Lu Yu

Orcid: 0000-0003-4109-0746

Affiliations:
  • Clemson University, Department of Electrical and Computer Engineering, SC, USA


According to our database1, Lu Yu authored at least 30 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Distributed Denial of Service (DDoS): A History.
IEEE Ann. Hist. Comput., 2022

2021
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion.
CoRR, 2021

On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms.
Comput. Secur., 2021

Availability analysis of a permissioned blockchain with a lightweight consensus protocol.
Comput. Secur., 2021

AFES: An Advanced Forensic Evidence System.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

2020
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Protocol Proxy: An FTE-based covert channel.
Comput. Secur., 2020

2019
Privacy Preserving Count Statistics.
CoRR, 2019

Traffic Analysis Resistant Network (TARN) Anonymity Analysis.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Internet freedom in West Africa: technical support for journalists and democracy advocates.
Commun. ACM, 2018

Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Internet Security Liberated via Software Defined Exchanges.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
Stealthy Domain Generation Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR, 2017

Stochastic Tools for Network Intrusion Detection.
CoRR, 2017

Stealthy Malware Traffic - Not as Innocent as It Looks.
CoRR, 2017

TARN: A SDN-based traffic analysis resistant network architecture.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2016
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms.
ACM Comput. Surv., 2016

A brief survey of Cryptocurrency systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Provenance threat modeling.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A covert data transport protocol.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Stealthy malware traffic - Not as innocent as it looks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Automobile ECU Design to Avoid Data Tampering.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Semantic Similarity Detection For Data Leak Prevention.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng., 2013

A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybern., 2013

Applying POMDP to moving target optimization.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Observable subspace solution for irreducible POMDPs with infinite horizon.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011


  Loading...