


Остановите войну!
for scientists:


default search action
Dan Meng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j64]Wenchao Cui, Dan Meng, Ke Lu, Yirong Wu
, Zhihong Pan, Xiaolong Li
, Shuifa Sun
:
Automatic segmentation of ultrasound images using SegNet and local Nakagami distribution fitting model. Biomed. Signal Process. Control. 81: 104431 (2023) - [j63]Fengkai Yuan
, Kai Wang
, Jiameng Ying, Rui Hou
, Lutan Zhao, Peinan Li
, Yifan Zhu, Zhenzhou Ji
, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023) - [j62]Tao Xue
, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j61]Dan Meng
, Tongtong Qiao
, Yao Ji
, Renshuo Wang
, Yue Zhang
, Xiaoguang San
, Quan Jin
, Xiaolong Wang
:
Hydrangea-Like In2O3@In2S3 n-n Heterostructures for High-Efficiency TMA Measurement. IEEE Trans. Instrum. Meas. 72: 1-9 (2023) - [j60]Zhiwei Wang
, Peinan Li
, Rui Hou
, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c202]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934 - 2022
- [j59]Ruipeng Yang
, Aimin Yu, Lijun Cai, Dan Meng:
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. Cybersecur. 5(1): 29 (2022) - [j58]Xiaoliang Liu, Zhihua Wang
, Xiaomei Yang, Yueming Liu, Bin Liu, Junyao Zhang, Ku Gao, Dan Meng, Yaxin Ding:
Mapping China's offshore mariculture based on dense time-series optical and radar data. Int. J. Digit. Earth 15(1): 1326-1349 (2022) - [j57]Dongmei Wei, Dan Meng
, Yuan Rong
, Yi Liu, Harish Garg
, Dragan Pamucar
:
Fermatean Fuzzy Schweizer-Sklar Operators and BWM-Entropy-Based Combined Compromise Solution Approach: An Application to Green Supplier Selection. Entropy 24(6): 776 (2022) - [j56]Xin Yang
, Yujie Li
, Dan Meng, Yuxuan Yang, Dun Liu, Tianrui Li:
Three-way multi-granularity learning towards open topic classification. Inf. Sci. 585: 41-57 (2022) - [j55]Jiameng Ying
, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022) - [j54]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022) - [j53]Ninghui Zhang, Haipeng Ye
, Ji Zheng, Xuejing Leng
, Dan Meng, Yu Li
:
Long-Term Impacts of COVID-19 Lockdown on the NO2 Concentrations and Urban Thermal Environment: Evidence from the Five Largest Urban Agglomerations in China. Remote. Sens. 14(4): 921 (2022) - [j52]Xiaotong Guo, Dan Meng
, Xuelong Chen
, Xiaojuan Li:
Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China. Remote. Sens. 14(17): 4308 (2022) - [j51]Yaxin Ding, Xiaomei Yang, Zhihua Wang, Dongjie Fu, He Li, Dan Meng, Xiaowei Zeng, Junyao Zhang:
A Field-Data-Aided Comparison of Three 10 m Land Cover Products in Southeast Asia. Remote. Sens. 14(19): 5053 (2022) - [c201]Yi Zhang, Zhi Deng, Dan Meng, Liang Zhou, Mengfei Li, Qijie Liu, Chao Kong:
Temporal Knowledge Graph Embedding for Link Prediction. WISA 2022: 3-14 - [c200]Zhiyuan Ma, Dan Meng, Chao Kong, Liang Zhou, Mengfei Li, Wan Tao:
Coreference Resolution with Syntax and Semantics. WISA 2022: 181-193 - [c199]Rong Yin, Yong Liu, Dan Meng:
Distributed Randomized Sketching Kernel Learning. AAAI 2022: 8883-8891 - [c198]Chao Kong, Dan Meng, Tao Liu, Mengfei Li, Qijie Liu, Liang Zhou, Pingfu Chao, Yi Zhang:
SAME: Sampling Attack in Multiplex Network Embedding. ADMA (2) 2022: 337-351 - [c197]Peinan Li, Rui Hou, Lutan Zhao, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552 - [c196]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359 - [c195]Dan Meng, Yonghang Yan
, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen:
A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet. ICACT 2022: 101-105 - [c194]Zhijia Li, Yonghang Yan
, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen:
A Survey of Coverage Issues in UAV networks. ICACT 2022: 185-190 - [c193]Xuewen Xia, Yonghang Yan
, Zhijia Li, Dan Meng, Lun Xia, Chen Chen:
A Survey of UAV Clustering Algorithm. ICACT 2022: 191-196 - [c192]Lun Xia, Yonghang Yan
, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen:
An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model. ICACT 2022: 201-206 - [c191]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analysis of DRAM Vulnerability Using Computation Tree Logic. ICC 2022: 986-991 - [c190]Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. MILCOM 2022: 292-297 - [c189]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Randomized Sketches for Clustering: Fast and Optimal Kernel $k$-Means. NeurIPS 2022 - [c188]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao
, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. IEEE Symposium on Security and Privacy 2022: 540-557 - [c187]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71 - [c186]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [i20]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations. CoRR abs/2208.14062 (2022) - [i19]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - [i18]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022) - 2021
- [j50]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [j49]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021) - [j48]Yu Li
, Haipeng Ye
, Xing Gao, Dongqi Sun, Zehong Li, Ninghui Zhang, Xuejing Leng
, Dan Meng, Ji Zheng:
Spatiotemporal Patterns of Urbanization in the Three Most Developed Urban Agglomerations in China Based on Continuous Nighttime Light Data (2000-2018). Remote. Sens. 13(12): 2245 (2021) - [j47]Haipeng Ye
, Zehong Li, Ninghui Zhang, Xuejing Leng, Dan Meng, Ji Zheng, Yu Li
:
Variations in the Effects of Landscape Patterns on the Urban Thermal Environment during Rapid Urbanization (1990-2020) in Megacities. Remote. Sens. 13(17): 3415 (2021) - [j46]Yaxin Ding
, Xiaomei Yang
, Hailiang Jin, Zhihua Wang
, Yueming Liu, Bin Liu, Junyao Zhang
, Xiaoliang Liu, Ku Gao, Dan Meng:
Monitoring Coastline Changes of the Malay Islands Based on Google Earth Engine and Dense Time-Series Remote Sensing Images. Remote. Sens. 13(19): 3842 (2021) - [j45]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j44]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou
, Zhenzhou Ji
, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021) - [c185]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168 - [c184]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang
, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272 - [c183]Fengkai Yuan, Kai Wang
, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c182]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability. HPCC/DSS/SmartCity/DependSys 2021: 1075-1083 - [c181]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance. ICA3PP (3) 2021: 196-213 - [c180]Guang Wang, Ziyuan Zhu, Shuan Li, Xu Cheng, Dan Meng:
Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm. ICCD 2021: 196-203 - [c179]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c178]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c177]Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
Towards Open World Traffic Classification. ICICS (1) 2021: 331-347 - [c176]Xiaoshuai Hao, Yucan Zhou, Dayan Wu, Wanqian Zhang, Bo Li, Weiping Wang, Dan Meng:
What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval. ICME 2021: 1-6 - [c175]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Distributed Nyström Kernel Learning with Communications. ICML 2021: 12019-12028 - [c174]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - [c173]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Automatic CNN Compression Based on Hyper-parameter Learning. IJCNN 2021: 1-8 - [c172]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Fast CNN Inference by Adaptive Sparse Matrix Decomposition. IJCNN 2021: 1-8 - [c171]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Energy-saving CNN with Clustering Channel Pruning. IJCNN 2021: 1-8 - [c170]Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng:
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. IJCNN 2021: 1-10 - [c169]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - [c168]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. MSN 2021: 502-511 - [c167]Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. SecureComm (1) 2021: 3-24 - [c166]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
FCEP: A Fast Concolic Execution for Reaching Software Patches. SEKE 2021: 510-515 - [c165]Wanqian Zhang, Dayan Wu, Yu Zhou
, Bo Li, Weiping Wang, Dan Meng:
Binary Neural Network Hashing for Image Retrieval. SIGIR 2021: 317-326 - [c164]Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. TrustCom 2021: 1132-1140 - [i17]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. CoRR abs/2104.09806 (2021) - 2020
- [j43]Xingxing He, Yingfang Li, Keyun Qin, Dan Meng:
Distance measures on intuitionistic fuzzy sets based on intuitionistic fuzzy dissimilarity functions. Soft Comput. 24(1): 523-541 (2020) - [j42]Dan Meng, Rui Hou
, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [j41]Jinfeng Li
, Liwei Chen, Gang Shi, Kai Chen
, Dan Meng:
ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3165-3176 (2020) - [j40]Jinfeng Li
, Qizhen Xu
, Yongyue Li
, Liwei Chen, Gang Shi, Dan Meng:
Efficient Return Address Verification Based on Dislocated Stack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3398-3407 (2020) - [j39]Rong Yin
, Yong Liu
, Weiping Wang, Dan Meng:
Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory. IEEE Trans. Neural Networks Learn. Syst. 31(9): 3512-3524 (2020) - [j38]Jiang Zhou
, Yong Chen
, Weiping Wang, Shuibing He
, Dan Meng:
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 31(2): 374-392 (2020) - [c163]Rong Yin, Yong Liu, Lijing Lu, Weiping Wang, Dan Meng:
Divide-and-Conquer Learning with Nyström: Optimal Rate and Algorithm. AAAI 2020: 6696-6703 - [c162]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c161]Limin Wang
, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Analyzing The Security of The Cache Side Channel Defences With Attack Graphs. ASP-DAC 2020: 50-55 - [c160]Xingbin Wang, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c159]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164 - [c158]Xingbin Wang, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197 - [c157]Kai Wang
, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413 - [c156]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. ESORICS (1) 2020: 338-358 - [c155]Dan Meng, Hongyu Li, Fan Zhu, Xiaolin Li:
FedMONN: Meta Operation Neural Network for Secure Federated Aggregation. HPCC/DSS/SmartCity 2020: 579-584 - [c154]Hongyu Li, Dan Meng, Hong Wang, Xiaolin Li:
Knowledge Federation: A Unified and Hierarchical Privacy-Preserving AI Framework. ICKG 2020: 84-91 - [c153]Zhuo Wang, Chaokun Wang, Weiping Wang, Xiaoyan Gu, Bo Li, Dan Meng:
Adaptive Relation Discovery from Focusing Seeds on Large Networks. ICDE 2020: 217-228 - [c152]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm. ICDM 2020: 1376-1381 - [c151]Wenyan An, Liwei Chen, Jinxin Wang
, Gewangzi Du, Gang Shi, Dan Meng:
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. ISPA/BDCloud/SocialCom/SustainCom 2020: 337-344 - [c150]Wanqian Zhang, Dayan Wu, Yu Zhou
, Bo Li, Weiping Wang, Dan Meng:
Deep Unsupervised Hybrid-similarity Hadamard Hashing. ACM Multimedia 2020: 3274-3282 - [c149]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033 - [c148]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. IEEE Symposium on Security and Privacy 2020: 1450-1465 - [c147]Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. TrustCom 2020: 194-201 - [c146]Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. TrustCom 2020: 293-300 - [c145]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c144]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687 - [i16]Hongyu Li, Dan Meng, Xiaolin Li:
Knowledge Federation: Hierarchy and Unification. CoRR abs/2002.01647 (2020) - [i15]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020) - [i14]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j37]Limin Wang
, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Colored Petri Net Based Cache Side Channel Vulnerability Evaluation. IEEE Access 7: 169825-169843 (2019) - [j36]Yingfang Li, Xingxing He
, Keyun Qin, Dan Meng:
Some notes on optimal fuzzy reasoning methods. Inf. Sci. 503: 652-669 (2019) - [j35]Jun Zhang, Rui Hou, Wei Song
, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019) - [c143]Zhuo Wang, Weiping Wang, Chaokun Wang, Xiaoyan Gu, Bo Li, Dan Meng:
Community Focusing: Yet Another Query-Dependent Community Detection. AAAI 2019: 329-337 - [c142]Wanqian Zhang, Dayan Wu, Jing Liu, Bo Li, Xiaoyan Gu, Weiping Wang, Dan Meng:
Fast and Multilevel Semantic-Preserving Discrete Hashing. BMVC 2019: 157 - [c141]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c140]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c139]Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - [c138]Yanfu Xu, Zheng Lin, Yuanxin Liu, Rui Liu, Weiping Wang, Dan Meng:
Ranking and Sampling in Open-Domain Question Answering. EMNLP/IJCNLP (1) 2019: 2412-2421 - [c137]Peinan Li, Lutan Zhao, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276 - [c136]Ningning Cai
, Can Ma, Weiping Wang, Dan Meng:
Effective Self Attention Modeling for Aspect Based Sentiment Analysis. ICCS (5) 2019: 3-14 - [c135]Jingzi Gu, Jinchao Zhang, Zheng Lin, Bo Li, Weiping Wang, Dan Meng:
Asymmetric Deep Cross-modal Hashing. ICCS (5) 2019: 41-54 - [c134]Fang Li, Chao Yan, Ziyuan Zhu, Dan Meng:
A Deep Malware Detection Method Based on General-Purpose Register Features. ICCS (3) 2019: 221-235 - [c133]Yao Xiao, Dan Meng, Cewu Lu, Chi-Keung Tang:
Template-Instance Loss for Offline Handwritten Chinese Character Recognition. ICDAR 2019: 315-322 - [c132]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. ICICS 2019: 3-17 - [c131]Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. ICICS 2019: 165-180 - [c130]Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. ICICS 2019: 181-196 - [c129]