default search action
Zhuo Lu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Zhuo Lu, Ziye Jia, Qihui Wu, Zhu Han:
Joint Trajectory Planning and Communication Design for Multiple UAVs in Intelligent Collaborative Air-Ground Communication Systems. IEEE Internet Things J. 11(19): 31053-31067 (2024) - [j38]Xingyu Li, Zhe Qu, Bo Tang, Zhuo Lu:
FedLGA: Toward System-Heterogeneity of Federated Learning via Local Gradient Approximation. IEEE Trans. Cybern. 54(1): 401-414 (2024) - [j37]Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, Yao Liu:
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. IEEE Trans. Dependable Secur. Comput. 21(5): 4343-4359 (2024) - [j36]Letian Zhang, Zhuo Lu, Linqi Song, Jie Xu:
CrossVision: Real-Time On-Camera Video Analysis via Common RoI Load Balancing. IEEE Trans. Mob. Comput. 23(5): 5027-5039 (2024) - [j35]Jiahao Xue, Zhe Qu, Jie Xu, Yao Liu, Zhuo Lu:
Bandwidth Allocation for Federated Learning With Wireless Providers and Cost Constraints. IEEE Trans. Mob. Comput. 23(6): 7470-7482 (2024) - [j34]Zhuo Lu, Guangyu Wu, Fuhui Zhou, Qihui Wu:
Intelligently Joint Task Assignment and Trajectory Planning for UAV Cluster With Limited Communication. IEEE Trans. Veh. Technol. 73(9): 13122-13137 (2024) - [c65]Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu:
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics. INFOCOM 2024: 691-700 - [c64]Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. NDSS 2024 - [c63]Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu:
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information. SP 2024: 2740-2758 - [i16]Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu:
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics. CoRR abs/2402.08986 (2024) - 2023
- [j33]Zhihui Mao, Zhuo Lu, Yanjie Wu, Lei Deng:
DBH Estimation for Individual Tree: Two-Dimensional Images or Three-Dimensional Point Clouds? Remote. Sens. 15(16): 4116 (2023) - [j32]Shuang Wu, Lei Deng, Jun Zhai, Zhuo Lu, Yanjie Wu, Yan Chen, Lijie Guo, Haifeng Gao:
Approach for Monitoring Spatiotemporal Changes in Fractional Vegetation Cover Through Unmanned Aerial System-Guided-Satellite Survey: A Case Study in Mining Area. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 5502-5513 (2023) - [j31]Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 437-450 (2023) - [j30]Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 20(1): 637-649 (2023) - [j29]Chunhe Song, Jiaxin Chen, Zhuo Lu, Fei Li, Yiyang Liu:
Steel Surface Defect Detection via Deformable Convolution and Background Suppression. IEEE Trans. Instrum. Meas. 72: 1-9 (2023) - [j28]Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, Yao Liu:
On the Convergence of Multi-Server Federated Learning With Overlapping Area. IEEE Trans. Mob. Comput. 22(11): 6647-6662 (2023) - [c62]Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu, Tao Wang:
SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity. CNS 2023: 1-9 - [c61]Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. ICCCN 2023: 1-10 - [c60]Zhengping Jay Luo, Will A. Pitera, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu:
How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks? WiseML@WiSec 2023: 9-14 - [i15]Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu:
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security. CoRR abs/2306.06178 (2023) - [i14]Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. CoRR abs/2311.07780 (2023) - 2022
- [j27]Zhuo Lu, Lei Deng, Han Lu:
An Improved LAI Estimation Method Incorporating with Growth Characteristics of Field-Grown Wheat. Remote. Sens. 14(16): 4013 (2022) - [j26]Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, Yalin E. Sagduyu:
When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing. IEEE Trans. Mob. Comput. 21(5): 1892-1908 (2022) - [j25]Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Trans. Netw. 30(4): 1733-1748 (2022) - [j24]Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, Yao Liu:
Context-Aware Online Client Selection for Hierarchical Federated Learning. IEEE Trans. Parallel Distributed Syst. 33(10): 4353-4367 (2022) - [c59]Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. CCS 2022: 905-919 - [c58]Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu:
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. CCS 2022: 1383-1397 - [c57]Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298 - [c56]Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, Zhuo Lu:
Generalized Federated Learning via Sharpness Aware Minimization. ICML 2022: 18250-18280 - [c55]Xingyu Li, Zhe Qu, Bo Tang, Zhuo Lu:
