default search action
Bo Luo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Tianxiao Zhang, Wenju Xu, Bo Luo, Guanghui Wang:
Depth-Wise Convolutions in Vision Transformers for efficient training on small datasets. Neurocomputing 617: 128998 (2025) - [j33]Zhaohui Wang, Bo Luo, Fengjun Li:
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. Proc. Priv. Enhancing Technol. 2025(1): 776-791 (2025) - 2024
- [j32]Yiming Zhang, Bo Luo, Hao Cheng, Zhuling Wang, Chaoqiang Jiang, Ruikun Mai:
A multi-loads capacitive power transfer system for railway intelligent monitoring systems based on single relay plate. Int. J. Circuit Theory Appl. 52(1): 79-96 (2024) - [j31]Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, Bo Luo:
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. Proc. Priv. Enhancing Technol. 2024(3): 477-494 (2024) - [j30]Bo Luo, Xiaobao Yang, Yu Zhou:
Model-Free Predictive Current Control of Permanent Magnet Synchronous Motor Based on Estimation of Current Variations. IEEE Trans. Ind. Electron. 71(8): 8395-8405 (2024) - [c100]Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo:
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. CCS 2024: 2236-2250 - [c99]Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, Bo Luo:
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. CCS 2024: 3287-3301 - [c98]Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li:
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. CCS 2024: 3346-3360 - [c97]Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, Bo Luo:
Companion Apps or Backdoors? On the Security of Automotive Companion Apps. ESORICS (3) 2024: 24-44 - [c96]Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, Bo Luo:
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. ESORICS (1) 2024: 311-331 - [c95]Yijun Zhao, Lingjing Yu, Yong Sun, Qingyun Liu, Bo Luo:
No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS. ICPC 2024: 358-369 - [c94]Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, Qibin Sun:
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. USENIX Security Symposium 2024 - [c93]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. USENIX Security Symposium 2024 - [c92]Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S. L. Wei, Yan Zhuang:
FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems. USENIX Security Symposium 2024 - [e5]Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3 [contents] - [i23]Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang:
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. CoRR abs/2403.01182 (2024) - [i22]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i21]Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, Bo Luo:
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. CoRR abs/2404.14581 (2024) - [i20]Tianxiao Zhang, Wenju Xu, Bo Luo, Guanghui Wang:
Depth-Wise Convolutions in Vision Transformers for Efficient Training on Small Datasets. CoRR abs/2407.19394 (2024) - [i19]Tianxiao Zhang, Bo Luo, Guanghui Wang:
Improving Vision Transformers by Overlapping Heads in Multi-Head Self-Attention. CoRR abs/2410.14874 (2024) - 2023
- [j29]Tianxiao Zhang, Andrés M. Bur, Shannon Kraft, Hannah Kavookjian, Bryan Renslo, Xiangyu Chen, Bo Luo, Guanghui Wang:
Gender, Smoking History, and Age Prediction from Laryngeal Images. J. Imaging 9(6): 109 (2023) - [j28]Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [c91]Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li:
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective. CCS 2023: 3558-3560 - [c90]Sohaib Kiani, Jared Barton, Jon Sushinsky, Lynda Heimbach, Bo Luo:
Counterfactual Prediction Under Selective Confounding. ECAI 2023: 1256-1263 - [c89]Zhaohui Wang, Bo Luo, Fengjun Li:
Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking. IoTDI 2023: 448-449 - [c88]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [i18]Tianxiao Zhang, Andrés M. Bur, Shannon Kraft, Hannah Kavookjian, Bryan Renslo, Xiangyu Chen, Bo Luo, Guanghui Wang:
Gender, Smoking History and Age Prediction from Laryngeal Images. CoRR abs/2305.16661 (2023) - [i17]Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo:
Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT. CoRR abs/2306.05524 (2023) - [i16]Tianxiao Zhang, Kaidong Li, Xiangyu Chen, Cuncong Zhong, Bo Luo, Ivan Grijalva Teran, Brian McCornack, Daniel Flippo, Ajay Sharda, Guanghui Wang:
A New Dataset and Comparative Study for Aphid Cluster Detection. CoRR abs/2307.05929 (2023) - [i15]Tianxiao Zhang, Kaidong Li, Xiangyu Chen, Cuncong Zhong, Bo Luo, Ivan Grijalva Teran, Brian McCornack, Daniel Flippo, Ajay Sharda, Guanghui Wang:
Aphid Cluster Recognition and Detection in the Wild Using Deep Learning Models. CoRR abs/2308.05881 (2023) - [i14]Sohaib Kiani, Jared Barton, Jon Sushinsky, Lynda Heimbach, Bo Luo:
Counterfactual Prediction Under Selective Confounding. CoRR abs/2310.14064 (2023) - 2022
- [j27]Tianxiao Zhang, Bo Luo, Ajay Sharda, Guanghui Wang:
Dynamic Label Assignment for Object Detection by Combining Predicted IoUs and Anchor IoUs. J. Imaging 8(7): 193 (2022) - [j26]Wenchi Ma, Xuemin Tu, Bo Luo, Guanghui Wang:
Semantic clustering based deduction learning for image recognition and classification. Pattern Recognit. 124: 108440 (2022) - [c87]Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu:
Blacktooth: Breaking through the Defense of Bluetooth in Silence. CCS 2022: 55-68 - [c86]Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo:
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. CCS 2022: 2129-2143 - [c85]Ishrak Hayet, Zijun Yao, Bo Luo:
Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. EMNLP (Findings) 2022: 5009-5018 - [c84]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems. ESORICS (3) 2022: 343-363 - [c83]Javaria Ahmad, Fengjun Li, Bo Luo:
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. ESORICS (2) 2022: 589-609 - [c82]Jingchun Xiang, Chaoqiang Jiang, Tianlu Ma, Xiaosheng Wang, Bo Luo, Li Fang:
A Comparison of Advanced IPT Systems with Nanocrystalline and Ferrite Cores for Wireless EV Charging. IECON 2022: 1-6 - [c81]Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. SecureComm 2022: 111-129 - [e4]Bo Luo, Mohamed Mosbah, Frédéric Cuppens, Lotfi Ben Othmane, Nora Cuppens, Slim Kallel:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [i13]Tianxiao Zhang, Ajay Sharda, Bo Luo, Guanghui Wang:
Dynamic Label Assignment for Object Detection by Combining Predicted and Anchor IoUs. CoRR abs/2201.09396 (2022) - [i12]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. CoRR abs/2205.15944 (2022) - [i11]James Pope, Jinyuan Liang, Vijay Kumar, Francesco Raimondo, Xinyi Sun, Ryan McConville, Thomas Pasquier, Robert J. Piechocki, George Oikonomou, Bo Luo, Dan Howarth, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Edoardo Carnelli, Theodoros Spyridopoulos, Aftab Khan:
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection. CoRR abs/2212.08525 (2022) - 2021
- [j25]Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, Jing Wang:
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Trans. Dependable Secur. Comput. 18(3): 1196-1213 (2021) - [c80]Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. ACSAC 2021: 31-44 - [c79]Sana Awan, Bo Luo, Fengjun Li:
CONTRA: Defending Against Poisoning Attacks in Federated Learning. ESORICS (1) 2021: 455-475 - [c78]James Pope, Francesco Raimondo, Vijay Kumar, Ryan McConville, Robert J. Piechocki, George Oikonomou, Thomas Pasquier, Bo Luo, Dan Howarth, Ioannis Mavromatis, Pietro Edoardo Carnelli, Adrián Sánchez-Mompó, Theodoros Spyridopoulos, Aftab Khan:
Container Escape Detection for Edge Devices. SenSys 2021: 532-536 - [c77]Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo:
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. TrustCom 2021: 114-121 - [e3]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i10]Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. CoRR abs/2109.12459 (2021) - [i9]Wenchi Ma, Xuemin Tu, Bo Luo, Guanghui Wang:
Semantic Clustering based Deduction Learning for Image Recognition and Classification. CoRR abs/2112.13165 (2021) - 2020
- [j24]Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. IEEE Trans. Dependable Secur. Comput. 17(1): 179-193 (2020) - [j23]Chengming Shi, Bo Luo, Songping He, Kai Li, Hongqi Liu, Bin Li:
Tool Wear Prediction via Multidimensional Stacked Sparse Autoencoders With Feature Fusion. IEEE Trans. Ind. Informatics 16(8): 5150-5159 (2020) - [c76]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c75]Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu:
DeepDyve: Dynamic Verification for Deep Neural Networks. CCS 2020: 101-112 - [c74]Bo Luo, Razvan Beuran, Yasuo Tan:
Smart Grid Security: Attack Modeling from a CPS Perspective. ComComAP 2020: 1-6 - [c73]Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo:
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. ESORICS (1) 2020: 153-173 - [c72]Bo Luo, Min Li, Yu Li, Qiang Xu:
On Configurable Defense against Adversarial Example Attacks. ACM Great Lakes Symposium on VLSI 2020: 543-548 - [c71]Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, Bo Luo:
WOLF: automated machine learning workflow management framework for malware detection and other applications. HotSoS 2020: 11:1-11:8 - [c70]Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu:
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. USENIX Security Symposium 2020: 55-72 - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i8]Bing Bai, Guanhua Zhang, Ye Lin, Hao Li, Kun Bai, Bo Luo:
CSRN: Collaborative Sequential Recommendation Networks for News Retrieval. CoRR abs/2004.04816 (2020) - [i7]Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu:
DeepDyve: Dynamic Verification for Deep Neural Networks. CoRR abs/2009.09663 (2020)
2010 – 2019
- 2019
- [j22]Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j21]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. J. Comput. Secur. 27(5): 547-580 (2019) - [j20]Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, Fengjun Li:
Content-Aware Trust Propagation Toward Online Review Spam Detection. ACM J. Data Inf. Qual. 11(3): 11:1-11:31 (2019) - [j19]Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, Bo Luo:
#DontTweetThis: Scoring Private Information in Social Networks. Proc. Priv. Enhancing Technol. 2019(4): 72-92 (2019) - [j18]Bo Luo, Haoting Wang, Hongqi Liu, Bin Li, Fangyu Peng:
Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification. IEEE Trans. Ind. Electron. 66(1): 509-518 (2019) - [j17]Chengming Shi, George Panoutsos, Bo Luo, Hongqi Liu, Bin Li, Xu Lin:
Using Multiple-Feature-Spaces-Based Deep Learning for Tool Condition Monitoring in Ultraprecision Manufacturing. IEEE Trans. Ind. Electron. 66(5): 3794-3803 (2019) - [c69]Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma:
TF-BIV: transparent and fine-grained binary integrity verification in the cloud. ACSAC 2019: 57-69 - [c68]Yu Li, Yannan Liu, Min Li, Ye Tian, Bo Luo, Qiang Xu:
D2NN: a fine-grained dual modular redundancy framework for deep neural networks. ACSAC 2019: 138-147 - [c67]Jinchao Zhang, Bo Luo, Fenfang Cao:
The antecedent and consequence of users' satisfaction and dissatisfaction with information seeking in online health communities. ASIST 2019: 836-837 - [c66]Sana Awan, Fengjun Li, Bo Luo, Mei Liu:
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. CCS 2019: 2561-2563 - [c65]Hui-fen Huang, Bo Luo:
Wideband Coding Metamaterial with Polarization Insensitivity. ComComAP 2019: 163-166 - [c64]Bo Luo, Yu Li, Lingxiao Wei, Qiang Xu:
On Functional Test Generation for Deep Neural Network IPs. DATE 2019: 1010-1015 - [c63]Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo:
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities. ICICS 2019: 763-780 - [c62]Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo:
Arcana: Enabling Private Posts on Public Microblog Platforms. SEC 2019: 271-285 - [c61]Adaku Uchendu, Jeffrey Cao, Qiaozhi Wang, Bo Luo, Dongwon Lee:
Characterizing Man-made vs. Machine-made Chatbot Dialogs. TTO 2019 - [c60]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [i6]Bo Luo, Yu Li, Lingxiao Wei, Qiang Xu:
On Functional Test Generation for Deep Neural Network IPs. CoRR abs/1911.11550 (2019) - [i5]Bo Luo, Qiang Xu:
Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples. CoRR abs/1912.02598 (2019) - 2018
- [j16]Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE Trans. Dependable Secur. Comput. 15(5): 742-754 (2018) - [c59]Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu:
Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks. AAAI 2018: 1652-1659 - [c58]Lingxiao Wei, Bo Luo, Yu Li, Yannan Liu, Qiang Xu:
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. ACSAC 2018: 393-406 - [c57]Lei Yang, Chris Seasholtz, Bo Luo, Fengjun Li:
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways. ESORICS (1) 2018: 575-594 - [c56]Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. IPCCC 2018: 1-7 - [c55]Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo:
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 862-869 - [c54]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c53]Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. SACMAT 2018: 93-104 - [c52]Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, Bin Lv:
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. SecureComm (1) 2018: 281-293 - [i4]Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu:
Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks. CoRR abs/1801.04693 (2018) - [i3]Lingxiao Wei, Yannan Liu, Bo Luo, Yu Li, Qiang Xu:
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. CoRR abs/1803.05847 (2018) - [i2]Bo Luo, Min Li, Yu Li, Qiang Xu:
On Configurable Defense against Adversarial Example Attacks. CoRR abs/1812.02737 (2018) - 2017
- [j15]Qiaozhi Wang, Jaisneet Bhandal, Shu Huang, Bo Luo:
Content-Based Classification of Sensitive Tweets. Int. J. Semantic Comput. 11(4): 541- (2017) - [j14]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. IEEE Internet Things J. 4(6): 1802-1831 (2017) - [j13]Chao Lan, Yuhao Yang, Xiaoli Li, Bo Luo, Jun Huan:
Learning Social Circles in Ego-Networks Based on Multi-View Network Structure. IEEE Trans. Knowl. Data Eng. 29(8): 1681-1694 (2017) - [c51]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c50]Abdulmalik Humayed, Bo Luo:
Using ID-Hopping to Defend Against Targeted DoS on CAN. SCAV@CPSWeek 2017: 19-26 - [c49]Yannan Liu, Lingxiao Wei, Bo Luo, Qiang Xu:
Fault injection attack on deep neural network. ICCAD 2017: 131-138 - [c48]Wenjun Huang, Ruimin Hu, Chao Liang, Weijian Ruan, Bo Luo:
Structural superpixel descriptor for visual tracking. IJCNN 2017: 3146-3152 - [c47]Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo:
A-Tor: Accountable Anonymity in Tor. SecureComm 2017: 838-851 - [c46]Qiaozhi Wang, Jaisneet Bhandal, Shu Huang, Bo Luo:
Classification of Private Tweets Using Tweet Content. ICSC 2017: 65-68 - [e1]Xuewen Chen, Bo Luo, Feng Luo, Vasile Palade, M. Arif Wani:
16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017, Cancun, Mexico, December 18-21, 2017. IEEE 2017, ISBN 978-1-5386-1418-1 [contents] - [i1]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. CoRR abs/1701.04525 (2017) - 2016
- [j12]Jingqiang Lin, Bo Luo, Le Guan, Jiwu Jing:
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE Secur. Priv. 14(6): 63-70 (2016) - [c45]Weijian Ruan, Jun Chen, Jinqiao Wang, Bo Luo, Wenjun Huang, Ruimin Hu:
Boosted local classifiers for visual tracking. ICME 2016: 1-6 - [c44]Yang Tian, Ranjith Sompalli, Guanghui Wang, Bo Luo:
Textual Ontology and Visual Features Based Search for a Paleontology Digital Library. ICTAI 2016: 1089-1094 - 2015
- [j11]Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo:
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches. IEEE Trans. Knowl. Data Eng. 27(8): 2190-2202 (2015) - [c43]Fengjun Li, Xin Fu, Bo Luo:
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. CCS 2015: 1650-1652 - [c42]Caitlin McCollister, Bo Luo, Shu Huang:
Building Topic Models to Predict Author Attributes from Twitter Messages. CLEF (Working Notes) 2015 - [c41]Jamuna Gopal, Shu Huang, Bo Luo:
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. DBSec 2015: 215-222 - [c40]Abdulmalik Humayed, Bo Luo:
Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks. ICCPS 2015: 252-253 - [c39]Hariprasad Sampathkumar, Xue-wen Chen, Bo Luo:
Ontology-Based Visualization of Healthcare Data Mined from Online Healthcare Forums. ICHI 2015: 325-334 - [c38]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Symposium on Security and Privacy 2015: 3-19 - 2014
- [j10]Hariprasad Sampathkumar, Xue-wen Chen, Bo Luo:
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model. BMC Medical Informatics Decis. Mak. 14: 91 (2014) - [c37]Wenrong Zeng, Yuhao Yang, Bo Luo:
Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases. IEEE BigData 2014: 701-710 - [c36]Yuhao Yang, Chao Lan, Xiaoli Li, Bo Luo, Jun Huan:
Automatic Social Circle Detection Using Multi-View Clustering. CIKM 2014: 1019-1028 - [c35]Bo Luo, Ruimin Hu, Yimin Wang, Chao Liang, Chunjie Zhang, Ge Gao:
Robust tracking via saliency-based appearance model. ICIP 2014: 417-420 - [c34]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. NDSS 2014 - [c33]Mang Ye, Bingyue Huang, Lei Yao, Jian Qin, Jian Guan, Xiao Wang, Bo Luo, Zheng Wang, Dongjing Liu, Zhuosheng Zhang, Su Mao, Chao Liang:
WHU-NERCMS at TRECVID2014: Instance Search Task. TRECVID 2014 - 2013
- [j9]Jian Cheng, Lan Li, Bo Luo, Shuai Wang, Haijun Liu:
High-resolution remote sensing image segmentation based on improved RIU-LBP and SRM. EURASIP J. Wirel. Commun. Netw. 2013: 263 (2013) - [j8]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Trans. Inf. Forensics Secur. 8(6): 888-900 (2013) - [j7]Yuxin Chen, Hariprasad Sampathkumar, Bo Luo, Xue-wen Chen:
iLike: Bridging the Semantic Gap in Vertical Image Search by Integrating Text and Visual Features. IEEE Trans. Knowl. Data Eng. 25(10): 2257-2270 (2013) - [c32]Wenrong Zeng, Yuhao Yang, Bo Luo:
Access control for big data using data content. IEEE BigData 2013: 45-47 - [c31]Meeyoung Park, Hariprasad Sampathkumar, Bo Luo, Xue-wen Chen:
Content-based assessment of the credibility of online healthcare information. IEEE BigData 2013: 51-58 - [c30]Hui Cai, Bin Li, Xinyong Mao, Bo Luo, Fangyu Peng:
A Complete Methodology for Estimating Dynamics of the Heavy Machine Tool Structure. ICIRA (2) 2013: 513-524 - [c29]Manogna Thimma, Tsam Kai Tsui, Bo Luo:
HyXAC: a hybrid approach for XML access control. SACMAT 2013: 113-124 - 2012
- [j6]Dan Wu, Daqing He, Bo Luo:
Multilingual Needs and Expectations in Digital Libraries: A Survey of Academic Users with Different Languages. Electron. Libr. 30(2): 182-197 (2012) - [c28]Avindra Fernando, Jun Huan, Justin P. Blumenstiel, Jin Lin, Xue-wen Chen, Bo Luo:
Identification of transposable elements of the giant panda (Ailuropoda melanoleuca) genome. BIBM Workshops 2012: 674-681 - [c27]Shu Huang, Min Chen, Bo Luo, Dongwon Lee:
Predicting aggregate social activities using continuous-time stochastic process. CIKM 2012: 982-991 - [c26]Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu:
Stalking online: on user privacy in social networks. CODASPY 2012: 37-48 - [c25]Yuxin Chen, Bo Luo:
S2A: secure smart household appliances. CODASPY 2012: 217-228 - [c24]Hariprasad Sampathkumar, Bo Luo, Xue-wen Chen:
