Follow
Lu Yu
Lu Yu
The Holcombe Department of Electrical and Computer Engineering, Clemson University
Verified email at g.clemson.edu - Homepage
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
4302016
Stealthy domain generation algorithms
Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ...
IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017
772017
On precision bound of distributed fault-tolerant sensor fusion algorithms
B Ao, Y Wang, L Yu, RR Brooks, SS Iyengar
ACM Computing Surveys (CSUR) 49 (1), 1-23, 2016
522016
Cyber security in smart DC microgrid operations
X Zhong, L Yu, R Brooks, GK Venayagamoorthy
2015 IEEE first international conference on dc microgrids (ICDCM), 86-91, 2015
482015
Inferring statistically significant hidden markov models
L Yu, JM Schwier, RM Craven, RR Brooks, C Griffin
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1548-1558, 2012
482012
Automobile ECU design to avoid data tampering
L Yu, J Deng, RR Brooks, SB Yun
Proceedings of the 10th annual cyber and information security research …, 2015
332015
A normalized statistical metric space for hidden markov models
C Lu, JM Schwier, RM Craven, L Yu, RR Brooks, C Griffin
IEEE transactions on cybernetics 43 (3), 806-819, 2013
312013
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software …, 2015
272015
Availability analysis of a permissioned blockchain with a lightweight consensus protocol
A Altarawneh, F Sun, RR Brooks, O Hambolu, L Yu, A Skjellum
Computers & Security 102, 102098, 2021
232021
Distributed denial of service (DDoS): a history
RR Brooks, L Yu, I Ozcelik, J Oakley, N Tusing
IEEE Annals of the History of Computing 44 (2), 44-54, 2021
222021
Scrybe: a blockchain ledger for clinical trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 1-2, 2018
222018
Security and data privacy of modern automobiles
J Deng, L Yu, Y Fu, O Hambolu, RR Brooks
Data analytics for intelligent transportation systems, 131-163, 2017
222017
Side channel analysis of multiple PMU data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
212015
Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
192020
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th international conference on malicious and unwanted software …, 2017
142017
Unmasking criminal enterprises: an analysis of Bitcoin transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software …, 2018
112018
Semantic similarity detection for data leak prevention
D Du, L Yu, RR Brooks
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
112015
Scraaps: X. 509 certificate revocation using the blockchain-based scrybe secure provenance system
S Medury, A Skjellum, RR Brooks, L Yu
2018 13th International Conference on Malicious and Unwanted Software …, 2018
102018
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
102016
Protocol proxy: An fte-based covert channel
J Oakley, L Yu, X Zhong, GK Venayagamoorthy, R Brooks
Computers & Security 92, 101777, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20