Stragglers Are Not Disasters: A Hybrid Federated Learning Framework with Delayed Gradients. ICMLA 2022: 727-732 - [c54]Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, Yalin E. Sagduyu:
MUSTER: Subverting User Selection in MU-MIMO Networks. INFOCOM 2022: 140-149 - [c53]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. WiseML@WiSec 2022: 63-68 - [c52]Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, Qingqi Pei:
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security. WISEC 2022: 222-232 - [i13]Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. CoRR abs/2201.02873 (2022) - [i12]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. CoRR abs/2201.03281 (2022) - [i11]Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang, Zhuo Lu:
Generalized Federated Learning via Sharpness Aware Minimization. CoRR abs/2206.02618 (2022) - [i10]Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. CoRR abs/2207.13192 (2022) - [i9]Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, Yao Liu:
On the Convergence of Multi-Server Federated Learning with Overlapping Area. CoRR abs/2208.07893 (2022) - 2021
- [j23]Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu:
Binary Code Similarity Detection through LSTM and Siamese Neural Network. EAI Endorsed Trans. Security Safety 8(29): e1 (2021) - [j22]Shangqing Zhao, Zhuo Lu, Cliff Wang:
Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense. IEEE Trans. Dependable Secur. Comput. 18(6): 2617-2630 (2021) - [j21]Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, Yao Liu:
How to Test the Randomness From the Wireless Channel for Security? IEEE Trans. Inf. Forensics Secur. 16: 3753-3766 (2021) - [j20]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Trans. Netw. 29(6): 2779-2792 (2021) - [c51]Junjie Xiong, Mingkui Wei, Zhuo Lu, Yao Liu:
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud. CCS 2021: 955-969 - [c50]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification. DySPAN 2021: 280-287 - [c49]Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han, Junjie Xiong:
Smartphone Location Spoofing Attack in Wireless Networks. SecureComm (2) 2021: 295-313 - [c48]Zhengping Luo, Shangqing Zhao, Rui Duan, Zhuo Lu, Yalin E. Sagduyu, Jie Xu:
Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing. WiseML@WiSec 2021: 55-60 - [i8]Xingyu Li, Zhe Qu, Bo Tang, Zhuo Lu:
Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients. CoRR abs/2102.06329 (2021) - [i7]Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, Yao Liu:
How to Test the Randomness from the Wireless Channel for Security? CoRR abs/2106.07715 (2021) - [i6]Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, Yao Liu:
Context-Aware Online Client Selection for Hierarchical Federated Learning. CoRR abs/2112.00925 (2021) - [i5]Xingyu Li, Zhe Qu, Bo Tang, Zhuo Lu:
FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation. CoRR abs/2112.11989 (2021) - 2020
- [j19]Shangqing Zhao, Zhuo Lu, Cliff Wang:
How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks? IEEE Trans. Wirel. Commun. 19(11): 7224-7236 (2020) - [c47]Zhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Log Analytics in HPC: A Data-driven Reinforcement Learning Framework. INFOCOM Workshops 2020: 550-555 - [c46]Lixing Chen, Zhuo Lu, Pan Zhou, Jie Xu:
Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks. INFOCOM 2020: 656-665 - [c45]Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. INFOCOM 2020: 1598-1607 - [c44]Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu, Yao Liu:
Comb Decoding towards Collision-Free WiFi. NSDI 2020: 933-951 - [c43]Zhengping Luo, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, Jie Xu:
Adversarial machine learning based partial-model attack in IoT. WiseML@WiSec 2020: 13-18 - [p3]Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, Yao Liu:
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis. Adaptive Autonomous Secure Cyber Systems 2020: 109-129 - [i4]Yalin E. Sagduyu, Yi Shi, Tugba Erpek, William C. Headley, Bryse Flowers, George Stantchev, Zhuo Lu:
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions. CoRR abs/2001.08883 (2020) - [i3]Zhengping Luo, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, Jie Xu:
Adversarial Machine Learning based Partial-model Attack in IoT. CoRR abs/2006.14146 (2020) - [i2]Zhuo Lu, Cliff Wang, Shangqing Zhao:
Cyber Deception for Computer and Network Security: Survey and Challenges. CoRR abs/2007.14497 (2020)
2010 – 2019
- 2019
- [j18]Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu:
Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation. Comput. Networks 158: 184-192 (2019) - [j17]Zhengping Luo, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Security of HPC Systems: From a Log-analyzing Perspective. EAI Endorsed Trans. Security Safety 6(21): e5 (2019) - [j16]Zhuo Lu, Yalin E. Sagduyu, Yi Shi:
Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation. IEEE Trans. Mob. Comput. 18(1): 111-124 (2019) - [c42]Zhuo Lu:
MTD 2019: The 6th ACM Workshop on Moving Target Defense. CCS 2019: 2697-2698 - [c41]Shangqing Zhao, Zhe Qu, Zhuo Lu, Tao Wang:
Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems. DySPAN 2019: 1-2 - [c40]Tao Hou, Tao Wang, Zhuo Lu, Yao Liu:
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic. GlobalSIP 2019: 1-5 - [c39]Mingkui Wei, Jie Wang, Zhuo Lu, Wenye Wang:
On Studying Information Dissemination in Social-Physical Interdependent Networks. ICC 2019: 1-6 - [c38]Shangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu:
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks. INFOCOM 2019: 1603-1611 - [c37]Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Entrapment for Wireless Eavesdroppers. INFOCOM 2019: 2530-2538 - [c36]Mohammed Alrowaily, Freeh Alenezi, Zhuo Lu:
Effectiveness of Machine Learning Based Intrusion Detection Systems. SpaCCS 2019: 277-288 - [e1]Zhuo Lu:
Proceedings of the 6th ACM Workshop on Moving Target Defense, MTD@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6828-5 [contents] - [i1]Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, Yalin E. Sagduyu:
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing. CoRR abs/1905.01430 (2019) - 2018
- [j15]Hejun Jiang, Penghui Luo, Debo Zhi, Fulang Qi, Xiaoyan Huang, Zhuo Lu, Mengke Ge, Lulu Wang, Bensheng Qiu:
In Vitro and In Vivo Experimental Studies of A Novel MR-Guided Method for Bipolar Radiofrequency Liver Ablation. IEEE Access 6: 21859-21866 (2018) - [j14]Cliff Wang, Zhuo Lu:
Cyber Deception: Overview and the Road Ahead. IEEE Secur. Priv. 16(2): 80-85 (2018) - [j13]Mingkui Wei, Zhuo Lu, Wenye Wang:
On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid. IEEE Syst. J. 12(4): 3404-3413 (2018) - [c35]Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. CCS 2018: 1747-1760 - [c34]Mohammed Alrowaily, Zhuo Lu:
Secure Edge Computing in IoT Systems: Review and Case Studies. SEC 2018: 440-444 - [c33]Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Zhuo Lu, Jason H. Li:
Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies. ICC Workshops 2018: 1-6 - [c32]Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu:
How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure? INFOCOM 2018: 2501-2509 - [c31]Lixing Chen, Jie Xu, Zhuo Lu:
Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward. NeurIPS 2018: 3251-3260 - 2017
- [j12]Liangmin Wang, Zhuo Lu, Hongjian Sun, Yantian Hou, Mengxing Huang:
Security and Privacy in Internet of Things with Crowd-Sensing. J. Electr. Comput. Eng. 2017: 2057965:1-2057965:2 (2017) - [j11]Zhuo Lu, Yalin E. Sagduyu, Jason H. Li:
Securing the Backpressure Algorithm for Wireless Networks. IEEE Trans. Mob. Comput. 16(4): 1136-1148 (2017) - [j10]Zhuo Lu, Cliff Wang:
Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective. IEEE/ACM Trans. Netw. 25(1): 43-55 (2017) - [c30]Mingkui Wei, Zhuo Lu, Wenye Wang:
On modeling and understanding vehicle evacuation attacks in VANETs. ICC 2017: 1-7 - [c29]Shangqing Zhao, Zhuo Lu, Cliff Wang:
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography. ICDCS 2017: 172-182 - [c28]Zhuo Lu, Mingkui Wei, Xiang Lu:
How they interact? Understanding cyber and physical interactions against fault propagation in smart grid. INFOCOM 2017: 1-9 - [c27]Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, Yao Liu:
Stateful Inter-Packet Signal Processing for Wireless Networking. MobiCom 2017: 15-27 - [c26]Ian D. Markwood, Dakun Shen, Yao Liu, Zhuo Lu:
PDF Mirage: Content Masking Attack Against Information-Based Online Services. USENIX Security Symposium 2017: 833-847 - 2016
- [j9]Zhuo Lu, Wenye Wang, Cliff Wang:
On the Evolution and Impact of Mobile Botnets in Wireless Networks. IEEE Trans. Mob. Comput. 15(9): 2304-2316 (2016) - [c25]Lei Pi, Zhuo Lu, Yalin E. Sagduyu, Su Chen:
Defending active learning against adversarial inputs in automated document classification. GlobalSIP 2016: 257-261 - [c24]Shichao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang, Limin Sun:
Zero reconciliation secret key extraction in MIMO backscatter wireless systems. ICC 2016: 1-6 - [c23]Mingkui Wei, Zhuo Lu, Wenye Wang:
Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid. ICC 2016: 1-6 - [c22]Zhuo Lu, Yalin Evren Sagduyu, Yi Shi:
