Follow
Liang Fu Lu
Liang Fu Lu
Verified email at tju.edu.cn
Title
Cited by
Cited by
Year
A novel feature selection approach for intrusion detection data classification
MA Ambusaidi, X He, Z Tan, P Nanda, LF Lu, UT Nagar
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
482014
Online virtual machine placement for increasing cloud provider’s revenue
L Zhao, L Lu, Z Jin, C Yu
IEEE Transactions on Services Computing 10 (2), 273-285, 2015
402015
Two axes re-ordering methods in parallel coordinates plots
LF Lu, ML Huang, J Zhang
Journal of Visual Languages & Computing 33, 3-12, 2016
312016
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
292012
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
292012
A new concentric-circle visualization of multi-dimensional data and its application in network security
LF Lu, JW Zhang, ML Huang, L Fu
Journal of Visual Languages & Computing 21 (4), 194-208, 2010
202010
An approach for simple linear profile gauge R&R studies
L Shi, W Chen, LF Lu
Discrete Dynamics in Nature and Society 2014, 2014
192014
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD
Y Mu, P Wang, L Lu, X Zhang, L Qi
Pattern Recognition Letters 130, 4-11, 2020
182020
Big data density analytics using parallel coordinate visualization
J Zhang, ML Huang, WB Wang, LF Lu, ZP Meng
2014 IEEE 17th International Conference on Computational Science and …, 2014
182014
Multi‐representational convolutional neural networks for text classification
R Jin, L Lu, J Lee, A Usman
Computational Intelligence, 2019
152019
Wi-Run: Multi-runner step estimation using commodity Wi-Fi
L Zhang, M Liu, L Lu, L Gong
2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018
152018
Intrusion detection method based on nonlinear correlation measure
MA Ambusaidi, Z Tan, X He, P Nanda, LF Lu, A Jamdagni
International journal of internet protocol technology, 2014
152014
NetViewer: A visualization tool for network security events
Z Jiawan, Y Peng, L Liangfu, C Lei
2009 International Conference on Networks Security, Wireless Communications …, 2009
152009
Wi-Run: Device-free step estimation system with commodity Wi-Fi
M Liu, L Zhang, P Yang, L Lu, L Gong
Journal of Network and Computer Applications 143, 77-88, 2019
132019
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing
ML Huang, LF Lu, X Zhang
Computing 97 (4), 425-437, 2015
132015
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
132010
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
132010
A novel visualization approach for efficient network scans detection
Z Jiawan, L Liang, L Liangfu, Z Ning
2008 International Conference on Security Technology, 23-26, 2008
132008
Basin boundaries with nested structure in a shallow arch oscillator
Y Zhang, LF Lu
Nonlinear Dynamics 77 (4), 1121-1132, 2014
122014
A novel visualization method for detecting ddos network attacks
J Zhang, G Yang, L Lu, ML Huang, M Che
Visual Information Communication, 185-194, 2009
102009
The system can't perform the operation now. Try again later.
Articles 1–20