Xiapu Luo mainly focuses on Computer security, Computer network, Android, Smart contract and Network packet. His study in the field of Access control is also linked to topics like Task analysis. His work on Network security as part of general Computer network research is often related to Metric, thus linking different fields of science.
In his work, Mechanism is strongly intertwined with Virtual machine, which is a subfield of Smart contract. The study incorporates disciplines such as Denial-of-service attack, Internet traffic and Vulnerability in addition to Network packet. His work in Blockchain tackles topics such as Cryptocurrency which are related to areas like Transaction data, Database and Construct.
His primary scientific interests are in Computer security, Computer network, Android, The Internet and Network packet. Xiapu Luo focuses mostly in the field of Computer security, narrowing it down to matters related to Denial-of-service attack and, in some cases, Flooding. His Computer network research integrates issues from Communication channel and Anonymity.
Xiapu Luo spends much of his time researching Computer security, Android, Smart contract, Internet privacy and Blockchain. His work focuses on many connections between Computer security and other disciplines, such as Adversarial system, that overlap with his field of interest in Benchmark. He interconnects Obfuscation, World Wide Web, Malware and Data science in the investigation of issues within Android.
His research in Smart contract intersects with topics in Construct, Software engineering, Bytecode and Symbolic execution. His Internet privacy research is multidisciplinary, incorporating perspectives in Android app, Cryptocurrency and Security token. The study incorporates disciplines such as Domain and End-to-end principle in addition to Cryptocurrency.
Xiapu Luo focuses on Computer security, Android, Malware, Artificial intelligence and Blockchain. His work carried out in the field of Computer security brings together such families of science as Android app and Peer-to-peer. His research in Android tackles topics such as Mobile apps which are related to areas like User experience design and Web page.
His work on Mobile malware as part of his general Malware study is frequently connected to Extortion, thereby bridging the divide between different branches of science. Xiapu Luo works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Stack overflow, Software, Software system and Malware analysis, as a part of the same area of interest. His Blockchain study combines topics from a wide range of disciplines, such as Security analysis and Throughput.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey on the security of blockchain systems
Xiaoqi Li;Peng Jiang;Ting Chen;Xiapu Luo.
Future Generation Computer Systems (2017)
QDASH: a QoE-aware DASH system
Ricky K. P. Mok;Xiapu Luo;Edmond W. W. Chan;Rocky K. C. Chang.
Proceedings of the 3rd Multimedia Systems Conference (2012)
Information processing method and device
Xiapu Luo;Jingang Hou;Zhiwei Liu;Xianneng Zou.
Under-optimized smart contracts devour your money
Ting Chen;Xiaoqi Li;Xiapu Luo;Xiaosong Zhang.
ieee international conference on software analysis evolution and reengineering (2017)
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
Xiapu Luo;Rocky K. C. Chang.
network and distributed system security symposium (2005)
Understanding Ethereum via Graph Analysis
Ting Chen;Yuxiao Zhu;Zihao Li;Jiachi Chen.
international conference on computer communications (2018)
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Xiapu Luo;Peng Zhou;Edmond W. W. Chan;Wenke Lee.
network and distributed system security symposium (2011)
Understanding Ethereum via Graph Analysis
Ting Chen;Zihao Li;Yuxiao Zhu;Jiachi Chen.
ACM Transactions on Internet Technology (2020)
Inferring the QoE of HTTP video streaming from user-viewing activities
Ricky K.P. Mok;Edmond W.W. Chan;Xiapu Luo;Rocky K.C. Chang.
acm special interest group on data communication (2011)
Detecting stealthy P2P botnets using statistical traffic fingerprints
Junjie Zhang;Roberto Perdisci;Wenke Lee;Unum Sarfraz.
dependable systems and networks (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: