default search action
Long Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Peixin Lu, Lianting Hu, Alexis Mitelpunkt, Surbhi Bhatnagar, Long Lu, Huiying Liang:
A hierarchical attention-based multimodal fusion framework for predicting the progression of Alzheimer's disease. Biomed. Signal Process. Control. 88(Part B): 105669 (2024) - [j16]Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - [c53]Changming Liu, Alejandro Mera, Engin Kirda, Meng Xu, Long Lu:
CO3: Concolic Co-execution for Firmware. USENIX Security Symposium 2024 - [c52]Alejandro Mera, Changming Liu, Ruimin Sun, Engin Kirda, Long Lu:
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications. USENIX Security Symposium 2024 - 2023
- [j15]Jiajie Tang, Pu Yang, Bingbing Xie, Cong Wei, Lianting Hu, Shouyi Wang, Yuxuan Jiang, Ruizhuo Li, Hang Zhou, Haiqing Xu, Qirong Wan, Jin Han, Dongchi Zhao, Long Lu:
A Deep Learning-Based Brain Age Prediction Model for Preterm Infants via Neonatal MRI. IEEE Access 11: 68994-69004 (2023) - [j14]Junjun Guo, Kai Long, Kunpeng Yang, Kaida Jiang, Long Lu, Changyuan Wang:
A novel prediction method for vulnerability outbreak trend. Comput. Electr. Eng. 108: 108743 (2023) - [j13]Jiajie Tang, Yongen Liang, Yuxuan Jiang, Jinrong Liu, Rui Zhang, Danping Huang, Chengcheng Pang, Chen Huang, Dongni Luo, Xue Zhou, Ruizhuo Li, Kanghui Zhang, Bingbing Xie, Lianting Hu, Fanfan Zhu, Huimin Xia, Long Lu, Hongying Wang:
A multicenter study on two-stage transfer learning model for duct-dependent CHDs screening in fetal echocardiography. npj Digit. Medicine 6 (2023) - [c51]Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha:
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks. SP 2023: 1596-1612 - [c50]Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek:
A Study of Multi-Factor and Risk-Based Authentication Availability. USENIX Security Symposium 2023: 2043-2060 - [i15]Bo Feng, Meng Luo, Changming Liu, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. CoRR abs/2312.01195 (2023) - 2022
- [j12]Bai-Chen Xie, Long Lu, Na Duan:
Environmental efficiency assessment of China's integrated power system under the assumption of semi-disposability. Comput. Ind. Eng. 167: 108023 (2022) - [j11]Peixin Lu, Xin Li, Lianting Hu, Long Lu:
Integrating genomic and resting State fMRI for efficient autism spectrum disorder classification. Multim. Tools Appl. 81(14): 19183-19194 (2022) - [j10]Xin Li, Peixin Lu, Lianting Hu, XiaoGuang Wang, Long Lu:
A novel self-learning semi-supervised deep learning network to detect fake news on social media. Multim. Tools Appl. 81(14): 19341-19349 (2022) - [j9]Ryan Williams, Tongwei Ren, Lorenzo De Carli, Long Lu, Gillian Smith:
Guided Feature Identification and Removal for Resource-constrained Firmware. ACM Trans. Softw. Eng. Methodol. 31(2): 28:1-28:25 (2022) - [c49]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. NDSS 2022 - [c48]Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu:
Breaking Embedded Software Homogeneity with Protocol Mutations. SecureComm 2022: 770-790 - [c47]Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, Andrea Lanzi:
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language. STM 2022: 136-155 - [i14]Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu:
D-Box: DMA-enabled Compartmentalization for Embedded Applications. CoRR abs/2201.05199 (2022) - [i13]Lianting Hu, Huiying Liang, Jiajie Tang, Xin Li, Li Huang, Long Lu:
Cutting-Splicing data augmentation: A novel technology for medical image segmentation. CoRR abs/2210.09099 (2022) - 2021
- [j8]Lianting Hu, Huiying Liang, Long Lu:
Splicing learning: A novel few-shot learning approach. Inf. Sci. 552: 17-28 (2021) - [c46]Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. AsiaCCS 2021: 687-701 - [c45]Omid Mirzaei, Roman Vasilenko, Engin Kirda, Long Lu, Amin Kharraz:
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning. DIMVA 2021: 130-150 - [c44]Ruimin Sun, Alejandro Mera, Long Lu, David R. Choffnes:
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. EuroS&P 2021: 385-402 - [c43]Seyed Ali Akhavani, Jordan Jueckstock, Junhua Su, Alexandros Kapravelos, Engin Kirda, Long Lu:
Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy. ISC 2021: 161-176 - [c42]Changming Liu, Yaohui Chen, Long Lu:
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. NDSS 2021 - [c41]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. SP 2021: 1938-1954 - [c40]Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu:
PTAuth: Temporal Memory Safety via Robust Points-to Authentication. USENIX Security Symposium 2021: 1037-1054 - [c39]Zhichuang Sun, Ruimin Sun, Long Lu, Alan Mislove:
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps. USENIX Security Symposium 2021: 1955-1972 - [c38]Mansour Ahmadi, Reza Mirzazade Farkhani, Ryan Williams, Long Lu:
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. USENIX Security Symposium 2021: 2025-2040 - 2020
- [j7]Zunpeng Yu, Long Lu:
Comprehensive analysis of potential prognostic biomarker in gliomas. Libr. Hi Tech 38(4): 783-797 (2020) - [j6]Wang Zhao, Long Lu:
Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data. Libr. Hi Tech 38(4): 799-817 (2020) - [j5]Tao Chen, Tanya Froehlich, Tingyu Li, Long Lu:
Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification. Libr. Hi Tech 38(4): 819-833 (2020) - [j4]Wang Zhao, Peixin Lu, Siwei Yu, Long Lu:
Consumer health information needs in China - a case study of depression based on a Social Q&A community. BMC Medical Informatics Decis. Mak. 20-S(3): 130 (2020) - [c37]Kevin W. Hamlen, Long Lu:
FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation. CCS 2020: 2149-2150 - [c36]Tao Chen, Peixin Lu, Long Lu:
Design Of ASD Subtyping Approach based on Multi-Omics Data to Promote Personalized Healthcare. HICSS 2020: 1-6 - [c35]Feicheng Ma, Jiang Wu, Long Lu:
Introduction to the Minitrack on Data-Driven Smart Health in Asia Pacific. HICSS 2020: 1-2 - [c34]Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, Long Lu:
MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. RAID 2020: 77-92 - [c33]Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha:
OAT: Attesting Operation Integrity of Embedded Devices. SP 2020: 1433-1449 - [c32]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. SP 2020: 1580-1596 - [c31]Bo Feng, Alejandro Mera, Long Lu:
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. USENIX Security Symposium 2020: 1237-1254 - [i12]Zhichuang Sun, Ruimin Sun, Long Lu:
Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps. CoRR abs/2002.07687 (2020) - [i11]Reza Mirzazade Farkhani, Mansour Ahmadi, Long Lu:
PTAuth: Temporal Memory Safety via Robust Points-to Authentication. CoRR abs/2002.07936 (2020) - [i10]Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, Long Lu:
MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. CoRR abs/2002.08568 (2020) - [i9]Ruimin Sun, Alejandro Mera, Long Lu, David R. Choffnes:
SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses. CoRR abs/2006.04806 (2020) - [i8]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020) - [i7]Zhichuang Sun, Ruimin Sun, Long Lu, Somesh Jha:
ShadowNet: A Secure and Efficient System for On-device Model Inference. CoRR abs/2011.05905 (2020)
2010 – 2019
- 2019
- [c30]Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi:
Detecting (absent) app-to-app authentication on cross-device short-distance channels. ACSAC 2019: 328-338 - [c29]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [c28]Long Lu, Wang Zhao:
Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology. ICSH 2019: 39-47 - [c27]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. ISC 2019: 360-380 - [c26]Heejin Park, Shuang Zhai, Long Lu, Felix Xiaozhu Lin:
StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone. USENIX ATC 2019: 537-554 - [c25]Wenhao Li, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang:
TEEv: virtualizing trusted execution environments on mobile platforms. VEE 2019: 2-16 - [i6]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - [i5]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. CoRR abs/1906.07327 (2019) - [i4]Bo Feng, Alejandro Mera, Long Lu:
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version). CoRR abs/1909.06472 (2019) - [i3]Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda:
An Analysis of Malware Trends in Enterprise Networks. CoRR abs/1910.00508 (2019) - 2018
- [j3]Liang Hong, Mengqi Luo, Ruixue Wang, Peixin Lu, Wei Lu, Long Lu:
Big Data in Health Care: Applications and Challenges. Data Inf. Manag. 2(3): 175-197 (2018) - [c24]Long Lu, Wang Zhao:
Augmented Reality: New Technologies for Building Visualized Hospital Knowledge Management Systems. ICSH 2018: 15-25 - [c23]Wenhao Li, Shiyu Luo, Zhichuang Sun, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang, Haibing Guan:
VButton: Practical Attestation of User-driven Operations in Mobile Apps. MobiSys 2018: 28-40 - [c22]Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou:
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. NDSS 2018 - [c21]Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios P. Kemerlis, Michalis Polychronakis:
Compiler-Assisted Code Randomization. IEEE Symposium on Security and Privacy 2018: 461-477 - [c20]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - [i2]Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha:
OEI: Operation Execution Integrity for Embedded Devices. CoRR abs/1802.03462 (2018) - [i1]Heejin Park, Shuang Zhai, Long Lu, Felix Xiaozhu Lin:
StreamBox-TZ: A Secure IoT Analytics Engine at the Edge. CoRR abs/1808.05078 (2018) - 2017
- [c19]Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha:
Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. AsiaCCS 2017: 652-665 - [c18]Arash Alavi, Alan Quach, Hang Zhang, Bryan Marsh, Farhan Ul Haq, Zhiyun Qian, Long Lu, Rajiv Gupta:
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts. PAM 2017: 100-112 - [c17]Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen:
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. IEEE Symposium on Security and Privacy 2017: 304-319 - 2016
- [c16]Long Lu, Mohammad Mannan:
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016). CCS 2016: 1873-1874 - [c15]Yue Chen, Zhi Wang, David B. Whalley, Long Lu:
Remix: On-demand Live Randomization. CODASPY 2016: 50-61 - [c14]Suwen Zhu, Long Lu, Kapil Singh:
CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices. MobiSys 2016: 375-386 - [c13]Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, Long Lu:
Shreds: Fine-Grained Execution Units with Private Memory. IEEE Symposium on Security and Privacy 2016: 56-71 - [c12]Dazeng Yuan, Mingxing He, Shengke Zeng, Xiao Li, Long Lu:
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application. UCC 2016: 269-275 - [e1]Long Lu, Mohammad Mannan:
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4564-4 [contents] - 2015
- [c11]Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li:
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. CCS 2015: 133-145 - [c10]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c9]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - 2014
- [c8]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - 2013
- [c7]Christian Seifert, Jack W. Stokes, Christina Colcernian, John C. Platt, Long Lu:
Robust scareware image detection. ICASSP 2013: 2920-2924 - [c6]Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:
Jekyll on iOS: When Benign Apps Become Evil. USENIX Security Symposium 2013: 559-572 - 2012
- [c5]Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
CHEX: statically vetting Android apps for component hijacking vulnerabilities. CCS 2012: 229-240 - 2011
- [c4]Long Lu, Roberto Perdisci, Wenke Lee:
SURF: detecting and measuring search poisoning. CCS 2011: 467-476 - 2010
- [j2]Li Sun, Taiyi Zhang, Long Lu, Hao Niu:
On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks. IEEE Signal Process. Lett. 17(6): 535-538 (2010) - [c3]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: an attack-agnostic approach for preventing drive-by malware infections. CCS 2010: 440-450
2000 – 2009
- 2009
- [j1]Li Sun, Taiyi Zhang, Long Lu, Hao Niu:
Cooperative communications with relay selection in wireless sensor networks. IEEE Trans. Consumer Electron. 55(2): 513-517 (2009) - [c2]Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:
Mapping kernel objects to enable systematic integrity checking. CCS 2009: 555-565 - [c1]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint