Publications

  1. Zhaohui Wang, Bo Luo, and Fengjun Li. PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. In the 25th Privacy Enhancing Technologies Symposium (PETS), 2025. (accepted)
  2. Javaria Ahmad, Fengjun Li, Razvan Beuran, and Bo Luo. Eunomia: A Real-time Privacy Compliance Monitor for Alexa Skills. In Annual Computer Security Applications Conference (ACSAC), 2024. (accepted)
  3. Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, and Bo Luo. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. In European Symposium on Research in Computer Security (ESORICS), 2024. (Acceptance rate: 16%) [pdf][data and code]
  4. Zeyan Liu, Zijun Yao, Fengjun Li, and Bo Luo. On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. In ACM Conference on Computer and Communications Security (CCS) , 2024. (accepted) [full paper with appendix ][data and code]
  5. Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, and Fengjun Li. The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. In ACM Conference on Computer and Communications Security (CCS), 2024. (accepted) [pdf]
  6. Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, and Bo Luo. A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. In ACM Conference on Computer and Communications Security (CCS), 2024. (accepted) [pdf]
  7. Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, and Bo Luo. Companion Apps or Backdoors? on the Security of Automotive Companion Apps. In European Symposium on Research in Computer Security (ESORICS), 2024. (Acceptance rate: 16%) [pdf]
  8. Sumit Bhattarai, Pramil Paudel, Zhu Li, Bo Luo, and Fengjun Li. Robust Privacy-Preserving Classification for Lensless Images. In IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), 2024. (accepted)
  9. Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S. L. Wei, Yan Zhuang. FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems. In USENIX Security Symposium, 2024. (accepted) [pdf]
  10. Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, and Qibin Sun. You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. In USENIX Security Symposium, 2024. (accepted) [pdf]
  11. Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, and Kaitai Liang. d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases. In USENIX Security Symposium, 2024. (accepted)
  12. Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, and Bo Luo. PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. In the 24th Privacy Enhancing Technologies Symposium (PETS), Bristol, UK, 2024. (accepted) [pdf] [code]
  13. Yijun Zhao, Lingjing Yu, Yong Sun, Qingyun Liu, and Bo Luo. No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS. In ACM/IEEE International Conference on Program Comprehension (ICPC), Lisbon, Portugal, 2024. (ICPC 2024 Distinguished Paper Award)[pdf]
  14. Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, and Fengjun Li. Poster: Ethics of Computer Security and Privacy Research-Trends and Standards from a Data Perspective. In ACM Conference on Computer and Communications Security, 2023. (Poster). [link][pdf]
  15. Sohaib Kiani, Jared Barton, Jon Sushinsky, Lynda Heimbach, and Bo Luo. Counterfactual Prediction Under Selective Confounding. In European Conference on Artificial Intelligence (ECAI), 2023. [link][pdf]
  16. Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, and Kaitai Liang. The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2023. [link]
  17. Zhaohui Wang, Bo Luo, and Fengjun Li. Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking. In ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI), 2023. (Poster) [link][pdf][SmartAppZoo]
  18. Tianxiao Zhang, Kaidong Li, Xiangyu Chen, Cuncong Zhong, Bo Luo, Ivan Grijalva, Brian McCornack, Daniel Flippo, Ajay Sharda, and Guanghui Wang. Aphid cluster recognition and detection in the wild using deep learning models. In Scientific Reports, vol. 13, no. 13410, 2023. [link]
  19. Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, and Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, iss. 2, 2023. [link]
  20. Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo. LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022 (Acceptance rate: 22.5%) [link][pdf]
  21. Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, and Feng Wu. Blacktooth: Breaking through the Defense of Bluetooth in Silence. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022 (Acceptance rate: 22.5%) (CCS Best Paper Honorable Mention)[link][pdf]
  22. Ishrak Hayet, Zijun Yao, and Bo Luo. Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. In Findings of EMNLP, 2022. [link][pdf]
  23. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, and Bo Luo. Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [link][pdf]
  24. Javaria Ahmad, Fengjun Li, and Bo Luo. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [link][pdf]
  25. Wenchi Ma, Xuemin Tu, Bo Luo, and Guanghui Wang. Semantic Clustering based Deduction Learning for Image Recognition and Classification. In Pattern Recognition, vol. 124, 2022. [link] [pdf]
  26. Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Shuqin Fan, Fan Zhang, and Bo Luo. Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature. In EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2022. [link][pdf]
  27. Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. In Annual Computer Security Applications Conference (ACSAC), 2021. (Acceptance rate: 24.5%) (ACSAC Distinguished Paper Award) [link][pdf][code]
  28. Sana Awan, Bo Luo, and Fengjun Li. CONTRA: Defending against Poisoning Attacks in Federated Learning. In European Symposium on Research in Computer Security (ESORICS), 2021. (Acceptance rate: 20.2%) [link][pdf]
  29. Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, and Bo Luo. You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. In IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021. [link][pdf]
  30. Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, and Jing Wang. Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, iss. 3, 2021. [link] [pdf]
  31. Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. In USENIX Security Symposium, 2020. (Acceptance rate: 16.1%) [link] [pdf] [presentation on YouTube]
  32. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In European Symposium on Research in Computer Security (ESORICS), 2020. (Acceptance rate: 19.6%) [link][pdf] [intro video] [presentation on YouTube ]
  33. Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, and Dan Meng. GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. In Annual Computer Security Applications Conference (ACSAC), 2020. (Acceptance rate: 23.2%) [link] [pdf]
  34. Xing Song, Lemuel R. Waitman, Yong Hu, Bo Luo, Fengjun Li, and Mei Liu. The Impact of Medical Big Data Anonymization on Early Acute Kidney Injury Risk Prediction. In AMIA Summits on Translational Science Proceedings. May 2020. [link]
  35. Bo Luo, Razvan Beuran, and Yasuo Tan. Smart Grid Security: Attack Modeling from a CPS Perspective. In IEEE Computing, Communications and IoT Applications Conference (ComComAp), 2020. [link] [pdf]
  36. Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, and Bo Luo. WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications. In Annual Hot Topics in the Science of Security Symposium (HoTSoS), 2020. [link][pdf]
  37. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, and Ziqiang Ma. TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud. In Annual Computer Security Applications Conference (ACSAC), 2019. (Acceptance rate: 22.6%). [link][pdf]
  38. Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, and Bo Luo. Tear Off Your Disguise: Phishing Website Detection using Visual and Network Identities. In International Conference on Information and Communications Security (ICICS), 2019. [link][pdf]
  39. Sana Awan, Fengjun Li, Bo Luo, and Mei Liu. POSTER: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. In ACM Conference on Computer and Communications Security - Posters and Demos, 2019. (Poster) [link][pdf]
  40. Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. #DontTweetThis: Scoring Private Information in Social Networks. In the 19th Privacy Enhancing Technologies Symposium (PETS), 2019 (Acceptance rate: 17.6%, Vol 4. 2019). [link] [pdf]
  41. Adaku Uchendu, Jerey Cao, Qiaozhi Wang, Bo Luo, and Dongwon Lee. Characterizing Man-made vs. Machine-made Chatbot Dialogs. In Conference for Truth and Trust Online (TTO), 2019. [link] [pdf]
  42. Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, and Jiwu Jing. Towards the Optimal Performance of Integrating WARM and DELAY against Remote Cache Timing Side Channels on Block Ciphers In Journal of Computer Security (JCS), vol. 27, iss. 5, 2019. [link] [pdf]
  43. Linzhi Jiang, Liqun Chen, Athanasios Giannetsos, Bo Luo, Kaitai Liang, and Jinguang Han. Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case. In IEEE Internet of Things Journal, vol. 6, iss. 6, 2019. [link][pdf]
  44. Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, and Bo Luo. Arcana: Enabling Private Posts on Public Microblog Platforms. In 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Lisbon, Portugal, June 2019. [link] [pdf]
  45. Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, and Bo Luo. Protecting Mobile Devices from Physical Memory Attacks with Targeted Encryption. In 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019. [link] [pdf]
  46. Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li. Content-Aware Trust Propagation Towards Online Review Spam Detection. In ACM Journal of Data and Information Quality (JDIQ), 2019. [link] [pdf]
  47. Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li. Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways. In European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, 2018. (Acceptance rate: 19.7%) [link] [pdf]
  48. Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, and Bo Luo. My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. In ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, IN, June 2018. [link] [pdf]
  49. Jianan Li, Chao Liu, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, and Bin Lv. FGFDect: A Fine-Grained Features Classi cation Model for Android Malware Detection. In International Conference on Security and Privacy in Communication Networks (SecureComm), 2018. (Short Paper) [link] [pdf]
  50. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, and Wenjing Lou. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018. (Acceptance rate: 22.8%) [link] [pdf]
  51. Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, and Jiwu Jing. Copker: A Cryptographic Engine against Cold-Boot Attacks. In IEEE Transactions on Dependable and Secure Computing (TDSC). Volume: 15, Issue: 5, 2018. [link] [pdf]
  52. Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, and Weiqing Huang. URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. In IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1-7. IEEE, 2018. [link] [pdf]
  53. Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo. Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. In IEEE International Conference on Big Data and Cloud Computing (BDCloud), 2018
  54. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. In Annual Computer Security Applications Conference (ACSAC), 2017 (ACSAC 2017 Best Paper Award). [link] [pdf]
  55. Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. Cyber-Physical Systems Security -- A Survey. In IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, Volume: 4 Issue: 6, 2017. [link] [pdf]
  56. Chao Lan, Yuhao Yang, Xiaoli Li, Bo Luo, and Jun Huan. Learning Social Circles in Ego-Networks based on Multi-View Network Structure. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, iss. 8, Aug 2017. [link] [pdf]
  57. Qiaozhi Wang, Jaisneet Bhandal, Shu Huang and Bo Luo. Content-Based Classification of Sensitive Tweets. In International Journal of Semantic Computing (IJSC), Special Issue on ICSC2017 Best Papers, Vol. 11, No. 04, pp. 541-562, 2017. (6/26 papers were selected from ICSC 2017) [link] [pdf]
  58. Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, and Huaqun Wang. Secure outsourcing SIFT: Efficient and Privacy-preserving Image Feature Extraction in the Encrypted Domain. In IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. [link] [pdf]
  59. Quanwei Cai, Jonathan Lutes, Jingqiang Lin, and Bo Luo. A-Tor: Accountable Anonymity in Tor. In International Conference on Security and Privacy in Communication Networks (SecureComm), 2017. [link] [pdf]
  60. Abdulmalik Humayed, and Bo Luo. Using ID-Hopping to Defend Against Targeted DoS on CAN. In International Workshop on Safe Control of Connected and Autonomous Vehicles (SCAV), in conjunction with CPS Week 2017, Pittsburgh, PA, 2017. [link] [pdf]
  61. Qiaozhi Wang, Jaisneet Bhandal, Shu Huang and Bo Luo. Classification of Private Tweets using Tweet Content. In IEEE International Conference on Semantic Computing (ICSC), San Diego, CA, 2017. (short paper) [link] [pdf]
  62. Yang Tian, Ranjith Sompalli, Guanghui Wang, and Bo Luo. Textual Ontology and Visual Features Based Search for a Paleontology Digital Library. In IEEE International Conference on Tools with Artificial Intelligence (ICTAI), San Jose, 2016. [link] [pdf]
  63. Jingqiang Lin, Bo Luo, Le Guan, and Jiwu Jing. Secure Computing using Registers and Caches: the Problem, Challenges and Solutions. In IEEE Security & Privacy Magazine, vol. 14, iss. 6, 2016. [link] [pdf]
  64. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, and Jing Wang. Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. In IEEE Symposium on Security & Privacy (Oakland), 2015 (Acceptance rate: 13.5%). [link] [pdf]
  65. Fengjun Li, Xin Fu, and Bo Luo. POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. In ACM Conference on Computer and Communications Security (CCS), 2015 (Poster). [link] [pdf]
  66. Hariprasad Sampathkumar, Xue-Wen Chen, and Bo Luo. Ontology-based Visualization of Healthcare Data Mined from Online Healthcare Forums. In IEEE International Conference on Healthcare Informatics (ICHI), 2015.
  67. Jamuna Gopal, Shu Huang, and Bo Luo. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. In 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Fairfax, VA, 2015. (short paper)
  68. Abdulmalik Humayed, and Bo Luo. Poster Abstract: Cyber-Physical Security for Smart Cars -- Taxonomy of Vulnerabilities, Threats, and Attacks. In 6th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Seattle, WA, 2015 (CPS Week Best Poster Finalist).
  69. Abdulmalik Humayed, and Bo Luo. Cyber-Physical Security for Smart Cars -- Issues, Survey and Challenges. In 2nd International IFIP Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC), Seattle, WA, 2015.
  70. Manogna Thimma, Fang Liu, Jingqiang Lin, and Bo Luo. HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol 27, issue 8, 2015.
  71. Yuhao Yang, Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. Automatic Social Circle Detection Using Multi-View Clustering. In ACM Conf. on Information and Knowledge Management (CIKM), 2014 (Acceptance rate: 20.9%).
  72. Wenrong Zeng, Yuhao Yang, and Bo Luo. Using Data Content to Assist Access Control for Large-Scale Content-Centric Databases. In IEEE International Conference on Big Data (IEEE BigData), 2014 (Acceptance rate: 18.5%).
  73. Hariprasad Sampathkumar, Xue-wen Chen, and Bo Luo. Mining Adverse Drug Reactions from Online Healthcare Forums using Hidden Markov Model. BMC Medical Informatics and Decision Making, 14:91, 2014.
  74. Le Guan, Jingqiang Lin, Bo Luo, and Jiwu Jing. Copker: Computing with Private Keys without RAM. In Network and Distributed System Security Symposium (NDSS), 2014 (Acceptance rate: 18%)
  75. Meeyoung Park, Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. Content-based Assessment of the Credibility of Online Healthcare Information. In IEEE Workshop on Big Data in Bioinformatics and Health Informatics (IEEE BHI), Santa Clara, CA, 2013.
  76. Wenrong Zeng, Yuhao Yang, and Bo Luo. Poster: Access Control for Big Data using Data Content. In IEEE International Conference on Big Data, Santa Clara, CA, 2013 (Poster).
  77. Manogna Thimma, Tsam Kai Tsui, and Bo Luo. HyXAC: a hybrid approach for XML access control. In ACM Symposium on Access Control Models and Technologies (SACMAT), Amsterdam, The Netherlands, 2013 .
  78. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. In  IEEE Transactions on Information Forensics & Security, vol 8, no 6, pp. 888-900, June 2013.
  79. Yuxin Chen, Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. iLike: Bridging the semantic gap in vertical image search by integrating text and visual features. In IEEE Transactions on Knowledge and Data Engineering, vol 25, issue 10, pp. 2257-2270, 2013.
  80. Haibin Liu, Bo Luo, and Dongwon Lee. Location Type Classification Using Tweet Content. In 11th International Conference on Machine Learning and Applications (ICMLA), Boca Raton, FL, December, 2012.
  81. Shu Huang, Min Chen, Bo Luo, and Dongwon Lee. Predicting aggregate social activities using continuous-time stochastic process. In 21st ACM Conf. on Information and Knowledge Management (CIKM), Maui HI, USA, October 2012. Acceptance Rate: 13.4%
  82. Jingqiang Lin, Bo Luo, Jiwu Jing and Xiaokun Zhang. GRADE: Graceful Degradation in Byzantine Quorum Systems. In 31st International Symposium on Reliable Distributed Systems (SRDS) , 2012.
  83. Fengjun Li, and Bo Luo. Preserving Data Integrity for Smart Grid Data Aggregation. In IEEE International Conference on Smart Grid Communications (SmartGridComm), 2012.
  84. Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. Mining Adverse Drug Side-effects from Online Medical Forums. In IEEE Conference on Healthcare Informatics, Imaging, and Systems Biology (HISB), La Jolla, CA, 2012 (poster).
  85. Yuanliang Meng, Junyan Li, Patrick Denton, Yuxin Chen, Bo Luo, Paul Selden and Xue-Wen Chen. IPKB: A Digital Library for Invertebrate Paleontology. In ACM/IEEE Joint Conference on Digital Libraries (JCDL), 2012.
  86. Yuxin Chen and Bo Luo. S2A: Secure Smart Household Appliances. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. Acceptance rate: 18.6%
  87. Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo and Peng Liu. Stalking Online: on User Privacy in Social Networks. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. Acceptance rate: 18.6%
  88. Hongliang Fei, Ruoyi Jiang, Yunhao Yang, Bo Luo, and Jun Huan, Content based Social Behavior Prediction: A Multi-task Learning Approach. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), Glasgow, UK, October 2011 (short paper).
  89. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Rewriting Insecure XML Queries to Secure Ones using Non-Deterministic Finite Automata. In The VLDB Journal, vol. 20, no. 3, 2011.
  90. Yuxin Chen, Brian Potetz, Bo Luo, Xue-wen Chen, and Yunfeng Lin. Cephalometric Landmark Tracing Using Deformable Templates. In IEEE Conference on Healthcare Informatics, Imaging, and Systems Biology (HISB), San Jose, CA, July 2011.
  91. Jonathan Lutes, Meeyoung Park, Bo Luo, and Xue-wen Chen. Healthcare Information Networks: Discovery and Evaluation. In IEEE Conference on Healthcare Informatics, Imaging, and Systems Biology (HISB), San Jose, CA, July 2011.
  92. Fengjun Li, Bo Luo, and Peng Liu. Secure and Privacy-Preserving Information Aggregation for Smart Grids. In International Journal of Security and Networks, Special Issue on Security and Privacy in Smart Grid, Vo. 6, No. 1, 2011.
  93. Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee and Peng Liu. Privacy-Preserving Group Linkage. In 23rd Scientific and Statistical Database Management Conference (SSDBM), Portland, OR, July 2011.
  94. Avindra Fernando, Jun Huan, Justin Blumenstiel, Jin Li, Xue-wen Chen, and Bo Luo. Identification of Transposable Elements of the Giant Panda (Ailuropoda Melanoleura) Genome. In Workshop on Next-generation Sequencing Analysis, in conjunction with IEEE International Conference on Bioinformatics and Biomedicine, Atlanta, GA, 2011.
  95. Michael Steve Stanley Laine, Gunes Ercal, and Bo Luo. User Groups in Social Networks: An Experimental Study on YouTube. In Hawaii International Conference on System Sciences (HICSS-44), Kauai, HI, Jan 2011.
  96. Yuxin Chen, Nenghai Yu, Bo Luo, and Xue-wen Chen. iLike: Integrating Visual and Textual Features for Vertical Search. In ACM Multimedia Conference (ACMMM), Firenze, Italy, October 2010. Acceptance rate: 17%
  97. Fengjun Li, Bo Luo, and Peng Liu. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, October 2010 .
  98. Fengjun Li, Bo Luo, Peng Liu, and Chao-Hsien Chu. A Node-failure Resilient Anonymous Communication Protocol through Commutative Path Hopping. In IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010. Acceptance rate: 17.5%
  99. Bo Luo, and Dongwon Lee. On Protecting Private Information in Social Networks: A Proposal. In Workshop on Modeling, Managing, and Mining of Evolving Social Networks (M3SN) - in conjunction with IEEE ICDE, Shanghai, China, 2009.
  100. Fengjun Li, Bo Luo, Peng Liu, Anna C. Squicciarini, Dongwon Lee, and Chao-Hsien Chu. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. In The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, USA, 2008 (invited paper).
  101. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering. In 14th ACM Conf. on Computer and Communication Security (CCS), Alexandria, VA, USA, October 2007. Acceptance rate: 18%
  102. Bo Luo, Dongwon Lee, and Peng Liu. Pragmatic XML Access Control using Off-the-shelf RDBMS. In 12th European Symposium On Research In Computer Security (ESORICS), Dresden, Germany, September 2007. Acceptance rate: 23.8%
  103. Yan Xiao, Bo Luo, and Dongwon Lee. Security-Conscious XML Indexing. In 12th International Conference on Database Systems for Advanced Applications (DASFAA), Bangkok, Thailand, April 2007.
  104. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, and Chao-Hsien Chu. In-broker Access Control for Information Brokerage Systems. International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 12(4): 283-292, December 2007.
  105. Fengjun Li, Bo Luo, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu, and Peng Liu. In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE Computer Society, June 2006.
  106. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. Deep Set Operators for XQuery. In Second International Workshop on XQuery Implementation, Experience and Perspectives (XIME-P), Baltimore, USA, Jun. 2005.
  107. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Fine-Grained Run-Time XML Access Control via NFA-based Query Rewriting. In ACM Thirteenth Conference on Information and Knowledge Management (CIKM), pp 543-552, Washington D.C., USA, Nov. 2004. Acceptance rate: 20%
  108. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms. In VLDB Workshop on Secure Data Management in a Connected World (Springer Lecture Notes in Computer Science, vol 3178), pp. 133-147, August 2004.
  109. Kennis Tam, Lam Ching Yu, Dacheng Tao, Hao Liu, Bo Luo, and Xiaoou Tang. Content-Based SMIL Retrieval. In Proceedings of Third International Conference on Image and Graphics (ICIG), pp 146-149, IEEE Computer Society Press, 2004.
  110. Bo Luo, Xiaoou Tang, Jianzhuang Liu and Hongjiang Zhang. Video Caption Detection and Extraction Using Temporal Information. In Proceedings of the IEEE International Conference on Image Processing (ICIP), vol. 1, pp. 297-300, Barcelona, Spain, September 2003.
  111. Bo Luo, Xiaogang Wang, and Xiaoou Tang. A World Wide Web Based Image Search Engine Using Text and Image Content Features. In Proceedings of IS&T/SPIE Electronic Imaging 2003, Internet Imaging IV, pp. 123-130, Santa Clara, USA, Jan. 2003
  112. Xiaoou Tang, Bo Luo, Xinbo Gao, Edwige Pissaloux, and Hongjiang Zhang. Video Text Extraction Using Temporal Feature Vectors. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME), vol. 1, pp. 85-88, Lausanne, Switzerland, Aug. 2002

 

Book/Book Chapter

  1. Bin Xie, Bo Luo, and Fengjun Li. Website Construction Under Linux, Mechanical Industry Publishing House of China, ISBN 7-111-08156-0, May 2000. (in Chinese)

Thesis/Dissertation

  1. Bo Luo. XML Access Control in Native and RDBMS-Supported XML Databases. Ph.D. Dissertation, The Pennsylvania State University, University Park, PA, 2008
  2. Bo Luo. Video Text Detection and Extraction Using Temporal Information. M.Phil. Thesis, The Chinese University of Hong Kong, July 2003
  3. Bo Luo. Research on Digital Watermarking Techniques. Undergraduate (B.E.) Thesis, University of Science and Technology of China, June 2001(in Chinese)