Login / Signup
Lu Yu
ORCID
Publication Activity (10 Years)
Years Active: 2011-2022
Publications (10 Years): 29
Top Topics
Sensor Fusion
Network Intrusion
Markov Model
Traffic Analysis
Top Venues
CoRR
MALWARE
Comput. Secur.
PST
</>
Publications
</>
Richard R. Brooks
,
Lu Yu
,
Ilker Özçelik
,
Jon Oakley
,
Nathan Tusing
Distributed Denial of Service (DDoS): A History.
IEEE Ann. Hist. Comput.
44 (2) (2022)
Amani Altarawneh
,
Fei Sun
,
Richard R. Brooks
,
Oluwakemi Hambolu
,
Lu Yu
,
Anthony Skjellum
Availability analysis of a permissioned blockchain with a lightweight consensus protocol.
Comput. Secur.
102 (2021)
Paul Black
,
Iqbal Gondal
,
Richard R. Brooks
,
Lu Yu
AFES: An Advanced Forensic Evidence System.
EDOC Workshops
(2021)
Jon Oakley
,
Carl R. Worley
,
Lu Yu
,
Richard R. Brooks
,
Ilker Özçelik
,
Anthony Skjellum
,
Jihad Obeid
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion.
CoRR
(2021)
Lu Yu
,
Yu Fu
,
Jonathan Oakley
,
Oluwakemi Hambolu
,
Richard R. Brooks
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms.
Comput. Secur.
105 (2021)
Jonathan Oakley
,
Lu Yu
,
Xingsi Zhong
,
Ganesh Kumar Venayagamoorthy
,
Richard R. Brooks
Protocol Proxy: An FTE-based covert channel.
Comput. Secur.
92 (2020)
Jonathan Oakley
,
Lu Yu
,
Xingsi Zhong
,
Ganesh Kumar Venayagamoorthy
,
Richard R. Brooks
Protocol Proxy: An FTE-based Covert Channel.
CoRR
(2020)
Nathan Tusing
,
Jonathan Oakley
,
C. Geddings Barrineau
,
Lu Yu
,
Kuang-Ching Wang
,
Richard R. Brooks
Traffic Analysis Resistant Network (TARN) Anonymity Analysis.
ICNP
(2019)
Lu Yu
,
Oluwakemi Hambolu
,
Yu Fu
,
Jon Oakley
,
Richard R. Brooks
Privacy Preserving Count Statistics.
CoRR
(2019)
Kuang-Ching Wang
,
Richard R. Brooks
,
C. Geddings Barrineau
,
Jonathan Oakley
,
Lu Yu
,
Qing Wang
Internet Security Liberated via Software Defined Exchanges.
SDN-NFV@CODASPY
(2018)
Hongda Li
,
Fuqiang Zhang
,
Lu Yu
,
Jon Oakley
,
Hongxin Hu
,
Richard R. Brooks
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
SDN-NFV@CODASPY
(2018)
Richard R. Brooks
,
Lu Yu
,
Yu Fu
,
Oluwakemi Hambolu
,
John Gaynard
,
Julie Owono
,
Archippe Yepmou
,
Felix Blanc
Internet freedom in West Africa: technical support for journalists and democracy advocates.
Commun. ACM
61 (5) (2018)
Sai Medury
,
Anthony Skjellum
,
Richard R. Brooks
,
Lu Yu
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System.
MALWARE
(2018)
Jonathan Oakley
,
Carl R. Worley
,
Lu Yu
,
Richard R. Brooks
,
Anthony Skjellum
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions.
MALWARE
(2018)
Xingsi Zhong
,
Yu Fu
,
Lu Yu
,
Richard R. Brooks
Stealthy Malware Traffic - Not as Innocent as It Looks.
CoRR
(2017)
Oluwakemi Hambolu
,
Lu Yu
,
Jon Oakley
,
Richard R. Brooks
,
Ujan Mukhopadhyay
,
Anthony Skjellum
Provenance Threat Modeling.
CoRR
(2017)
Lu Yu
,
Qing Wang
,
C. Geddings Barrineau
,
Jon Oakley
,
Richard R. Brooks
,
Kuang-Ching Wang
TARN: A SDN-based traffic analysis resistant network architecture.
MALWARE
(2017)
Yu Fu
,
Zhe Jia
,
Lu Yu
,
Xingsi Zhong
,
Richard R. Brooks
A Covert Data Transport Protocol.
CoRR
(2017)
Richard R. Brooks
,
Lu Yu
,
Yu Fu
,
Guthrie Cordone
,
Jon Oakley
,
Xingsi Zhong
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR
(2017)
Lu Yu
,
Qing Wang
,
C. Geddings Barrineau
,
Jon Oakley
,
Richard R. Brooks
,
Kuang-Ching Wang
TARN: A SDN-based Traffic Analysis Resistant Network Architecture.
CoRR
(2017)
Yu Fu
,
Lu Yu
,
Oluwakemi Hambolu
,
Ilker Özçelik
,
Benafsh Husain
,
Jingxuan Sun
,
Karan Sapra
,
Dan Du
,
Christopher Tate Beasley
,
Richard R. Brooks
Stealthy Domain Generation Algorithms.
IEEE Trans. Inf. Forensics Secur.
12 (6) (2017)
Lu Yu
,
Richard R. Brooks
Stochastic Tools for Network Intrusion Detection.
CoRR
(2017)
Yu Fu
,
Zhe Jia
,
Lu Yu
,
Xingsi Zhong
,
Richard R. Brooks
A covert data transport protocol.
MALWARE
(2016)
Ujan Mukhopadhyay
,
Anthony Skjellum
,
Oluwakemi Hambolu
,
Jon Oakley
,
Lu Yu
,
Richard R. Brooks
A brief survey of Cryptocurrency systems.
PST
(2016)
Buke Ao
,
Yongcai Wang
,
Lu Yu
,
Richard R. Brooks
,
S. S. Iyengar
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms.
ACM Comput. Surv.
49 (1) (2016)
Oluwakemi Hambolu
,
Lu Yu
,
Jon Oakley
,
Richard R. Brooks
,
Ujan Mukhopadhyay
,
Anthony Skjellum
Provenance threat modeling.
PST
(2016)
Xingsi Zhong
,
Yu Fu
,
Lu Yu
,
Richard R. Brooks
,
Ganesh Kumar Venayagamoorthy
Stealthy malware traffic - Not as innocent as it looks.
MALWARE
(2015)
Dan Du
,
Lu Yu
,
Richard R. Brooks
Semantic Similarity Detection For Data Leak Prevention.
CISR
(2015)
Lu Yu
,
Juan Deng
,
Richard R. Brooks
,
SeokBae Yun
Automobile ECU Design to Avoid Data Tampering.
CISR
(2015)
Chen Lu
,
Jason M. Schwier
,
Ryan Craven
,
Lu Yu
,
Richard R. Brooks
,
Christopher Griffin
A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybern.
43 (3) (2013)
Lu Yu
,
Jason M. Schwier
,
Ryan Craven
,
Richard R. Brooks
,
Christopher Griffin
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng.
25 (7) (2013)
Lu Yu
,
Richard R. Brooks
Applying POMDP to moving target optimization.
CSIIRW
(2013)
Lu Yu
,
Richard R. Brooks
Observable subspace solution for irreducible POMDPs with infinite horizon.
CSIIRW
(2011)