Follow
Liang Fu Lu
Liang Fu Lu
Verified email at tju.edu.cn
Title
Cited by
Cited by
Year
A novel feature selection approach for intrusion detection data classification
MA Ambusaidi, X He, Z Tan, P Nanda, LF Lu, UT Nagar
2014 IEEE 13th international conference on trust, security and privacy in …, 2014
532014
Online virtual machine placement for increasing cloud provider’s revenue
L Zhao, L Lu, Z Jin, C Yu
IEEE Transactions on Services Computing 10 (2), 273-285, 2015
412015
Two axes re-ordering methods in parallel coordinates plots
LF Lu, ML Huang, J Zhang
Journal of Visual Languages & Computing 33, 3-12, 2016
362016
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
302012
A new axes re-ordering method in parallel coordinates visualization
LF Lu, ML Huang, TH Huang
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
302012
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD
Y Mu, P Wang, L Lu, X Zhang, L Qi
Pattern Recognition Letters 130, 4-11, 2020
252020
A new concentric-circle visualization of multi-dimensional data and its application in network security
LF Lu, JW Zhang, ML Huang, L Fu
Journal of Visual Languages & Computing 21 (4), 194-208, 2010
212010
Big data density analytics using parallel coordinate visualization
J Zhang, ML Huang, WB Wang, LF Lu, ZP Meng
2014 IEEE 17th International Conference on Computational Science and …, 2014
192014
An approach for simple linear profile gauge R&R studies
L Shi, W Chen, LF Lu
Discrete Dynamics in Nature and Society 2014, 2014
192014
Wi-Run: Multi-runner step estimation using commodity Wi-Fi
L Zhang, M Liu, L Lu, L Gong
2018 15th Annual IEEE International Conference on Sensing, Communication …, 2018
182018
Intrusion detection method based on nonlinear correlation measure
MA Ambusaidi, Z Tan, X He, P Nanda, LF Lu, A Jamdagni
International journal of internet protocol technology, 2014
182014
Multi‐representational convolutional neural networks for text classification
R Jin, L Lu, J Lee, A Usman
Computational Intelligence, 2019
162019
Wi-Run: Device-free step estimation system with commodity Wi-Fi
M Liu, L Zhang, P Yang, L Lu, L Gong
Journal of Network and Computer Applications 143, 77-88, 2019
152019
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing
ML Huang, LF Lu, X Zhang
Computing 97 (4), 425-437, 2015
152015
NetViewer: A visualization tool for network security events
Z Jiawan, Y Peng, L Liangfu, C Lei
2009 International Conference on Networks Security, Wireless Communications …, 2009
152009
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
142010
An improved wavelet analysis method for detecting DDoS attacks
LF Lu, ML Huang, MA Orgun, JW Zhang
2010 Fourth International Conference on Network and System Security, 318-322, 2010
142010
A novel visualization approach for efficient network scans detection
Z Jiawan, L Liang, L Liangfu, Z Ning
2008 International Conference on Security Technology, 23-26, 2008
132008
Basin boundaries with nested structure in a shallow arch oscillator
Y Zhang, LF Lu
Nonlinear Dynamics 77 (4), 1121-1132, 2014
122014
A new non-adaptive optimization method: Stochastic gradient descent with momentum and difference
W Yuan, F Hu, L Lu
Applied Intelligence 52 (4), 3939-3953, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20