Lan Luo

According to our database1, Lan Luo authored at least 36 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A probabilistic approach to assessing project complexity dynamics under uncertainty.
Soft Comput., 2022

DT CWT and Schur decomposition based robust watermarking algorithm to geometric attacks.
Multim. Tools Appl., 2022

On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

Hyperlink-induced Pre-training for Passage Retrieval in Open-domain Question Answering.
CoRR, 2022

Hyperlink-induced Pre-training for Passage Retrieval in Open-domain Question Answering.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

DVM-CAR: A large-scale automotive dataset for visual marketing research and applications.
CoRR, 2021

Answer Complex Questions: Path Ranker Is All You Need.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Research on the Relationship among Teachers' Psychological Capital, Job Satisfaction and Job Burnout.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Detection and Prediction of Ovulation From Body Temperature Measured by an In-Ear Wearable Thermometer.
IEEE Trans. Biomed. Eng., 2020

On a Family of Quantum Synchronizable Codes Based on the $(\lambda(u + v)|u - v)$ Construction.
IEEE Access, 2020

On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020

Learning to Infer User Hidden States for Online Sequential Advertising.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Sequential Advertising Agent with Interpretable User Hidden Intents.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Two new families of quantum synchronizable codes.
Quantum Inf. Process., 2019

Fault-tolerant quantum computation with non-binary systems.
Quantum Inf. Process., 2019

Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory.
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019

Microcontroller Based IoT System Firmware Security: Case Studies.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

On Misconception of Hardware and Cost in IoT Security and Privacy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Non-Binary Quantum Synchronizable Codes From Repeated-Root Cyclic Codes.
IEEE Trans. Inf. Theory, 2018

On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018

A model for the jitter of a ring oscillator under sinusoidal interference on the power supply.
Microelectron. J., 2018

Non-binary entanglement-assisted quantum stabilizer codes.
Sci. China Inf. Sci., 2017

Identification of gene pairs through penalized regression subject to constraints.
BMC Bioinform., 2017

A stochastic iterative evolution CT reconstruction algorithm for limited-angle sparse projection data.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Consumer Preference Elicitation of Complex Products Using Fuzzy Support Vector Machine Active Learning.
Mark. Sci., 2016

Researches on marital quality, well-being and social support of IT employees.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Pheromone mark ant colony optimization with a hybrid node-based pheromone update strategy.
Neurocomputing, 2015

An Improved Ant Colony Optimization Applied in Robot Path Planning Problem.
J. Comput., 2013

Credit Risk Model and Bayesian Improvement for Companies in China.
Proceedings of the Modeling Risk Management for Resources and Environment in China, 2011

Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules.
IACR Cryptol. ePrint Arch., 2009

A Comment to the Intelligent Functions of Different Weight Ciphers.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Immune Clonal Selection Wavelet Network Based Intrusion Detection.
Proceedings of the Artificial Neural Networks: Biological Inspirations, 2005

Probabilistic principal component subspaces: a hierarchical finite mixture model for data visualization.
IEEE Trans. Neural Networks Learn. Syst., 2000

Computer-based decision support system: visual mapping of featured database in computer-aided diagnosis.
Proceedings of the Medical Imaging 2000: Image Processing, 2000

Hierarchical probabilistic principal component subspaces for data visualization.
Proceedings of the International Joint Conference Neural Networks, 1999