Zhuo Lu
Title
Cited by
Cited by
Year
Cyber security in the smart grid: Survey and challenges
W Wang, Z Lu
Computer networks 57 (5), 1344-1371, 2013
8712013
Review and evaluation of security threats on the communication networks in the smart grid
Z Lu, X Lu, W Wang, C Wang
2010-Milcom 2010 Military Communications Conference, 1830-1835, 2010
1932010
Modeling, evaluation and detection of jamming attacks in time-critical wireless applications
Z Lu, W Wang, C Wang
IEEE Transactions on Mobile Computing 13 (8), 1746-1759, 2013
752013
On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP
X Lu, Z Lu, W Wang, J Ma
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
612011
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
Z Lu, W Wang, C Wang
2011 Proceedings IEEE INFOCOM, 1871-1879, 2011
602011
Adversarial deep learning for cognitive radio security: Jamming attack and defense strategies
Y Shi, YE Sagduyu, T Erpek, K Davaslioglu, Z Lu, JH Li
2018 IEEE International Conference on Communications Workshops (ICC …, 2018
332018
Camouflage traffic: Minimizing message delay for smart grid applications under jamming
Z Lu, W Wang, C Wang
IEEE Transactions on Dependable and Secure Computing 12 (1), 31-44, 2014
312014
Optimal training sequences for MIMO channel estimation with spatial correlation
J Pang, J Li, L Zhao, Z Lu
2007 IEEE 66th Vehicular Technology Conference, 651-655, 2007
232007
How can botnets cause storms? understanding the evolution and impact of mobile botnets
Z Lu, W Wang, C Wang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1501-1509, 2014
222014
On the evolution and impact of mobile botnets in wireless networks
Z Lu, W Wang, C Wang
IEEE Transactions on Mobile Computing 15 (9), 2304-2316, 2015
212015
Cyber deception: Overview and the road ahead
C Wang, Z Lu
IEEE Security & Privacy 16 (2), 80-85, 2018
202018
Secure edge computing in iot systems: Review and case studies
M Alrowaily, Z Lu
2018 IEEE/ACM Symposium on Edge Computing (SEC), 440-444, 2018
172018
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming
Z Lu, W Wang, C Wang
2012 Proceedings IEEE INFOCOM, 3066-3070, 2012
142012
On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks
Z Lu, W Wang, C Wang
2010 Proceedings IEEE INFOCOM, 1-9, 2010
142010
Iterative parameter estimation in MIMO flat-fading channels with frequency offsets
Z Lu, J Li, L Zhao, J Pang
20th International Conference on Advanced Information Networking and …, 2006
142006
Defending active learning against adversarial inputs in automated document classification
L Pi, Z Lu, Y Sagduyu, S Chen
2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2016
132016
Deep learning-aided cyber-attack detection in power transmission systems
D Wilson, Y Tang, J Yan, Z Lu
2018 IEEE Power & Energy Society General Meeting (PESGM), 1-5, 2018
122018
From security to vulnerability: Data authentication undermines message delivery in smart grid
X Lu, W Wang, Z Lu, J Ma
2011-MILCOM 2011 Military Communications Conference, 1183-1188, 2011
122011
Optimal training sequences for frequency-selective MIMO correlated fading channels
J Pang, J Li, L Zhao, Z Lu
21st International Conference on Advanced Information Networking and …, 2007
122007
Securing the backpressure algorithm for wireless networks
Z Lu, YE Sagduyu, JH Li
IEEE Transactions on Mobile Computing 16 (4), 1136-1148, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20