default search action
Dan Meng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Yingfang Li, Xingxing He, Keyun Qin, Dan Meng:
An improved method to estimate the similarity between LR-type fuzzy numbers. Fuzzy Sets Syst. 476: 108770 (2024) - [j77]Qiqi Tao, Liying Li, Junlong Zhou, Guitao Cao, Dan Meng:
Resource-aware Montgomery modular multiplication optimization for digital signal processing. J. Syst. Archit. 151: 103142 (2024) - [j76]Mei Zhang, Dan Meng, Yongtao Pei, Jinghua Wen:
Research on image segmentation method based on improved Snake model. Multim. Tools Appl. 83(5): 13977-13994 (2024) - [j75]Dan Meng, Xiaomei Yang, Zhihua Wang, Yueming Liu, Junyao Zhang, Xiaoliang Liu, Bin Liu:
Spatial Distribution and Differentiation Analysis of Coastal Aquaculture in China Based on Remote Sensing Monitoring. Remote. Sens. 16(9): 1585 (2024) - [j74]Gaoshan Fu, Xiang Yin, Yue Gao, Dan Meng, Liang Chen:
Research on the Application of Node Importance Assessment based on HITs Algorithm in Power Grid Planning. Scalable Comput. Pract. Exp. 25(5): 3832-3840 (2024) - [j73]Xingbin Wang, Yan Wang, Yulan Su, Sisi Zhang, Dan Meng, Rui Hou:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024) - [j72]Xingbin Wang, Boyan Zhao, Yulan Su, Sisi Zhang, Fengkai Yuan, Jun Zhang, Dan Meng, Rui Hou:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024) - [j71]Tongshuai Wu, Liwei Chen, Gewangzi Du, Dan Meng, Gang Shi:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 19: 3986-4000 (2024) - [j70]Huan Zhang, Lixin Zhao, Aimin Yu, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. IEEE Trans. Inf. Forensics Secur. 19: 6113-6127 (2024) - [c240]Jiahui Chen, Dan Meng, Xiangyun Gao, Liping Zhang, Chao Kong:
AGNE: Attentional Graph Convolutional Network Embedding for Knowledge Concept Recommendation in MOOCs. WISA 2024: 463-475 - [c239]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
KSM: Killer of Spectre and Meltdown Attacks. CSCWD 2024: 157-162 - [c238]Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. CSCWD 2024: 407-412 - [c237]Yusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties. CSCWD 2024: 772-777 - [c236]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Module Level Security Evaluation Method Based on Model Checking. CSCWD 2024: 1165-1170 - [c235]Xingbin Wang, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46 - [c234]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [c233]Longling Zhang, Lyqi Liu, Dan Meng, Jun Wang, Shengshan Hu:
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification. ICASSP 2024: 1311-1315 - [c232]Ruicheng Niu, Ziyuan Zhu, Chaofei Li, Dan Meng:
Search Robust and Adaptable Architecture. ICASSP 2024: 5155-5159 - [c231]Zhongkai Tong, Ziyuan Zhu, Zhangyu Sha, Yuxin Liu, Dan Meng:
Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning. ICIC (LNAI 1) 2024: 62-74 - [c230]Haolai Wei, Liwei Chen, Zhijie Zhang, Gang Shi, Dan Meng:
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. ISSTA 2024: 730-742 - [c229]Zhijie Zhang, Liwei Chen, Haolai Wei, Gang Shi, Dan Meng:
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization. ISSTA 2024: 1351-1363 - [i28]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i27]Hanlei Jin, Yang Zhang, Dan Meng, Jun Wang, Jinghua Tan:
A Comprehensive Survey on Process-Oriented Automatic Text Summarization with Exploration of LLM-Based Methods. CoRR abs/2403.02901 (2024) - [i26]Chaochao Chen, Yizhao Zhang, Yuyuan Li, Dan Meng, Jun Wang, Xiaoli Zheng, Jianwei Yin:
Post-Training Attribute Unlearning in Recommender Systems. CoRR abs/2403.06737 (2024) - [i25]Shengyu Fan, Xianglong Deng, Zhuoyu Tian, Zhicheng Hu, Liang Chang, Rui Hou, Dan Meng, Mingzhe Zhang:
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption. CoRR abs/2403.10188 (2024) - [i24]Fanyi Wang, Peng Liu, Haotian Hu, Dan Meng, Jingwen Su, Jinjin Xu, Yanhao Zhang, Xiaoming Ren, Zhiwang Zhang:
LoopAnimate: Loopable Salient Object Animation. CoRR abs/2404.09172 (2024) - [i23]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - 2023
- [j69]Wenchao Cui, Dan Meng, Ke Lu, Yirong Wu, Zhihong Pan, Xiaolong Li, Shuifa Sun:
Automatic segmentation of ultrasound images using SegNet and local Nakagami distribution fitting model. Biomed. Signal Process. Control. 81: 104431 (2023) - [j68]Bin Liu, Xiaomei Yang, Zhihua Wang, Yaxin Ding, Junyao Zhang, Dan Meng:
A Comparison of Six Forest Mapping Products in Southeast Asia, Aided by Field Validation Data. Remote. Sens. 15(18): 4584 (2023) - [j67]Xiaoliang Liu, Yueming Liu, Zhihua Wang, Xiaomei Yang, Xiaowei Zeng, Dan Meng:
Comprehensive Assessment of Vulnerability to Storm Surges in Coastal China: Towards a Prefecture-Level Cities Perspective. Remote. Sens. 15(19): 4828 (2023) - [j66]Yougui Ren, Xiaomei Yang, Zhihua Wang, Ge Yu, Yueming Liu, Xiaoliang Liu, Dan Meng, Qingyang Zhang, Guo Yu:
Segment Anything Model (SAM) Assisted Remote Sensing Supervision for Mariculture - Using Liaoning Province, China as an Example. Remote. Sens. 15(24): 5781 (2023) - [j65]Guang Wang, Ziyuan Zhu, Xu Cheng, Dan Meng:
A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors. IEEE Trans. Computers 72(11): 3203-3217 (2023) - [j64]Fengkai Yuan, Kai Wang, Jiameng Ying, Rui Hou, Lutan Zhao, Peinan Li, Yifan Zhu, Zhenzhou Ji, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023) - [j63]Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j62]Dan Meng, Tongtong Qiao, Yao Ji, Renshuo Wang, Yue Zhang, Xiaoguang San, Quan Jin, Xiaolong Wang:
Hydrangea-Like In2O3@In2S3 n-n Heterostructures for High-Efficiency TMA Measurement. IEEE Trans. Instrum. Meas. 72: 1-9 (2023) - [j61]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Scalable Kernel $k$-Means With Randomized Sketching: From Theory to Algorithm. IEEE Trans. Knowl. Data Eng. 35(9): 9210-9224 (2023) - [j60]Zhiwei Wang, Peinan Li, Rui Hou, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c228]Yi Zhang, Dan Meng, Liping Zhang, Chao Kong:
DINE: Dynamic Information Network Embedding for Social Recommendation. WISA 2023: 76-87 - [c227]Xianlan Sun, Dan Meng, Xiangyun Gao, Liping Zhang, Chao Kong:
GENE: Global Enhanced Graph Neural Network Embedding for Session-Based Recommendation. WISA 2023: 173-184 - [c226]Ruicheng Niu, Ziyuan Zhu, Tao Leng, Chaofei Li, Yuxin Liu, Dan Meng:
Improving Adversarial Robustness via Channel and Depth Compatibility. ADMA (5) 2023: 137-149 - [c225]Xinyi Liu, Dan Meng:
The efficacy and safety of acupuncture assisted anesthesia (AAA) for postoperative pain of thoracoscopy: A systematic review and meta-analysis of randomized controlled trials. BIBM 2023: 4595-4602 - [c224]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy. CSCWD 2023: 29-34 - [c223]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling. CSCWD 2023: 1914-1919 - [c222]Yifan Zhu, Peinan Li, Lutan Zhao, Dan Meng, Rui Hou:
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. DAC 2023: 1-6 - [c221]Tongsai Jin, Zhihui Fu, Dan Meng, Jun Wang, Yue Qi, Guitao Cao:
FedPerturb: Covert Poisoning Attack on Federated Learning via Partial Perturbation. ECAI 2023: 1172-1179 - [c220]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934 - [c219]Dan Meng, Xue Wang, Jun Wang:
Backdoor Attack Against Automatic Speaker Verification Models in Federated Learning. ICASSP 2023: 1-5 - [c218]Zhiwei Wang, Peinan Li, Rui Hou, Dan Meng:
NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs. ICCD 2023: 357-365 - [c217]Ziwei Li, Yucan Zhou, Haihui Fan, Xiaoyan Gu, Bo Li, Dan Meng:
Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction. ICONIP (2) 2023: 561-572 - [c216]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture. ICPADS 2023: 340-347 - [c215]Mingkai Luo, Dan Meng, Jun Wang, Yu Fang, Jiangyong Ying:
FedLRS: A Communication-Efficient Federated Learning Framework With Low-Rank and Sparse Decomposition. ICPADS 2023: 2091-2099 - [c214]Yu-Jie Xiong, Yu-Fan Dai, Dan Meng:
Deep Frame-Point Sequence Consistent Network for Handwriting Trajectory Recovery. ICPADS 2023: 2151-2158 - [c213]Huozhu Wang, Ziyuan Zhu, Dan Meng:
Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors. ISCC 2023: 970-976 - [c212]Yuyuan Li, Chaochao Chen, Xiaolin Zheng, Yizhao Zhang, Zhongxuan Han, Dan Meng, Jun Wang:
Making Users Indistinguishable: Attribute-wise Unlearning in Recommender Systems. ACM Multimedia 2023: 984-994 - [c211]Weiming Liu, Xiaolin Zheng, Chaochao Chen, Mengling Hu, Xinting Liao, Fan Wang, Yanchao Tan, Dan Meng, Jun Wang:
Differentially Private Sparse Mapping for Privacy-Preserving Cross Domain Recommendation. ACM Multimedia 2023: 6243-6252 - [c210]Yuyuan Li, Chaochao Chen, Yizhao Zhang, Weiming Liu, Lingjuan Lyu, Xiaolin Zheng, Dan Meng, Jun Wang:
UltraRE: Enhancing RecEraser for Recommendation Unlearning via Error Decomposition. NeurIPS 2023 - [c209]Shuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng:
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark. SRDS 2023: 93-106 - [c208]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. TrustCom 2023: 1-9 - [c207]Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:
Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. TrustCom 2023: 920-928 - [c206]Yinglong Li, Dan Meng, Xinchen Xu, Tieming Chen, Yanjun Li, Ting Wang:
fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Using Fuzzy Decision for Edge VANETs. WoWMoM 2023: 175-184 - [i22]Yunhao Li, Zhen Xiao, Lin Yang, Dan Meng, Xin Zhou, Heng Fan, Libo Zhang:
AttMOT: Improving Multiple-Object Tracking by Introducing Auxiliary Pedestrian Attributes. CoRR abs/2308.07537 (2023) - [i21]Yuyuan Li, Chaochao Chen, Xiaolin Zheng, Yizhao Zhang, Zhongxuan Han, Dan Meng, Jun Wang:
Making Users Indistinguishable: Attribute-wise Unlearning in Recommender Systems. CoRR abs/2310.05847 (2023) - 2022
- [j59]Ruipeng Yang, Aimin Yu, Lijun Cai, Dan Meng:
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. Cybersecur. 5(1): 29 (2022) - [j58]Xiaoliang Liu, Zhihua Wang, Xiaomei Yang, Yueming Liu, Bin Liu, Junyao Zhang, Ku Gao, Dan Meng, Yaxin Ding:
Mapping China's offshore mariculture based on dense time-series optical and radar data. Int. J. Digit. Earth 15(1): 1326-1349 (2022) - [j57]Dongmei Wei, Dan Meng, Yuan Rong, Yi Liu, Harish Garg, Dragan Pamucar:
Fermatean Fuzzy Schweizer-Sklar Operators and BWM-Entropy-Based Combined Compromise Solution Approach: An Application to Green Supplier Selection. Entropy 24(6): 776 (2022) - [j56]Xin Yang, Yujie Li, Dan Meng, Yuxuan Yang, Dun Liu, Tianrui Li:
Three-way multi-granularity learning towards open topic classification. Inf. Sci. 585: 41-57 (2022) - [j55]Jiameng Ying, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022) - [j54]Kai Wang, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022) - [j53]Ninghui Zhang, Haipeng Ye, Ji Zheng, Xuejing Leng, Dan Meng, Yu Li:
Long-Term Impacts of COVID-19 Lockdown on the NO2 Concentrations and Urban Thermal Environment: Evidence from the Five Largest Urban Agglomerations in China. Remote. Sens. 14(4): 921 (2022) - [j52]Xiaotong Guo, Dan Meng, Xuelong Chen, Xiaojuan Li:
Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China. Remote. Sens. 14(17): 4308 (2022) - [j51]Yaxin Ding, Xiaomei Yang, Zhihua Wang, Dongjie Fu, He Li, Dan Meng, Xiaowei Zeng, Junyao Zhang:
A Field-Data-Aided Comparison of Three 10 m Land Cover Products in Southeast Asia. Remote. Sens. 14(19): 5053 (2022) - [c205]Yi Zhang, Zhi Deng, Dan Meng, Liang Zhou, Mengfei Li, Qijie Liu, Chao Kong:
Temporal Knowledge Graph Embedding for Link Prediction. WISA 2022: 3-14 - [c204]Zhiyuan Ma, Dan Meng, Chao Kong, Liang Zhou, Mengfei Li, Wan Tao:
Coreference Resolution with Syntax and Semantics. WISA 2022: 181-193 - [c203]Rong Yin, Yong Liu, Dan Meng:
Distributed Randomized Sketching Kernel Learning. AAAI 2022: 8883-8891 - [c202]Chao Kong, Dan Meng, Tao Liu, Mengfei Li, Qijie Liu, Liang Zhou, Pingfu Chao, Yi Zhang:
SAME: Sampling Attack in Multiplex Network Embedding. ADMA (2) 2022: 337-351 - [c201]Peinan Li, Rui Hou, Lutan Zhao, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552 - [c200]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359 - [c199]Dan Meng, Yonghang Yan, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen:
A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet. ICACT 2022: 101-105 - [c198]Zhijia Li, Yonghang Yan, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen:
A Survey of Coverage Issues in UAV networks. ICACT 2022: 185-190 - [c197]Xuewen Xia, Yonghang Yan, Zhijia Li, Dan Meng, Lun Xia, Chen Chen:
A Survey of UAV Clustering Algorithm. ICACT 2022: 191-196 - [c196]Lun Xia, Yonghang Yan, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen:
An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model. ICACT 2022: 201-206 - [c195]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analysis of DRAM Vulnerability Using Computation Tree Logic. ICC 2022: 986-991 - [c194]Guang Wang, Ziyuan Zhu, Xu Cheng, Dan Meng:
In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm. ICCD 2022: 463-470 - [c193]Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. MILCOM 2022: 292-297 - [c192]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Randomized Sketches for Clustering: Fast and Optimal Kernel $k$-Means. NeurIPS 2022 - [c191]Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. SecureComm 2022: 510-528 - [c190]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c189]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71 - [c188]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [c187]Dan Meng, Zhihui Fu, Chao Kong, Yue Qi, Guitao Cao:
t-PSI: Efficient Multi-party Private Set Intersection with Threshold. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 8-15 - [c186]Dan Meng, Zhihui Fu, Chao Kong, Yue Qi, Guitao Cao:
When Adversarial Example Attacks Meet Vertical Federated Learning. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1016-1021 - [i20]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations. CoRR abs/2208.14062 (2022) - [i19]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - [i18]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022) - 2021
- [j50]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [j49]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021) - [j48]Yu Li, Haipeng Ye, Xing Gao, Dongqi Sun, Zehong Li, Ninghui Zhang, Xuejing Leng, Dan Meng, Ji Zheng:
Spatiotemporal Patterns of Urbanization in the Three Most Developed Urban Agglomerations in China Based on Continuous Nighttime Light Data (2000-2018). Remote. Sens. 13(12): 2245 (2021) - [j47]Haipeng Ye, Zehong Li, Ninghui Zhang, Xuejing Leng, Dan Meng, Ji Zheng, Yu Li:
Variations in the Effects of Landscape Patterns on the Urban Thermal Environment during Rapid Urbanization (1990-2020) in Megacities. Remote. Sens. 13(17): 3415 (2021) - [j46]Yaxin Ding, Xiaomei Yang, Hailiang Jin, Zhihua Wang, Yueming Liu, Bin Liu, Junyao Zhang, Xiaoliang Liu, Ku Gao, Dan Meng:
Monitoring Coastline Changes of the Malay Islands Based on Google Earth Engine and Dense Time-Series Remote Sensing Images. Remote. Sens. 13(19): 3842 (2021) - [j45]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Peng Liu, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j44]Kai Wang, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021) - [c185]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168 - [c184]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272 - [c183]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c182]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability. HPCC/DSS/SmartCity/DependSys 2021: 1075-1083 - [c181]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance. ICA3PP (3) 2021: 196-213 - [c180]Guang Wang, Ziyuan Zhu, Shuan Li, Xu Cheng, Dan Meng:
Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm. ICCD 2021: 196-203 - [c179]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c178]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c177]Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
Towards Open World Traffic Classification. ICICS (1) 2021: 331-347 - [c176]Xiaoshuai Hao, Yucan Zhou, Dayan Wu, Wanqian Zhang, Bo Li, Weiping Wang, Dan Meng:
What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval. ICME 2021: 1-6 - [c175]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Distributed Nyström Kernel Learning with Communications. ICML 2021: 12019-12028 - [c174]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - [c173]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Automatic CNN Compression Based on Hyper-parameter Learning. IJCNN 2021: 1-8 - [c172]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Fast CNN Inference by Adaptive Sparse Matrix Decomposition. IJCNN 2021: 1-8 - [c171]Nannan Tian, Yong Liu, Weiping Wang, Dan Meng:
Energy-saving CNN with Clustering Channel Pruning. IJCNN 2021: 1-8 - [c170]Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng:
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. IJCNN 2021: 1-10 - [c169]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - [c168]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. MSN 2021: 502-511 - [c167]Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. SecureComm (1) 2021: 3-24 - [c166]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
FCEP: A Fast Concolic Execution for Reaching Software Patches. SEKE 2021: 510-515 - [c165]Wanqian Zhang, Dayan Wu, Yu Zhou, Bo Li, Weiping Wang, Dan Meng:
Binary Neural Network Hashing for Image Retrieval. SIGIR 2021: 317-326 - [c164]Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. TrustCom 2021: 1132-1140 - [i17]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. CoRR abs/2104.09806 (2021) - 2020
- [j43]Xingxing He, Yingfang Li, Keyun Qin, Dan Meng:
Distance measures on intuitionistic fuzzy sets based on intuitionistic fuzzy dissimilarity functions. Soft Comput. 24(1): 523-541 (2020) - [j42]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [j41]Jinfeng Li, Liwei Chen, Gang Shi, Kai Chen, Dan Meng:
ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3165-3176 (2020) - [j40]Jinfeng Li, Qizhen Xu, Yongyue Li, Liwei Chen, Gang Shi, Dan Meng:
Efficient Return Address Verification Based on Dislocated Stack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3398-3407 (2020) - [j39]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory. IEEE Trans. Neural Networks Learn. Syst. 31(9): 3512-3524 (2020) - [j38]Jiang Zhou, Yong Chen, Weiping Wang, Shuibing He, Dan Meng:
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 31(2): 374-392 (2020) - [c163]Rong Yin, Yong Liu, Lijing Lu, Weiping Wang, Dan Meng:
Divide-and-Conquer Learning with Nyström: Optimal Rate and Algorithm. AAAI 2020: 6696-6703 - [c162]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c161]Limin Wang, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Analyzing The Security of The Cache Side Channel Defences With Attack Graphs. ASP-DAC 2020: 50-55 - [c160]Xingbin Wang, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c159]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164 - [c158]Xingbin Wang, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197 - [c157]Kai Wang, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413 - [c156]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. ESORICS (1) 2020: 338-358 - [c155]Dan Meng, Hongyu Li, Fan Zhu, Xiaolin Li:
FedMONN: Meta Operation Neural Network for Secure Federated Aggregation. HPCC/DSS/SmartCity 2020: 579-584 - [c154]Hongyu Li, Dan Meng, Hong Wang, Xiaolin Li:
Knowledge Federation: A Unified and Hierarchical Privacy-Preserving AI Framework. ICKG 2020: 84-91 - [c153]Zhuo Wang, Chaokun Wang, Weiping Wang, Xiaoyan Gu, Bo Li, Dan Meng:
Adaptive Relation Discovery from Focusing Seeds on Large Networks. ICDE 2020: 217-228 - [c152]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm. ICDM 2020: 1376-1381 - [c151]Wenyan An, Liwei Chen, Jinxin Wang, Gewangzi Du, Gang Shi, Dan Meng:
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. ISPA/BDCloud/SocialCom/SustainCom 2020: 337-344 - [c150]Wanqian Zhang, Dayan Wu, Yu Zhou, Bo Li, Weiping Wang, Dan Meng:
Deep Unsupervised Hybrid-similarity Hadamard Hashing. ACM Multimedia 2020: 3274-3282 - [c149]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033 - [c148]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c147]Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. TrustCom 2020: 194-201 - [c146]Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. TrustCom 2020: 293-300 - [c145]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c144]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687 - [i16]Hongyu Li, Dan Meng, Xiaolin Li:
Knowledge Federation: Hierarchy and Unification. CoRR abs/2002.01647 (2020) - [i15]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020) - [i14]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j37]Limin Wang, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Colored Petri Net Based Cache Side Channel Vulnerability Evaluation. IEEE Access 7: 169825-169843 (2019) - [j36]Yingfang Li, Xingxing He, Keyun Qin, Dan Meng:
Some notes on optimal fuzzy reasoning methods. Inf. Sci. 503: 652-669 (2019) - [j35]Jun Zhang, Rui Hou, Wei Song, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019) - [c143]Zhuo Wang, Weiping Wang, Chaokun Wang, Xiaoyan Gu, Bo Li, Dan Meng:
Community Focusing: Yet Another Query-Dependent Community Detection. AAAI 2019: 329-337 - [c142]Wanqian Zhang, Dayan Wu, Jing Liu, Bo Li, Xiaoyan Gu, Weiping Wang, Dan Meng:
Fast and Multilevel Semantic-Preserving Discrete Hashing. BMVC 2019: 157 - [c141]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c140]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c139]Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - [c138]Yanfu Xu, Zheng Lin, Yuanxin Liu, Rui Liu, Weiping Wang, Dan Meng:
Ranking and Sampling in Open-Domain Question Answering. EMNLP/IJCNLP (1) 2019: 2412-2421 - [c137]Peinan Li, Lutan Zhao, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276 - [c136]Ningning Cai, Can Ma, Weiping Wang, Dan Meng:
Effective Self Attention Modeling for Aspect Based Sentiment Analysis. ICCS (5) 2019: 3-14 - [c135]Jingzi Gu, Jinchao Zhang, Zheng Lin, Bo Li, Weiping Wang, Dan Meng:
Asymmetric Deep Cross-modal Hashing. ICCS (5) 2019: 41-54 - [c134]Fang Li, Chao Yan, Ziyuan Zhu, Dan Meng:
A Deep Malware Detection Method Based on General-Purpose Register Features. ICCS (3) 2019: 221-235 - [c133]Yao Xiao, Dan Meng, Cewu Lu, Chi-Keung Tang:
Template-Instance Loss for Offline Handwritten Chinese Character Recognition. ICDAR 2019: 315-322 - [c132]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. ICICS 2019: 3-17 - [c131]Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. ICICS 2019: 165-180 - [c130]Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. ICICS 2019: 181-196 - [c129]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. ICICS 2019: 341-356 - [c128]Jiarong Wang, Lijun Cai, Aimin Yu, Dan Meng:
Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection. ICTAI 2019: 947-954 - [c127]Fang Li, Jinrong Han, Ziyuan Zhu, Dan Meng:
Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features. IJCNN 2019: 1-8 - [c126]Rongqin Liu, Jiahao Hu, Lanxin Xiang, Dan Meng:
Research on Method of Venture Capital Guide Fund Selects Sub-fund under Hybrid Multi-attribute Group Decision-making. ISKE 2019: 279-284 - [c125]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels. ISPA/BDCloud/SocialCom/SustainCom 2019: 614-621 - [c124]Jingjing Xu, Aimin Yu, Lijun Cai, Dan Meng:
MMNR: A Network Representation Framework Based on Multi-View Motif Fusion. ISPA/BDCloud/SocialCom/SustainCom 2019: 792-801 - [c123]Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:
Building Trust in Container Environment. TrustCom/BigDataSE 2019: 1-9 - [i13]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. CoRR abs/1902.00888 (2019) - [i12]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - [i11]Yao Xiao, Dan Meng, Cewu Lu, Chi-Keung Tang:
Template-Instance Loss for Offline Handwritten Chinese Character Recognition. CoRR abs/1910.05545 (2019) - [i10]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels. CoRR abs/1910.12021 (2019) - 2018
- [j34]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j33]Fengjun Xiao, Mingming Lu, Ying Zhao, Soumia Menasria, Dan Meng, Shangsheng Xie, Juncai Li, Chengzhi Li:
An information-aware visualization for privacy-preserving accelerometer data sharing. Hum. centric Comput. Inf. Sci. 8: 13 (2018) - [j32]Boyan Zhao, Rui Hou, Jianbo Dong, Michael C. Huang, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM Trans. Comput. Syst. 36(1): 2:1-2:26 (2018) - [c122]Peng Fu, Zheng Lin, Fengcheng Yuan, Weiping Wang, Dan Meng:
Learning Sentiment-Specific Word Embedding via Global Sentiment Representation. AAAI 2018: 4808-4815 - [c121]Jun Zhang, Rui Hou, Wei Song, Zhiyuan Zhan, Boyan Zhao, Mingyu Chen, Dan Meng:
Stateful Forward-Edge CFI Enforcement with Intel MPX. ACA 2018: 79-94 - [c120]Guang Yang, Lijun Cai, Aimin Yu, Jiangang Ma, Dan Meng, Yu Wu:
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model. BigDataService 2018: 9-16 - [c119]Dan Meng:
SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. CCS 2018: 2177 - [c118]Jinchao Zhang, Jingzi Gu, Shuai Cheng, Bo Li, Weiping Wang, Dan Meng:
Efficient Algorithms of Parallel Skyline Join over Data Streams. ICA3PP (1) 2018: 184-199 - [c117]Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. TrustCom/BigDataSE 2018: 360-371 - [c116]Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. TrustCom/BigDataSE 2018: 763-773 - 2017
- [j31]Dan Meng, Libo Zhang, Guitao Cao, Wenming Cao, Guixu Zhang, Bing Hu:
Liver Fibrosis Classification Based on Transfer Learning and FCNet for Ultrasound Images. IEEE Access 5: 5804-5810 (2017) - [j30]Xingxing He, Yingfang Li, Keyun Qin, Dan Meng:
On the TL-transitivity of fuzzy similarity measures. Fuzzy Sets Syst. 322: 54-69 (2017) - [j29]Yingfang Li, Xingxing He, Keyun Qin, Dan Meng:
Three constructive methods for the definition of interval-valued fuzzy equivalencies. Fuzzy Sets Syst. 322: 70-85 (2017) - [j28]Xingxing He, Yingfang Li, Keyun Qin, Dan Meng:
On the characterizations of fuzzy XNOR connectives. J. Intell. Fuzzy Syst. 32(3): 2733-2745 (2017) - [j27]Zhiyong Chen, Wei Zhang, Bin Hu, Xiaochun Cao, Si Liu, Dan Meng:
Retrieving Objects by Partitioning. IEEE Trans. Big Data 3(1): 44-54 (2017) - [j26]Xiaoping Fan, Yanni Peng, Ying Zhao, Yong Li, Dan Meng, Zengsheng Zhong, Fangfang Zhou, Mingming Lu:
A personal visual analytics on smartphone usage data. J. Vis. Lang. Comput. 41: 111-120 (2017) - [c115]Mingming Lu, Yihan Guo, Dan Meng, Cuncai Li, Yin Zhao:
An Information-Aware Privacy-Preserving Accelerometer Data Sharing. ICPCSEE (1) 2017: 425-432 - [c114]Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. IPCCC 2017: 1-9 - [c113]Yanliang Chen, Minghua Zhu, Bo Xiao, Dan Meng:
FPGA-Accelerated for Constrained High Dispersal Network. ISPA/IUCC 2017: 840-845 - [c112]Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng:
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. SEC 2017: 568-584 - [c111]Min Zhu, Bibo Tu, Wei Wei, Dan Meng:
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM. VEE 2017: 242-256 - 2016
- [j25]Yingfang Li, Keyun Qin, Xingxing He, Dan Meng:
Properties of Raha's similarity-based approximate reasoning method. Fuzzy Sets Syst. 294: 48-62 (2016) - [j24]Yingfang Li, Keyun Qin, Xingxing He, Dan Meng:
Robustness of fuzzy connectives and fuzzy reasoning with respect to general divergence measures. Fuzzy Sets Syst. 294: 63-78 (2016) - [j23]Zheng Lin, Xiaolong Jin, Xueke Xu, Yuanzhuo Wang, Xueqi Cheng, Weiping Wang, Dan Meng:
An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification. IEEE ACM Trans. Audio Speech Lang. Process. 24(3): 432-444 (2016) - [j22]Xiaochun Cao, Ling Du, Xingxing Wei, Dan Meng, Xiaojie Guo:
High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation. IEEE Trans. Cybern. 46(5): 1132-1143 (2016) - [c110]Mingming Lu, Dan Meng, Yanni Peng, Yong Li, Ying Zhao, Xiaoping Fan, Fangfang Zhou:
A visual analytics approach for exploring individual behaviors in smartphone usage data. PacificVis 2016: 224-228 - [c109]Peng Fu, Zheng Lin, Hailun Lin, Fengcheng Yuan, Weiping Wang, Dan Meng:
Quantifying the Effect of Sentiment on Topic Evolution in Chinese Microblog. APWeb (1) 2016: 531-542 - [c108]Kun Wang, Guitao Cao, Dan Meng, Weiting Chen, Wenming Cao:
Automatic fall detection of human in video using combination of features. BIBM 2016: 1228-1233 - [c107]Dan Meng, Guitao Cao, Xinyu Song, Weiting Chen, Wenming Cao:
Automated human physical function measurement using constrained high dispersal network with SVM-linear. BIBM 2016: 1520-1526 - [c106]Dan Meng, Guitao Cao, Zhihai He, Wenming Cao:
Facial expression recognition based on LLENet. BIBM 2016: 1915-1917 - [c105]Dan Meng, Guitao Cao, Ye Duan, Minghua Zhu, Liping Tu, Jiatuo Xu, Dong Xu:
A deep tongue image features analysis model for medical application. BIBM 2016: 1918-1922 - [c104]Jinchao Zhang, Zheng Lin, Bo Li, Weiping Wang, Dan Meng:
Skyline Join Query Processing over Multiple Relations. DASFAA Workshops 2016: 353-361 - [c103]Yun Gao, Wei Zhou, Jizhong Han, Dan Meng:
Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution. HPCC/SmartCity/DSS 2016: 102-109 - [c102]Xianyi Zheng, Yanhong He, Jiangang Ma, Gang Shi, Dan Meng:
TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment. HPCC/SmartCity/DSS 2016: 663-670 - [c101]Siyao Yang, Dan Meng, Xiaojuan Li:
Drought assessment in Beijing-Tianjin-Hebei region in China in recent ten years. IGARSS 2016: 4458-4461 - [c100]Xianyi Zheng, Lulu Yang, Jiangang Ma, Gang Shi, Dan Meng:
TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms. ISCC 2016: 456-462 - [c99]Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. Trustcom/BigDataSE/ISPA 2016: 194-200 - [c98]Liang Wang, Weiping Wang, Jingzi Gu, Dan Meng:
Delta-Generalization: High Accuracy Data Release for Privacy Preserving. Trustcom/BigDataSE/ISPA 2016: 1861-1866 - [c97]Xianyi Zheng, Lulu Yang, Gang Shi, Dan Meng:
Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms. Trustcom/BigDataSE/ISPA 2016: 1944-1950 - 2015
- [j21]Yingfang Li, Keyun Qin, Xingxing He, Dan Meng:
Similarity measures of interval-valued fuzzy sets. J. Intell. Fuzzy Syst. 28(5): 2113-2125 (2015) - [j20]Buyun Qu, Zhibin Zhang, Xingquan Zhu, Dan Meng:
An empirical study of morphing on behavior-based network traffic classification. Secur. Commun. Networks 8(1): 68-79 (2015) - [j19]Liang Yang, Xiaochun Cao, Di Jin, Xiao Wang, Dan Meng:
A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization. IEEE Trans. Cybern. 45(11): 2585-2598 (2015) - [j18]Xiaochun Cao, Hua Zhang, Xiaojie Guo, Si Liu, Dan Meng:
SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation. IEEE Trans. Image Process. 24(9): 2746-2759 (2015) - [j17]Youwei Wang, Can Ma, Weiping Wang, Dan Meng:
An approach of fast data manipulation in HDFS with supplementary mechanisms. J. Supercomput. 71(5): 1736-1753 (2015) - [c96]Zhenyan Liu, Dan Meng, Weiping Wang, Chunxia Zhang:
A Supervised Parameter Estimation Method of LDA. APWeb 2015: 401-410 - [c95]Yun Gao, Wei Zhou, Jizhong Han, Dan Meng, Zhang Zhang, Zhiyong Xu:
An evaluation and analysis of graph processing frameworks on five key issues. Conf. Computing Frontiers 2015: 11:1-11:8 - [c94]Ying Kang, Xiaoyan Gu, Weiping Wang, Dan Meng:
Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks. CIKM 2015: 33-42 - [c93]Chaoyong Li, Gong Cheng, Jinwen Zhong, Can Ma, Weiping Wang, Dan Meng, Qing Wang, Bo Wang:
Lotus: A framework for query optimization based on distributed cache. FSKD 2015: 1189-1196 - [c92]Debin Jia, Zhengwei Liu, Xiaoyan Gu, Bo Li, Jingzi Gu, Weiping Wang, Dan Meng:
LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data. ICA3PP (2) 2015: 134-148 - [c91]Jinchao Zhang, Dong Zhang, Bo Yu, Bo Li, Weiping Wang, Dan Meng:
Skyline Query on Anti-correlated Distributions: From the Perspective of Spatial Index. ICA3PP (4) 2015: 386-401 - [c90]Jiang Zhou, Yong Chen, Weiping Wang, Dan Meng:
MAMS: A Highly Reliable Policy for Metadata Service. ICPP 2015: 729-738 - [c89]Danfei Shen, Guitao Cao, Dan Meng:
Lasso Screening for Object Categories Recognition Using Multi-directional Context Features. ISKE 2015: 434-441 - [c88]Jiang Zhou, Yong Chen, Xiaoyan Gu, Weiping Wang, Dan Meng:
A virtual shared metadata storage for HDFS. NAS 2015: 265-274 - [c87]Ying Kang, Bo Yu, Weiping Wang, Dan Meng:
Spectral Clustering for Large-Scale Social Networks via a Pre-Coarsening Sampling based NystrÖm Method. PAKDD (2) 2015: 106-118 - [c86]Ying Kang, Dong Zhang, Bo Yu, Xiaoyan Gu, Weiping Wang, Dan Meng:
Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method. WAIM 2015: 413-425 - [c85]Zheng Lin, Weiping Wang, Xiaolong Jin, Jiguang Liang, Dan Meng:
A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction. WWW (Companion Volume) 2015: 67-68 - 2014
- [j16]Dan Meng, Zheng Pei:
Dynamic adaptive learning algorithm based on two-fuzzy neural-networks. Neurocomputing 125: 88-94 (2014) - [j15]Yu Wen, Weiping Wang, Li Guo, Dan Meng:
Automated Power Control for Virtualized Infrastructures. J. Comput. Sci. Technol. 29(6): 1111-1122 (2014) - [c84]Jia Cui, Dan Meng, Zhong-Tao Chen:
Leveraging Deletion Neighborhoods and Trie for Efficient String Similarity Search and Join. AIRS 2014: 1-13 - [c83]Jia Cui, Weiping Wang, Dan Meng, Zhenyan Liu:
Continuous similarity join on data streams. ICPADS 2014: 552-559 - [c82]Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng:
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. INTRUST 2014: 328-345 - [c81]Yun Gao, Wei Zhou, Zhang Zhang, Jizhong Han, Dan Meng, Zhiyong Xu:
Online Anomaly Detection by Improved Grammar Compression of Log Sequences. SDM 2014: 911-919 - 2013
- [j14]Xiaodong Pan, Dan Meng, Yang Xu:
Syntax theory of finite lattice-valued propositional logic. Sci. China Inf. Sci. 56(8): 1-12 (2013) - [j13]Keyun Qin, Dan Meng, Zheng Pei, Yang Xu:
Combination of interval set and soft set. Int. J. Comput. Intell. Syst. 6(2): 370-380 (2013) - [j12]Dan Meng, Zheng Pei:
On weighted unbalanced linguistic aggregation operators in group decision making. Inf. Sci. 223: 31-41 (2013) - [j11]Zheng Pei, Da Ruan, Dan Meng, Zhicai Liu:
Formal concept analysis based on the topology for attributes of a formal context. Inf. Sci. 236: 66-82 (2013) - [j10]Fang-Fang Guo, Li-Ping Pang, Dan Meng, Zun-Quan Xia:
An algorithm for solving optimization problems with fuzzy relational inequality constraints. Inf. Sci. 252: 20-31 (2013) - [j9]Jiang Zhou, Can Ma, Jin Xiong, Weiping Wang, Dan Meng:
Highly reliable message-passing mechanism for cluster file system. Int. J. Parallel Emergent Distributed Syst. 28(6): 556-575 (2013) - [c80]Zhang Zhang, Jizhong Han, Bo Li, Wei Zhou, Dan Meng:
Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds. CSC 2013: 84-91 - [c79]Youwei Wang, Weiping Wang, Can Ma, Dan Meng:
Zput: A speedy data uploading approach for the Hadoop Distributed File System. CLUSTER 2013: 1-5 - [c78]Jiang Zhou, Jing Guo, Weiping Wang, Cuilan Du, Xiaoyan Gu, Dan Meng:
OAMS: A Highly Reliable Metadata Service for Big Data Storage. CSE 2013: 1287-1294 - [c77]Youwei Wang, Ge Fu, Weiping Wang, Xinran Liu, Can Ma, Dan Meng:
Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster. CSE 2013: 1295-1302 - [c76]Bo Li, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng:
DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data. CSE 2013: 1303-1309 - [c75]Qing Li, Yong Li, Bibo Tu, Dan Meng:
An Adaptive Resource Sharing Platform for Internet Data Center. HPCC/EUC 2013: 1179-1186 - [c74]Wenbin Li, Yonghua Sun, Dan Meng, Xiaojuan Li:
Analysis of Beijing's urban heat-island under the influence of extrme heat based on HJ-1B data. IGARSS 2013: 3845-3848 - [c73]Yiting Qu, Dan Meng, Zheng Chen:
Influence of urbanization process on urban thermal environment in Beijing. IGARSS 2013: 3868-3871 - [c72]Mingyu Wang, Yonghua Sun, Dan Meng, Xiaojuan Li:
The dynamic change of the urban thermal environment landscape patterns in Beijing from 2003 to 2011. IGARSS 2013: 4245-4248 - 2012
- [j8]Xiaodong Pan, Dan Meng:
Triangular norm based graded convex fuzzy sets. Fuzzy Sets Syst. 209: 1-13 (2012) - [j7]Dan Meng, Zheng Pei:
Extracting linguistic rules from data sets using fuzzy logic and genetic algorithms. Neurocomputing 78(1): 48-54 (2012) - [c71]Buyun Qu, Zhibin Zhang, Le Guo, Xingquan Zhu, Li Guo, Dan Meng:
An empirical study of morphing on network traffic classification. CHINACOM 2012: 227-232 - [c70]Youwei Wang, Jiang Zhou, Can Ma, Weiping Wang, Dan Meng, Jason Kei:
Clover: A Distributed File System of Expandable Metadata Service Derived from HDFS. CLUSTER 2012: 126-134 - [c69]Dan Meng, Huili Gong, Xiaojuan Li, Demin Zhou:
Trends in temperature and extreme temperature over the Beijing-Tianjin-Hebei Metropolitan Region During 1957-2009. Geoinformatics 2012: 1-6 - [c68]Yanrong Zhao, Weiping Wang, Dan Meng, Xiufeng Yang, Shubin Zhang, Jun Li, Gang Guan:
A data locality optimization algorithm for large-scale data processing in Hadoop. ISCC 2012: 655-661 - [c67]Qingqing Feng, Jizhong Han, Yun Gao, Dan Meng:
Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing. NAS 2012: 89-93 - [c66]Xiaoyan Gu, Xiufeng Yang, Weiping Wang, Yan Jin, Dan Meng:
CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing. NAS 2012: 94-98 - [c65]Yanrong Zhao, Ruan Yuan, Weiping Wang, Dan Meng, Shubin Zhang, Jun Li:
A Hardware-Based TCP Stream State Tracking and Reassembly Solution for 10G Backbone Traffic. NAS 2012: 154-163 - [c64]Yanrong Zhao, Weiping Wang, Dan Meng, YongChun Lv, Shubin Zhang, Jun Li:
TDWS: A Job Scheduling Algorithm Based on MapReduce. NAS 2012: 313-319 - [c63]Buyun Qu, Zhibin Zhang, Li Guo, Dan Meng:
On Accuracy of Early Traffic Classification. NAS 2012: 348-354 - 2011
- [j6]Dan Meng, Xiaohong Zhang, Keyun Qin:
Soft rough fuzzy sets and soft fuzzy rough sets. Comput. Math. Appl. 62(12): 4635-4645 (2011) - [j5]Xu Liu, Jianfeng Zhan, Kunlin Zhan, Weisong Shi, Lin Yuan, Dan Meng, Lei Wang:
Automatic performance debugging of SPMD-style parallel programs. J. Parallel Distributed Comput. 71(7): 925-937 (2011) - [c62]Peng Wang, Dan Meng, Zhaoxia Han, Xu Liu:
Towards quantitative analysis of data intensive computing: a case study of Hadoop. ICAC 2011: 193-194 - [c61]Guanhua Tian, Dan Meng:
Implications of Recovery Schemes for Virtualization Platform. ICPP Workshops 2011: 176-183 - [c60]Jiang Zhou, Can Ma, Jin Xiong, Dan Meng:
HR-NET: A Highly Reliable Message-Passing Mechanism for Cluster File System. NAS 2011: 364-371 - [c59]Yu Wang, Jing Xing, Jin Xiong, Dan Meng:
A Load-Aware Data Placement Policy on Cluster File System. NPC 2011: 17-31 - [c58]Linping Wu, Hongbing Luo, Jianfeng Zhan, Dan Meng:
A Runtime Fault Detection Method for HPC Cluster. PDCAT 2011: 68-72 - [i9]Xu Liu, Jianfeng Zhan, Kunlin Zhan, Weisong Shi, Lin Yuan, Dan Meng, Lei Wang:
Automatic Performance Debugging of SPMD-style Parallel Programs. CoRR abs/1103.6087 (2011) - 2010
- [j4]Peng Wang, Dan Meng, Jizhong Han, Jianfeng Zhan, Bibo Tu, Xiaofeng Shi, Le Wan:
Transformer: A New Paradigm for Building Data-Parallel Programming Models. IEEE Micro 30(4): 55-64 (2010) - [c57]Xiang Zhang, Zhigang Huo, Jie Ma, Dan Meng:
Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration. CLUSTER 2010: 88-96 - [c56]Bo Li, Zhigang Huo, Panyong Zhang, Dan Meng:
Virtualizing Modern High-Speed Interconnection Networks with Performance and Scalability. CLUSTER 2010: 107-115 - [c55]Zhuan Chen, Jin Xiong, Dan Meng:
Replication-Based Highly Available Metadata Management for Cluster File Systems. CLUSTER 2010: 292-301 - [c54]Guanhua Tian, Dan Meng:
Coordinated Selective Rejuvenation for Distributed Services. ICPADS 2010: 389-396 - [c53]Dan Meng, Huili Gong, Xiaojuan Li, Wenji Zhao, Yanfang Li:
Impervious surface coverage and their impact on other components of the urban ecosystem in Beijing. IGARSS 2010: 2731-2734 - [c52]Guanhua Tian, Dan Meng, Yong Li:
Request Path Driven Model for Performance Fault Diagnoses. ISPA 2010: 298-305 - [c51]Guanhua Tian, Dan Meng:
Failure Rules Based Node Resource Provision Policy for Cloud Computing. ISPA 2010: 397-404 - [c50]Wei Zhou, Jianfeng Zhan, Dan Meng, Zhihong Zhang:
Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems. NPC 2010: 262-276 - [c49]Guanhua Tian, Jianfeng Zhan, Chao Ren, Dan Meng:
A Case Study for SOA System Rejuvenation. PDPTA 2010: 97-103 - [i8]Xu Liu, Lin Yuan, Jianfeng Zhan, Bibo Tu, Dan Meng:
Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/1002.4264 (2010) - [i7]Wei Zhou, Jianfeng Zhan, Dan Meng, Dongyan Xu, Zhihong Zhang:
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems. CoRR abs/1003.0951 (2010) - [i6]Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes. CoRR abs/1003.0955 (2010) - [i5]Wei Zhou, Lei Wang, Dan Meng, Lin Yuan, Jianfeng Zhan:
Scalable Group Management in Large-Scale Virtualized Clusters. CoRR abs/1003.5794 (2010) - [i4]Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, Dongyan Xu, Yabing Huang, Dan Meng:
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes. CoRR abs/1007.4057 (2010)
2000 – 2009
- 2009
- [c48]Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun, Dan Meng:
A Highly Efficient Inter-domain Communication Channel. CIT (1) 2009: 369-374 - [c47]Can Ma, Zhigang Huo, Jingnan Cai, Dan Meng:
DCR: A fully transparent checkpoint/restart framework for distributed systems. CLUSTER 2009: 1-10 - [c46]Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise request tracing and performance debugging for multi-tier services of black boxes. DSN 2009: 337-346 - [c45]Bo Li, Zhigang Huo, Panyong Zhang, Dan Meng:
Multiple Virtual Lanes-aware MPI collective communication in multi-core clusters. HiPC 2009: 304-311 - [c44]Guangming Tan, Ziyu Guo, Mingyu Chen, Dan Meng:
Single-particle 3d reconstruction from cryo-electron microscopy images on GPU. ICS 2009: 380-389 - [c43]Dan Meng, Huili Gong, Xiaojuan Li, Wenji Zhao, Zhaoning Gong, Lin Zhu, Deyong Hu:
Study of Thermal Environment based on Remote Sensing in Beijing-capital Zone. IGARSS (3) 2009: 353-356 - [c42]Xiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng:
Solo: A Lightweight Virtual Machine. ISPA 2009: 129-136 - [c41]Panyong Zhang, Bo Li, Zhigang Huo, Dan Meng:
Evaluating the Effect of Huge Page on Large Scale Applications. NAS 2009: 74-81 - [c40]Dong Yang, Zhuan Chen, Rongfeng Tang, Jin Xiong, Dan Meng:
HMF: High-available Message-passing Framework for Cluster File System. NAS 2009: 249-252 - [c39]Bo Li, Panyong Zhang, Zhigang Huo, Dan Meng:
Early Experiences with Write-Write Design of NFS over RDMA. NAS 2009: 303-308 - [i3]Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng:
Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/0906.1326 (2009) - [i2]Wei Zhou, Jianfeng Zhan, Dan Meng:
Multidimensional Analysis of System Logs in Large-scale Cluster Systems. CoRR abs/0906.1328 (2009) - [i1]Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng:
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms. CoRR abs/0906.1346 (2009) - 2008
- [c38]Yi Liang, Zheng Zhang, Jianping Fan, Dan Meng:
PhoenixAccount: A Grid Accounting System for the Distributed Resource Sharing. GCC 2008: 519-524 - [c37]Dan Meng:
A Neural Network Model to Predict Initial Return of Chinese SMEs Stock Market Initial Public Offerings. ICNSC 2008: 394-398 - [c36]Panyong Zhang, Can Ma, Jie Ma, Qiang Li, Dan Meng:
HPPNET: A novel network for HPC and its implication for communication software. IPDPS 2008: 1-8 - [c35]Zhitong Su, Wei Song, Dan Meng, Jinhong Li:
A new associative classifier for text categorization. ISKE 2008: 291-295 - [c34]Xu Liu, Bibo Tu, Jianfeng Zhan, Dan Meng:
A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers. PDCAT 2008: 263-266 - [c33]Dan Meng, Yang Xu:
Credit Rating Method with Heterogeneous Information. RSKT 2008: 739-746 - 2007
- [j3]Ninghui Sun, Dan Meng:
Dawning4000A high performance computer. Frontiers Comput. Sci. China 1(1): 20-25 (2007) - [j2]Dan Meng, Vidhyasaharan Sethu, Eliathamby Ambikairajah, Linlin Ge:
A Novel Technique for Noise Reduction in InSAR Images. IEEE Geosci. Remote. Sens. Lett. 4(2): 226-230 (2007) - [c32]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c31]Yi Liang, Jianping Fan, Dan Meng, Ruihua Di:
A Strategy-Proof Combinatorial Auction-Based Grid Resource Allocation System. ICA3PP 2007: 254-266 - [c30]Dan Meng, Zhiqiang Zhang, Tao Yang, Huili Gong, Wenji Zhao, Xiaojuan Li, Zhaoning Gong, Yanhui Wang, Zhuowei Hu, Yonghua Sun:
Research on dynamic evolvement of desertification in beijing and its neighboring areas by remote sensing. IGARSS 2007: 699-701 - [c29]Chao Ren, Dan Meng, Danjun Liu, Jianfeng Zhan:
Theory of commercial application management system and its implementation - AMPS. Parallel and Distributed Computing and Networks 2007: 75-83 - [c28]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182 - 2006
- [c27]Jianfeng Zhan, Gengpu Liu, Lei Wang, Bibo Tu, Yi Jin, Yang Li, Yan Hao, Xuehai Hong, Dan Meng, Ninghui Sun:
PhoenixG: A Unified Management Framework for Industrial Information Grid. CCGRID 2006: 489-496 - [c26]Linping Wu, Dan Meng, Jianfeng Zhan, Lei Wang, Bibo Tu:
A Failure-Aware Scheduling Strategy in Large-Scale Cluster System. CCGRID 2006: 645-648 - [c25]Ying Jiang, Dan Meng, Chao Ren, Jianfeng Zhan:
An Integrated Adaptive Management System for Cluster-based Web Services. CLUSTER 2006 - [c24]Yuanxia You, Dan Meng, Gang Xue, Jie Ma:
Evaluation of the Device Driver Availability in Dawning4000A. GPC 2006: 308-313 - [c23]Linping Wu, Dan Meng, Wen Gao, Jianfeng Zhan:
A proactive fault-detection mechanism in large-scale cluster systems. IPDPS 2006 - [c22]Zhihong Zhang, Dan Meng, Jianfeng Zhan, Lei Wang, Linping Wu, Huang Wei:
Easy and reliable cluster management: the self-management experience of Fire Phoenix. IPDPS 2006 - [c21]Dan Meng, Xu Huang:
An Interactive Intelligent Search Engine Model Research Based on User Information Preference. JCIS 2006 - [c20]Linping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu:
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems. PDCAT 2006: 364-367 - 2005
- [c19]Ying Jiang, Dan Meng, Danjun Liu:
Spare Instance: an Adaptive Mechanism for Managing Cluster Applications. CLUSTER 2005: 1-2 - [c18]Ying Jiang, Dan Meng, Yi Liang, Danjun Liu, Jianfeng Zhan:
Adaptive Management of a Utility Computing. CLUSTER 2005: 1-2 - [c17]Jin Xiong, Rongfeng Tang, Sining Wu, Dan Meng, Ninghui Sun:
An Efficient Metadata Distribution Policy for Cluster File Systems. CLUSTER 2005: 1-10 - [c16]Ying-chao Zhou, Dan Meng, Xiao-cheng Zhou, Yao Chen:
Experience Of OS Optimization For Linpack On Dawning4000A. CLUSTER 2005: 1 - [c15]Dan Meng, Zaiqiang Zhang, Yang Xu:
A Case Retrieval Model Based on Factor-Structure Connection and lambda-Similarity in Fuzzy Case-Based Reasoning. FSKD (1) 2005: 175-178 - [c14]Taoying Liu, Zhiwei Xu, Ninghui Sun, Dan Meng:
Destructive Transaction: Human-Oriented Cluster System Management Mechanism. IPDPS 2005 - [c13]Rongfeng Tang, Jin Xiong, Jie Ma, Dan Meng:
A New Way to High Performance NFS for Clusters. PDCAT 2005: 51-55 - 2004
- [c12]Rongfeng Tang, Dan Meng, Jin Xiong:
SuperNBD: An Efficient Network Storage Software for Cluster. NPC 2004: 244-247 - 2003
- [c11]Jin Xiong, Sining Wu, Dan Meng, Ninghui Sun, Guojie Li:
Design and Performance of the Dawning Cluster File System. CLUSTER 2003: 232- - [c10]Rongfeng Tang, Dan Meng, Sining Wu:
Optimized Implementation of Extendible Hashing to Support Large File System Directory. CLUSTER 2003: 452-455 - [c9]Dan Meng, Xiaoping Qiu:
Resolution principle based on finite chain lattice-valued proposition logic FCLP(X). FUZZ-IEEE 2003: 61-66 - [c8]Xiaoping Qiu, Dan Meng, Yongchuan Tang, Yang Xu:
Multilayered fuzzy clustering method based on distance and density. SMC 2003: 1417-1422 - [c7]Dan Meng, Xuefang Wang, Yang Xu, Keyun Qin:
Resolution based on six lattice-valued proposition logic LP6(X). SMC 2003: 2489-2494 - [c6]Xuefang Wang, Dan Meng, Yang Xu, Keyun Qin:
Graded consequence relations of lattice-valued propositional logic LP(X). SMC 2003: 5004-5009 - 2002
- [c5]Qinghua Ye, Limin Xiao, Dan Meng, Wen Gao, Yi Liang, Ying Jiang:
AppManager: A Powerful Service-Based Application Management System for Clusters. ICPP Workshops 2002: 537-546 - [c4]Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu:
Semi-User-Level Communication Architecture. IPDPS 2002 - [c3]Dan Meng, Yang Xu:
alpha-Resolution Principle Based On An Intermediate Element Lattice-Valued Propositional Logic. JCIS 2002: 89-91 - [c2]Xiaoping Qiu, Yunchuan Tang, Dan Meng, Yang Xu:
A new fuzzy clustering method based on distance and density. SMC (2) 2002: 5 - 2001
- [j1]Jie Ma, Jin He, Dan Meng, Guojie Li:
BCL-3: A High Performance Basic Communication Protocol for Commodity Superserver DAWNING-3000. J. Comput. Sci. Technol. 16(6): 522-530 (2001) - [c1]Zhiwei Xu, Ninghui Sun, Dan Meng, Wei Li:
Cluster and Grid Superservers: The Dawning Experiences in China. CLUSTER 2001: 351-358
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint