Підписатись
Lu Di
Lu Di
Підтверджена електронна адреса в xidian.edu.cn
Назва
Посилання
Посилання
Рік
Investigation of critical behavior in Pr0. 55Sr0. 45MnO3 by using the field dependence of magnetic entropy change
J Fan, L Pi, L Zhang, W Tong, L Ling, B Hong, Y Shi, W Zhang, D Lu, ...
Applied Physics Letters 98 (7), 2011
1052011
Magnetic and magnetocaloric properties of perovskite manganite Pr0. 55Sr0. 45MnO3
J Fan, L Pi, L Zhang, W Tong, L Ling, B Hong, Y Shi, W Zhang, D Lu, ...
Physica B: Condensed Matter 406 (11), 2289-2292, 2011
622011
APPLET: a privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China. Information Sciences 60 (9), 092101, 2017
492017
xTSeH: A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices
D Lu, R Han, Y Shen, X Dong, J Ma, X Du, M Guizani
IEEE Journal on Selected Areas in Communications, 2020
352020
Android malware detection via graph representation learning
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
Mobile Information Systems 2021 (1), 5538841, 2021
212021
Android malware detection based on call graph via graph neural network
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
2020 International Conference on Networking and Network Applications (NaNA …, 2020
212020
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing
X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma
IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019
212019
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
172015
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing
Y Wang, J Ma, D Lu, X Lu, L Zhang
Cluster computing 17, 1369-1381, 2014
152014
Magnetocaloric effect of half-doped manganite Nd0. 5Ca0. 25Sr0. 25MnO3
J Fan, B Hong, D Lu, Y Shi, L Ling, L Zhang, W Tong, L Pi, Y Zhang
Physica B: Condensed Matter 405 (15), 3120-3123, 2010
152010
Smaug: A TEE-assisted secured SQLite for embedded systems
D Lu, M Shi, X Ma, X Liu, R Guo, T Zheng, Y Shen, X Dong, J Ma
IEEE Transactions on Dependable and Secure Computing 20 (5), 3617-3635, 2022
102022
Information flow control on encrypted data for service composition among multiple clouds
N Xi, J Ma, C Sun, D Lu, Y Shen
Distributed and Parallel Databases 36, 511-527, 2018
82018
Distributed secure service composition with declassification in mobile network
N Xi, C Sun, J Ma, Y Shen, D Lu
2016 International Conference on Networking and Network Applications (NaNA …, 2016
52016
A secured TPM integration scheme towards smart embedded system based collaboration network
D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma
Computers & Security 97, 101922, 2020
42020
Towards primary user sybil-proofness for online spectrum auction in dynamic spectrum access
X Dong, Q Kang, Q Yao, D Lu, Y Xu, J Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1439-1448, 2020
42020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing
X Dong, G Li, T Zhang, D Lu, Y Shen, J Ma
World Wide Web 23, 1035-1055, 2020
42020
Building a secure scheme for a trusted hardware sharing environment
D Lu, J Ma, C Sun, Q Wu, Z Sun, N Xi
IEEE Access 5, 20260-20271, 2017
42017
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
D Lu, J Ma, C Sun, X Ma, N Xi
Science China. Information Sciences 60 (5), 52103, 2017
42017
BejaGNN: behavior-based Java malware detection via graph neural network
P Feng, L Yang, D Lu, N Xi, J Ma
The Journal of Supercomputing 79 (14), 15390-15414, 2023
32023
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model
H Qiao, Y Liu, X Dong, D Lu
2019 International Conference on Networking and Network Applications (NaNA …, 2019
32019
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20