Lu Yu
Lu Yu
The Holcombe Department of Electrical and Computer Engineering, Clemson University
Verified email at g.clemson.edu
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
1622016
On precision bound of distributed fault-tolerant sensor fusion algorithms
B Ao, Y Wang, L Yu, RR Brooks, SS Iyengar
ACM Computing Surveys (CSUR) 49 (1), 1-23, 2016
392016
Stealthy domain generation algorithms
Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ...
IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017
382017
Inferring statistically significant hidden markov models
L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012
382012
Cyber security in smart DC microgrid operations
X Zhong, L Yu, R Brooks, GK Venayagamoorthy
2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015
332015
A normalized statistical metric space for hidden markov models
C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin
IEEE transactions on cybernetics 43 (3), 806-819, 2013
262013
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software†…, 2015
222015
Automobile ecu design to avoid data tampering
L Yu, J Deng, RR Brooks, SB Yun
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
192015
Side channel analysis of multiple PMU data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
192015
Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
102020
Scrybe: A blockchain ledger for clinical trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 1-2, 2018
102018
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th International Conference on Malicious and Unwanted Software†…, 2017
92017
A covert data transport protocol
Y Fu, Z Jia, L Yu, X Zhong, R Brooks
2016 11th International Conference on Malicious and Unwanted Software†…, 2016
82016
Unmasking criminal enterprises: An analysis of bitcoin transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software†…, 2018
72018
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
72016
Semantic similarity detection for data leak prevention
D Du, L Yu, RR Brooks
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
62015
Applying POMDP to moving target optimization
L Yu, RR Brooks
Proceedings of the Eighth Annual Cyber Security and Information Intelligence†…, 2013
62013
Security and data privacy of modern automobiles
J Deng, L Yu, Y Fu, O Hambolu, RR Brooks
Data Analytics for Intelligent Transportation Systems, 131-163, 2017
52017
SCRaaPS: X. 509 certificate revocation using the Blockchain-based Scrybe secure provenance system
S Medury, A Skjellum, RR Brooks, L Yu
2018 13th International Conference on Malicious and Unwanted Software†…, 2018
42018
Towards efficient traffic monitoring for science dmz with side-channel based traffic winnowing
H Li, F Zhang, L Yu, J Oakley, H Hu, RR Brooks
Proceedings of the 2018 ACM International Workshop on Security in Software†…, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20