


default search action
Hui Lu 0005
Person information
- affiliation: Guangzhou University, Cyberspace Institute of Advanced Technology, China
- affiliation (PhD): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Hui Lu — disambiguation page
- Hui Lu 0001
(aka: Hui Lv 0001) — University of Texas at Arlington (UTA), Department of Computer Science and Engineering, Arlington, TX, USA (and 3 more)
- Hui Lu 0002
— Beihang University, Beijing, China
- Hui Lu 0003
— Tsinghua University, Center for Earth System Science, Beijing, China
- Hui Lu 0004
— University of Illinois at Chicago, Department of Bioengineering, IL, USA (and 2 more)
- Hui Lu 0006 — Utrecht University, The Netherlands (and 1 more)
- Hui Lu 0007
— Northumbria University, Newcastle Business School, Newcastle Upon Tyne, UK
- Hui Lu 0008
— George Washington University, Washington, DC, USA
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Cheng Qiao
, Yanqing Zeng, Hui Lu
, Yuan Liu
, Zhihong Tian
:
An Efficient Incentive Mechanism for Federated Learning in Vehicular Networks. IEEE Netw. 38(5): 189-195 (2024) - [j28]Yuntian Tan
, Wenfeng Huang, Yang You, Shen Su
, Hui Lu
:
Recognizing BGP Communities Based on Graph Neural Network. IEEE Netw. 38(6): 282-288 (2024) - 2023
- [j27]Yangzixing Lv, Wei Shi
, Weiyong Zhang
, Hui Lu
, Zhihong Tian
:
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage. IEEE Internet Things J. 10(12): 10462-10470 (2023) - [j26]Ximing Chen, Jing Qiu, Fasheng Zhou, Hui Lu, Lejun Zhang, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning. IEEE Wirel. Commun. 30(5): 96-103 (2023) - [c27]Junhan Chen, Rufeng Liang, Man Zhang, Chengcong Zheng, Xun Huang, Hui Lu, Xiang Yu, Zhihong Tian:
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation. CloudNet 2023: 398-402 - [c26]Shen Su, Yue Xue
, Liansheng Lin, Chao Wang, Hui Lu, Jing Qiu, Yanbin Sun, Yuan Liu, Zhihong Tian:
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. GLOBECOM 2023: 5122-5128 - [c25]Weicheng Li, Hui Lu, Yanbin Sun, Shen Su, Jing Qiu, Zhihong Tian:
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. IWQoS 2023: 1-2 - [c24]Shen Su, Yuntian Tan, Yue Xue
, Chao Wang, Hui Lu, Zhihong Tian, Chun Shan, Xiaojiang Du:
Detecting Smart Contract Project Anomalies in Metaverse. MetaCom 2023: 524-532 - 2022
- [j25]Jian Hou
, Fangai Liu, Hui Lu, Zhiyuan Tan, Xuqiang Zhuang, Zhihong Tian:
A novel flow-vector generation approach for malicious traffic detection. J. Parallel Distributed Comput. 169: 72-86 (2022) - [j24]Hui Lu
, Chengjie Jin
, Xiaohan Helu
, Xiaojiang Du
, Mohsen Guizani
, Zhihong Tian
:
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System. IEEE Trans. Netw. Sci. Eng. 9(4): 2052-2065 (2022) - [c23]Runsheng Guo, Qichao Liu, Man Zhang, Ning Hu, Hui Lu:
A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. DSC 2022: 40-47 - 2021
- [j23]Jiantao Shi, Likun Liu, Xiangzhan Yu, Hui Lu
:
A collaborative service resource evaluation model based on trust network. EURASIP J. Wirel. Commun. Netw. 2021(1): 51 (2021) - [j22]Ning Hu, Zhihong Tian, Hui Lu
, Xiaojiang Du, Mohsen Guizani
:
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. Int. J. Mach. Learn. Cybern. 12(11): 3129-3144 (2021) - [j21]Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun
, Yi Han, Zhihong Tian:
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. Mob. Networks Appl. 26(4): 1723-1732 (2021) - [j20]Hui Lu, Chengjie Jin, Xiaohan Helu, Chunsheng Zhu, Nadra Guizani, Zhihong Tian:
