Lu Yu
Lu Yu
The Holcombe Department of Electrical and Computer Engineering, Clemson University
Verified email at g.clemson.edu
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
1472016
On precision bound of distributed fault-tolerant sensor fusion algorithms
B Ao, Y Wang, L Yu, RR Brooks, SS Iyengar
ACM Computing Surveys (CSUR) 49 (1), 1-23, 2016
372016
Inferring statistically significant hidden markov models
L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012
372012
Stealthy domain generation algorithms
Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ...
IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017
342017
Cyber security in smart DC microgrid operations
X Zhong, L Yu, R Brooks, GK Venayagamoorthy
2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015
262015
A normalized statistical metric space for hidden markov models
C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin
IEEE transactions on cybernetics 43 (3), 806-819, 2013
252013
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software†…, 2015
222015
Side channel analysis of multiple pmu data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
182015
Automobile ecu design to avoid data tampering
L Yu, J Deng, RR Brooks, SB Yun
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
152015
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
92020
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th International Conference on Malicious and Unwanted Software†…, 2017
82017
A covert data transport protocol
Y Fu, Z Jia, L Yu, X Zhong, R Brooks
2016 11th International Conference on Malicious and Unwanted Software†…, 2016
82016
Scrybe: A Blockchain ledger for clinical trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 2018
72018
Trespass, nuisance, and spam: 11th century common law meets the internet
RJ Aalberts, P Poon, P Thistle
Communications of the ACM 50 (12), 40-45, 2007
72007
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
62016
Applying POMDP to moving target optimization
L Yu, RR Brooks
Proceedings of the Eighth Annual Cyber Security and Information Intelligence†…, 2013
62013
Semantic similarity detection for data leak prevention
D Du, L Yu, RR Brooks
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
52015
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software†…, 2018
42018
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing
H Li, F Zhang, L Yu, J Oakley, H Hu, RR Brooks
Proceedings of the 2018 ACM International Workshop on Security in Software†…, 2018
32018
Security and data privacy of modern automobiles
J Deng, L Yu, Y Fu, O Hambolu, RR Brooks
Data Analytics for Intelligent Transportation Systems, 131-163, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20