BibTeX records: Yuxiu Luo

download as .bib file

@article{DBLP:journals/expert/LuLZTXW23,
  author       = {Qinghua Lu and
                  Yuxiu Luo and
                  Liming Zhu and
                  MingJian Tang and
                  Xiwei Xu and
                  Jon Whittle},
  title        = {Developing Responsible Chatbots for Financial Services: {A} Pattern-Oriented
                  Responsible Artificial Intelligence Engineering Approach},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {38},
  number       = {6},
  pages        = {42--51},
  year         = {2023},
  url          = {https://doi.org/10.1109/MIS.2023.3320437},
  doi          = {10.1109/MIS.2023.3320437},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/LuLZTXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-05517,
  author       = {Qinghua Lu and
                  Yuxiu Luo and
                  Liming Zhu and
                  MingJian Tang and
                  Xiwei Xu and
                  Jon Whittle},
  title        = {Operationalising Responsible {AI} Using a Pattern-Oriented Approach:
                  {A} Case Study on Chatbots in Financial Services},
  journal      = {CoRR},
  volume       = {abs/2301.05517},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.05517},
  doi          = {10.48550/ARXIV.2301.05517},
  eprinttype    = {arXiv},
  eprint       = {2301.05517},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-05517.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/Tang0ACL21,
  author       = {MingJian Tang and
                  Jiao Yin and
                  Mamoun Alazab and
                  Jinli Cao and
                  Yuxiu Luo},
  title        = {Modeling of Extreme Vulnerability Disclosure in Smart City Industrial
                  Environments},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {6},
  pages        = {4150--4158},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3022182},
  doi          = {10.1109/TII.2020.3022182},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/Tang0ACL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/TangAL19,
  author       = {MingJian Tang and
                  Mamoun Alazab and
                  Yuxiu Luo},
  title        = {Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {3},
  pages        = {317--329},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2017.2723570},
  doi          = {10.1109/TBDATA.2017.2723570},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbd/TangAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TangALD18,
  author       = {MingJian Tang and
                  Mamoun Alazab and
                  Yuxiu Luo and
                  Matthew Donlon},
  title        = {Disclosure of cyber security vulnerabilities: time series modelling},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {10},
  number       = {3},
  pages        = {255--275},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJESDF.2018.10013065},
  doi          = {10.1504/IJESDF.2018.10013065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TangALD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/TangAL16,
  author       = {MingJian Tang and
                  Mamoun Alazab and
                  Yuxiu Luo},
  title        = {Exploiting Vulnerability Disclosures: Statistical Framework and Case
                  Study},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.10},
  doi          = {10.1109/CCC.2016.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/TangAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/LuoAS07,
  author       = {Yuxiu Luo and
                  Giannakis Antoniou and
                  Leon Sterling},
  editor       = {David S. Munro and
                  Hong Shen and
                  Quan Z. Sheng and
                  Henry Detmold and
                  Katrina Falkner and
                  Cruz Izu and
                  Paul D. Coddington and
                  Bradley Alexander and
                  Si{-}Qing Zheng},
  title        = {Incorporating Security Requirements into Communication Protocols in
                  Multi-agent Software Systems},
  booktitle    = {Eighth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide,
                  Australia},
  pages        = {159--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PDCAT.2007.48},
  doi          = {10.1109/PDCAT.2007.48},
  timestamp    = {Mon, 17 Jul 2023 13:04:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/LuoAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/LuoST07,
  author       = {Yuxiu Luo and
                  Leon Sterling and
                  Kuldar Taveter},
  title        = {Modelling a Smart Music Player with a Hybrid Agent-Oriented Methodology},
  booktitle    = {15th {IEEE} International Requirements Engineering Conference, {RE}
                  2007, October 15-19th, 2007, New Delhi, India},
  pages        = {281--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/RE.2007.43},
  doi          = {10.1109/RE.2007.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/LuoST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics