Skip to main content

Lu Yu

Lu YuResearch Assistant Professor of Electrical and Computer Engineering

Ph.D. - 2012, Clemson University
Electrical Engineering
B.S. - 2007, Xi’an Jiaotong University 
Control Theory and Control Engineering
B.S. - 2004, Xi’an Jiaotong University 
Information Engineering 

Contact Information
Office: 300B Riggs Hall
Office Phone: 864.656.5916
Email: luy@clemson.edu

Research
Dr. Yu’s research interests mainly focus on cybersecurity. She is currently engaged in research in privacy-preserving data mining, blockchain technology, and anonymity network. Her previous research includes botnet detection (e.g., domain name generation (DGA)), distributed denial-of-service (DDoS) attacks detection and mitigation, and Markov decision processes (MDP), etc.

Blockchain is a distributed digital ledger storing provenance metadata. A reliable, efficient and secure consensus algorithm is critical to the blockchain technology. The lightweight mining (LWM) consensus algorithm guarantees a c as long as there is one good miner. Unlike most existing mining algorithms (e.g., Proof-of-Work (PoW), Proof-of-Stake (PoS)) that are devised for cryptocurrency applications, LWM is completely free of monetary qualities. This allows consensus to be achieved with minimal computational overhead. The application of the LWM algorithm includes clinical trials, transparency and accountability of agriculture supply chain, and digital forensics, etc.

Privacy-preserving data mining techniques are critical to protect user privacy in the era of big data. Privacy-preserving data techniques look at techniques that useful statistics from user data without disclosing any private user information. Dr. Yu’s research focuses on privacy-preserving data collection approaches. True user privacy is only possible when no personally identifiable information (PII) is ever collected. In particular, her previous work includes privacy-preserving probabilistic counting, and negative surveys.

Teaching
Dr. Yu has taught both undergraduate and graduate courses. She has taught System Programming Concepts (ECE2220) and Communications systems (ECE4270). The graduate courses she has taught are mainly security-related, including computer network security (ECE4490/6490), malware reverse engineering (ECE8830), and distributed denial-of-service (DDoS) attacks (ECE8860).

Publications
https://scholar.google.com/citations?user=gyEEdK4AAAAJ&hl=en&oi=ao