Friendships in the air: Integrating social links into wireless network modeling, routing, and analysis. INFOCOM Workshops 2016: 322-327 - [c21]Zhuo Lu, Yalin E. Sagduyu:
Risk assessment based access control with text and behavior analysis for document management. MILCOM 2016: 37-42 - [p2]Zhuo Lu, Cliff Wang, Mingkui Wei:
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. Cyber Deception 2016: 99-116 - 2015
- [b1]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23287-4, pp. 1-116 - [j8]Zhuo Lu, Wenye Wang, Cliff Wang:
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming. IEEE Trans. Dependable Secur. Comput. 12(1): 31-44 (2015) - [j7]Lei Sun, Wenye Wang, Zhuo Lu:
On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures. IEEE Trans. Wirel. Commun. 14(6): 3390-3401 (2015) - [c20]Zhuo Lu, Lisa M. Marvel, Cliff Wang:
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs. MTD@CCS 2015: 85-93 - [c19]Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li:
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. INFOCOM 2015: 253-261 - [c18]Zhuo Lu, Cliff Wang:
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. INFOCOM 2015: 280-288 - [c17]Zhuo Lu, Cliff Wang, Mingkui Wei:
On detection and concealment of critical roles in tactical wireless networks. MILCOM 2015: 909-914 - 2014
- [j6]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications. IEEE Trans. Mob. Comput. 13(8): 1746-1759 (2014) - [c16]Zhuo Lu, Wenye Wang, Cliff Wang:
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. INFOCOM 2014: 1501-1509 - [c15]Zhuo Lu, Yalin E. Sagduyu, Yi Shi:
Socio-technological Testbed for Evaluation of Combined Social and Communication Networks. MILCOM 2014: 989-994 - [p1]Nicholas Evancich, Zhuo Lu, Jason H. Li, Yi Cheng, Joshua Tuttle, Peng Xie:
Network-Wide Awareness. Cyber Defense and Situational Awareness 2014: 63-91 - 2013
- [j5]Wenye Wang, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. Comput. Networks 57(5): 1344-1371 (2013) - 2012
- [j4]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks. IEEE Trans. Mob. Comput. 11(8): 1331-1344 (2012) - [c14]Zhuo Lu, Wenye Wang, Cliff Wang:
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. INFOCOM 2012: 3066-3070 - 2011
- [c13]Xiang Lu, Zhuo Lu, Wenye Wang, Jianfeng Ma:
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6 - [c12]Zhuo Lu, Wenye Wang, Cliff Wang:
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. INFOCOM 2011: 1871-1879 - [c11]Xiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma:
From security to vulnerability: Data authentication undermines message delivery in smart grid. MILCOM 2011: 1183-1188 - 2010
- [j3]Wei Dong, Jiandong Li, Zhuo Lu, Wen Zhang:
Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error. Circuits Syst. Signal Process. 29(2): 275-293 (2010) - [j2]Wei Dong, Jiandong Li, Zhuo Lu:
Parameter Estimation for Correlated MIMO Channels with Frequency-Selective Fading. Wirel. Pers. Commun. 52(4): 813-828 (2010) - [c10]Zhuo Lu, Cliff Wang, Wenye Wang:
On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks. ICC 2010: 1-5 - [c9]Zhuo Lu, Wenye Wang, Cliff Wang:
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks. INFOCOM 2010: 1819-1827
2000 – 2009
- 2009
- [c8]Wei Dong, Jiandong Li, Zhuo Lu:
Joint timing error, frequency offset and channel estimation for MIMO systems. IWCMC 2009: 878-882 - 2008
- [c7]Wei Dong, Jiandong Li, Zhuo Lu:
Parameter Estimation for MIMO Systems with Multiple Frequency Offsets. AINA 2008: 480-485 - [c6]Wei Dong, Jiandong Li, Zhuo Lu:
Joint Frequency Offset and Channel Estimation for MIMO Systems Based on Particle Swarm Optimization. VTC Spring 2008: 862-866 - 2007
- [j1]Zhuo Lu, Linjing Zhao, Jiandong Li:
Further Results on the Maximum-Likelihood IFO Estimation for OFDM Systems. IEEE Trans. Consumer Electron. 53(2): 286-288 (2007) - [c5]Jiyong Pang, Jiandong Li, Linjing Zhao, Zhuo Lu:
Optimal Training Sequences for Frequency-Selective MIMO Correlated Fading Channels. AINA 2007: 820-824 - [c4]Zhuo Lu, Jiandong Li, Linjing Zhao, Yao Liu:
Composite Frequency-Offset Estimator for Wireless Communications. ICC 2007: 5873-5878 - [c3]Jiyong Pang, Jiandong Li, Linjing Zhao, Zhuo Lu:
Optimal Training Sequences for MIMO Channel Estimation with Spatial Correlation. VTC Fall 2007: 651-655 - 2006
- [c2]Zhuo Lu, Jiandong Li, Linjing Zhao, Jiyong Pang:
Iterative Parameter Estimation in MIMO Flat-fading Channels with Frequency Offsets. AINA (2) 2006: 802-805 - [c1]Linjing Zhao, Jiandong Li, Zhuo Lu, Jiyong Pang:
Carrier-Frequency Offsets Estimation Based on ML and ESPRIT Method for OFDMA Uplink. AINA (2) 2006: 809-816
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint