dblp: Tianbo Lu
https://dblp.org/pid/10/542.html
dblp person page RSS feedWed, 08 Jan 2025 20:32:58 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Tianbo Luhttps://dblp.org/pid/10/542.html14451SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining.https://doi.org/10.1109/TNSM.2024.3435869Jiaze Shang, Tianbo Lu, Pengfei Zhao: SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining.IEEE Trans. Netw. Serv. Manag.21(6): 6153-6173 (2024)]]>https://dblp.org/rec/journals/tnsm/ShangLZ24Sun, 01 Dec 2024 00:00:00 +0100DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.https://doi.org/10.1007/978-3-031-54773-7_11Tianbo Lu, Xia Ding, Jiaze Shang, Pengfei Zhao, Han Zhang: DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.ACNS (2)2024: 265-282]]>https://dblp.org/rec/conf/acns/LuDSZZ24Mon, 01 Jan 2024 00:00:00 +0100Transformer-based Model for Multi-tab Website Fingerprinting Attack.https://doi.org/10.1145/3576915.3623107Zhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang: Transformer-based Model for Multi-tab Website Fingerprinting Attack.CCS2023: 1050-1064]]>https://dblp.org/rec/conf/ccs/JinLLS23Sun, 01 Jan 2023 00:00:00 +0100An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization.https://doi.org/10.1109/IJCNN54540.2023.10191537Yifeng Wang, Yamei Xia, Tianbo Lu, Xiaoyan Zhang, Wenbin Yao: An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization.IJCNN2023: 1-8]]>https://dblp.org/rec/conf/ijcnn/WangXLZY23Sun, 01 Jan 2023 00:00:00 +0100Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention.https://doi.org/10.1109/ISCC58397.2023.10217886Qiaozhi Feng, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang: Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention.ISCC2023: 1242-1247]]>https://dblp.org/rec/conf/iscc/FengXYLZ23Sun, 01 Jan 2023 00:00:00 +0100A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion.https://doi.org/10.1007/978-3-031-44693-1_11Wenjun Kong, Yamei Xia, Wenbin Yao, Tianbo Lu: A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion.NLPCC (1)2023: 135-146]]>https://dblp.org/rec/conf/nlpcc/KongXYL23Sun, 01 Jan 2023 00:00:00 +0100A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.https://doi.org/10.1109/COMPSAC54236.2022.00127Feng Jiang, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang: A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.COMPSAC2022: 773-778]]>https://dblp.org/rec/conf/compsac/JiangXYLZ22Sat, 01 Jan 2022 00:00:00 +0100RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things.https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00202Jiaze Shang, Tianbo Lu, Yingjie Cai, Shuang Luo, Zhaoxin Jin: RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things.HPCC/DSS/SmartCity/DependSys2022: 1291-1298]]>https://dblp.org/rec/conf/hpcc/ShangLCLJ22Sat, 01 Jan 2022 00:00:00 +0100TNRAS: Tor Nodes Reliability Analysis Scheme.https://doi.org/10.1145/3507509.3507512Wenzhen Zhang, Tianbo Lu, Zeyu Du: TNRAS: Tor Nodes Reliability Analysis Scheme.ICCNS2021: 21-26]]>https://dblp.org/rec/conf/iccns/ZhangLD21Fri, 01 Jan 2021 00:00:00 +0100A Survey on Measuring Anonymity in Anonymous Communication Systems.https://doi.org/10.1109/ACCESS.2019.2919322Tianbo Lu, Zeyu Du, Z. Jane Wang: A Survey on Measuring Anonymity in Anonymous Communication Systems.IEEE Access7: 70584-70609 (2019)]]>https://dblp.org/rec/journals/access/LuDW19Tue, 01 Jan 2019 00:00:00 +0100MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.https://doi.org/10.1155/2019/9078176Tianbo Lu, Ting Meng, Chao Li, Guozhen Dong, Huiyang Li, Jiao Zhang, Xiaoyan Zhang: MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication.Secur. Commun. Networks2019: 9078176:1-9078176:15 (2019)]]>https://dblp.org/rec/journals/scn/LuMLDLZZ19Tue, 01 Jan 2019 00:00:00 +0100MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment.https://doi.org/10.3390/sym11020203Tianbo Lu, Meng Luo, Ru Yan, Zhimin Lin: MFBS: Multiple Factor Bandwidth Strategy Scheme for Anonymity Assessment.Symmetry11(2): 203 (2019)]]>https://dblp.org/rec/journals/symmetry/LuLYL19Tue, 01 Jan 2019 00:00:00 +0100Practice Teaching Reform of Discrete Mathematics Model based on D3.js.https://doi.org/10.1109/ICCSE.2019.8845409Tianbo Lu, Peng Zhang, Huiyang Li: Practice Teaching Reform of Discrete Mathematics Model based on D3.js.ICCSE2019: 379-384]]>https://dblp.org/rec/conf/iccse2/LuZL19Tue, 01 Jan 2019 00:00:00 +0100Path selection algorithm with minimal delay in wireless sensor networks.https://doi.org/10.1177/1550147718793856Tianbo Lu, Yifei Su, Youwen Wang, Xiaoyan Zhang, Hao Meng: Path selection algorithm with minimal delay in wireless sensor networks.Int. J. Distributed Sens. Networks14(8) (2018)]]>https://dblp.org/rec/journals/ijdsn/LuSWZM18Mon, 01 Jan 2018 00:00:00 +0100Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.https://doi.org/10.1155/2014/438350Tianbo Lu, Xiaobo Guo, Yang Li, Yong Peng, Xiaoyan Zhang, Feng Xie, Yang Gao: Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks.Int. J. Distributed Sens. Networks10 (2014)]]>https://dblp.org/rec/journals/ijdsn/LuGLPZXG14Wed, 01 Jan 2014 00:00:00 +0100A New Estimation Model for Small Organic Software Project.https://doi.org/10.4304/jsw.8.9.2218-2222Wan-Jiang Han, Tianbo Lu, Xiao-Yan Zhang, Li-Xin Jiang: A New Estimation Model for Small Organic Software Project.J. Softw.8(9): 2218-2222 (2013)]]>https://dblp.org/rec/journals/jsw/HanLZJ13Tue, 01 Jan 2013 00:00:00 +0100Security Analysis on Cyber-physical System Using Attack Tree.https://doi.org/10.1109/IIH-MSP.2013.113Feng Xie, Tianbo Lu, Xiaobo Guo, Jingli Liu, Yong Peng, Yang Gao: Security Analysis on Cyber-physical System Using Attack Tree.IIH-MSP2013: 429-432]]>https://dblp.org/rec/conf/iih-msp/XieLGLPG13Tue, 01 Jan 2013 00:00:00 +0100Cyber-physical System Risk Assessment.https://doi.org/10.1109/IIH-MSP.2013.116Yong Peng, Tianbo Lu, Jingli Liu, Yang Gao, Xiaobo Guo, Feng Xie: Cyber-physical System Risk Assessment.IIH-MSP2013: 442-447]]>https://dblp.org/rec/conf/iih-msp/PengLLGGX13Tue, 01 Jan 2013 00:00:00 +0100Next Big Thing in Big Data: The Security of the ICT Supply Chain.https://doi.org/10.1109/SocialCom.2013.172Tianbo Lu, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, Hongyu Yang: Next Big Thing in Big Data: The Security of the ICT Supply Chain.SocialCom2013: 1066-1073]]>https://dblp.org/rec/conf/socialcom/LuGXZPY13Tue, 01 Jan 2013 00:00:00 +0100Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.https://doi.org/10.1109/APSCC.2012.41Feng Xie, Tianbo Lu, Bing Xu, Dongqing Chen, Yong Peng: Research on Software Development Process Assurance Models in ICT Supply Chain Risk Management.APSCC2012: 43-49]]>https://dblp.org/rec/conf/apscc/XieLXCP12Sun, 01 Jan 2012 00:00:00 +0100Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach.https://doi.org/10.1007/978-3-642-12189-0_23Ye Wang, Yi Han, Tianbo Lu: Estimating the Influence of Documents in IR Systems: A Marked Indexing Approach.ICCSA (4)2010: 263-272]]>https://dblp.org/rec/conf/iccsa/WangHL10Fri, 01 Jan 2010 00:00:00 +0100Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.https://doi.org/10.1016/j.cose.2009.01.001Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young: Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.Comput. Secur.28(6): 466-475 (2009)]]>https://dblp.org/rec/journals/compsec/LiWTLY09Thu, 01 Jan 2009 00:00:00 +0100Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.https://doi.org/10.1109/GLOCOM.2009.5425547Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Lin Qi: Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.GLOBECOM2009: 1-7]]>https://dblp.org/rec/conf/globecom/LiLGTQ09Thu, 01 Jan 2009 00:00:00 +0100Towards lightweight and efficient DDOS attacks detection for web server.https://doi.org/10.1145/1526709.1526896Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Qin-Wu Nie: Towards lightweight and efficient DDOS attacks detection for web server.WWW2009: 1139-1140]]>https://dblp.org/rec/conf/www/LiLGTN09Thu, 01 Jan 2009 00:00:00 +0100A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.https://doi.org/10.1016/j.comcom.2008.08.009Yang Li, Li Guo, Zhihong Tian, Tianbo Lu: A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.Comput. Commun.31(17): 4018-4025 (2008)]]>https://dblp.org/rec/journals/comcom/LiGTL08Tue, 01 Jan 2008 00:00:00 +0100Towards an analysis of WonGoo performance.https://doi.org/10.1108/17427370710847291Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng: Towards an analysis of WonGoo performance.Int. J. Pervasive Comput. Commun.3(2): 159-174 (2007)]]>https://dblp.org/rec/journals/ijpcc/LuFSC07Mon, 01 Jan 2007 00:00:00 +0100Performance Analysis ofWonGoo System.https://doi.org/10.1109/CIT.2005.152Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng: Performance Analysis ofWonGoo System.CIT2005: 716-723]]>https://dblp.org/rec/conf/IEEEcit/LuFSC05Sat, 01 Jan 2005 00:00:00 +0100Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.https://doi.org/10.1007/11534310_90Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo: Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.ICCNMC2005: 853-862]]>https://dblp.org/rec/conf/iccnmc/LuFSG05Sat, 01 Jan 2005 00:00:00 +0100Building Scale-Free Overlay Mix Networks with Small-World Properties.https://doi.org/10.1109/ICITA.2005.88Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo: Building Scale-Free Overlay Mix Networks with Small-World Properties.ICITA (2)2005: 529-534]]>https://dblp.org/rec/conf/icita/LuFSCG05Sat, 01 Jan 2005 00:00:00 +0100WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.https://dblp.org/pid/10/542.htmlTianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng: WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.PDPTA2004: 1102-1106]]>https://dblp.org/rec/conf/pdpta/LuFSC04Thu, 01 Jan 2004 00:00:00 +0100