Zhuo Lu

3.4k total citations · 1 hit paper
92 papers, 2.2k citations indexed

About

Zhuo Lu is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Zhuo Lu has authored 92 papers receiving a total of 2.2k indexed citations (citations by other indexed papers that have themselves been cited), including 63 papers in Computer Networks and Communications, 37 papers in Artificial Intelligence and 35 papers in Electrical and Electronic Engineering. Recurrent topics in Zhuo Lu's work include Network Security and Intrusion Detection (25 papers), Internet Traffic Analysis and Secure E-voting (16 papers) and Smart Grid Security and Resilience (15 papers). Zhuo Lu is often cited by papers focused on Network Security and Intrusion Detection (25 papers), Internet Traffic Analysis and Secure E-voting (16 papers) and Smart Grid Security and Resilience (15 papers). Zhuo Lu collaborates with scholars based in United States, China and Australia. Zhuo Lu's co-authors include Wenye Wang, Cliff Wang, Yao Liu, Xiang Lu, Shangqing Zhao, Yalin E. Sagduyu, Zhe Qu, Jie Xu, Bo Tang and G. Lucovsky and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Wireless Communications and IEEE Transactions on Cybernetics.

In The Last Decade

Zhuo Lu

90 papers receiving 2.1k citations

Hit Papers

Cyber security in the Smart Grid: Survey and challenges 2013 2026 2017 2021 2013 250 500 750

Peers

Zhuo Lu
Yao Liu United States
Carl Hauser United States
Jiyao An China
Xiaojun Cao United States
Cliff Wang United States
S. Felix Wu United States
Ding Li United States
Yao Liu United States
Zhuo Lu
Citations per year, relative to Zhuo Lu Zhuo Lu (= 1×) peers Yao Liu

Countries citing papers authored by Zhuo Lu

Since Specialization
Citations

This map shows the geographic impact of Zhuo Lu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhuo Lu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhuo Lu more than expected).

Fields of papers citing papers by Zhuo Lu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhuo Lu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhuo Lu. The network helps show where Zhuo Lu may publish in the future.

Co-authorship network of co-authors of Zhuo Lu

This figure shows the co-authorship network connecting the top 25 collaborators of Zhuo Lu. A scholar is included among the top collaborators of Zhuo Lu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhuo Lu. Zhuo Lu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Lu, Zhuo, et al.. (2024). Assessing the effectiveness of crawlers and large language models in detecting adversarial hidden link threats in meta computing. SHILAP Revista de lepidopterología. 5(3). 100292–100292. 1 indexed citations
3.
Lu, Zhuo, et al.. (2024). Warmonger Attack: A Novel Attack Vector in Serverless Computing. IEEE/ACM Transactions on Networking. 32(6). 4826–4841. 2 indexed citations
4.
Shen, Wenbo, et al.. (2024). The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. IEEE Transactions on Dependable and Secure Computing. 21(5). 4343–4359. 1 indexed citations
5.
Li, Xingyu, Zhe Qu, Bo Tang, & Zhuo Lu. (2023). FedLGA: Toward System-Heterogeneity of Federated Learning via Local Gradient Approximation. IEEE Transactions on Cybernetics. 54(1). 401–414. 24 indexed citations
6.
Qu, Zhe, et al.. (2023). Bandwidth Allocation for Federated Learning With Wireless Providers and Cost Constraints. IEEE Transactions on Mobile Computing. 23(6). 7470–7482. 4 indexed citations
7.
Lu, Zhuo, et al.. (2023). CrossVision: Real-Time On-Camera Video Analysis via Common RoI Load Balancing. IEEE Transactions on Mobile Computing. 23(5). 5027–5039. 3 indexed citations
8.
Wang, Tao, et al.. (2022). Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. IEEE Transactions on Dependable and Secure Computing. 20(1). 637–649. 7 indexed citations
9.
Liu, Yao, et al.. (2022). Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Transactions on Networking. 30(4). 1733–1748. 6 indexed citations
10.
Qu, Zhe, Xingyu Li, Jie Xu, et al.. (2022). On the Convergence of Multi-Server Federated Learning With Overlapping Area. IEEE Transactions on Mobile Computing. 22(11). 6647–6662. 14 indexed citations
11.
Qu, Zhe, Rui Duan, Lixing Chen, et al.. (2022). Context-Aware Online Client Selection for Hierarchical Federated Learning. IEEE Transactions on Parallel and Distributed Systems. 33(12). 4353–4367. 63 indexed citations
12.
Li, Xingyu, Zhe Qu, Shangqing Zhao, et al.. (2021). LoMar: A Local Defense Against Poisoning Attack on Federated Learning. IEEE Transactions on Dependable and Secure Computing. 20(1). 437–450. 87 indexed citations
13.
Qu, Zhe, Shangqing Zhao, Jie Xu, Zhuo Lu, & Yao Liu. (2021). How to Test the Randomness From the Wireless Channel for Security?. IEEE Transactions on Information Forensics and Security. 16. 3753–3766. 5 indexed citations
14.
Wang, Tao, et al.. (2021). Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. IEEE/ACM Transactions on Networking. 29(6). 2779–2792. 10 indexed citations
15.
Zhao, Shangqing, et al.. (2020). Comb Decoding towards Collision-Free WiFi.. Networked Systems Design and Implementation. 933–951. 3 indexed citations
16.
Zhao, Shangqing, et al.. (2020). When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing. IEEE Transactions on Mobile Computing. 21(5). 1892–1908. 45 indexed citations
17.
Shi, Yi, Yalin E. Sagduyu, Tugba Erpek, et al.. (2018). Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies. 1–6. 76 indexed citations
18.
Liu, Yao, et al.. (2017). PDF Mirage: Content Masking Attack Against Information-Based Online Services.. USENIX Security Symposium. 833–847. 6 indexed citations
19.
Lu, Xiang, Zhuo Lu, Wenye Wang, & Jianfeng Ma. (2011). On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. 35 indexed citations
20.
Lu, Zhuo. (2006). Research of coverage and connectivity problems in wireless sensor networks. Journal of Chongqing University of Posts and Telecommunications. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026