default search action
Meng Yue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j45]Zhijun Wu, Yun Bai, Yuan Zhang, Liang Liu, Meng Yue:
TrustCNAV: Certificateless aggregate authentication of civil navigation messages in GNSS. Comput. Secur. 148: 104172 (2025) - [j44]Tianqiao Zhao, Amirthagunaraj Yogarathnam, Meng Yue:
A Large Language Model for Determining Partial Tripping of Distributed Energy Resources. IEEE Trans. Smart Grid 16(1): 437-440 (2025) - [j43]Anping Zhou, Jianhui Wang, Meng Yue:
Back-to-Back DC Transmission System Embedded Scheduling With Integrated Hydrogen Injection Modeling. IEEE Trans. Smart Grid 16(1): 773-785 (2025) - 2024
- [j42]Yin Yu, Xinyuan Jiang, Daning Huang, Yan Li, Meng Yue, Tianqiao Zhao:
PIDGeuN: Graph Neural Network-Enabled Transient Dynamics Prediction of Networked Microgrids Through Full-Field Measurement. IEEE Access 12: 49464-49475 (2024) - [j41]Ying Zhang, Meng Yue, Jianhui Wang, Shinjae Yoo:
Multi-Agent Graph-Attention Deep Reinforcement Learning for Post-Contingency Grid Emergency Voltage Control. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3340-3350 (2024) - [j40]Meng Yue, Qingxin Yan, Zichao Lu, Zhijun Wu:
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN. IEEE Trans. Netw. Serv. Manag. 21(3): 3522-3536 (2024) - [j39]Bin Huang, Tianqiao Zhao, Meng Yue, Jianhui Wang:
Bi-Level Adaptive Storage Expansion Strategy for Microgrids Using Deep Reinforcement Learning. IEEE Trans. Smart Grid 15(2): 1362-1375 (2024) - [c26]Ying Zhang, Meng Yue:
Cooperative Multi-Agent Deep Reinforcement Learning for Adaptive Decentralized Emergency Voltage Control. ISGT 2024: 1-5 - [c25]Qiong Peng, Weiping Lin, Yihuang Hu, Ailisi Bao, Chenyu Lian, Weiwei Wei, Meng Yue, Jingxin Liu, Lequan Yu, Liansheng Wang:
Advancing H&E-to-IHC Virtual Staining with Task-Specific Domain Knowledge for HER2 Scoring. MICCAI (4) 2024: 3-13 - [i15]Lilan Karunaratne, Nilanjan Ray Chaudhuri, Amirthagunaraj Yogarathnam, Meng Yue:
On Modeling Adequacy and Stability Analysis of IBR-related Subsynchronous Oscillations in Multimachine Systems. CoRR abs/2403.07835 (2024) - [i14]Lilan Karunaratne, Nilanjan Ray Chaudhuri, Amirthagunaraj Yogarathnam, Meng Yue:
A Case Study on Modeling Adequacy of a Grid with Subsynchronous Oscillations Involving IBRs. CoRR abs/2407.09526 (2024) - [i13]Lilan Karunaratne, Nilanjan Ray Chaudhuri, Amirthagunaraj Yogarathnam, Meng Yue:
Discovery and Characterization of Cross-Area and Intra-Area SSOs Sensitive to Delay in Droop Control of Grid-Forming Converters. CoRR abs/2409.09912 (2024) - [i12]Amirhossein Mollaali, Gabriel Zufferey, Gonzalo Constante-Flores, Christian Moya, Can Li, Guang Lin, Meng Yue:
Conformalized Prediction of Post-Fault Voltage Trajectories Using Pre-trained and Finetuned Attention-Driven Neural Operators. CoRR abs/2410.24162 (2024) - [i11]Feiqin Zhu, Dmitrii Torbunov, Yihui Ren, Zhongjing Jiang, Tianqiao Zhao, Amirthagunaraj Yogarathnam, Meng Yue:
Mitigating Parameter Degeneracy using Joint Conditional Diffusion Model for WECC Composite Load Model in Power Systems. CoRR abs/2411.10431 (2024) - 2023
- [j38]Meng Yue, Silin Peng, Wenzhi Feng:
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack. IET Inf. Secur. 17(3): 360-376 (2023) - [j37]Christian Moya, Shiqi Zhang, Guang Lin, Meng Yue:
DeepONet-grid-UQ: A trustworthy deep operator framework for predicting the power grid's post-fault trajectories. Neurocomputing 535: 166-182 (2023) - [j36]Meng Yue, Han Zheng, Haoran Cui, Zhijun Wu:
GAN-LSTM-Based ADS-B Attack Detection in the Context of Air Traffic Control. IEEE Internet Things J. 10(14): 12651-12665 (2023) - [j35]Yanrong Lu, Chenzhuo Wang, Meng Yue, Zhijun Wu:
Consumer-source authentication with conditional anonymity in information-centric networking. Inf. Sci. 624: 378-394 (2023) - [j34]Yixuan Sun, Christian Moya, Guang Lin, Meng Yue:
DeepGraphONet: A Deep Graph Operator Network to Learn and Zero-Shot Transfer the Dynamic Response of Networked Systems. IEEE Syst. J. 17(3): 4360-4370 (2023) - [j33]Zhijun Wu, Tong Shang, Meng Yue, Liang Liu:
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast. IEEE Trans. Aerosp. Electron. Syst. 59(6): 8535-8549 (2023) - [j32]Tianqiao Zhao, Meng Yue, Jianhui Wang:
Deep-Learning-Based Koopman Modeling for Online Control Synthesis of Nonlinear Power System Transient Dynamics. IEEE Trans. Ind. Informatics 19(10): 10444-10453 (2023) - [j31]Zhijun Wu, Silin Peng, Liang Liu, Meng Yue:
Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN. IEEE Trans. Netw. Sci. Eng. 10(1): 239-252 (2023) - [c24]Jiaming Li, Yue Zhao, Meng Yue:
Integrating Learning and Physics based Computation for Fast Online Transient Analysis. ISGT 2023: 1-5 - [c23]Amirthagunaraj Yogarathnam, Lilan Karunaratne, Nilanjan Ray Chaudhuri, Meng Yue:
Modeling Adequacy of Droop-Controlled Grid-Forming Converters for Transient Studies: Singular Perturbation Analysis. ISGT 2023: 1-5 - [c22]Meng Yue, Biao Jin, Zhiqiang Yao:
MAP-GAN: Generative Adversarial Network for Privacy Preserving of Multiple Facial Attributes. ISKE 2023: 294-301 - [i10]Christian Moya, Guang Lin, Tianqiao Zhao, Meng Yue:
On Approximating the Dynamic Response of Synchronous Generators via Operator Learning: A Step Towards Building Deep Operator-based Power Grid Simulators. CoRR abs/2301.12538 (2023) - [i9]Fei Kong, Jinxi Xiang, Xiyue Wang, Xinran Wang, Meng Yue, Jun Zhang, Sen Yang, Junhan Zhao, Xiao Han, Yuhan Dong, Yueping Liu:
Federated contrastive learning models for prostate cancer diagnosis and Gleason grading. CoRR abs/2302.06089 (2023) - [i8]Ying Zhang, Meng Yue:
Cooperative Multi-Agent Deep Reinforcement Learning for Adaptive Decentralized Emergency Voltage Control. CoRR abs/2310.13577 (2023) - 2022
- [j30]Yang Li, Haiyan Su, Li Yang, Meng Yue, Mingbo Wang, Xiaolong Gu, Lijuan Dai, Xiangming Wang, Xiaohua Su, Andu Zhang, Jialiang Ren, Gaofeng Shi:
Can lymphovascular invasion be predicted by contrast-enhanced CT imaging features in patients with esophageal squamous cell carcinoma? A preliminary retrospective study. BMC Medical Imaging 22(1): 93 (2022) - [j29]Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue:
