Lu, Sheng-zhuo
175  results:
Search for persons X
?
1

Multi-Level Security Based on Physical Distribution:

, In: 1984 IEEE Symposium on Security and Privacy,
 
?
2

Understanding the Ineffectiveness of the Transfer Attack in..:

, In: Advances in Information Security; Network Security Empowered by Artificial Intelligence,
Duan, Rui ; Zhao, Wenwei ; Luo, Zhengping Jay... - p. 99-119 , 2024
 
?
3

A Single-Stage 3D Object Detector with Multi-scale Input an..:

, In: 2023 42nd Chinese Control Conference (CCC),
Wang, Yijing ; Lu, Zhuo ; Li, Zheng. - p. 7849-7854 , 2023
 
?
4

Research on Stock History Data Mining and Prediction Algori..:

, In: 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC),
Lu, Zhuo - p. 1-6 , 2023
 
?
5

Federated Learning for IoT Applications, Attacks and Defens..:

, In: AI Embedded Assurance for Cyber Systems,
Qu, Zhe ; Duan, Rui ; Liu, Yao. - p. 161-181 , 2023
 
?
6

How Can the Adversary Effectively Identify Cellular IoT Dev..:

, In: Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning,
 
?
7

SecDINT: Preventing Data-oriented Attacks via Intel SGX Esc..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
Shen, Dakun ; Hou, Tao ; Lu, Zhuo.. - p. 1-9 , 2023
 
?
8

Research on Recommendation System Based on Neural Network a..:

, In: 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC),
Lu, Zhuo - p. 1-5 , 2023
 
?
9

Data-Driven Next-Generation Wireless Networking: Embracing ..:

, In: 2023 32nd International Conference on Computer Communications and Networks (ICCCN),
Xue, Jiahao ; Qu, Zhe ; Zhao, Shangqing.. - p. 1-10 , 2023
 
?
10

Undermining Deep Learning Based Channel Estimation via Adve..:

, In: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning,
Hou, Tao ; Wang, Tao ; Lu, Zhuo.. - p. 63-68 , 2022
 
?
11

DyWCP : Dynamic and Lightweight Data-Channel Coupling to..:

, In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Bi, Shengping ; Hou, Tao ; Wang, Tao... - p. 222-232 , 2022
 
?
12

Perception-Aware Attack : Creating Adversarial Music via..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Duan, Rui ; Qu, Zhe ; Zhao, Shangqing... - p. 905-919 , 2022
 
?
13

MUSTER: Subverting User Selection in MU-MIMO Networks:

, In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications,
Hou, Tao ; Bi, Shengping ; Wang, Tao... - p. 140-149 , 2022
 
?
14

When Third-Party JavaScript Meets Cache: Explosively Amplif..:

, In: 2022 IEEE Conference on Communications and Network Security (CNS),
Hou, Tao ; Bi, Shengping ; Wei, Mingkui... - p. 290-298 , 2022
 
?
15

Location Heartbleeding : The Rise of Wi-Fi Spoofing Atta..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Han, Xiao ; Xiong, Junjie ; Shen, Wenbo.. - p. 1383-1397 , 2022
 
1-15