Liang Fu Lu
Liang Fu Lu
Verified email at
Cited by
Cited by
A novel feature selection approach for intrusion detection data classification
MA Ambusaidi, X He, Z Tan, P Nanda, LF Lu, UT Nagar
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
Online virtual machine placement for increasing cloud provider’s revenue
L Zhao, L Lu, Z Jin, C Yu
IEEE Transactions on Services Computing 10 (2), 273-285, 2015
Two axes re-ordering methods in parallel coordinates plots
LF Lu, ML Huang, J Zhang
Journal of Visual Languages & Computing 33, 3-12, 2016
A new non-adaptive optimization method: Stochastic gradient descent with momentum and difference
W Yuan, F Hu, L Lu
Applied Intelligence, 1-15, 2022
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD
Y Mu, P Wang, L Lu, X Zhang, L Qi
Pattern Recognition Letters 130, 4-11, 2020
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
Multi‐representational convolutional neural networks for text classification
R Jin, L Lu, J Lee, A Usman
Computational Intelligence, 2019
An approach for simple linear profile gauge R&R studies
L Shi, W Chen, LF Lu
Discrete Dynamics in Nature and Society 2014 (1), 816980, 2014
Wi-Run: Multi-runner step estimation using commodity Wi-Fi
L Zhang, M Liu, L Lu, L Gong
2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018
A new concentric-circle visualization of multi-dimensional data and its application in network security
LF Lu, JW Zhang, ML Huang, L Fu
Journal of Visual Languages & Computing 21 (4), 194-208, 2010
Big data density analytics using parallel coordinate visualization
J Zhang, ML Huang, WB Wang, LF Lu, ZP Meng
2014 IEEE 17th International Conference on Computational Science and …, 2014
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing
ML Huang, LF Lu, X Zhang
Computing 97, 425-437, 2015
Intrusion detection method based on nonlinear correlation measure
MA Ambusaidi, Z Tan, X He, P Nanda, LF Lu, A Jamdagni
International Journal of Internet Protocol Technology 7 8 (2-3), 77-86, 2014
Wi-Run: Device-free step estimation system with commodity Wi-Fi
M Liu, L Zhang, P Yang, L Lu, L Gong
Journal of Network and Computer Applications 143, 77-88, 2019
Netviewer: A visualization tool for network security events
Z Jiawan, Y Peng, L Liangfu, C Lei
2009 International Conference on Networks Security, Wireless Communications …, 2009
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
Basin boundaries with nested structure in a shallow arch oscillator
Y Zhang, LF Lu
Nonlinear Dynamics 77, 1121-1132, 2014
A novel visualization approach for efficient network scans detection
Z Jiawan, L Liang, L Liangfu, Z Ning
2008 International Conference on Security Technology, 23-26, 2008
Exploring coupled images fusion based on joint tensor decomposition
L Lu, X Ren, KH Yeh, Z Tan, J Chanussot
Human-centric Computing and Information Sciences 10 (1), 10, 2020
Using neural networks for fake colorized image detection
Y Li, Y Zhang, L Lu, Y Jia, J Liu
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20