LDoS attack detection method based on traffic classification prediction. IET Inf. Secur. 16(2): 86-96 (2022) - [c21]Carson Hu, Guang Lin, Bao Wang, Meng Yue, Jack Xin:
Post-Fault Power Grid Voltage Prediction via 1D-CNN with Spatial Coupling. AI4I 2022: 35-37 - [c20]Haoran Cui, Shibo Zhu, Meng Yue:
LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication. DataCom 2022: 166-177 - [c19]Yunling Zheng, Carson Hu, Guang Lin, Meng Yue, Bao Wang, Jack Xin:
Glassoformer: A Query-Sparse Transformer for Post-Fault Power Grid Voltage Prediction. ICASSP 2022: 3968-3972 - [i7]Yunling Zheng, Carson Hu, Guang Lin, Meng Yue, Bao Wang, Jack Xin:
glassoformer: a query-sparse transformer for post-fault power grid voltage prediction. CoRR abs/2201.09145 (2022) - [i6]Christian Moya, Shiqi Zhang, Meng Yue, Guang Lin:
DeepONet-Grid-UQ: A Trustworthy Deep Operator Framework for Predicting the Power Grid's Post-Fault Trajectories. CoRR abs/2202.07176 (2022) - [i5]Yixuan Sun, Christian Moya, Guang Lin, Meng Yue:
DeepGraphONet: A Deep Graph Operator Network to Learn and Zero-shot Transfer the Dynamic Response of Networked Systems. CoRR abs/2209.10622 (2022) - 2021
- [j28]Zhijun Wu, Haolin Ma, Meng Yue:
Reliability Assessment Model of IMA Partition Software Using Stochastic Petri Nets. IEEE Access 9: 25219-25232 (2021) - [j27]Zhijun Wu, Wenzhi Feng, Jin Lei, Meng Yue:
I-CIFA: An improved collusive interest flooding attack in named data networking. J. Inf. Secur. Appl. 61: 102912 (2021) - [j26]Zhijun Wu, Yue Yin, Guang Li, Meng Yue:
Coherent Detection of Synchronous Low-Rate DoS Attacks. Secur. Commun. Networks 2021: 6694264:1-6694264:14 (2021) - [j25]Meng Yue, Minxiao Wang, Zhijun Wu:
Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model. IEEE Trans. Dependable Secur. Comput. 18(5): 2285-2300 (2021) - [j24]Meng Yue, Jing Li, Zhijun Wu, Minxiao Wang:
High-Potency Models of LDoS Attack Against CUBIC + RED. IEEE Trans. Inf. Forensics Secur. 16: 4950-4965 (2021) - [c18]Yan Wang, Haolin Ma, Meng Yue, Zhijun Wu:
Optimization of Airborne AFDX Transmission Delay Based on Revised RSP Method. ICCCS 2021: 1011-1016 - [c17]Pan Gao, Meng Yue, Zhijun Wu:
A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM. ICCCS 2021: 1063-1069 - [c16]Haolin Ma, Weihang Cui, Meng Yue, Zhijun Wu:
Modeling and Simulation on Dynamic Reliability of Multi-partition Software of IMA Based on TimeNET4.4. ICCCS 2021: 1088-1093 - [c15]Yanrong Lu, Meng Yue, Zhijun Wu:
Content Security over ICN based Smart Grid: A Cryptographic Solution. ISPA/BDCloud/SocialCom/SustainCom 2021: 785-791 - [c14]Meng Yue, Han Zheng, Wenzhi Feng, Zhijun Wu:
A Detection Method for I-CIFA Attack in NDN Network. SmartCom 2021: 364-373 - [i4]Ying Zhang, Meng Yue, Jianhui Wang:
Adaptive Load Shedding for Grid Emergency Control via Deep Reinforcement Learning. CoRR abs/2102.12908 (2021) - 2020
- [j23]Zhijun Wu, Xu Qing, Jingjie Wang, Meng Yue, Liang Liu:
Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network. IEEE Access 8: 17404-17418 (2020) - [j22]Zhijun Wu, Wenjing Li, Liang Liu, Meng Yue:
Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey. IEEE Access 8: 43920-43943 (2020) - [j21]Meng Yue, Huaiyuan Wang, Liang Liu, Zhijun Wu:
Detecting DoS Attacks Based on Multi-Features in SDN. IEEE Access 8: 104688-104700 (2020) - [j20]Liang Liu, Wenzhi Feng, Zhijun Wu, Meng Yue, Rudan Zhang:
The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN. IEEE Access 8: 128005-128017 (2020) - [j19]Rui Wang, Shaocheng Han, Peng Zhang, Meng Yue, Zheng Cheng, Yujin Zhang:
A Novel Zero-Watermarking Scheme Based on Variable Parameter Chaotic Mapping in NSPD-DCT Domain. IEEE Access 8: 182391-182411 (2020) - [j18]Zhijun Wu, Wenzhi Feng, Meng Yue, Xinran Xu, Liang Liu:
Mitigation measures of collusive interest flooding attacks in named data networking. Comput. Secur. 97: 101971 (2020) - [j17]Liang Liu, Huaiyuan Wang, Zhijun Wu, Meng Yue:
The detection method of low-rate DoS attack based on multi-feature fusion. Digit. Commun. Networks 6(4): 504-513 (2020) - [j16]Zhijun Wu, Anxin Guo, Meng Yue, Liang Liu:
An ADS-B Message Authentication Method Based on Certificateless Short Signature. IEEE Trans. Aerosp. Electron. Syst. 56(3): 1742-1753 (2020) - [c13]Jiaming Li, Meng Yue, Yue Zhao, Guang Lin:
Machine-Learning-Based Online Transient Analysis via Iterative Computation of Generator Dynamics. SmartGridComm 2020: 1-6 - [i3]Yichen Zhang, Yan Li, Kevin Tomsovic, Seddik M. Djouadi, Meng Yue:
Review on Set-Theoretic Methods for Safety Verification and Control of Power System. CoRR abs/2001.00080 (2020) - [i2]Zefan Tang, Jieying Jiao, Peng Zhang, Meng Yue, Chen Chen, Jun Yan:
Enabling Cyberattack-Resilient Load Forecasting through Adversarial Machine Learning. CoRR abs/2001.02289 (2020)
2010 – 2019
- 2019
- [j15]Zhijun Wu, Qingbo Pan, Meng Yue, Liang Liu:
Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks. Comput. Networks 152: 64-77 (2019) - [j14]Meng Yue, Zhijun Wu, Jingjie Wang:
Detecting LDoS attack bursts based on queue distribution. IET Inf. Secur. 13(3): 285-292 (2019) - [j13]Mingjian Cui, Jianhui Wang, Meng Yue:
Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks. IEEE Trans. Smart Grid 10(5): 5724-5734 (2019) - [j12]Meng Yue, Tao Hong, Jianhui Wang:
Descriptive Analytics-Based Anomaly Detection for Cybersecure Load Forecasting. IEEE Trans. Smart Grid 10(6): 5964-5974 (2019) - [c12]Meng Yue:
Analysis of the Information Service Levels of the Agricultural Economy in the Environment of the Internet of Things and the Cloud Computing. CSIA 2019: 332-338 - [c11]Zhijun Wu, Shan Tian, Wen Li, Meng Yue, Jian Wang:
A secret classified label control model based on the identity-based cryptography. IWCMC 2019: 96-101 - [c10]Lan Ma, Shan Tian, Yang Song, Zhijun Wu, Meng Yue:
An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation. SpaCCS Workshops 2019: 245-252 - [c9]Zhijun Wu, Enzhong Xu, Liang Liu, Meng Yue:
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN. TrustCom/BigDataSE 2019: 843-848 - 2018
- [j11]Seung Jun Lee, Sang Hun Lee, Tsong-Lun Chu, Athi Varuttamaseni, Meng Yue, Ming Li, Jaehyun Cho, Hyun Gook Kang:
