Xiang Lu
Cited by
Cited by
Review and evaluation of security threats on the communication networks in the smart grid
Z Lu, X Lu, W Wang, C Wang
2010-Milcom 2010 Military Communications Conference, 1830-1835, 2010
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Q Jiang, J Ma, X Lu, Y Tian
Peer-to-peer Networking and Applications 8 (6), 1070-1081, 2015
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72 (10), 3826-3849, 2016
An empirical study of communication infrastructures towards the smart grid: Design, implementation, and evaluation
X Lu, W Wang, J Ma
IEEE Transactions on Smart Grid 4 (1), 170-183, 2013
Achieving privacy preservation in WiFi fingerprint-based localization
H Li, L Sun, H Zhu, X Lu, X Cheng
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2337-2345, 2014
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
Q Jiang, J Ma, X Lu, Y Tian
Journal of medical systems 38 (2), 12, 2014
On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP
X Lu, Z Lu, W Wang, J Ma
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
Authentication and integrity in the smart grid: An empirical study in substation automation systems
X Lu, W Wang, J Ma
International Journal of Distributed Sensor Networks 8 (6), 175262, 2012
Development of distributed grid intelligence platform for solid state transformer
F Wang, X Lu, W Wang, A Huang
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture
X Lu, W Wang, J Ma, L Sun
2013 IEEE International Conference on Smart Grid Communications …, 2013
Talk to transformers: An empirical study of device communications for the freedm system
X Lu, W Wang, A Juneja, A Dean
2011 IEEE International Conference on Smart Grid Communications …, 2011
A privacy-preserving fuzzy localization scheme with CSI fingerprint
X Wang, Y Liu, Z Shi, X Lu, L Sun
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
From security to vulnerability: Data authentication undermines message delivery in smart grid
X Lu, W Wang, Z Lu, J Ma
2011-MILCOM 2011 Military Communications Conference, 1183-1188, 2011
Authentications and key management in 3G-WLAN interworking
X Li, X Lu, J Ma, Z Zhu, L Xu, YH Park
Mobile Networks and Applications 16 (3), 394-407, 2011
ViMediaNet: an emulation system for interactive multimedia based telepresence services
X Lu, L Tu, X Zhou, N Xiong, L Sun
The Journal of Supercomputing 73 (8), 3562-3578, 2017
Provoking the adversary by dual detection techniques: A game theoretical framework
A Salem, X Liao, Y Shen, X Lu
2017 International Conference on Networking and Network Applications (NaNA …, 2017
How they interact? understanding cyber and physical interactions against fault propagation in smart grid
Z Lu, M Wei, X Lu
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
A cascaded transformer-based equalisation converter for series connected battery cells
H Zhan, X Xiang, SM Lambert, V Pickert, H Wu, X Lu
IET Digital Library, 2016
Negative-supervised cascaded deep learning for traffic sign classification
K Xie, S Ge, R Yang, X Lu, L Sun
CCF Chinese Conference on Computer Vision, 249-257, 2015
CovertMIMO: A covert uplink transmission scheme for MIMO systems
X Wang, Y Liu, X Lu, S Lv, Z Shi, L Sun
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
The system can't perform the operation now. Try again later.
Articles 1–20