Publications:
Books:
1. Z. Du and Y. Luo, A Concise Course on Scientific Language Matlab (in Chinese), Nankai University Press, 1998.
2. Y. Wang and Y. Luo (editors), Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, December 10-12, 2010, Shanghai, China.
3. Chinese translation of the 19th, 20th and 21st chapters of the book: Information Theory and Network Coding (R. W. Yeung), which was publised by Higher Education Press, China, July 2011.
Papers:
IEEE Transactions on Information Theory:
1). Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp. 1007 -1014, 2010.
2). Y. Luo, C. Mitrpant, A. J. Han Vinck, and K. Chen, "Some new characters on the wire-tap channel of type II", IEEE Trans. Inform. Theory, vol.51, no.3, pp.1222-1229, 2005.
3). C. Mitrpant, A. J. Han Vinck and Y. Luo, "An Achievable Region for the Gaussian Wiretap Channel with Side Information", IEEE Trans. Inform. Theory, vol.52, no.5, pp.2181-2190, 2006.
4). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "On constant composition codes over Zq", IEEE Trans. Inform. Theory, vol.49, no.11, pp.3010-3016, 2003.
5). Y. Luo, F. Fu and V. K. Wei, "On the depth distribution of linear codes", IEEE Trans. Inform. Theory, vol.46, no.6, pp.2197-2203, 2000.
6). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On the Svanstrom bound for ternary constant weight codes", IEEE Trans. Inform. Theory, vol.47, no.5, pp.2061-2064, 2001.
7). O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.
8) Yuan Luo, Chaoping Xing and Lin You, Construction of sequences with high nonlinear complexity from function fields, IEEE Transactions on Information Theory, Vol.63, No.12, pp.7646-7650, 2017
9) Lingfei Jin, Yuan Luo and Chaoping Xing, Repairing
algebraic geometry codes, IEEE Transactions on Information Theory, Vol. 64, No.
2, pp. 900-908, 2018.
10) Yuan Luo , Chaoping Xing and Chen Yuan, “Optimal locally repairable codes of distance 3 and 4 via cyclic codes,” IEEE Transactions on Information Theory, to be published in 2018.
Others:
In 2019:
[4] Bin Dai and Yuan Luo, “An Improved Feedback Coding
Scheme for the Wire-tap Channel,” IEEE Transactions on Information Forensics
& Security, vol.14, no.1, pp.262-271, 2019.
[3] Yuan Luo , Chaoping Xing and Chen Yuan, “Optimal
locally repairable codes of distance 3 and 4 via cyclic codes,” IEEE
Transactions on Information Theory, vol. 65, pp. 1045-1053, 2019.
[2] Min Zeng, Yuan Luo, Min-Kyu Song, Hong-Yeop Song, “The
F_M-linear Complexity of M-ary Sidel’nikov Sequences of Period p?1=f?Mλ ,”
Proceedings of 2019 IEEE International Symposium on Information Theory, Paris,
France, July 7-12, 2019.
[1] Pin Fang, Yuan Luo
and Yisen Wang, Self-attentive
networks for one-shot image recognition, Proceedings of 2019 IEEE International
Conference on Multimedia and Expo (ICME), Shanghai,
China, July 8-12, 2019.
In 2018:
[6] Jingzhao Wang, Tinghan Wang and Yuan Luo, “Storage and Repair Bandwidth Tradeoff for Distributed Storage Systems with Clusters and Separate Nodes,” to be published in SCIENCE CHINA Information Sciences, 2018. SCIS-2018-0131
[5] Dan He, Yuan Luo and
Wangmei Guo, “Arbitrarily Varying Wiretap Channel: a New Scheme for the Proof
of Strong Secrecy,” Proceedings of 2018 IEEE International Symposium on
Information Theory, Talisa Hotel in Vail, Colorado, USA, Jun. 17-22, 2018.
[4] 《信息通信技术》2018年创刊周年第1期,主题:人工智能运营与机器学习理论,策划指导:董振江?骆源。
[3] Ali Moharrer, Wei
Shuangqing and Luo Yuan, Layered Synthesis of Latent Gaussian Trees: an
Information Theoretic Approach to Generative Problems, Information and
Communications Technologies, No.1, pp.35-41, 2018. (Invited paper in Chinese)
[2] Lingfei Jin, Yuan
Luo and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on
Information Theory, Vol. 64, No. 2, pp. 900-908, 2018. Impact Factor 2.68
[1]
Chenchen Zhang, Yuan Luo and Yan Chen, A Low Complexity SCMA Detector Based on
Discretization, IEEE Transactions on Wireless Communications, Vol. 17, No. 4,
pp. 2333-2345, 2018. Impact Factor 4.95 科学院2区
In 2017
[6] Yuan Luo, Chaoping Xing and Lin You, Construction of
sequences with high nonlinear complexity from function fields, IEEE
Transactions on Information Theory, Vol.63, No.12, pp.7646-7650, 2017
[5] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, VOL. 12, NO. 3, pp.746-759 , 2017. Impact Factor 4.33 科学院2区
[4] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1408-1419, 2017 Impact Factor 3.82 科学院2区
[3] Chenchen Zhang and Yuan Luo, Approximating the Differential Entropy of Gaussian Mixtures, Proceedings of IEEE GLOBECOM 2017, Singapore, Dec. 4-8, 2017.
[2] Qiran Shi, Chenchen Zhang, Yuan Luo, Low-Complexity RMS Delay Spread Estimation for Wireless OFDM Systems, Proceedings of the 17th IEEE International Conference on Communication Technology, October 27-30, 2017, Chengdu, China.
[1] Akram Hussain and Yuan Luo, Generalized Bidirectional limited magnitude error correcting code for Flash memory, Proceedings of the 11th Annual International Conference on Combinatorial Optimization and Applications 2017, Dec 16-18, 2017 Shanghai, China.
In 2016:
[11] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, vol.65, no.10, pp.8658-8668, 2016. Impact Factor 2.24
[10] Dan He, Wangmei Guo and Yuan Luo, "Secrecy Capacity of the Extended Wiretap Channel II with Noise", Entropy, vol.18, no.11, 2016. Impact Factor 1.74
[9] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, accepted, T-IFS-06293-2016. Impact Factor 2.44
[8] 骆源,过敏意,"计算机学科本硕博贯通培养机制探讨", 计算机教育,2016年第5期1-4页。
[7] Dongxin Liu, Fan Wu, Linghe Kong, Shaojie Tang, Yuan Luo, Guihai Chen, "Training-Free Indoor White Space Exploration", Special Issue on Spectrum Sharing and Aggregation for Future Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.34, no.10, pp.2589-2604, 2016. Impact Factor 3.67
[6] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. , no. , pp. , doi:10.1109/TMC.2016.2597839. Aug. 2016 Impact Factor 2.45
[5] Chenchen Zhang, Yuan Luo and Guangtao Xue, "A new construction of threshold cryptosystems based on RSA", Information Sciences, vol.363, pp.140-153, 2016. Impact Factor 3.36
[4] Dan He, Yuan Luo and Ning Cai, "Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel", Proceedings of 2016 IEEE International Symposium on Information Theory, pp.505-509, Barcelona, Spain, July 10-15, 2016.
[3] Yaning Xu, Qiyuan He and Yuan Luo, "Optimal Repair for Distributed Storage Codes in Vehicular Networks", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.
[2] Qiyuan He, Yaning Xu and Yuan Luo, " I/O Optimized Recovery Algorithm in Vehicular Network Using PM-RBT Codes ", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.
[1] Songfan Xie and Yuan Luo, "A Seamless Dual-Link Handover Scheme with Optimized Threshold for C/U Plane Network in High-Speed Rail", The 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.
In 2015:
[9] Min Zeng, Yuan Luo and Guang Gong, "Sequences with Good Correlation Property Based on Depth and Interleaving Techniques", Designs, Codes and Cryptography, vol.77, no.1, pp.255-275, 2015.