Bayesian Belief Network Model Quantification Using Distribution-Based Node Probability and Experienced Data Updates for Software Reliability Assessment. IEEE Access 6: 64556-64568 (2018) - [j10]Meng Yue, Liang Liu, Zhijun Wu, Minxiao Wang:
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network. Int. J. Commun. Syst. 31(2) (2018) - [j9]Meng Yue, Tami Toto, Michael P. Jensen, Scott E. Giangrande, Robert Lofaro:
A Bayesian Approach-Based Outage Prediction in Electric Utility Systems Using Radar Measurement Data. IEEE Trans. Smart Grid 9(6): 6149-6159 (2018) - [c8]Zhijun Wu, Shengyan Zhou, Meng Yue:
Research on SWIM Services Dynamic Migration Mechanism. DASC/PiCom/DataCom/CyberSciTech 2018: 1034-1039 - [c7]Zhijun Wu, Qingbo Pan, Meng Yue, Shaopu Ma:
An Approach of Security Protection for VSAT Network. TrustCom/BigDataSE 2018: 1511-1516 - 2017
- [j8]Xiaoyu Zhang, Zhijun Wu, Jiusheng Chen, Meng Yue:
An adaptive KPCA approach for detecting LDoS attack. Int. J. Commun. Syst. 30(4) (2017) - 2016
- [j7]Meng Yue, Zhijun Wu, Minxiao Wang:
A New Exploration of FB-Shrew Attack. IEEE Commun. Lett. 20(10): 1987-1990 (2016) - [j6]Zhijun Wu, Ran Hu, Meng Yue:
Flow-oriented detection of low-rate denial of service attacks. Int. J. Commun. Syst. 29(1): 130-141 (2016) - [j5]Zhijun Wu, Liyuan Zhang, Meng Yue:
Low-Rate DoS Attacks Detection Based on Network Multifractal. IEEE Trans. Dependable Secur. Comput. 13(5): 559-567 (2016) - [c6]Zhijun Wu, Jun Jiang, Meng Yue:
A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks. CyberC 2016: 86-90 - [c5]Jin Xu, Meng Yue, Dimitrios Katramatos, Shinjae Yoo:
Spatial-temporal load forecasting using AMI data. SmartGridComm 2016: 612-618 - 2015
- [j4]Zhijun Wu, Meng Yue, Douzhe Li, Ke Xie:
SEDP-based detection of low-rate DoS attacks. Int. J. Commun. Syst. 28(11): 1772-1788 (2015) - 2014
- [j3]Zhijun Wu, Guang Li, Meng Yue, Hualong Zeng:
DDoS: Flood vs. Shrew. J. Comput. 9(6): 1426-1435 (2014) - [j2]Zhijun Wu, Yi Cui, Meng Yue, Lan Ma, Lu Wang:
Cross-correlation Based Synchronization Mechanism of LDDoS Attacks. J. Networks 9(3): 604-611 (2014) - [j1]Meng Yue, Zhijun Wu, Jin Lei:
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance. J. Softw. 9(7): 1854-1861 (2014) - [i1]Meng Yue, Xiaoyu Wang:
A Revised Incremental Conductance MPPT Algorithm for Solar PV Generation Systems. CoRR abs/1405.4890 (2014) - 2012
- [c4]Zhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang:
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation. TrustCom 2012: 25-32 - 2010
- [c3]Meng Yue, Xiaofeng Wu:
The Approach of ACARS Data Encryption and Authentication. CIS 2010: 556-560
2000 – 2009
- 2000
- [c2]Meng Yue, Ning Xi, Mark A. Minor, Ranjan Mukherjee:
Dynamic workspace analysis and motion planning for a micro biped walking robot. IROS 2000: 1900-1905
1990 – 1999
- 1999
- [c1]Meng Yue, Mark A. Minor, Ning Xi, Ranjan Mukherjee:
Kinematic workspace analyses of a miniature walking robot. IROS 1999: 1798-1803
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint