Skip Navigation

Dr. Wei Lu

Associate Professor
Computer Science
Putnam Science Center 158 • M-2001
603-358-2604

Degrees & Credentials:

B.S in Electronics Engineering, Special Class for the Gifted Young, Huazhong University of Science and Technology, Wuhan, China.

M.IPLaw, School of Law, University of New Hampshire, Concord, NH.

Ph.D, Electrical and Computer Engineering, University of Victoria, Victoria, BC.

Professional Engineer (P.Eng.) in Software Engineering, Association of Professional Engineers and Geoscientists of New Brunswick, Fredericton, NB.

Professional Interests:

Cyber Security and Artificial Intelligence.

Professional Background:

Secure Software Engineer, Q1 Labs Inc., Waltham, MA (Security Systems Division, IBM, since October 2011).

Member of Research Staff, German Research Center for Artificial Intelligence (DFKI GmbH), Kaiserslautern, Germany.

Junior Member of Technical Staff (MTS-1), Bell Laboratories (Asia & Pacific), Lucent Technologies Inc., Beijing, China.

Key Professional Work:

Books

Wei Lu. Beginning Robotics Programming in Java with LEGO Mindstorms. Apress Publisher, ISBN: 978-1-4842-2004-7, Nov. 2016.

Ali Ghorbani, Wei Lu, Mahbod Tavalaee. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer Publisher, ISBN-10: 0387887709, Oct. 20, 2009.

Wei Lu, Yu Liu and Li Luo. QA about Email and Foxmail System. Press of Huazhong University of Science and Technology, ISBN 7-5609-2295-3, September 2000.

Book Chapters

John Hancock, Benjamin Osowiecki, Aram Taft and Wei Lu. Leveraging Cloud-based Resources for Automated Biometric Identification. in Biometric-based Security Systems: State of the Art and Perspectives. Isaac Woungang, Obaidat S. Mohammad, Issa Traore (Eds.). Cambridge University Press, accepted, under press. Jan. 2018.

Wei Lu, Ling Xue. An Enhanced CUSUM Algorithm for Anomaly Detection in Information Security Practices. Issa Traore, Ahmed Awad, and Isaac Woungang (Eds.) Springer, pp. 83-96, ISBN 978-3-319-48946-9, Jan. 2017.

David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. Peer-to-peer Botnet Detection Based On Flow Intervals in Information Security and Privacy Research. Dimitris Gritzalis, Steven Furnell and Marianthi Theoharidou (Eds.) Springer, pp. 87-102, ISBN 978-3-642-30436-1, 2012.

Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani. Automatic Discovery of Network Applications: A Hybrid Approach in Advances in Artificial Intelligence. Atefeh Farzindar and Keselj, Vlado (Eds.). Springer, pp. 208-219, ISBN 978-3-642-13058-8, 2010.

Wei Lu and Hengjian Tong. Detecting Network Anomalies Using CUSUM and EM Clustering. in Advances in Computation and Intelligence. Zhenhua Li (Ed.). Springer, pp. 297-308, ISBN 978-3-642-04843-2, 2009.

Wei Lu, Hengjian Tong and Issa Traore. E-means: An Evolutionary Clustering Algorithm. in Advances in Computation and Intelligence. Xuesong Yan (Ed.). Springer, pp. 537-545, ISBN 978-3-540-92137-0, 2008.

Wei Lu and Issa Traore. A Novel Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-time. in Cryptology and Network Security. Y.G. Desmedt, H. Wang, Y. Mu, Y. Li, (Eds.). Springer, pp. 96-109. ISBN 978-3-540-32298-6, 2005.

Peer-reviewed Journals

David Zhao, Issa Traore, Bassam Sayed, Wei Lu, Sherif Saad, Ali Ghorbani and Dan Garant, Botnet Detection based on Traffic Behavior Analysis and Flow Intervals, Computer & Security, Elsevier, pp. 2-16, Vol 39, Nov. 2013.

Wei Lu, Goaletsa Rammidi and Ali A. Ghorbani. Clustering Botnet Communication Traffic Based on N-gram Feature Selection., Computer Communications, Vol. 34, No. 3, pp. 502-514, Elsevier, 2011.

Wei Lu and Ali A. Ghorbani. Network Anomaly Detection Based on Wavelet Analysis. Special Issue on Signal Processing Applications in Network Intrusion Detection Systems, EURASIP Journal on Advances in Signal Processing, Article No. 4, pp. 1-16, Hindawi, Jan. 2009.

Wei Lu and Issa Traore. Unsupervised Anomaly Detection Using an Evolutionary Extension of K-means Algorithm. International Journal on Information and Computer Security, Volume 2, Number 2, pp. 107-139, Inderscience Publisher, May 2008.

Wei Lu and Issa Traore. Detecting New Forms of Network Intrusion Using Genetic Programming. Computational Intelligence. Volume 20, Issue 3, pp. 475-494, Wiley Publisher, August 2004.

More publications can see Google Scholar Profile at https://scholar.google.com/citations?user=x3MYuloAAAAJ&hl=en


Contact Computer Science

Wise up!
Contact Admissions contact admissions
Request information

Computer Science (Sciences)
Emma Wilson
Administrative Assistant
603-358-2540

Admissions Office
800-KSC-1909
229 Main Street
Keene, New Hampshire 03435