Skip to the content of the web site.
an exploration to the future of secure and privacy systems ...

Publications

The documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

All IEEE publications: “© IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”
    [J][C][B][T]

Journal Papers:

[2025 and beyond]
  1. G. Li, TH. Luan, C. Lai, J. Zheng, and R. Lu, "DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond", IEEE Transactions on Dependable and Secure Computing, to appear.
  2. X. Song, X. Liu, H. Shan, and R. Lu, "Time-delay Robust Safety Control of Connected Vehicles under Stochastic DoS Attack", IEEE Internet of Things Journal, to appear.
  3. T. Sasi, AH. Lashkari, R. Lu, P. Xiong, and S. Iqbal, "An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic", Journal of Information and Intelligence, to appear.
  4. C. Wang, Y. Ming, H. Liu, S. Zhang, and R. Lu, "Puncturable Signature and Applications in Privacy-Aware Data Reporting for VDTNs", IEEE Transactions on Services Computing, Vol. 18, No. 3, pp. 1669-1682, 2025.
  5. M. Rabbani, J. Gui, Z. Zhou, F. Nejati, M. Mirani, G. Piya, I. Opushnyev, R. Lu, and A. Ghorbani, "A lightweight IoT device identification using enhanced behavioral-based features", Peer-to-Peer Networking and Applications, Vol. 18, No. 2, pp. 2, 2025.
  6. J. Zhang, H. Zhu, J. Zhao, R. Lu, Y. Zheng, J. Tang, and H. Li, "COKV: Key-Value Data Collection With Condensed Local Differential Privacy", IEEE Transactions on Information Forensics and Security, Vol. 20, pp. 3260-3273, 2025.
  7. L. Sun, R. Lu, Y. Zheng, Y. Zhang, and Y. Tao, "Efficient and Privacy-Preserving Weighted Nearby-Fit Spatial Keyword Query in Cloud", IEEE Internet of Things Journal, Vol. 12, No. 12, pp. 20498-20511, 2025.
  8. G. Xu, S. Xu, J. Ning, X. Huang, H. Li, and R. Lu, "New secure sparse inner product with applications to machine learning", IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 4, pp. 4040-4052, 2025.
  9. R. Mahdi, J. Gui, F. Nejati, Z. Zhou, A. Kaniyamattam, M. Mirani, G. Piya, I. Opushnyev, R. Lu, and A. Ghorbani, "Device identification and anomaly detection in IoT environments", IEEE Internet of Things Journal, Vol. 12, No. 10, pp. 13625-13643, 2025.
  10. J. Sun, Y. Bao, W. Qiu, R. Lu, S. Zhang, Y. Guan, and X. Cheng, "Privacy-preserving fine-grained data sharing with dynamic service for the cloud-edge IoT", IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 2, pp. 1329-1346, 2025.
  11. N. Huang, C. Dou, Y. Wu, L. Qian, S. Zhou, and R. Lu, "Image analysis oriented integrated sensing and communication via intelligent reflecting surface", IEEE Transactions on Cognitive Communications and Networking, Vol. 11, No. 1, pp. 274-287, 2025.
  12. Y. Zheng, H. Zhu, R. Lu, S. Zhang, F. Wang, J. Shao, and H. Li, "Efficient and privacy-preserving weighted range set sampling in cloud", IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 1, pp. 534-548, 2025.
  13. H. Bao, Z. Wang, R. Lu, C. Huang, B. Li, "TAMT: Privacy-preserving task assignment with multi-threshold range search for spatial crowdsourcing applications", IEEE Transactions on Big Data, Vol. 11, No. 1, pp. 208-220, 2025.
  14. J. Li, Y. Su, R. Lu, Z. Su, W. Meng, and M. Shen, "StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks", IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 1, pp. 192-204, 2025.
  15. H. Yang, D. Xue, M. Ge, J. Li, G. Xu, H. Li, and R. Lu, "Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly from The Gradient," IEEE Transactions on Dependable and Secure Computing, Vol. 22, No. 1, pp. 132-145, 2025.

