Lei Luo

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China


According to our database1, Lei Luo authored at least 35 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Particle Filter Localization Algorithm Based on LOS Possibility for Smart Vehicle Digital Key.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A Federated Learning Scheme Based on Lightweight Differential Privacy.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Generate qualified adversarial attacks and foster enhanced models based on generative adversarial networks.
Intell. Data Anal., 2022

Research and Application of Intelligent Vehicle Cybersecurity Threat Model.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Capability-based Component Security Mechanism for Microkernel OS.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
A Complete Privacy-Preserving Credit Score System Using Blockchain and Zero Knowledge Proof.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A Data Protection-Oriented Design Procedure for a Federated Learning Framework.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
安全虚拟机监视器的形式化验证研究 (Study on Formal Verification of Secure Virtual Machine Monitor).
计算机科学, 2019

2018
基于纳什均衡的AUTOSAR任务到多核ECU的映射方法 (Nash Equilibrium Based Method for Mapping AUTOSAR Tasks to Multicore ECU).
计算机科学, 2018

AUTOSAR可运行实体-任务自动映射方法研究 (Study on Automatic Method for AUTOSAR Runnable Entity-task Mapping).
计算机科学, 2018

2016
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm.
Int. J. Distributed Sens. Networks, 2016

2015
A context-aware mobile web middleware for service of surveillance video with privacy.
Multim. Tools Appl., 2015

嵌入式操作系统的形式化验证研究 (Research on Formal Verification of Embedded Operating System).
计算机科学, 2015

2013
Reliability analysis of real-time fault-tolerant task models.
Des. Autom. Embed. Syst., 2013

A Novel Mobile Device NFC Stack Architecture.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Research on Client/Server Communication Mechanism in AUTOSAR System.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Reliability Analysis of Task Model in Real-Time Fault-Tolerant Systems.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A Precise Memory Model for Operating System Code Verification.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Schedulability Analysis for Distributed Systems Using Network of Action Automata and Environment Automata.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

End-to-End Schedulability Analysis for Bi-directional Real-Time Multistage Pipeline.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
Component-based Mobile Web Application of Cross-platform.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Research on Mobile Web Applications End to End Technology.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Decompression Method for Massive Compressed Files in Mobile Rich Media Applications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Dependability Analysis for AADL Models by PVS.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
Formal Schedulability Analysis and Simulation for AADL.
Proceedings of the International Conference on Embedded Software and Systems, 2008

UCaS: A Schedulability Analysis Tool for AADL Models.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2004
QoS Adaptive Algorithms Based on Resources Availability of Mobile Terminals.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

2003
A formal semantic definition of DEVIL.
ACM SIGPLAN Notices, 2003

Partitioning based operating system: a formal model.
ACM SIGOPS Oper. Syst. Rev., 2003

2001
The Minimal Model of Operating Systems.
ACM SIGOPS Oper. Syst. Rev., 2001

A Provably Correct Operating System: delta-Core.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...