Tianbo Lu

Orcid: 0009-0001-2882-6037

According to our database1, Tianbo Lu authored at least 29 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization.
Proceedings of the International Joint Conference on Neural Networks, 2023

Transformer-based Model for Multi-tab Website Fingerprinting Attack.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
TNRAS: Tor Nodes Reliability Analysis Scheme.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

2019
MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment.
Symmetry, 2019

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.
Secur. Commun. Networks, 2019

A Survey on Measuring Anonymity in Anonymous Communication Systems.
IEEE Access, 2019

Practice Teaching Reform of Discrete Mathematics Model based on D3.js.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2018
Path selection algorithm with minimal delay in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

2014
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
A New Estimation Model for Small Organic Software Project.
J. Softw., 2013

Next Big Thing in Big Data: The Security of the ICT Supply Chain.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Security Analysis on Cyber-physical System Using Attack Tree.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Cyber-physical System Risk Assessment.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2010
Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach.
Proceedings of the Computational Science and Its Applications, 2010

2009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Comput. Secur., 2009

Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008

2007
Towards an analysis of WonGoo performance.
Int. J. Pervasive Comput. Commun., 2007

2005
Building Scale-Free Overlay Mix Networks with Small-World Properties.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Performance Analysis ofWonGoo System.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004


  Loading...