


default search action
Dan Meng 0002
Person information
- affiliation: Chinese Academy of Sciences (CAS), Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), China
- affiliation: University of Chinese Academy of Sciences (UCAS), School of Cyber Security, China
Other persons with the same name
- Dan Meng — disambiguation page
- Dan Meng 0001
— OPPO Research Institute, Shenzhen, China (and 1 more)
- Dan Meng 0003
— Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, University of Beijing, China (and 1 more)
- Dan Meng 0004
— Southwestern University of Finance and Economics, School of Management Science and Engineering, Chengdu, China
- Dan Meng 0005
— Capital Normal University, College of Resource Environment and Tourism, Beijing Laboratory of Water Resources Security, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Zhaoyang Wang, Yanfei Hu, Yu Wen, Boyang Zhang, Shuailou Li, Wenbo Wang, Zheng Liu, Dan Meng:
FineGCP: Fine-grained dependency graph community partitioning for attack investigation. Comput. Secur. 151: 104311 (2025) - [j39]Zhuoyu Tian
, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. Cybersecur. 8(1): 98 (2025) - [j38]Yuhui Zhang, Hong Liao, Lutan Zhao, Yuncong Shao, Zhihong Tian, XiaoFeng Wang, Dan Meng, Rui Hou:
An Efficient Speculative Federated Tree Learning System With a Lightweight NN-Based Predictor. IEEE Trans. Parallel Distributed Syst. 36(8): 1728-1743 (2025) - [c189]Yan Wang
, Xingbin Wang
, Yulan Su
, Sisi Zhang
, Zechao Lin
, Dan Meng
, Rui Hou
:
ROBIN: A Novel Framework for Accelerating Robust Multi-Variant Training. ASP-DAC 2025: 1120-1125 - [c188]Zihao Yang, Mengxin Zheng, Shengyu Fan, Qian Lou, Rui Hou, Dan Meng, Mingzhe Zhang:
Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator. CF 2025: 128-131 - [c187]Changhao Wu, Lixin Zhao, Aimin Yu, Lijun Cai, Dan Meng:
ET-Former: Robust Transformer-Based Representation for Encrypted Traffic Classification. CSCWD 2025: 44-49 - [c186]Zhengbang Yang, Lutan Zhao, Peinan Li, Han Liu, Kai Li, Boyan Zhao, Dan Meng, Rui Hou:
LegoZK: A Dynamically Reconfigurable Accelerator for Zero-Knowledge Proof. HPCA 2025: 113-126 - [c185]Zechao Lin, Sisi Zhang, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
LoRATEE: A Secure and Efficient Inference Framework for Multi-Tenant LoRA LLMs Based on TEE. ICASSP 2025: 1-5 - [c184]Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:
RanDoctor: System-Level Ransomware Detection with ProbSparse Self-Attention. ICASSP 2025: 1-5 - [c183]Sisi Zhang, Zechao Lin, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
Jack of All Trades, Master of None: PMP-Guided Adaptive Multi-Teacher Distillation with Meta-Learning. ICASSP 2025: 1-5 - [c182]Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:
RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head Attention. ICIC (4) 2025: 27-38 - [c181]Xu Chen, Ningning Cui, Zhe Pan, Liwei Chen, Gang Shi, Dan Meng:
Critical Variable State-Aware Directed Greybox Fuzzing. ICSE 2025: 141-152 - [c180]Shengyu Fan
, Xianglong Deng
, Liang Kong
, Guiming Shi
, Guang Fan
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
FAST: An FHE Accelerator for Scalable-parallelism with Tunable-bit. ISCA 2025: 92-106 - [c179]Dian Jiao
, Xianglong Deng
, Zhiwei Wang
, Shengyu Fan
, Yi Chen
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
Neo: Towards Efficient Fully Homomorphic Encryption Acceleration using Tensor Core. ISCA 2025: 107-121 - [c178]Yulan Su, Sisi Zhang, Zechao Lin, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
Poseidon: A NAS-Based Ensemble Defense Method Against Multiple Perturbations. MMM (3) 2025: 215-228 - [c177]Yulan Su, Sisi Zhang, Yan Wang, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
RobSparse: Automatic Search for GPU-Friendly Robust and Sparse Vision Transformers. MMM (3) 2025: 311-325 - [c176]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
The Road to Trust: Building Enclaves within Confidential VMs. NDSS 2025 - [c175]Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng:
