Bo Luo
Bo Luo
Professor, The University of Kansas
Verified email at - Homepage
Cited by
Cited by
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 First IEEE International Conference on Smart Grid Communications, 327-332, 2010
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain
S Awan, F Li, B Luo, M Liu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model
H Sampathkumar, X Chen, B Luo
BMC Medical Informatics and Decision Making 14 (1), 91, 2014
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
CONTRA: Defending Against Poisoning Attacks in Federated Learning
S Awan, B Luo, F Li
European Symposium on Research in Computer Security, 455-475, 2021
Secure and privacy-preserving information aggregation for smart grids
F Li, B Luo, P Liu
International Journal of Security and Networks 6 (1), 28-39, 2011
Preserving data integrity for smart grid data aggregation
F Li, B Luo
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
World Wide Web based image search engine using text and image content features
B Luo, X Wang, X Tang
Proceedings of SPIE 5018, 123-130, 2003
Copker: Computing with private keys without RAM
L Guan, J Lin, B Luo, J Jing
21st ISOC Network and Distributed System Security Symposium (NDSS), 2014
System and methods of integrating visual features with textual features for image searching
X Chen, B Luo
US Patent 9,075,825, 2015
Stalking online: on user privacy in social networks
Y Yang, J Lutes, F Li, B Luo, P Liu
Proceedings of the second ACM conference on Data and Application Security …, 2012
You are what you broadcast: Identification of mobile and {IoT} devices from (public){WiFi}
L Yu, B Luo, J Ma, Z Zhou, Q Liu
29th USENIX security symposium (USENIX security 20), 55-72, 2020
Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case
L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han
IEEE Internet of Things Journal, 2019
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain
L Jiang, C Xu, X Wang, B Luo, H Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017
Access control for big data using data content
W Zeng, Y Yang, B Luo
2013 IEEE International Conference on Big Data, 45-47, 2013
Using ID-Hopping to Defend Against Targeted DoS on CAN
A Humayed, B Luo
Proceedings of the 1st International Workshop on Safe Control of Connected …, 2017
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
F Li, B Luo, P Liu, D Lee, CH Chu
Information Forensics and Security, IEEE Transactions on 8 (6), 888-900, 2013
Privacy-Preserving Information Brokering in Distributed Information Sharing.(2013)
F Li, B Luo, P Liu, D Lee, CHES Chu
IEEE Transactions on Information Forensics and Security 8 (6), 888-900, 0
The system can't perform the operation now. Try again later.
Articles 1–20