[8] Chuliang Weng, Jianfeng Zhan and Yuan Luo, "TSAC: Enforcing Isolation of Virtual Machines in Clouds", IEEE Transactions on Computers, vol. 64, no. 5, pp.1470-1482, 2015.
[7] C. Zhang, X. Chen and Y. Luo, "Threshold Optimization for ISI-free Region Detection in High-Mobility Fading Channels," Proceedings of the Fourth International Workshop on High Mobility Wireless Communications (HMWC’2015), Xi’an, China, Oct. 21-23, 2015.
[6] Zhenyi Liao and Yuan Luo, A Stack-based Lightweight Approach to Detect Kernel-level Rookits, Proceedings of the 2015 International Conference on Progress in Informatics and Computing, Nanjing, Dec 18-20, 2015.
[5] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, DOI 10.1109/TVT.2015.2508485, 2015.
[4] B. Dai, A. J. Han Vinck, Y. Luo and Z. Ma, “Capacity-equivocation region of a special case of wiretap channel with noiseless feedback”, Journal of Communications and Networks, vol. 17, no. 1, pp. 21-26, 2015.
[3] X. Liu and Y. Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, vol. 74, no. 3, pp. 533-557, 2015.
[2] X. Dong, J. Yu, Y. Zhu, Y. Chen, Y. Luo and M. Li, “SECO: Secure and Scalable Data Collaboration Services in Cloud Computing,” Computers & Security, vol. 50, no. C, pp.91-105, May 2015.
[1] Z. Zhuang, B. Dai, Y. Luo and A. J. Han Vinck, "Secure Error-Correcting Network Codes with Side Information Leakage," IET Communications, vol. 9, no. 8, pp.1068-1075, 2015.
In 2014:
[14] X. Chen, C. Zhang and Y. Luo, "Low-Complexity ISI-free Region Detection for OFDM Systems in High-Mobility Fading Channels," Proceedings of the Third International Workshop on High Mobility Wireless Communications (HMWC’2014), pp. 155-159, Beijing, China, November 1-3, 2014. One of the best student paper awards.
[13] M. Zeng, Y. Luo and A. J. Han Vinck, "A Construction of Long Period Sequences Based on Lightweight Generation and High Probability," IEEE Transactions on Communications, vol. 62, no. 11, pp. 4012-4023, 2014.
[12] J. Zhang, X. Dong, J. Yu, Y. Luo, M. Li and B. Wu, "Differentially Private Multidimensional Data Publication", China Communications, vol. 11, no. 13, pp.79-85, 2014.
[11] S. Huang and Y. Luo, "Achieve Distributed, Scalable and Effective Access Control in Cloud Storage Services," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.
[10] Y. Mao, X. Chen and Y. Luo, "HVSM: An In-Out-VM Security Monitoring Architecture in IaaS Cloud," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.
[9] X. Liu and Y. Luo, "The weight distributions of some cyclic codes with three or four nonzeros over F3", Designs, Codes and Cryptography, vol. 73, no. 3, pp. 747-768, 2014.
[8] X. Liu, M. Harrison and Y. Luo, "A note on the five valued conjectures of Johansen, Helleseth, Kholosha and zeta functions", IEEE Communications Letters, pp.1483-1486, vol. 18, no. 9, 2014.
[7] O. Geil, S. Martin, R. Matsumotoy, D. Ruano and Y. Luo, "Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes", Proceedings of 2014 IEEE Information Theory Workshop, pp. 137-141, Hobart, Tasmania, Australia, Nov. 2-5, 2014.
[6] O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.
[5] X. Liu and Y. Luo, "The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3", Journal of Applied Mathematics, Volume 2014, Article ID 686138, DOI: 10.1155/2014/686138.
[4] Zhuojun Zhuang, Bin Dai, Yuan Luo and A. J. Han Vinck, "On the relative profiles of a linear code and a subcode", Designs, Codes and Cryptography, vol.72, no. 2, pp. 219-247, 2014.
[3] Xiaogang Liu, Yuan Luo and Kenneth W. Shum, "On the Optimum Cyclic Subcode Chains of RM(2, m)* for Increasing Message Length", IEEE Transactions on Communications, pp. 2145-2155, vol.62, no.7, 2014.
[2] Min Zeng, Yuan Luo and Guang Gong, "New Binary Sequences With Good Correlation Based on High-Order Difference and Interleaving Techniques", Proceedings of IEEE International Symposium on Information Theory, pp. 1663-1666, Honolulu, HI, USA, June 2014.
[1] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li, "Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing", Computers & Security, Vol.42, Pages 151–164, May 2014.
In 2013:
[15] Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li, "Hybrid CPU Management for Adapting to the Diversity of Virtual Machines", IEEE Transactions on Computers, vol.62, no.7, pp.1332-1344, 2013.
[14] Zhuojun Zhuang, Yuan Luo and Bin Dai, "Code constructions and existence bounds for relative generalized Hamming weight", Designs, Codes and Cryptography, vol. 69, no. 3, pp.275-297, 2013.
[13] MAO Yaqiang, WANG Yao, LUO Yuan, "A Design of Dynamic Integrity Measurement Framework towards the Cloud", http://www.paper.edu.cn, Feb. 2013. (in Chinese)
[12] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "Achieving Secure and Efficient Data Collaboration in Cloud Computing", Proceedings of 2013 IEEE/ACM 21st International Symposium on Quality of Service (IWQoS), Pages 195-200, Montreal, Canada, June 2013.
[11] Xujian Chen, Chunshu Li and Yuan Luo, "A Seamless Dual-Link Handover Scheme Suitable for High-Speed Rail", Proceedings of the 2013 International Workshop on High Mobility Wireless Communications (HMWC2013), Pages 91-95, Shanghai, China, Nov. 2013.
[10] Fengfeng Ning, Chuliang Weng, and Yuan Luo, "Virtualization I/O Optimization Based on Shared Memory", Proceedings of the IEEE International Conference on Big Data 2013 (IEEE BigData 2013), Pages 70-77, Santa Clara, USA, Oct. 6-9, 2013.
[9] Xiaogang Liu and Yuan Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, DOI: 10.1007/s10623-013-9877-5, accepted for publication in August 2013.
[8] Bin Dai, A. J. Han Vinck and Yuan Luo, "Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback", Journal of Applied Mathematics, Volume 2013, Article ID 423619.
[7] Bin Dai, A. J. Han Vinck, Yuan Luo and Xiaohu Tang, "Wiretap Channel with Action-Dependent Channel State Information", Entropy, vol.15, no.2, pp.445-473, 2013.
[6] Bin Dai, A. J. Han Vinck, Yuan Luo and Zhuojun Zhuang, "Capacity Region of a New Bus Communication Model." Entropy, vol.15, no. 2: pp.678-697, 2013.
[5] Min Zeng and Yuan Luo, "Depth, ultimate period, and distribution of sequences of period p^r-1", Invited Paper in the Proceedings of the 8th International Conference on Communications and Networking in China, Guilin, China, Pages 891-896, August 2013.
[4] Min Zeng, Yuan Luo, and Guang Gong, "A Constuction of Sequence With Low Correlation Based on High-order Difference", one of the best papers of 中国通信学会第一届信息通信博士论坛, Beijing, China, Apr. 2013.
[3] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "P2E: Privacy-preserving and Effective Cloud Data Sharing Service", Proceedings of IEEE Globecom 2013, Atlanta USA, Dec. 09-13 2013.
[2] Peng Gao and Yuan Luo, " Unsupervised Strategies for Shilling Attack Detection in Recommender System ", Communications Technology, vol.46, no.04, pp. 5-12, 2013. ( in Chinese.)
[1] Xufu Luo and Yuan Luo, "Research on Virtual Machine System Security Protocols Based on TPM", Jisuanji Yu Xiandaihua, no. 7, pp. 30-33, 2013. ( in Chinese.)
In 2012:
[8] Bin Dai and Yuan Luo, "Some New Results on the Wiretap Channel with Side Information", Entropy, vol.14, no.9, pp.1671-1702, 2012.
[7] Guangtao Xue, Yuan Luo, Jiadi Yu, Minglu Li, "A Novel Vehicular Location Prediction based on Mobility Patterns for Routing in Urban VANET", EURASIP Journal on Wireless Communications and Networking, 2012:222, 2012.
[6] M. Zeng, Y. Luo and G. Gong, "Rotating-table game and construction of periodic sequences with lightweight calculation", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 1221-1225, Cambridge, USA, July 1 to July 6, 2012.
[5] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 438-442, Cambridge, USA, July 1 to July 6, 2012.
[4] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Capacity Region of Non-degraded Wiretap Channel with Noiseless feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, Pages 244-248, Cambridge, USA, July 1 to July 6, 2012.
[3] Dan He and Yuan Luo, "A Kind of Non-DMC Erasure Wiretap Channel", Proceedings of 2012 14th International Conference on Communication Technology, Pages 1082-1087, Chengdu, China, Nov. 9th-11th, 2012. One of the best papers of the conference.
[2] Zhuojun ZHUANG, Yuan LUO, Bin DAI, "Upper Bounds on Relative Length/Dimension Profile", Proceedings of the 17th National Youth Communication Conference of China, Pages 33-39, Qing Dao, China, July 2012. ( in Chinese.)
[1] Yao Wang and Yuan Luo, "An In-Out-VM MeasurementArchitecture against Dynamic Attacks in Clouds", Proceedings of 2012 14th International Conference on Communication Technology, Pages 761-767, Chengdu, China, Nov. 9th-11th, 2012.
In 2011:
[1] Q. Liu, G. Wang, C. Weng, Y. Luo, and M. Li, “A Mandatory Access Control Framework in Virtual Machine System with Respect to Multilevel Security II: Implementation,” China Communications, vol. 8, no. 2, pp. 86–94, 2011.
[2] Zihui Liu, Xin-Wen Wub, Yuan Luo, Wende Chen. “New code equivalence based on relative generalized Hamming weights,” Information Sciences, vol. 181, pp. 4308-4317, 2011.
[3] Lei Yu, Chuliang Weng, Minglu Li, Yuan Luo. "SNPdisk: an Efficient Para-virtualization Snapshot Mechanism for Virtual Disks in Private Clouds," IEEE Network, vol. 25, no. 4, pp. 20-26, 2011.
[4] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, Some new bounds on relative generalized Hamming weight, in: 13th International Conference on Communication Technology, Jinan, China, pp. 971-974, Sep. 2011.
[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, On the RDLP and IRDLP of a linear code and a linear subcode, 13th International Conference on Communication Technology, Jinan, China, pp. 975-978, Sep. 2011.
[6] J. Yan, Z. Zhuang, Y. Luo, "On the optimum distance profiles of some quasi cyclic codes," 13th International Conference on Communication Technology, Jinan, China, pp. 979-983, Sep. 2011.
[7] Min Zeng and Yuan Luo, "On the Second Depth Distribution of Vectors Over Fq", Journal of Computational Information Systems, vol. 7, no. 5, 1738-1743, 2011.
In 2010:
[1] Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp.1007-1014, 2010.
[2] Q. Liu, G. Wang, C. Weng, Y. Luo and M. Li, "A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory", China Communications, vol.7, no.4, pp.137-143, 2010. One of the best papers of 2010 Annual Conference of China Institute of Communications.
[3] X. He, Y. Luo, "Mutual Information Based Similarity Measure for Collaborative Filtering", Proceedings of 2010 IEEE International Conference on Procgress in Informatics and Computing, Shanghai, China, pp. 1117-1121, Dec. 10-12, 2010.
[4] B. Dai, Y. Luo, A.J.Han.Vinck, "Cpacity region of broadcast channels With private message and causal side information”, Proceedings of the 3rd International Congress on Image and Signal Processing, Yantai, China, pp. 3770-3773, Oct. 16-18, 2010.
[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, “Secure error-correcting network codes with side information from source,” Proceedings of the 2010 International Conference on Communications and Intelligence Information Security, Guangxi, China, pp.55-59, Oct. 2010.
[6] Q. Liu, C. Weng, M. Li, and Y. Luo "An In-VM Measuring Framework for Virtual Machines in Cloud", IEEE Security & Privacy, Vol. 8, no. 6, pp. 56-62, 2010.
[7] M. Houllier and Y. Luo, "Information Distances over Clusters", Proceedings of the 7th International Symposium on Neural Networks, Shanghai, China, June 6-9, 2010. Lecture Notes in Computer Science, Part I, vol. 6063, p.355-364, 2010.
[8] ZHANG Qiang, LUO Yuan, WENG Chuliang and LI Minglu, "A Trust-Based Detecting Mechanism in Secure Recommender Systems", Microcomputer Information, vol. 26, no. 3, pages 68-70, 2010. (in Chinese)
[9] LIU Qian, LUO Yuan, WENG Chuliang and LI Minglu, "Security protocols based on trusted platform module for virtual machine system", Information Security and Technology, vol. 6, pp. 49-55, 2010. (in Chinese)
Before 2009:
1). Z. Liu, W. Chen and Y. Luo, "The relative generalized Hamming weight of linear q-ary codes and their subcodes", Designs, codes and cryptography, vol.48, no.2, pp.111-123, 2008.
2). P. Wang, Y. Luo and A. J. Han Vinck, "Quotient Subcode Set and the Coordinated Wiretap Channel II", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.e91, no.12, pp.3731-3737, 2008.
3). Y. Luo, W. Chen and A. J. Han Vinck, "The determination of the chain good weight hierarchies with high dimension", SIAM Journal on Discrete Mathematics, vol.17, no.2, pp.196-209, 2004.
4). Y. Luo, W. Chen and F. Fu, "A new kind of geometric structures determining the chain good weight hierarchies", Discrete Mathematics, vol.260c, pp.101-117, 2003.
5). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On equidistant constant weight codes", Discrete Applied Mathematics, vol.128, pp.157-164, 2003.
6). H. Zhu, Y. Luo, C. Weng, M. Li, "A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach", pp.134-138, 2009 Fourth ChinaGrid Annual Conference, 2009.
7). Q. Zhang, Y. Luo, C. Weng, M. Li, "A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems", 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, Shanghai China July 2009.
8). Y. Luo, A. J. Han Vinck, "On a Classification of Cyclic Subcode Chains", Proceedings of the 2009 Fourth International ICST Conference on Communications and Networking in China, August 2009, Xi an, China.
9). J. Yu, Y. Luo and M. Li, "Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices", IEEE China Grid 2008.
10). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Resource Scheduling Strategy for Intrusion Detection on Multi-Core Platform", Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China.
11). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Reasonable Approach for Defining Load Index in Parallel Computing", The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008).
12). Z. Zhuang, Y. Luo, M. Li and C. Weng, "An Abstract Model for Intrusion Detection on Multi-Core Platform", IEEE China Grid 2008.
13). A. J. Han Vinck and Y. Luo, "Optimum Distance Profiles of Linear Block Codes", 2008 IEEE International Symposium on Information Theory, Canada.
14). B. Dai and Y. Luo, "Wiretap Channel with Side Information from Part of Encoder", the First International Workshop on High Performance Network (HPN2008), Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China.
15). P. Wang, Y. Luo and A. J. Han Vinck, " Quotient Subcode Set and Inverse Relative Dimension/ Length Profile", IEEE IWSDA 2007, p128-133.
16). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "Bounds and constructions for q-ary constant composition code". 2002 IEEE International Symposium on Information Theory, June 30-July 5, Lausanne, Switzerland.
17). Y. Luo, F. Fu, C. Mitrpant and A. J. Han Vinck,“A Generalization of MDS Codes”, 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.
18). Y. Luo, W. Chen and F. Fu, "On the weight hierarchies satisfying the chain condition", AAECC 2001 , November 26-30, Melbourne, Australia.
19). C. Mitrpant, Y. Luo and A. J. Han Vinck, "On the wire-tap channel of type II with side information," 2003 IEEE International Symposium on Information Theory, June 29-July 4, Yokohama, Japan.
20). C. Mitrpant, Y. Luo and A. J. Han Vinck, "Achieving the Perfect Secrecy for the Gaussian Wiretap Channel with Side Information", 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.
21). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On the Svanstr?m bound for ternary constant weight codes", 2001 IEEE International Symposium on Information Theory, June 24-29, Washington, D.C., USA.
22). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On equidistant constant weight codes", WCC 2001, January 8-12, Paris, France.
23). Y. Luo, F. Fu and K. Chen, "Relative Dimension/Length Profile and Its Conjugate", FIFTH SHANGHAI CONFERENCE ON COMBINATORICS, May 14-18, Shanghai, 2005.
24). B. Dai, Y. Luo, "A variation of the coding scheme in the wiretap channel of type II", ECTI2006, pp.191-194, May 10-13, Thailand.
25). Y. Luo, "Three versions of depths of vectors over GF(2) and linear complexity", IEEE the 5th Asia-Europe Workshop on Concepts in Information Theory, 2006, Korea.
26). Y. Luo and Z. Zhang, "Neural network models for design of block cipher system", Systems Science and Mathematical Sciences, vol.11, no.2, pp.161-167, 1998.
27). M. Zeng and Y. Luo, "On the third depth distribution and the period of sequence (E-1)m(S) over F2, Journal on Communications", vol. 29, no. 4,pp.51-56, 2008. (in Chinese)
28). Y. Luo, F. Fu and Z. Du, "A bound on the discrete entropy, Journal on Communications", vol.18, no.10, pp.66-69, 1997. (in Chinese)
29). F. Fu and Y. Luo, Depth distribution on linear block code, Chinese Science Bulletin, vol.43, no.19, pp.2046-2049, 1998. (in Chinese)
30). M. Zeng and Y. Luo, On the two kinds of depth distribution over F2, Journal of Shanghai Jiao Tong University, vol.42, no.12, pp.2060-2064, 2008. (in Chinese)
31). Y. Luo and Z. Zhuang, Classic channels related network coding, ZTE Communications, vol.15, no.1, pp.15-19, 2009. (in Chinese)
Chinese Patents:
专利1:基于TPM的虚拟机安全协议方法,发明专利号:ZL200810203006.3 骆源, 方喆, 李明禄, 翁楚良,授权日 2013-03-20
专利2:虚拟化环境中的强制访问控制方法及装置,发明专利号:ZL200810203451.X 翁楚良, 王观海, 骆源, 李明禄,授权日2012-08-22
专利3:安全分散式虚拟存储池系统,发明专利号:ZL201110094381.0 翁楚良、于磊、李明禄、骆源,授权日2013-08-21
专利4:编码方法、解码方法、编码器及解码器,发明专利号:ZL201110219826.3 颜金洲, 骆源, 金莹, 魏岳军,授权日 2016年03月30日
专利5:城区出租车动态在线调度优化系统及其方法,发明专利号 ZL201310072227.2 薛广涛, 邹庆楠, 骆源, 俞嘉地, 朱弘恣,授权日2014年12月31日
专利6:一种用于高速运载工具的分布式天线通信系统,实用新型专利号 ZL201420197529.2 陈序建, 刘鲁滨, 毛亚强, 黄粟, 骆源 授权日:2014年09月10日
专利7:骆源,毛亚强,廖振壹 一种用于虚拟机上的混合监控度量方法及系统,发明专利号:ZL201510141611.2 授权日:2018年06月15日