dblp: Tianbo Lu https://dblp.org/pid/10/542.html dblp person page RSS feed Wed, 08 Jan 2025 20:32:58 +0100 en-US daily 1 released under the CC0 1.0 license dblp@dagstuhl.de (dblp team) dblp@dagstuhl.de (dblp team) Computers/Computer_Science/Publications/Bibliographies http://www.rssboard.org/rss-specification https://dblp.org/img/logo.144x51.pngdblp: Tianbo Luhttps://dblp.org/pid/10/542.html14451 SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining.https://doi.org/10.1109/TNSM.2024.3435869, , :
SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining. IEEE Trans. Netw. Serv. Manag. 21(6): 6153-6173 ()]]>
https://dblp.org/rec/journals/tnsm/ShangLZ24Sun, 01 Dec 2024 00:00:00 +0100
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.https://doi.org/10.1007/978-3-031-54773-7_11, , , , :
DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks. ACNS (2) : 265-282]]>
https://dblp.org/rec/conf/acns/LuDSZZ24Mon, 01 Jan 2024 00:00:00 +0100
Transformer-based Model for Multi-tab Website Fingerprinting Attack.https://doi.org/10.1145/3576915.3623107, , , :
Transformer-based Model for Multi-tab Website Fingerprinting Attack. CCS : 1050-1064]]>
https://dblp.org/rec/conf/ccs/JinLLS23Sun, 01 Jan 2023 00:00:00 +0100
An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization.https://doi.org/10.1109/IJCNN54540.2023.10191537, , , , :
An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization. IJCNN : 1-8]]>
https://dblp.org/rec/conf/ijcnn/WangXLZY23Sun, 01 Jan 2023 00:00:00 +0100
Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention.https://doi.org/10.1109/ISCC58397.2023.10217886, , , , :
Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention. ISCC : 1242-1247]]>
https://dblp.org/rec/conf/iscc/FengXYLZ23Sun, 01 Jan 2023 00:00:00 +0100
A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion.https://doi.org/10.1007/978-3-031-44693-1_11, , , :
A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion. NLPCC (1) : 135-146]]>
https://dblp.org/rec/conf/nlpcc/KongXYL23Sun, 01 Jan 2023 00:00:00 +0100
A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.https://doi.org/10.1109/COMPSAC54236.2022.00127, , , , :
A Node-labeling-based Method for Evaluating the Anonymity of Tor Network. COMPSAC : 773-778]]>
https://dblp.org/rec/conf/compsac/JiangXYLZ22Sat, 01 Jan 2022 00:00:00 +0100
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things.https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00202, , , , :
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things. HPCC/DSS/SmartCity/DependSys : 1291-1298]]>
https://dblp.org/rec/conf/hpcc/ShangLCLJ22Sat, 01 Jan 2022 00:00:00 +0100
TNRAS: Tor Nodes Reliability Analysis Scheme.https://doi.org/10.1145/3507509.3507512, , :
TNRAS: Tor Nodes Reliability Analysis Scheme. ICCNS : 21-26]]>
https://dblp.org/rec/conf/iccns/ZhangLD21Fri, 01 Jan 2021 00:00:00 +0100
A Survey on Measuring Anonymity in Anonymous Communication Systems.https://doi.org/10.1109/ACCESS.2019.2919322, , :
A Survey on Measuring Anonymity in Anonymous Communication Systems. IEEE Access 7: 70584-70609 ()]]>
https://dblp.org/rec/journals/access/LuDW19Tue, 01 Jan 2019 00:00:00 +0100
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.https://doi.org/10.1155/2019/9078176, , , , , , :
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. Secur. Commun. Networks 2019: 9078176:1-9078176:15 ()]]>
https://dblp.org/rec/journals/scn/LuMLDLZZ19Tue, 01 Jan 2019 00:00:00 +0100
MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment.https://doi.org/10.3390/sym11020203, , , :
MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment. Symmetry 11(2): 203 ()]]>
https://dblp.org/rec/journals/symmetry/LuLYL19Tue, 01 Jan 2019 00:00:00 +0100
Practice Teaching Reform of Discrete Mathematics Model based on D3.js.https://doi.org/10.1109/ICCSE.2019.8845409, , :
Practice Teaching Reform of Discrete Mathematics Model based on D3.js. ICCSE : 379-384]]>
https://dblp.org/rec/conf/iccse2/LuZL19Tue, 01 Jan 2019 00:00:00 +0100
Path selection algorithm with minimal delay in wireless sensor networks.https://doi.org/10.1177/1550147718793856, , , , :
Path selection algorithm with minimal delay in wireless sensor networks. Int. J. Distributed Sens. Networks 14(8) ()]]>
https://dblp.org/rec/journals/ijdsn/LuSWZM18Mon, 01 Jan 2018 00:00:00 +0100
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.https://doi.org/10.1155/2014/438350, , , , , , :
Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 ()]]>
https://dblp.org/rec/journals/ijdsn/LuGLPZXG14Wed, 01 Jan 2014 00:00:00 +0100
A New Estimation Model for Small Organic Software Project.https://doi.org/10.4304/jsw.8.9.2218-2222, , , :
A New Estimation Model for Small Organic Software Project. J. Softw. 8(9): 2218-2222 ()]]>
https://dblp.org/rec/journals/jsw/HanLZJ13Tue, 01 Jan 2013 00:00:00 +0100
Security Analysis on Cyber-physical System Using Attack Tree.https://doi.org/10.1109/IIH-MSP.2013.113, , , , , :
Security Analysis on Cyber-physical System Using Attack Tree. IIH-MSP : 429-432]]>
https://dblp.org/rec/conf/iih-msp/XieLGLPG13Tue, 01 Jan 2013 00:00:00 +0100
Cyber-physical System Risk Assessment.https://doi.org/10.1109/IIH-MSP.2013.116, , , , , :
Cyber-physical System Risk Assessment. IIH-MSP : 442-447]]>
https://dblp.org/rec/conf/iih-msp/PengLLGGX13Tue, 01 Jan 2013 00:00:00 +0100
Next Big Thing in Big Data: The Security of the ICT Supply Chain.https://doi.org/10.1109/SocialCom.2013.172, , , , , :
Next Big Thing in Big Data: The Security of the ICT Supply Chain. SocialCom : 1066-1073]]>
https://dblp.org/rec/conf/socialcom/LuGXZPY13Tue, 01 Jan 2013 00:00:00 +0100
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.https://doi.org/10.1109/APSCC.2012.41, , , , :
Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management. APSCC : 43-49]]>
https://dblp.org/rec/conf/apscc/XieLXCP12Sun, 01 Jan 2012 00:00:00 +0100
Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach.https://doi.org/10.1007/978-3-642-12189-0_23, , :
Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach. ICCSA (4) : 263-272]]>
https://dblp.org/rec/conf/iccsa/WangHL10Fri, 01 Jan 2010 00:00:00 +0100
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.https://doi.org/10.1016/j.cose.2009.01.001, , , , :
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. Comput. Secur. 28(6): 466-475 ()]]>
https://dblp.org/rec/journals/compsec/LiWTLY09Thu, 01 Jan 2009 00:00:00 +0100
Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.https://doi.org/10.1109/GLOCOM.2009.5425547, , , , :
Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism. GLOBECOM : 1-7]]>
https://dblp.org/rec/conf/globecom/LiLGTQ09Thu, 01 Jan 2009 00:00:00 +0100
Towards lightweight and efficient DDOS attacks detection for web server.https://doi.org/10.1145/1526709.1526896, , , , :
Towards lightweight and efficient DDOS attacks detection for web server. WWW : 1139-1140]]>
https://dblp.org/rec/conf/www/LiLGTN09Thu, 01 Jan 2009 00:00:00 +0100
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.https://doi.org/10.1016/j.comcom.2008.08.009, , , :
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. Comput. Commun. 31(17): 4018-4025 ()]]>
https://dblp.org/rec/journals/comcom/LiGTL08Tue, 01 Jan 2008 00:00:00 +0100
Towards an analysis of WonGoo performance.https://doi.org/10.1108/17427370710847291, , , :
Towards an analysis of WonGoo performance. Int. J. Pervasive Comput. Commun. 3(2): 159-174 ()]]>
https://dblp.org/rec/journals/ijpcc/LuFSC07Mon, 01 Jan 2007 00:00:00 +0100
Performance Analysis ofWonGoo System.https://doi.org/10.1109/CIT.2005.152, , , :
Performance Analysis ofWonGoo System. CIT : 716-723]]>
https://dblp.org/rec/conf/IEEEcit/LuFSC05Sat, 01 Jan 2005 00:00:00 +0100
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.https://doi.org/10.1007/11534310_90, , , :
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. ICCNMC : 853-862]]>
https://dblp.org/rec/conf/iccnmc/LuFSG05Sat, 01 Jan 2005 00:00:00 +0100
Building Scale-Free Overlay Mix Networks with Small-World Properties.https://doi.org/10.1109/ICITA.2005.88, , , , :
Building Scale-Free Overlay Mix Networks with Small-World Properties. ICITA (2) : 529-534]]>
https://dblp.org/rec/conf/icita/LuFSCG05Sat, 01 Jan 2005 00:00:00 +0100
WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.https://dblp.org/pid/10/542.html, , , :
WonGoo: A Peer-to-Peer Protocol for Anonymous Communication. PDPTA : 1102-1106]]>
https://dblp.org/rec/conf/pdpta/LuFSC04Thu, 01 Jan 2004 00:00:00 +0100
  NODES
INTERN 2
Project 2