Mining Adverse Drug Side-Effects from Online Medical Forums. HISB 2012: 150 - [c23]Haibin Liu, Bo Luo, Dongwon Lee:
Location Type Classification Using Tweet Content. ICMLA (1) 2012: 232-237 - [c22]Yuanliang Meng, Junyan Li, Patrick Denton, Yuxin Chen, Bo Luo, Paul Selden, Xue-wen Chen:
IPKB: a digital library for invertebrate paleontology. JCDL 2012: 101-110 - [c21]Fengjun Li, Bo Luo:
Preserving data integrity for smart grid data aggregation. SmartGridComm 2012: 366-371 - [c20]Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang:
GRADE: Graceful Degradation in Byzantine Quorum Systems. SRDS 2012: 171-180 - 2011
- [j5]Fengjun Li, Bo Luo, Peng Liu:
Secure and privacy-preserving information aggregation for smart grids. Int. J. Secur. Networks 6(1): 28-39 (2011) - [j4]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata. VLDB J. 20(3): 397-415 (2011) - [c19]Hongliang Fei, Ruoyi Jiang, Yuhao Yang, Bo Luo, Jun Huan:
Content based social behavior prediction: a multi-task learning approach. CIKM 2011: 995-1000 - [c18]Michael Steve Stanley Laine, Gunes Ercal, Bo Luo:
User Groups in Social Networks: An Experimental Study on YouTube. HICSS 2011: 1-10 - [c17]Yuxin Chen, Brian Potetz, Bo Luo, Xue-wen Chen, Yunfeng Lin:
Cephalometric Landmark Tracing Using Deformable Templates. HISB 2011: 112-119 - [c16]Jonathan Lutes, Meeyoung Park, Bo Luo, Xue-wen Chen:
Healthcare Information Networks: Discovery and Evaluation. HISB 2011: 190-197 - [c15]Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng Liu:
Privacy Preserving Group Linkage. SSDBM 2011: 432-450 - 2010
- [c14]Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu:
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. INFOCOM 2010: 2820-2828 - [c13]Yuxin Chen, Nenghai Yu, Bo Luo, Xue-wen Chen:
iLike: integrating visual and textual features for vertical search. ACM Multimedia 2010: 221-230
2000 – 2009
- 2009
- [c12]Bo Luo, Dongwon Lee:
On Protecting Private Information in Social Networks: AProposal. ICDE 2009: 1603-1606 - 2008
- [c11]Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - 2007
- [c10]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. CCS 2007: 508-518 - [c9]Yan Xiao, Bo Luo, Dongwon Lee:
Security-Conscious XML Indexing. DASFAA 2007: 949-954 - [c8]Bo Luo, Dongwon Lee, Peng Liu:
Pragmatic XML Access Control Using Off-the-Shelf RDBMS. ESORICS 2007: 55-71 - 2006
- [c7]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259 - 2005
- [j3]Bo Luo, Linyan Sun, Richard Mweene:
Empirical study of trading rule discovery in China stock market. Expert Syst. Appl. 28(3): 531-535 (2005) - [j2]Bo Luo, Linyan Sun, Richard Mweene:
The evolvement and relevant factors of price discovery: A case study of cross-listed stocks in China. Expert Syst. Appl. 29(2): 463-471 (2005) - [j1]Shizhuo Zhu, Bo Luo:
Adaptive Information: Improving Business through Semantic Interoperability, Grid Computing, and Enterprise Integration. Inf. Process. Manag. 41(5): 1301-1303 (2005) - [c6]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
Deep Set Operators for XQuery. XIME-P 2005 - 2004
- [c5]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
QFilter: fine-grained run-time XML access control via NFA-based query rewriting. CIKM 2004: 543-552 - [c4]Kennis Tam, Lam Ching Yu, Dacheng Tao, Hao Liu, Bo Luo, Xiaoou Tang:
Content-based SMIL retrieval. ICIG 2004: 146-149 - [c3]Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. Secure Data Management 2004: 133-147 - 2003
- [c2]Bo Luo, Xiaoou Tang, Jianzhuang Liu, HongJiang Zhang:
Video caption detection and extraction using temporal information. ICIP (1) 2003: 297-300 - 2002
- [c1]Xiaoou Tang, Bo Luo, Xinbo Gao, Edwige E. Pissaloux, Hong-Jiang Zhang:
Video text extraction using temporal feature vectors. ICME (1) 2002: 85-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint