Lu Yu
Lu Yu
The Holcombe Department of Electrical and Computer Engineering, Clemson University
Verified email at g.clemson.edu - Homepage
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
2142016
On precision bound of distributed fault-tolerant sensor fusion algorithms
B Ao, Y Wang, L Yu, RR Brooks, SS Iyengar
ACM Computing Surveys (CSUR) 49 (1), 1-23, 2016
432016
Stealthy domain generation algorithms
Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ...
IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017
422017
Inferring statistically significant hidden markov models
L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012
402012
Cyber security in smart DC microgrid operations
X Zhong, L Yu, R Brooks, GK Venayagamoorthy
2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015
392015
A normalized statistical metric space for hidden markov models
C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin
IEEE transactions on cybernetics 43 (3), 806-819, 2013
282013
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software†…, 2015
242015
Automobile ecu design to avoid data tampering
L Yu, J Deng, RR Brooks, SB Yun
Proceedings of the 10th annual cyber and information security research†…, 2015
222015
Side channel analysis of multiple PMU data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
202015
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy 79, 51, 2020
152020
Scrybe: A blockchain ledger for clinical trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 1-2, 2018
142018
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th International Conference on Malicious and Unwanted Software†…, 2017
112017
Security and data privacy of modern automobiles
J Deng, L Yu, Y Fu, O Hambolu, RR Brooks
Data Analytics for Intelligent Transportation Systems, 131-163, 2017
82017
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
82016
A covert data transport protocol
Y Fu, Z Jia, L Yu, X Zhong, R Brooks
2016 11th International Conference on Malicious and Unwanted Software†…, 2016
82016
Unmasking criminal enterprises: an analysis of Bitcoin transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software†…, 2018
72018
Semantic similarity detection for data leak prevention
D Du, L Yu, RR Brooks
Proceedings of the 10th Annual Cyber and Information Security Research†…, 2015
72015
Availability analysis of a permissioned blockchain with a lightweight consensus protocol
A Altarawneh, F Sun, RR Brooks, O Hambolu, L Yu, A Skjellum
Computers & Security 102, 102098, 2021
62021
Scraaps: X. 509 certificate revocation using the blockchain-based scrybe secure provenance system
S Medury, A Skjellum, RR Brooks, L Yu
2018 13th International Conference on Malicious and Unwanted Software†…, 2018
62018
Applying POMDP to moving target optimization
L Yu, RR Brooks
Proceedings of the Eighth Annual Cyber Security and Information Intelligence†…, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20