


default search action
Xiang Lu 0004
Person information
- affiliation: Institute of Information Engineering, CAS, China
Other persons with the same name
- Xiang Lu — disambiguation page
- Xiang Lu 0001
— Shandong University of Science and Technology, Qingdao, Shandong, China - Xiang Lu 0002
— Sichuan University, Chengdu, China - Xiang Lu 0003
— Guangxi University, Naning, China - Xiang Lu 0005
— Shandong University of Science and Technology, Qingdao, China - Xiang Lu 0006
— Sun Yat-Sen University, Guangzhou, Guangdong, China - Xiang Lu 0007
— Civil Aviation University of China, Tianjing, China - Xiang Lu 0008
— Beijing Institute of Technology, Beijing, China - Xiang Lu 0009
— Harbin Institute of Technology, Harbin, China - Xiang Lu 0010
— China University of Mining and Technology, Xuzhou, Jiangsu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
[j14]Jing Si
, Rong Guo, Xiang Lu, Chao Han, Li Xu, Dan Xing, Caiping Chen:
Decision aids on breast conserving surgery for early stage breast cancer patients: a systematic review. BMC Medical Informatics Decis. Mak. 20(1): 275 (2020)
[j13]Xiali Wang
, Xiang Lu
:
A Host-Based Anomaly Detection Framework Using XGBoost and LSTM for IoT Devices. Wirel. Commun. Mob. Comput. 2020: 8838571:1-8838571:13 (2020)
2010 – 2019
- 2017
[j12]Haojin Zhu
, Kuai Xu
, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 293-295 (2017)
[j11]Xiang Lu
, Linlin Tu, Xinyun Zhou, Naixue Xiong, Limin Sun:
ViMediaNet: an emulation system for interactive multimedia based telepresence services. J. Supercomput. 73(8): 3562-3578 (2017)
[c13]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6
[c12]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45
[c11]Shangqing Zhao, Zhengping Luo
, Zhuo Lu, Xiang Lu, Yao Liu:
Stateful Inter-Packet Signal Processing for Wireless Networking. MobiCom 2017: 15-27- 2016
[j10]Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang:
Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int. J. Grid Util. Comput. 7(1): 1-11 (2016)
[j9]Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:
An optimal query strategy for protecting location privacy in location-based services. Peer-to-Peer Netw. Appl. 9(4): 752-761 (2016)
[j8]Qi Jiang
, Muhammad Khurram Khan
, Xiang Lu, Jianfeng Ma, Debiao He
:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016)
[c10]Shichao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang, Limin Sun:
Zero reconciliation secret key extraction in MIMO backscatter wireless systems. ICC 2016: 1-6- 2015
[j7]Qi Jiang
, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6): 1070-1081 (2015)
[c9]Kaixuan Xie, Shiming Ge, Rui Yang, Xiang Lu, Limin Sun:
Negative-Supervised Cascaded Deep Learning for Traffic Sign Classification. CCCV (1) 2015: 249-257
[c8]Shuixian Chen, Xiang Lu, Limin Sun, Shiming Ge:
Target Domain Adaptation for Face Detection in a Smart Camera Network with Peer-to-Peer Communications. GLOBECOM 2015: 1-6
[c7]Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, Limin Sun:
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. GLOBECOM 2015: 1-6
[c6]Yongming Jin, Hongsong Zhu, Zhiqiang Shi, Xiang Lu, Limin Sun:
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. ICC 2015: 7234-7239- 2014
[j6]Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang:
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Clust. Comput. 17(4): 1369-1381 (2014)
[j5]Qi Jiang
, Jianfeng Ma, Xiang Lu, Youliang Tian:
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(2): 12 (2014)
[c5]Hong Li, Limin Sun, Haojin Zhu
, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. INFOCOM 2014: 2337-2345- 2013
[j4]Xinghua Li, Xiang Lu, Jianfeng Ma:
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. Smart Comput. Rev. 3(3): 174-189 (2013)
[j3]Xiang Lu, Wenye Wang
, Jianfeng Ma:
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation. IEEE Trans. Smart Grid 4(1): 170-183 (2013)
[c4]Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92
[c3]Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun:
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617- 2012
[j2]Xiang Lu, Wenye Wang, Jianfeng Ma:
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems. Int. J. Distributed Sens. Networks 8 (2012)- 2011
[j1]Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park:
Authentications and Key Management in 3G-WLAN Interworking. Mob. Networks Appl. 16(3): 394-407 (2011)
[c2]Xiang Lu, Zhuo Lu, Wenye Wang
, Jianfeng Ma:
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6
[c1]Xiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma:
From security to vulnerability: Data authentication undermines message delivery in smart grid. MILCOM 2011: 1183-1188
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-29 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







