The SCEAS System
Navigation Menu

Search the dblp DataBase


Li Lu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Li Lu, Mengchi Liu, Guoren Wang
    XML-RL Update Language. [Citation Graph (0, 0)][DBLP]
    CAiSE Short Paper Proceedings, 2003, pp:- [Conf]
  2. Li Lu, Lei Hu
    Pairing-Based Multi-Recipient Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:159-165 [Conf]
  3. Mengchi Liu, Li Lu, Guoren Wang
    A Declarative XML-RL Update Language. [Citation Graph (0, 0)][DBLP]
    ER, 2003, pp:506-519 [Conf]
  4. Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil
    A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:143-152 [Conf]
  5. Shiyuan Liu, Li Lu, Guanglan Liao, Jianping Xuan
    Pattern Discovery from Time Series Using Growing Hierarchical Self-Organizing Map. [Citation Graph (0, 0)][DBLP]
    ICONIP (1), 2006, pp:1030-1037 [Conf]
  6. Meiliu Lu, Du Zhang, Hongjun Xu, Ken Tse-yau Lau, Li Lu
    Protein Secondary Structure Prediction Using Data Mining Tool C5. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1999, pp:107-0 [Conf]
  7. Guoren Wang, Mengchi Liu, Li Lu
    Extending XML-RL with Update. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:66-75 [Conf]
  8. Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni
    Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]

  9. Sample-Based Automatic Dictionary Generation for Keyword Spotting System. [Citation Graph (, )][DBLP]

  10. A hybrid approach to gender classification from face images. [Citation Graph (, )][DBLP]

  11. ACTION: Breaking the Privacy Barrier for RFID Systems. [Citation Graph (, )][DBLP]

  12. Refresh: Weak Privacy Model for RFID Systems. [Citation Graph (, )][DBLP]

  13. An Effective Dimension Reduction Approach to Chinese Document Classification Using Genetic Algorithm. [Citation Graph (, )][DBLP]

  14. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP]

  15. Age Estimation Robust to Expression Variations. [Citation Graph (, )][DBLP]

  16. Granular Index for XML Database. [Citation Graph (, )][DBLP]

  17. Robot path planning in uncertain environments based on particle swarm optimization. [Citation Graph (, )][DBLP]

  18. Gender Classification of Facial Images Based on Multiple Facial Regions. [Citation Graph (, )][DBLP]

  19. A novel fusion-based method for expression-invariant gender classification. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002