​
Login / Signup
Hui Lu
ORCID
Publication Activity (10 Years)
Years Active: 2018-2023
Publications (10 Years): 45
Top Topics
Support Vector
Anomaly Detection
Partially Observable
Risk Aversion
Top Venues
ICCCS (1)
IEEE Access
Int. J. Distributed Sens. Networks
IEEE Internet Things J.
</>
Publications
</>
Junhan Chen
,
Rufeng Liang
,
Man Zhang
,
Chengcong Zheng
,
Xun Huang
,
Hui Lu
,
Xiang Yu
,
Zhihong Tian
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
CloudNet
(2023)
Weicheng Li
,
Hui Lu
,
Yanbin Sun
,
Shen Su
,
Jing Qiu
,
Zhihong Tian
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
IWQoS
(2023)
Shen Su
,
Yue Xue
,
Liansheng Lin
,
Chao Wang
,
Hui Lu
,
Jing Qiu
,
Yanbin Sun
,
Yuan Liu
,
Zhihong Tian
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
GLOBECOM
(2023)
Shen Su
,
Yuntian Tan
,
Yue Xue
,
Chao Wang
,
Hui Lu
,
Zhihong Tian
,
Chun Shan
,
Xiaojiang Du
Detecting Smart Contract Project Anomalies in Metaverse.
MetaCom
(2023)
Yangzixing Lv
,
Wei Shi
,
Weiyong Zhang
,
Hui Lu
,
Zhihong Tian
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J.
10 (12) (2023)
Ximing Chen
,
Jing Qiu
,
Fasheng Zhou
,
Hui Lu
,
Lejun Zhang
,
Zhihong Tian
,
Xiaojiang Du
,
Mohsen Guizani
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun.
30 (5) (2023)
Runsheng Guo
,
Qichao Liu
,
Man Zhang
,
Ning Hu
,
Hui Lu
A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection.
DSC
(2022)
Jian Hou
,
Fangai Liu
,
Hui Lu
,
Zhiyuan Tan
,
Xuqiang Zhuang
,
Zhihong Tian
A novel flow-vector generation approach for malicious traffic detection.
J. Parallel Distributed Comput.
169 (2022)
Hui Lu
,
Chengjie Jin
,
Xiaohan Helu
,
Xiaojiang Du
,
Mohsen Guizani
,
Zhihong Tian
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng.
9 (4) (2022)
Jiantao Shi
,
Likun Liu
,
Xiangzhan Yu
,
Hui Lu
A collaborative service resource evaluation model based on trust network.
EURASIP J. Wirel. Commun. Netw.
2021 (1) (2021)
Jiageng Yang
,
Xinguo Zhang
,
Hui Lu
,
Muhammad Shafiq
,
Zhihong Tian
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.
Secur. Commun. Networks
2021 (2021)
Hui Lu
,
Chengjie Jin
,
Xiaohan Helu
,
Chunsheng Zhu
,
Nadra Guizani
,
Zhihong Tian
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw.
35 (2) (2021)
Ning Hu
,
Zhihong Tian
,
Hui Lu
,
Xiaojiang Du
,
Mohsen Guizani
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern.
12 (11) (2021)
Zhaoquan Gu
,
Weixiong Hu
,
Chuanjing Zhang
,
Hui Lu
,
Lihua Yin
,
Le Wang
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng.
8 (2) (2021)
Runhai Jiao
,
Shuangkun Wang
,
Tianle Zhang
,
Hui Lu
,
Hui He
,
Brij B. Gupta
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method.
IEEE Trans. Netw. Serv. Manag.
18 (4) (2021)
Jin Li
,
Songqi Wu
,
Yundan Yang
,
Fenghui Duan
,
Hui Lu
,
Yueming Lu
Controlled Sharing Mechanism of Data Based on the Consortium Blockchain.
Secur. Commun. Networks
2021 (2021)
Hui Lu
,
Chengjie Jin
,
Xiaohan Helu
,
Man Zhang
,
Yanbin Sun
,
Yi Han
,
Zhihong Tian
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl.
26 (4) (2021)
Haitao Sun
,
Chengjie Jin
,
Xiaohan Helu
,
Hui Lu
,
Man Zhang
,
Zhihong Tian
Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks
16 (2) (2020)
Mohan Li
,
Yanbin Sun
,
Hui Lu
,
Sabita Maharjan
,
Zhihong Tian
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J.
7 (7) (2020)
Zhihong Tian
,
Chaochao Luo
,
Hui Lu
,
Shen Su
,
Yanbin Sun
,
Man Zhang
User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci.
1 (3) (2020)
Xiang Yu
,
Hui Lu
,
Xianfei Yang
,
Ying Chen
,
Haifeng Song
,
Jianhua Li
,
Wei Shi
An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks.
Int. J. Distributed Sens. Networks
16 (5) (2020)
Hanwen Liu
,
Xiaohan Helu
,
Chengjie Jin
,
Hui Lu
,
Zhihong Tian
,
Xiaojiang Du
,
Khalid Abualsaud
A Malware Detection Method for Health Sensor Data Based on Machine Learning.
ICIoT
(2020)
Menghai Pan
,
Weixiao Huang
,
Yanhua Li
,
Xun Zhou
,
Zhenming Liu
,
Rui Song
,
Hui Lu
,
Zhihong Tian
,
Jun Luo
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol.
11 (1) (2020)
Lihua Yin
,
Xi Luo
,
Chunsheng Zhu
,
Liming Wang
,
Zhen Xu
,
Hui Lu
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics
16 (2) (2020)
Weixiang Chen
,
Xiaohan Helu
,
Chengjie Jin
,
Man Zhang
,
Hui Lu
,
Yanbin Sun
,
Zhihong Tian
Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol.
31 (12) (2020)
Mingzhou Yang
,
Yanhua Li
,
Xun Zhou
,
Hui Lu
,
Zhihong Tian
,
Jun Luo
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
WWW
(2020)
Xianfei Yang
,
Xiang Yu
,
Hui Lu
Dual possibilistic regression models of support vector machines and application in power load forecasting.
Int. J. Distributed Sens. Networks
16 (5) (2020)
Yuanyuan Chen
,
Hui Lu
,
Jing Qiu
,
Le Wang
A Tutorial of Graph Representation.
ICAIS (1)
(2019)
Xiang Yu
,
Hui Lu
,
Le Wang
,
Dapeng Man
A Dynamic Event Region Tracking Approach Based on Node Calibration.
ICAIS (1)
(2019)
Dan Xu
,
Le Wang
,
Jing Qiu
,
Hui Lu
A Review of Network Representation Learning.
ICAIS (2)
(2019)
Chaobin Wang
,
Le Wang
,
Mohan Li
,
Yu Jiang
,
Hui Lu
A Distributed Cryptanalysis Framework Based on Mobile Phones.
ICAIS (4)
(2019)
Menghai Pan
,
Yanhua Li
,
Xun Zhou
,
Zhenming Liu
,
Rui Song
,
Hui Lu
,
Jun Luo
Dissecting the Learning Curve of Taxi Drivers: A Data-Driven Approach.
SDM
(2019)
Cong Zhang
,
Yanhua Li
,
Jie Bao
,
Sijie Ruan
,
Tianfu He
,
Hui Lu
,
Zhihong Tian
,
Cong Liu
,
Chao Tian
,
Jianfeng Lin
,
Xianen Li
Effective Recycling Planning for Dockless Sharing Bikes.
SIGSPATIAL/GIS
(2019)
Le Wang
,
Zhihong Tian
,
Zhaoquan Gu
,
Hui Lu
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access
7 (2019)
Hui Lu
,
Man Zhang
,
Shen Su
,
Xiangsong Gao
,
Chaochao Luo
Broken Bike Recycling Planning for Sharing Bikes System.
IEEE Access
7 (2019)
Hui Lu
,
Xiaohan Helu
,
Chengjie Jin
,
Yanbin Sun
,
Man Zhang
,
Zhihong Tian
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access
7 (2019)
Hangfeng Yang
,
Shudong Li
,
Xiaobo Wu
,
Hui Lu
,
Weihong Han
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access
7 (2019)
Hui Lu
,
Xiang Cui
,
Le Wang
,
Yu Jiang
,
Meng Cui
The Research on Security Audit for Information System Classified Protection.
ICCCS (2)
(2018)
Xiang Yu
,
Yanbo Li
,
Hui Lu
,
Le Wang
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope.
ICCCS (1)
(2018)
Xiang Yu
,
Shuang Chen
,
Yanbo Li
,
Hui Lu
,
Le Wang
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
ICCCS (3)
(2018)
Xiangsong Gao
,
Hui Lu
,
Xiang Cui
,
Le Wang
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory.
ICCCS (1)
(2018)
Chaochao Luo
,
Le Wang
,
Hui Lu
Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset.
ICCCS (1)
(2018)
Yanbin Sun
,
Mohan Li
,
Le Wang
,
Hui Lu
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
ICCCS (1)
(2018)
Mohan Li
,
Yanbin Sun
,
Le Wang
,
Hui Lu
Quality-Aware Query Based on Relative Source Quality.
ICCCS (2)
(2018)
Hui Lu
,
Xiang Cui
,
Le Wang
,
Yu Jiang
,
Ronglai Jia
A Trusted Computing Base for Information System Classified Protection.
ICCCS (1)
(2018)