Hui Lu

Orcid: 0000-0002-4120-7716

Affiliations:
  • Guangzhou University, Cyberspace Institute of Advanced Technology, China
  • Beijing University of Posts and Telecommunications, China (PhD)


According to our database1, Hui Lu authored at least 50 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023

Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023

Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023

2022
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022

A novel flow-vector generation approach for malicious traffic detection.
J. Parallel Distributed Comput., 2022

A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method.
IEEE Trans. Netw. Serv. Manag., 2021

Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.
Secur. Commun. Networks, 2021

Controlled Sharing Mechanism of Data Based on the Consortium Blockchain.
Secur. Commun. Networks, 2021

AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021

A collaborative service resource evaluation model based on trust network.
EURASIP J. Wirel. Commun. Netw., 2021

2020
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020

ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020

User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Dual possibilistic regression models of support vector machines and application in power load forecasting.
Int. J. Distributed Sens. Networks, 2020

Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020

Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020

Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

A Malware Detection Method for Health Sensor Data Based on Machine Learning.
Proceedings of the IEEE International Conference on Informatics, 2020

A Survey of Hybrid Fuzzing based on Symbolic Execution.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Systemic Review of Kernel Fuzzing.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access, 2019

Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019

Broken Bike Recycling Planning for Sharing Bikes System.
IEEE Access, 2019

Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access, 2019

Dissecting the Learning Curve of Taxi Drivers: A Data-Driven Approach.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Dynamic Event Region Tracking Approach Based on Node Calibration.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research on Content Extraction of Rich Text Web Pages.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Review of Network Representation Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Distributed Cryptanalysis Framework Based on Mobile Phones.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Tutorial of Graph Representation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network Protocol Analysis Base on WeChat PC Version.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Effective Recycling Planning for Dockless Sharing Bikes.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

2018
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Trusted Computing Base for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The Research on Security Audit for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Quality-Aware Query Based on Relative Source Quality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Encryption Traffic Analysis Countermeasure Model Based on Game Theory.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018


  Loading...