default search action
Lei Luo 0004
Person information
- affiliation: University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
Other persons with the same name
- Lei Luo — disambiguation page
- Lei Luo 0001 — Nanjing University of Science and Technology, School of Computer Science and Engineering, China (and 1 more)
- Lei Luo 0002 — National University of Defense Technology, College of Computer, Changsha, China
- Lei Luo 0003 — Chongqing University of Posts and Telecommunications, School of Communication and Information Engineering, Chongqing, China (and 1 more)
- Lei Luo 0005 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 2 more)
- Lei Luo 0006 — Rambus Inc., Chapel Hill, NC, USA (and 1 more)
- Lei Luo 0007 — Kansas State University, Manhattan, KS, USA
- Lei Luo 0008 — Beijing University of Posts and Telecommunications, School of Artificial Intelligence, Beijing, China (and 2 more)
- Lei Luo 0009 — Chongqing University, Key Laboratory of Optoelectronic Technology and Systems, Chongqing, China (and 1 more)
- Lei Luo 0010 — Wuhan Textile University, China (and 1 more)
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Wenlong Song, Hong Chen, Zhijie Qiu, Lei Luo:
A Federated Learning Scheme Based on Lightweight Differential Privacy. IEEE Big Data 2023: 2356-2361 - [c22]Zihan Zhou, Weivi Hu, Yiran Tian, Lei Luo, Yun Li, Lirong Chen:
Particle Filter Localization Algorithm Based on LOS Possibility for Smart Vehicle Digital Key. DSC 2023: 82-89 - [c21]Xiansen Chen, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks. DSC 2023: 237-244 - [c20]Pengyu Zhang, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation. DSC 2023: 375-382 - 2022
- [j12]Junpeng He, Lei Luo, Kun Xiao, Xiyu Fang, Yun Li:
Generate qualified adversarial attacks and foster enhanced models based on generative adversarial networks. Intell. Data Anal. 26(5): 1359-1377 (2022) - [c19]Jiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo, Rui Xu:
Capability-based Component Security Mechanism for Microkernel OS. DSC 2022: 32-39 - [c18]Haitao Zhang, Lei Luo, Ruikun Li, Jiajia Yi, Yun Li, Lirong Chen:
Research and Application of Intelligent Vehicle Cybersecurity Threat Model. DSC 2022: 102-109 - [c17]Haitao Zhang, Lei Luo, Yun Li, Lirong Chen, Xiaobo Wu:
A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level. DSC 2022: 506-511 - 2021
- [c16]Yuye Han, Hong Chen, Zhijie Qiu, Lei Luo, Gongbin Qian:
A Complete Privacy-Preserving Credit Score System Using Blockchain and Zero Knowledge Proof. IEEE BigData 2021: 3629-3636 - 2020
- [c15]Jiannan Liu, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:
An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection. QRS 2020: 122-129 - [c14]Yue Yu, Ming Zeng, Zhijie Qiu, Lei Luo, Hong Chen:
A Data Protection-Oriented Design Procedure for a Federated Learning Framework. WCSP 2020: 968-974
2010 – 2019
- 2019
- [j11]Hao Chen, Lei Luo, Yun Li, Lirong Chen:
安全虚拟机监视器的形式化验证研究 (Study on Formal Verification of Secure Virtual Machine Monitor). 计算机科学 46(3): 170-179 (2019) - 2018
- [j10]Zheng Ran, Lei Luo, Hua Yan, Yun Li:
AUTOSAR可运行实体-任务自动映射方法研究 (Study on Automatic Method for AUTOSAR Runnable Entity-task Mapping). 计算机科学 45(4): 190-195 (2018) - [j9]Zheng Ran, Lei Luo, Hua Yan, Yun Li:
基于纳什均衡的AUTOSAR任务到多核ECU的映射方法 (Nash Equilibrium Based Method for Mapping AUTOSAR Tasks to Multicore ECU). 计算机科学 45(6): 166-171 (2018) - 2016
- [j8]Hao Feng, Lei Luo, Yong Wang, Miao Ye, Rongsheng Dong:
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm. Int. J. Distributed Sens. Networks 12(8) (2016) - 2015
- [j7]Lirong Chen, Yun Li, Lei Luo:
嵌入式操作系统的形式化验证研究 (Research on Formal Verification of Embedded Operating System). 计算机科学 42(8): 203-214 (2015) - [j6]Jie Shen, Ying-Jue Cai, Lei Luo:
A context-aware mobile web middleware for service of surveillance video with privacy. Multim. Tools Appl. 74(18): 8025-8051 (2015) - 2013
- [j5]Shenglin Gui, Lei Luo:
Reliability analysis of real-time fault-tolerant task models. Des. Autom. Embed. Syst. 17(1): 87-107 (2013) - [c13]Kun Xiao, Lei Luo:
A Novel Mobile Device NFC Stack Architecture. DASC 2013: 169-173 - [c12]Hao Chen, Lei Luo, Hua Yan, Geng Chen, Shenglin Gui:
Research on Client/Server Communication Mechanism in AUTOSAR System. DASC 2013: 220-226 - 2012
- [c11]Shenglin Gui, Lei Luo:
Reliability Analysis of Task Model in Real-Time Fault-Tolerant Systems. CIT 2012: 368-374 - 2011
- [c10]Shenglin Gui, Lei Luo:
End-to-End Schedulability Analysis for Bi-directional Real-Time Multistage Pipeline. ISPA 2011: 219-224 - [c9]Shenglin Gui, Lei Luo, Miao Yu, Jianhua Xu, Yun Li:
Schedulability Analysis for Distributed Systems Using Network of Action Automata and Environment Automata. ISPA 2011: 225-231 - [c8]Geng Chen, Lei Luo, Lijie Wang:
A Precise Memory Model for Operating System Code Verification. TrustCom 2011: 1125-1132 - 2010
- [c7]Siyu Mi, Zhijie Qiu, Lei Luo:
Research on Mobile Web Applications End to End Technology. CIT 2010: 2061-2065 - [c6]Houchen Li, Zhijie Qiu, Lei Luo:
Decompression Method for Massive Compressed Files in Mobile Rich Media Applications. CIT 2010: 2066-2071 - [c5]Biao Pan, Kun Xiao, Lei Luo:
Component-based Mobile Web Application of Cross-platform. CIT 2010: 2072-2077
2000 – 2009
- 2009
- [c4]Geng Chen, Lei Luo, Rong Gong, Shenglin Gui:
Dependability Analysis for AADL Models by PVS. DASC 2009: 19-24 - 2008
- [c3]Shenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu:
UCaS: A Schedulability Analysis Tool for AADL Models. EUC (2) 2008: 449-454 - [c2]Shenglin Gui, Lei Luo, Yun Li, Lijie Wang:
Formal Schedulability Analysis and Simulation for AADL. ICESS 2008: 429-435 - 2004
- [c1]Yun Li, Lei Luo:
QoS Adaptive Algorithms Based on Resources Availability of Mobile Terminals. ICESS 2004: 280-286 - 2003
- [j4]Lei Luo, Ming-Yuan Zhu:
Partitioning based operating system: a formal model. ACM SIGOPS Oper. Syst. Rev. 37(3): 23-35 (2003) - [j3]Lei Luo, Ming-Yuan Zhu, Qing-Li Zhang:
A formal semantic definition of DEVIL. ACM SIGPLAN Notices 38(4): 47-56 (2003) - 2001
- [j2]Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:
A Provably Correct Operating System: delta-Core. ACM SIGOPS Oper. Syst. Rev. 35(1): 17-33 (2001) - [j1]Ming-Yuan Zhu, Lei Luo, Guang-Zhe Xiong:
The Minimal Model of Operating Systems. ACM SIGOPS Oper. Syst. Rev. 35(3): 22-29 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint