Lu Ou

ORCID: 0000-0002-8441-781X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Photonic and Optical Devices
  • Advanced Antenna and Metasurface Technologies
  • Network Security and Intrusion Detection
  • Electromagnetic Scattering and Analysis
  • Sparse and Compressive Sensing Techniques
  • Quantum Mechanics and Non-Hermitian Physics
  • Advanced Malware Detection Techniques
  • Electromagnetic Simulation and Numerical Methods
  • Antenna Design and Analysis
  • Topic Modeling
  • Face recognition and analysis
  • Antenna Design and Optimization
  • Machine Fault Diagnosis Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Software Testing and Debugging Techniques
  • Neuroscience and Neural Engineering
  • Human Mobility and Location-Based Analysis
  • Mechanical and Optical Resonators
  • Advanced Fiber Laser Technologies
  • Intelligent Tutoring Systems and Adaptive Learning
  • Online Learning and Analytics
  • Biometric Identification and Security

Xiamen University of Technology
2024-2025

Hunan University
2016-2025

Guangzhou University
2023-2024

Sun Yat-sen University
2021

Uber AI (United States)
2021

Illinois Institute of Technology
2020-2021

ACT
2019-2021

City University of Seattle
2021

Chongqing Jiaotong University
2020

Campbell Institute
2020

Decision tree classification has become a prevailing technique for online diagnosis services. By outsourcing computation intensive tasks to cloud server, cloud-assisted services are better ways cases that the storage and requirements exceed capability of medical institutions. With privacy concerns as well intellectual property protection issues, valuable classifier sensitive user data should be protected against server. In this paper, we identify work-flow We propose an efficient secure...

10.1109/tdsc.2019.2922958 article EN IEEE Transactions on Dependable and Secure Computing 2019-06-14

Searchable encryption provides an effective mechanism that achieves secure search over encrypted data. A popular application model of searchable is a data owner stores to server and the can effectively perform keyword-based according query trapdoor submitted by user, where owner's user's queries are kept secret in server. Recently, many encryptions have been proposed achieve better security performance, provide updatable feature ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/access.2018.2889754 article EN cc-by-nc-nd IEEE Access 2019-01-01

A mutual correlation between trajectories of two users is very helpful to real-life applications such as product recommendation and social media. While providing tremendous benefits, the releasing correlated may leak sensitive relations, due potential links correlations relations. To best our knowledge, we take first step propose a mathematically rigorous n-body Laplace framework, satisfying "-differential privacy, which efficiently prevents relation inference through n-node users. The...

10.1109/tdsc.2018.2853105 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2018-07-10

Constructing three-dimensional (3D) aligned nanofiber scaffolds is significant for the development of cardiac tissue engineering, which promising in field drug discovery and disease mechanism study. However, current scaffold preparation strategy, mainly includes manual assembly hybrid 3D printing, faces challenge integrated fabrication morphology-controllable nanofibers due to its cross-scale structural feature. In this research, a trench-guided electrospinning (ES) strategy was proposed...

10.1021/acs.langmuir.3c03358 article EN Langmuir 2024-02-22

10.1016/j.ymssp.2016.03.009 article EN Mechanical Systems and Signal Processing 2016-04-01

Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such code-morphism, which allows the evolve into many variants and bypass traditional code feature based In this paper, we propose disassemble binary executables opcodes sequences, then convert images. By using convolutional neural network compare opcode images generated targets known sample codes,...

10.1109/icpads.2016.0155 article EN 2016-12-01

In the digital age, data breaches have become a significant threat to consumer privacy, prompting implementation of stringent protection regulations worldwide. This paper evaluates effectiveness two prominent regulatory frameworks, General Data Protection Regulation (GDPR) in European Union and California Consumer Privacy Act (CCPA) United States, safeguarding responding breaches. Through comparative analysis their key provisions, enforcement mechanisms, real-world impacts, study examines...

10.62051/ijsspa.v6n1.22 article EN International Journal of Social Sciences and Public Administration 2025-01-23

Prior work has shown entropy-based DDOS detection is suitable for detecting low-rate DOS. A key challenge in this approach to determine the most threshold attacks accurately. To address challenge, we propose an advanced (AEB) scheme, which divides variable rate into different fields and treats each field with methods. Compared prior approaches, our scheme significant better performance on distinguishing waves of legal traffic flash crowds from We validate effectiveness by conducting...

10.1109/icina.2010.5636786 article EN 2010-10-01

10.1016/j.jcss.2016.12.003 article EN publisher-specific-oa Journal of Computer and System Sciences 2017-01-06

New privacy implications are induced to individuals and families because of the time-series data classification problem in Internet Things such as appliance classifications smart grid. To prevent adversary from inferring household used grid, a singular spectrum analysis (SSA) has been applied local differential (SSA-LDP). First, Fourier noise added via geometric sum which proved achieve Laplace distribution. Furthermore, we have that sanitized through SSA-LDP is ε -deferentially private for...

10.1109/jiot.2020.2977220 article EN IEEE Internet of Things Journal 2020-02-28

Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such code-morphism, which allows the evolve into many variants and bypass traditional code feature based In this paper, we propose disassemble binary executables opcodes sequences, then convert images. By comparing opcode images generated targets known sample codes, can detect if target contain of...

10.1109/icccn.2016.7568542 article EN 2016-08-01

Question answering (QA) is a hot field of research in Natural Language Processing. A big challenge this to answer questions from knowledge-dependable domain. Since traditional QA hardly satisfies some situations, such as disease diagnosis, drug recommendation, etc . In recent years, researches focus on knowledge-based question (KBQA). However, there still exist problems KBQA, KBQA limited by range historical cases and takes too much human labor. To address the problems, paper, we propose an...

10.7717/peerj-cs.667 article EN cc-by PeerJ Computer Science 2021-09-01

Secure search techniques over encrypted cloud data allow an authorized user to query files of interest by submitting keywords the server in a privacy-preserving manner. However, practice, returned results may be incorrect or incomplete dishonest environment. For example, intentionally omit some qualified save computational resources and communication overhead. Thus, well-functioning secure system should provide verification mechanism that allows verify results. In this paper, we design...

10.1109/tcc.2017.2709318 article EN IEEE Transactions on Cloud Computing 2017-05-29

Existing indoor semantic recognition schemes are capable of discovering patterns through smartphone sensing; however, there is a lack device-free system. In this paper, we propose WiFiMap+, which first-ever automatical inference system using WiFi signals to recognize highlevel semantics from human activities and environments, where the high-level consist facilities environments. To characterize static environments dynamical separately with channel state information (CSI), novel two-stream...

10.1109/tvt.2019.2926844 article EN IEEE Transactions on Vehicular Technology 2019-07-10

In the big data era, with rapid development of location-based applications, GPS enabled devices and institutions, location correlation privacy raises more people's concern. Because adversaries may combine correlations their background knowledge to guess users' privacy, such should be protected preserve privacy. order deal disclosure problem, perturbation generalization have been proposed. However, most proposed approaches depend on syntactic models without rigorous guarantee. Furthermore,...

10.1109/icpads.2016.0064 article EN 2016-12-01

With the rise of more interactive assessments, such as simulation- and game-based assessment, process data are available to learn about students' cognitive processes well motivational aspects. Since can be complicated due interdependencies in time, our traditional psychometric models may not necessarily fit, we need look for additional ways analyze data. In this study, draw from a study on self-adapted test under different goal conditions (Arieli-Attali, 2016) use hidden Markov takers'...

10.3389/fpsyg.2019.00083 article EN cc-by Frontiers in Psychology 2019-02-06

The high-speed millimeter wave Wireless Hadamard image transmission technique is studied for the next-generation 5G wireless network and beyond. Cyclic transform has been applied to image, followed by sub-sampling compression. For regularly sub-sampled transform, Fourier spectrum method can be used reconstruct when it transmitted receiver. randomly Compressed Sensing used. compatible with Multiple Inputs Outputs in mmWave networks. Both software hardware implementations of realized through...

10.1109/mwc.001.2000081 article EN IEEE Wireless Communications 2020-07-17
Coming Soon ...