Conference Papers:

[2025 and beyond]

  1. X. Wu, Xi. Li, Q. Li, J. Ni and R. Lu, SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts, ESORICS'25, Toulouse, France, September 22-26, 2025.
  2. Z. Jia, R. Lu, M. Mamun, S. Ray, An Efficient and Privacy-Preserving AdaBoost Federated Learning Framework for AiP System, Proc. PST'25, Fredericton, Canada, August 26-28, 2025.
  3. Z. Wang, W. Meng, and R. Lu, Traffic Accident Detection via Fusion-GRU based Future Frame Detection Box Prediction, Proc. IEEE ICC'25, Montreal, Canada, June 8–12, 2025.
  4. E. Z. Zhang, Y. Guan, R. Lu, and H. Zhang, An Efficient Private Set Frequency Query Scheme under Local Differential Privacy, Proc. IEEE ICC'25, Montreal, Canada, June 8–12, 2025.
  5. Z. Jia, J. Gui, R. Lu, and M. Mamun, Towards Efficient and Privacy-preserving Data Sharing Scheme for Aging in Place, Proc. IEEE ICC'25, Montreal, Canada, June 8–12, 2025.
  6. J. Guo, XF. Shan, G. Wang, D. Chen, R. Lu, and S. Tang, LLAUS: A High-Quality Instruction-Tuned Large Vision Language Assistant for UltraSound, ICMR'25, Chicago, USA, Jun. 30-Jul. 3, 2025.
  7. C. Fu, Y. Xia, G. Wang, R. Lu, and S. Tang, MedQuery: A Graph-Driven Medical Literature-Enhanced Query Answering System, ICMR'25, Chicago, USA, Jun. 30-Jul. 3, 2025.
  8. C. Fu, G. Wang, J. Li, W. Zhang, R. Lu, and S. Tang, ITERATE: Image-Text Enhancement, Retrieval, and Alignment for Transmodal Evolution with LLMs, Proceedings of the 31st International Conference on Computational Linguistics, COLING'25, Abu Dhabi, UAE, Jan. 19-24, 2025.
  9. J. Guo, C. Fu, G. Wang, R. Lu, D. Chen, and S. Tang, MM-CARP: Multimodal Model with Cross-Modal Retrieval-Augmented and Visual Region Perception, MMM'25, Nara, Japan, Jan. 8-10, 2025.

Book & Book Chapters:

  1. B. Li, R. Lu, and G. Xiao, Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems, Wireless Networks, Springer Verlag, 2020. (ISBN: 978-3-030-58671-3) [PDF]
  2. R. Lu, Privacy-Enhancing Aggregation Techniques for Smart Grid Communications, Wireless Networks, Springer Verlag, 2016. (ISBN: 978-3-319-32899-7) [PDF]
  3. R. Lu, X. Lin, C. Huang, and H. Bao, Privacy-Preserving Time Series Data Aggregation for Internet of Things, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations, Editor Fei Hu, March 30, 2016 Forthcoming by CRC Press, (ISBN 9781498723183) [PDF]
  4. L. Li and R. Lu, Anonymous Communication for Big Data, Networking for Big Data, pp. 233 - 256, Editors S. Yu, X. Lin, J. Misic, and X. Shen, CRC Press, 2015. (ISBN 978-1-4822-720696349-7) [PDF]
  5. X. Lin and R. Lu, Vehicular Ad Hoc Network Security and Privacy, June 2015, Wiley-IEEE Press. (ISBN: 978-1-118-91390-1) [PDF]
  6. M. Wen, R. Lu, X. Liang, J. Lei, and X. Shen (authors), Querying over Encrypted Data in Smart Grids, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-3-319-06354-6, ISBN 978-3-319-06355-3 eBook) [PDF]
  7. X. Liang, R. Lu, X. Lin, and X. Shen (authors), Security and Privacy in Mobile Social Networks, SpringerBriefs in Computer Science, Springer Verlag, 2014. (ISBN: 978-1-4614-8857-6) [PDF]
  8. K. Zhang, X. Liang, R. Lu, and X. Shen, "Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks", Handbook on Opportunistic Mobile Social Networks, to appear. Editors J. Wu and Y. Wang, CRC Press, Taylo & Francis Group, USA, 2013. [PDF]
  9. X. Lin, H. Zhu, M. Shi, R. Lu, P.H. Ho, X. Shen, "Universal Authentication and Billing Architecture for Wireless MANs", Emerging Wireless LANs, Wireless PANs, and Wireless MANs, pp. 555 - 584, Editors Y. Xiao and Y. Pan, John Wiley & Sons, Inc., 2009. (ISBN 978-0-471-72069-0) [PDF]

Technical Report:

  1. J. Shao, Z. Cao, L. Wang, and R. Lu, "Efficient Password-based Authenticated Key Exchange without Public Information", IACR Cryptology ePrint Archive 2007: 326, 2007. [PDF]
  2. R. Lu, Z. Cao, R. Su, and J. Shao, "Pairing-Based Two-Party Authenticated Key Agreement Protocol", IACR Cryptology ePrint Archive 2005: 354, 2005. [PDF]
  3. R. Lu and Z. Cao, "ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks", IACR Cryptology ePrint Archive 2005: 355, 2005. [PDF]