Follow
Lu Di
Title
Cited by
Cited by
Year
APPLET: A privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China Information Sciences 60 (9), 1-16, 2017
442017
xTSeH: A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices
D Lu, R Han, Y Shen, X Dong, J Ma, X Du, M Guizani
IEEE Journal on Selected Areas in Communications, 2020
272020
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing
X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma
IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019
182019
Android malware detection based on call graph via graph neural network
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
2020 International Conference on Networking and Network Applications (NaNA …, 2020
162020
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
162015
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing
Y Wang, J Ma, D Lu, X Lu, L Zhang
Cluster computing 17, 1369-1381, 2014
142014
Android malware detection via graph representation learning
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
Mobile Information Systems 2021, 1-14, 2021
122021
Information flow control on encrypted data for service composition among multiple clouds
N Xi, J Ma, C Sun, D Lu, Y Shen
Distributed and Parallel Databases 36, 511-527, 2018
72018
Smaug: A TEE-assisted secured SQLite for embedded systems
D Lu, M Shi, X Ma, X Liu, R Guo, T Zheng, Y Shen, X Dong, J Ma
IEEE Transactions on Dependable and Secure Computing, 2022
52022
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
X Dong, G Li, T Zhang, D Lu, Y Shen, J Ma
World Wide Web 23, 1035-1055, 2020
42020
Building a secure scheme for a trusted hardware sharing environment
D Lu, J Ma, C Sun, Q Wu, Z Sun, N Xi
IEEE Access 5, 20260-20271, 2017
42017
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
D Lu, J Ma, C Sun, X Ma, N Xi
Sci. China Inf. Sci 60 (5), 1-17, 2017
42017
Distributed secure service composition with declassification in mobile network
N Xi, C Sun, J Ma, Y Shen, D Lu
2016 International Conference on Networking and Network Applications (NaNA …, 2016
42016
BejaGNN: behavior-based Java malware detection via graph neural network
P Feng, L Yang, D Lu, N Xi, J Ma
The Journal of Supercomputing 79 (14), 15390-15414, 2023
32023
A secured TPM integration scheme towards smart embedded system based collaboration network
D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma
Computers & Security 97, 101922, 2020
32020
Towards primary user Sybil-proofness for online spectrum auction in dynamic spectrum access
X Dong, Q Kang, Q Yao, D Lu, Y Xu, J Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1439-1448, 2020
32020
A two-dimensional Sybil-proof mechanism for dynamic spectrum access
X Dong, Z You, Y Shen, D Lu, Y Xu, J Liu
IEEE Transactions on Mobile Computing, 2022
22022
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model
H Qiao, Y Liu, X Dong, D Lu
2019 International Conference on Networking and Network Applications (NaNA …, 2019
22019
Distributed secure service composition with declassification in mobile clouds
N Xi, D Lu, C Sun, J Ma, Y Shen
Mobile Information Systems 2017, 2017
22017
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems
C Ma, N Xi, D Lu, Y Feng, J Ma
arXiv preprint arXiv:2309.05978, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20