关注
Bo Luo
Bo Luo
Professor, The University of Kansas
在 ku.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
10922017
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 First IEEE International Conference on Smart Grid Communications, 327-332, 2010
7162010
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain
S Awan, F Li, B Luo, M Liu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1352019
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
1332004
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model
H Sampathkumar, X Chen, B Luo
BMC Medical Informatics and Decision Making 14 (1), 91, 2014
1322014
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
1292015
CONTRA: Defending Against Poisoning Attacks in Federated Learning
S Awan, B Luo, F Li
European Symposium on Research in Computer Security, 455-475, 2021
1082021
Preserving data integrity for smart grid data aggregation
F Li, B Luo
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
1062012
Secure and privacy-preserving information aggregation for smart grids
F Li, B Luo, P Liu
International Journal of Security and Networks 6 (1), 28-39, 2011
1052011
World Wide Web based image search engine using text and image content features
B Luo, X Wang, X Tang
Proceedings of SPIE 5018, 123-130, 2003
962003
Copker: Computing with private keys without RAM
L Guan, J Lin, B Luo, J Jing
21st ISOC Network and Distributed System Security Symposium (NDSS), 2014
722014
Stalking online: on user privacy in social networks
Y Yang, J Lutes, F Li, B Luo, P Liu
Proceedings of the second ACM conference on Data and Application Security …, 2012
692012
System and methods of integrating visual features with textual features for image searching
X Chen, B Luo
US Patent 9,075,825, 2015
682015
You are what you broadcast: Identification of mobile and {IoT} devices from (public){WiFi}
L Yu, B Luo, J Ma, Z Zhou, Q Liu
29th USENIX security symposium (USENIX security 20), 55-72, 2020
612020
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain
L Jiang, C Xu, X Wang, B Luo, H Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017
582017
Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case
L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han
IEEE Internet of Things Journal, 2019
562019
Access control for big data using data content
W Zeng, Y Yang, B Luo
2013 IEEE International Conference on Big Data, 45-47, 2013
562013
Using ID-Hopping to Defend Against Targeted DoS on CAN
A Humayed, B Luo
Proceedings of the 1st International Workshop on Safe Control of Connected …, 2017
442017
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
F Li, B Luo, P Liu, D Lee, CH Chu
Information Forensics and Security, IEEE Transactions on 8 (6), 888-900, 2013
432013
In-broker access control: Towards efficient end-to-end performance of information brokerage systems
F Li, B Luo, P Liu, D Lee, P Mitra, WC Lee, CH Chu
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
432006
系统目前无法执行此操作,请稍后再试。
文章 1–20