Xiaorong Lu

According to our database1, Xiaorong Lu authored at least 15 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Combined Effects of Artificial Surface and Urban Blue-Green Space on Land Surface Temperature in 28 Major Cities in China.
Remote. Sens., 2022

2021
Seasonal Variations of Daytime Land Surface Temperature and Their Underlying Drivers over Wuhan, China.
Remote. Sens., 2021

YACLC: A Chinese Learner Corpus with Multidimensional Annotation.
CoRR, 2021

2016
Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Geospatial Streams Publish with Differential Privacy.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Secure and Robust Covert Channel Based on Secret Sharing Scheme.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Secur. Commun. Networks, 2015

Remotely Sensed Trajectory Analysis of Channel Migration in Lower Jingjiang Reach during the Period of 1983-2013.
Remote. Sens., 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Towards Preserving Worker Location Privacy in Spatial Crowdsourcing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Steganalysis of Compressed Speech Based on Markov and Entropy.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013


  Loading...