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call. IEEE Netw. 35(2): 215-221 (2021) - [j19]Jiageng Yang, Xinguo Zhang, Hui Lu
, Muhammad Shafiq
, Zhihong Tian
:
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices. Secur. Commun. Networks 2021: 1987844:1-1987844:15 (2021) - [j18]Jin Li, Songqi Wu, Yundan Yang, Fenghui Duan, Hui Lu
, Yueming Lu
:
Controlled Sharing Mechanism of Data Based on the Consortium Blockchain. Secur. Commun. Networks 2021: 5523489:1-5523489:10 (2021) - [j17]Zhaoquan Gu
, Weixiong Hu
, Chuanjing Zhang
, Hui Lu
, Lihua Yin, Le Wang
:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 921-932 (2021) - [j16]Runhai Jiao
, Shuangkun Wang
, Tianle Zhang
, Hui Lu
, Hui He
, Brij B. Gupta
:
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method. IEEE Trans. Netw. Serv. Manag. 18(4): 4019-4029 (2021) - 2020
- [j15]Weixiang Chen, Xiaohan Helu, Chengjie Jin, Man Zhang, Hui Lu
, Yanbin Sun, Zhihong Tian:
Advanced persistent threat organization identification based on software gene of malware. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j14]Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. Int. J. Digit. Crime Forensics 12(1): 109-130 (2020) - [j13]Haitao Sun, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, Zhihong Tian
:
Research on android infiltration technology based on the silent installation of an accessibility service. Int. J. Distributed Sens. Networks 16(2) (2020) - [j12]Xianfei Yang, Xiang Yu, Hui Lu
:
Dual possibilistic regression models of support vector machines and application in power load forecasting. Int. J. Distributed Sens. Networks 16(5) (2020) - [j11]Xiang Yu, Hui Lu
, Xianfei Yang, Ying Chen
, Haifeng Song, Jianhua Li, Wei Shi
:
An adaptive method based on contextual anomaly detection in Internet of Things through wireless sensor networks. Int. J. Distributed Sens. Networks 16(5) (2020) - [j10]Mohan Li
, Yanbin Sun
, Hui Lu
, Sabita Maharjan
, Zhihong Tian
:
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet Things J. 7(7): 6266-6278 (2020) - [j9]Zhihong Tian, Chaochao Luo, Hui Lu, Shen Su, Yanbin Sun, Man Zhang:
User and Entity Behavior Analysis under Urban Big Data. Trans. Data Sci. 1(3): 16:1-16:19 (2020) - [j8]Lihua Yin, Xi Luo
, Chunsheng Zhu
, Liming Wang, Zhen Xu, Hui Lu
:
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. IEEE Trans. Ind. Informatics 16(2): 1373-1384 (2020) - [j7]Menghai Pan
, Weixiao Huang, Yanhua Li
, Xun Zhou, Zhenming Liu, Rui Song
, Hui Lu, Zhihong Tian, Jun Luo:
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis. ACM Trans. Intell. Syst. Technol. 11(1): 8:1-8:19 (2020) - [c22]Tao Zhang, Yu Jiang, Runsheng Guo, Xiaoran Zheng, Hui Lu:
A Survey of Hybrid Fuzzing based on Symbolic Execution. CIAT 2020: 192-196 - [c21]Zhuobo Tan, Hui Lu:
A Systemic Review of Kernel Fuzzing. CIAT 2020: 283-289 - [c20]Hanwen Liu, Xiaohan Helu, Chengjie Jin, Hui Lu, Zhihong Tian, Xiaojiang Du, Khalid Abualsaud:
A Malware Detection Method for Health Sensor Data Based on Machine Learning. ICIoT 2020: 277-282 - [c19]Mingzhou Yang
, Yanhua Li, Xun Zhou, Hui Lu, Zhihong Tian, Jun Luo:
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning. WWW 2020: 1637-1647
2010 – 2019
- 2019
- [j6]Hangfeng Yang
, Shudong Li
, Xiaobo Wu, Hui Lu
, Weihong Han:
A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning. IEEE Access 7: 148853-148860 (2019) - [j5]Le Wang, Zhihong Tian
, Zhaoquan Gu, Hui Lu
:
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 7: 169066-169072 (2019) - [j4]Hui Lu
, Man Zhang, Shen Su
, Xiangsong Gao, Chaochao Luo:
Broken Bike Recycling Planning for Sharing Bikes System. IEEE Access 7: 177354-177361 (2019) - [j3]Hui Lu, Xiaohan Helu, Chengjie Jin
, Yanbin Sun
, Man Zhang
, Zhihong Tian
:
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices. IEEE Access 7: 178321-178330 (2019) - [j2]Cong Zhang, Yuanan Liu, Fan Wu, Lidong Zhai, Hui Lu:
Analysis of WeChat Subscription Influence Based on Topic Diffusion. Int. J. Digit. Crime Forensics 11(4): 130-148 (2019) - [c18]Cong Zhang, Yanhua Li, Jie Bao, Sijie Ruan, Tianfu He, Hui Lu, Zhihong Tian, Cong Liu, Chao Tian, Jianfeng Lin, Xianen Li:
Effective Recycling Planning for Dockless Sharing Bikes. SIGSPATIAL/GIS 2019: 62-70 - [c17]Dan Xu, Le Wang, Jing Qiu, Hui Lu:
A Review of Network Representation Learning. ICAIS (2) 2019: 124-132 - [c16]Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun:
Research on Content Extraction of Rich Text Web Pages. ICAIS (4) 2019: 279-287 - [c15]Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun:
Network Protocol Analysis Base on WeChat PC Version. ICAIS (4) 2019: 288-297 - [c14]Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun:
Bitcoin Network Size Estimation Based on Coupon Collection Model. ICAIS (4) 2019: 298-307 - [c13]Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu:
A Distributed Cryptanalysis Framework Based on Mobile Phones. ICAIS (4) 2019: 318-331 - [c12]Xiang Yu, Hui Lu, Le Wang, Dapeng Man:
A Dynamic Event Region Tracking Approach Based on Node Calibration. ICAIS (1) 2019: 347-357 - [c11]Yuanyuan Chen, Hui Lu, Jing Qiu, Le Wang:
A Tutorial of Graph Representation. ICAIS (1) 2019: 368-378 - [c10]Liwen Zheng, Xiaohan Helu, Mohan Li, Hui Lu:
Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm. ICAIS (1) 2019: 605-616 - [c9]Menghai Pan, Yanhua Li
, Xun Zhou, Zhenming Liu, Rui Song
, Hui Lu, Jun Luo:
Dissecting the Learning Curve of Taxi Drivers: A Data-Driven Approach. SDM 2019: 783-791 - 2018
- [j1]Fan Wu, Ran Sun, Wenhao Fan, Yuanan Liu, Feng Liu, Hui Lu:
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control. Int. J. Digit. Crime Forensics 10(3): 95-113 (2018) - [c8]Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. ICCCS (2) 2018: 3-8 - [c7]Xiang Yu, Yanbo Li, Hui Lu, Le Wang:
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope. ICCCS (1) 2018: 3-12 - [c6]Xiang Yu, Shuang Chen, Yanbo Li, Hui Lu, Le Wang:
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description. ICCCS (3) 2018: 227-233 - [c5]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Ronglai Jia:
A Trusted Computing Base for Information System Classified Protection. ICCCS (1) 2018: 253-262 - [c4]Xiangsong Gao, Hui Lu, Xiang Cui, Le Wang:
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. ICCCS (1) 2018: 285-292 - [c3]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:
The Research on Security Audit for Information System Classified Protection. ICCCS (2) 2018: 300-308 - [c2]Chaochao Luo, Le Wang, Hui Lu:
Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset. ICCCS (1) 2018: 326-333 - [c1]Yanbin Sun, Mohan Li, Le Wang, Hui Lu:
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree. ICCCS (1) 2018: 525-530
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-25 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint