Lingling Lu

ORCID: 0000-0003-4454-8046
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cloud Computing and Resource Management
  • Advanced Malware Detection Techniques
  • Age of Information Optimization
  • Caching and Content Delivery
  • Spam and Phishing Detection
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Visual Attention and Saliency Detection
  • Advanced Decision-Making Techniques
  • Advanced Vision and Imaging
  • Advanced Image and Video Retrieval Techniques
  • Engineering Education and Curriculum Development
  • Innovative Educational Techniques
  • Image and Video Quality Assessment
  • Advanced Computing and Algorithms
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Robotics and Sensor-Based Localization
  • Data Management and Algorithms
  • Digital Media and Visual Art
  • IoT and Edge/Fog Computing
  • Data Stream Mining Techniques

Zhejiang University of Science and Technology
2022-2024

Zhejiang University
2013-2023

Nanjing University of Science and Technology
2012

National Institute of Measurement and Testing Technology
2008

Recent years have witnessed explosive growth in blockchain smart contract applications. As contracts become increasingly popular and carry trillion dollars worth of digital assets, they more an appealing target for attackers, who exploited vulnerabilities to cause catastrophic economic losses. Notwithstanding a proliferation work that has been developed detect impressive list vulnerabilities, the bad randomness vulnerability is overlooked by many existing tools. In this article, we make...

10.1109/tse.2023.3271417 article EN IEEE Transactions on Software Engineering 2023-04-28

Nowadays, the rise in popularity of massive open online courses (MOOCs) is significant. However, current education service heavily relies on a third-party platform, which acts as middleman to process transactions occurred among system participants. On one hand, this centralized business model based database management system, once compromised, data consistency and safety transaction records can no longer be guaranteed. other it's more expensive resolve disputes possible fraud via mediator...

10.1109/blockchain.2019.00074 article EN 2019-07-01

Blockchain, a distributed and shared ledger, provides credible transparent solution to increase application auditability by querying the immutable records written in ledger. Unfortunately, existing query APIs offered blockchain are inflexible unscalable. Some studies propose off-chain solutions provide more flexible scalable services. However, service providers (SPs) may deliver fake results without executing real computation tasks collude cheat users. In this article, we novel intelligent...

10.1109/tdsc.2022.3228908 article EN IEEE Transactions on Dependable and Secure Computing 2022-12-13

This article focuses on a simple, yet fundamental question of distributed edge computing: "how to handle IoT traffic with different levels sensitivity and criticality by satisfying the application-specific latency constraints?" arises in practical deployment computing, where user data can arrive at much faster rate than that they be processed an node. Addressing this is critical for meeting requirement latency-sensitive applications, but existing approaches are inadequate problem. We present...

10.1109/tsc.2023.3312131 article EN IEEE Transactions on Services Computing 2023-09-25

E-commerce platforms provide entrances for customers to enter mini-apps that can meet their specific shopping requirements. Trigger items displayed on entrance icons attract more entering. However, conventional Click-Through-Rate (CTR) prediction models, which ignore user instant interest in trigger item, fail be applied the new recommendation scenario dubbed Trigger-Induced Recommendation Mini-Apps (TIRA). Moreover, due high stickiness of some mini-apps, existing trigger-based methods...

10.1145/3543873.3584661 article EN 2023-04-28

ICPS software and hardware suffer from low update frequency, making it easier for insiders to bypass external defenses launch concealed destructive attacks. To address these concerns, we design a device fingerprinting method based on multi-physical features, augmenting current intrusion detection techniques in the environment. In this paper, use sorting system as an example, demonstrating that proposed technology has generality of control flow. Specifically, first formalize physical model...

10.1145/3582691 article EN ACM Transactions on Sensor Networks 2023-02-20
Coming Soon ...