Lu Yu

According to our database1, Lu Yu authored at least 15 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Internet Security Liberated via Software Defined Exchanges.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
Stealthy Domain Generation Algorithms.
IEEE Trans. Information Forensics and Security, 2017

TARN: A SDN-based traffic analysis resistant network architecture.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2016
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms.
ACM Comput. Surv., 2016

A brief survey of Cryptocurrency systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Provenance threat modeling.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A covert data transport protocol.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Stealthy malware traffic - Not as innocent as it looks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Automobile ECU Design to Avoid Data Tampering.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Semantic Similarity Detection For Data Leak Prevention.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng., 2013

A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybernetics, 2013

Applying POMDP to moving target optimization.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Observable subspace solution for irreducible POMDPs with infinite horizon.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011


  Loading...