关注
Liang Fu Lu
Liang Fu Lu
在 tju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A novel feature selection approach for intrusion detection data classification
MA Ambusaidi, X He, Z Tan, P Nanda, LF Lu, UT Nagar
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
582014
Online virtual machine placement for increasing cloud provider’s revenue
L Zhao, L Lu, Z Jin, C Yu
IEEE Transactions on Services Computing 10 (2), 273-285, 2015
512015
Two axes re-ordering methods in parallel coordinates plots
LF Lu, ML Huang, J Zhang
Journal of Visual Languages & Computing 33, 3-12, 2016
442016
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD
Y Mu, P Wang, L Lu, X Zhang, L Qi
Pattern Recognition Letters 130, 4-11, 2020
382020
A new non-adaptive optimization method: Stochastic gradient descent with momentum and difference
W Yuan, F Hu, L Lu
Applied Intelligence, 1-15, 2022
352022
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
332012
Multirepresentational convolutional neural networks for text classification
R Jin, L Lu, J Lee, A Usman
Computational Intelligence, 2019
242019
Wi-Run: Multi-runner step estimation using commodity Wi-Fi
L Zhang, M Liu, L Lu, L Gong
2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018
242018
An approach for simple linear profile gauge R&R studies
L Shi, W Chen, LF Lu
Discrete Dynamics in Nature and Society 2014, 2014
242014
A new concentric-circle visualization of multi-dimensional data and its application in network security
LF Lu, JW Zhang, ML Huang, L Fu
Journal of Visual Languages & Computing 21 (4), 194-208, 2010
232010
Big data density analytics using parallel coordinate visualization
J Zhang, ML Huang, WB Wang, LF Lu, ZP Meng
2014 IEEE 17th International Conference on Computational Science and …, 2014
202014
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing
ML Huang, LF Lu, X Zhang
Computing 97, 425-437, 2015
192015
Intrusion detection method based on nonlinear correlation measure
MA Ambusaidi, Z Tan, X He, P Nanda, LF Lu, A Jamdagni
International Journal of Internet Protocol Technology 7 8 (2-3), 77-86, 2014
182014
Wi-Run: Device-free step estimation system with commodity Wi-Fi
M Liu, L Zhang, P Yang, L Lu, L Gong
Journal of Network and Computer Applications 143, 77-88, 2019
162019
Netviewer: A visualization tool for network security events
Z Jiawan, Y Peng, L Liangfu, C Lei
2009 International Conference on Networks Security, Wireless Communications …, 2009
162009
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
142010
Basin boundaries with nested structure in a shallow arch oscillator
Y Zhang, LF Lu
Nonlinear Dynamics 77, 1121-1132, 2014
132014
A novel visualization approach for efficient network scans detection
Z Jiawan, L Liang, L Liangfu, Z Ning
2008 International Conference on Security Technology, 23-26, 2008
132008
Using neural networks for fake colorized image detection
Y Li, Y Zhang, L Lu, Y Jia, J Liu
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
102019
A novel visualization method for detecting ddos network attacks
J Zhang, G Yang, L Lu, ML Huang, M Che
Visual Information Communication, 185-194, 2010
102010
系统目前无法执行此操作,请稍后再试。
文章 1–20