CASPR: Context-Aware Security Policy Recommendation. NDSS 2025 - [c174]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. SP 2025: 2827-2845 - [i24]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. CoRR abs/2505.07239 (2025) - 2024
- [j37]Xingbin Wang
, Yan Wang
, Yulan Su
, Sisi Zhang
, Dan Meng, Rui Hou
:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024) - [j36]Xingbin Wang
, Boyan Zhao
, Yulan Su
, Sisi Zhang
, Fengkai Yuan
, Jun Zhang
, Dan Meng
, Rui Hou
:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024) - [j35]Tongshuai Wu
, Liwei Chen
, Gewangzi Du
, Dan Meng, Gang Shi
:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 19: 3986-4000 (2024) - [j34]Huan Zhang
, Lixin Zhao
, Aimin Yu
, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. IEEE Trans. Inf. Forensics Secur. 19: 6113-6127 (2024) - [c173]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
KSM: Killer of Spectre and Meltdown Attacks. CSCWD 2024: 157-162 - [c172]Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. CSCWD 2024: 407-412 - [c171]Yusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties. CSCWD 2024: 772-777 - [c170]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Module Level Security Evaluation Method Based on Model Checking. CSCWD 2024: 1165-1170 - [c169]Yifan Zhu
, Peinan Li
, Yunkai Bai
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure. DAC 2024: 2:1-2:6 - [c168]Yunkai Bai
, Peinan Li
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks. DAC 2024: 3:1-3:6 - [c167]Yan Wang
, Xingbin Wang
, Zechao Lin
, Yulan Su
, Sisi Zhang
, Rui Hou
, Dan Meng
:
Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense. DAC 2024: 5:1-5:6 - [c166]Xingbin Wang
, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46 - [c165]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [c164]Ruicheng Niu, Ziyuan Zhu, Chaofei Li, Dan Meng:
Search Robust and Adaptable Architecture. ICASSP 2024: 5155-5159 - [c163]Zhongkai Tong, Ziyuan Zhu, Zhangyu Sha, Yuxin Liu, Dan Meng:
Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning. ICIC (LNAI 1) 2024: 62-74 - [c162]Shuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng:
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy. IPCCC 2024: 1-10 - [c161]Tao Leng, Lixin Zhao, Yuedong Pan, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors. ISCC 2024: 1-7 - [c160]Haolai Wei
, Liwei Chen
, Zhijie Zhang
, Gang Shi
, Dan Meng
:
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. ISSTA 2024: 730-742 - [c159]Zhijie Zhang
, Liwei Chen
, Haolai Wei
, Gang Shi
, Dan Meng
:
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization. ISSTA 2024: 1351-1363 - [c158]Yunkai Bai, Peinan Li, Yubiao Huang, Michael C. Huang, Shijun Zhao, Lutan Zhao, Fengwei Zhang, Dan Meng, Rui Hou:
HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management. MICRO 2024: 105-120 - [c157]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. MICRO 2024: 338-351 - [c156]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analyzing Cache Timing-based Side Channel Vulnerability through Cache Line Composition. MILCOM 2024: 517-522 - [c155]Feng He, Shijun Zhao, Dan Meng, Rui Hou:
MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. TrustCom 2024: 37-48 - [c154]Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng:
DyCom: A Dynamic Community Partitioning Technique for System Audit Logs. TrustCom 2024: 1486-1493 - [i23]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i22]Shengyu Fan, Xianglong Deng, Zhuoyu Tian, Zhicheng Hu, Liang Chang, Rui Hou, Dan Meng, Mingzhe Zhang:
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption. CoRR abs/2403.10188 (2024) - [i21]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - [i20]Zhiwei Wang, Haoqi He, Lutan Zhao, Peinan Li, Zhihao Li, Dan Meng, Rui Hou:
Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs. CoRR abs/2410.05934 (2024) - [i19]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. CoRR abs/2410.13405 (2024) - 2023
- [j33]Guang Wang
, Ziyuan Zhu, Xu Cheng
, Dan Meng:
A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors. IEEE Trans. Computers 72(11): 3203-3217 (2023) - [j32]Fengkai Yuan
, Kai Wang
, Jiameng Ying, Rui Hou
, Lutan Zhao, Peinan Li
, Yifan Zhu, Zhenzhou Ji
, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023) - [j31]Tao Xue
, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j30]Rong Yin
, Yong Liu
, Weiping Wang
, Dan Meng:
Scalable Kernel $k$-Means With Randomized Sketching: From Theory to Algorithm. IEEE Trans. Knowl. Data Eng. 35(9): 9210-9224 (2023) - [j29]Zhiwei Wang
, Peinan Li
, Rui Hou
, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c153]Ruicheng Niu, Ziyuan Zhu, Tao Leng, Chaofei Li, Yuxin Liu, Dan Meng:
Improving Adversarial Robustness via Channel and Depth Compatibility. ADMA (5) 2023: 137-149 - [c152]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy. CSCWD 2023: 29-34 - [c151]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling. CSCWD 2023: 1914-1919 - [c150]Yifan Zhu, Peinan Li, Lutan Zhao, Dan Meng, Rui Hou:
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. DAC 2023: 1-6 - [c149]Shengyu Fan, Zhiwei Wang, Weizhi Xu
, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934 - [c148]Zhiwei Wang, Peinan Li, Rui Hou, Dan Meng:
NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs. ICCD 2023: 357-365 - [c147]Ziwei Li, Yucan Zhou, Haihui Fan, Xiaoyan Gu, Bo Li, Dan Meng:
Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction. ICONIP (2) 2023: 561-572 - [c146]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture. ICPADS 2023: 340-347 - [c145]Huozhu Wang, Ziyuan Zhu, Dan Meng:
Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors. ISCC 2023: 970-976 - [c144]Shuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng:
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark. SRDS 2023: 93-106 - [c143]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. TrustCom 2023: 1-9 - [c142]Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:
Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. TrustCom 2023: 920-928 - 2022
- [j28]Ruipeng Yang
, Aimin Yu, Lijun Cai, Dan Meng:
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. Cybersecur. 5(1): 29 (2022) - [j27]Jiameng Ying
, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022) - [j26]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022) - [c141]Rong Yin, Yong Liu, Dan Meng:
Distributed Randomized Sketching Kernel Learning. AAAI 2022: 8883-8891 - [c140]Peinan Li, Rui Hou, Lutan Zhao
, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552 - [c139]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359 - [c138]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analysis of DRAM Vulnerability Using Computation Tree Logic. ICC 2022: 986-991 - [c137]Guang Wang
, Ziyuan Zhu, Xu Cheng, Dan Meng:
In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm. ICCD 2022: 463-470 - [c136]Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. MILCOM 2022: 292-297 - [c135]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Randomized Sketches for Clustering: Fast and Optimal Kernel $k$-Means. NeurIPS 2022 - [c134]Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. SecureComm 2022: 510-528 - [c133]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao
, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c132]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71 - [c131]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [i18]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations. CoRR abs/2208.14062 (2022) - [i17]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - [i16]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022) - 2021
- [j25]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [j24]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021) - [j23]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j22]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou
, Zhenzhou Ji
, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021) - [c130]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168 - [c129]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272 - [c128]Fengkai Yuan, Kai Wang
, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad
, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c127]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability. HPCC/DSS/SmartCity/DependSys 2021: 1075-1083 - [c126]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance. ICA3PP (3) 2021: 196-213 - [c125]Guang Wang
, Ziyuan Zhu, Shuan Li, Xu Cheng, Dan Meng:
Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm. ICCD 2021: 196-203 - [c124]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c123]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c122]Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
Towards Open World Traffic Classification. ICICS (1) 2021: 331-347 - [c121]Xiaoshuai Hao, Yucan Zhou, Dayan Wu, Wanqian Zhang, Bo Li
, Weiping Wang
, Dan Meng:
What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval. ICME 2021: 1-6 - [c120]Rong Yin, Yong Liu, Weiping Wang, Dan Meng:
Distributed Nyström Kernel Learning with Communications. ICML 2021: 12019-12028 - [c119]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - [c118]Nannan Tian, Yong Liu, Weiping Wang
, Dan Meng:
Automatic CNN Compression Based on Hyper-parameter Learning. IJCNN 2021: 1-8 - [c117]Nannan Tian, Yong Liu, Weiping Wang
, Dan Meng:
Fast CNN Inference by Adaptive Sparse Matrix Decomposition. IJCNN 2021: 1-8 - [c116]Nannan Tian, Yong Liu, Weiping Wang
, Dan Meng:
Energy-saving CNN with Clustering Channel Pruning. IJCNN 2021: 1-8 - [c115]Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng:
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. IJCNN 2021: 1-10 - [c114]Xingbin Wang
, Boyan Zhao, Rui Hou, Amro Awad
, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - [c113]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. MSN 2021: 502-511 - [c112]Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. SecureComm (1) 2021: 3-24 - [c111]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
FCEP: A Fast Concolic Execution for Reaching Software Patches. SEKE 2021: 510-515 - [c110]Wanqian Zhang, Dayan Wu, Yu Zhou
, Bo Li
, Weiping Wang
, Dan Meng:
Binary Neural Network Hashing for Image Retrieval. SIGIR 2021: 317-326 - [c109]Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. TrustCom 2021: 1132-1140 - [i15]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. CoRR abs/2104.09806 (2021) - 2020
- [j21]Dan Meng, Rui Hou
, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [j20]Jinfeng Li
, Liwei Chen, Gang Shi, Kai Chen
, Dan Meng:
ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3165-3176 (2020) - [j19]Jinfeng Li
, Qizhen Xu
, Yongyue Li
, Liwei Chen, Gang Shi, Dan Meng:
Efficient Return Address Verification Based on Dislocated Stack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3398-3407 (2020) - [j18]Rong Yin
, Yong Liu
, Weiping Wang
, Dan Meng:
Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory. IEEE Trans. Neural Networks Learn. Syst. 31(9): 3512-3524 (2020) - [j17]Jiang Zhou
, Yong Chen
, Weiping Wang
, Shuibing He
, Dan Meng:
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 31(2): 374-392 (2020) - [c108]Rong Yin, Yong Liu, Lijing Lu, Weiping Wang
, Dan Meng:
Divide-and-Conquer Learning with Nyström: Optimal Rate and Algorithm. AAAI 2020: 6696-6703 - [c107]Tao Xue, Yu Wen, Bo Luo
, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c106]Limin Wang
, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Analyzing The Security of The Cache Side Channel Defences With Attack Graphs. ASP-DAC 2020: 50-55 - [c105]Xingbin Wang
, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c104]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164 - [c103]Xingbin Wang
, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197 - [c102]Kai Wang
, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413 - [c101]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. ESORICS (1) 2020: 338-358 - [c100]Zhuo Wang, Chaokun Wang, Weiping Wang
, Xiaoyan Gu
, Bo Li
, Dan Meng:
Adaptive Relation Discovery from Focusing Seeds on Large Networks. ICDE 2020: 217-228 - [c99]Rong Yin, Yong Liu, Weiping Wang
, Dan Meng:
Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm. ICDM 2020: 1376-1381 - [c98]Wenyan An, Liwei Chen, Jinxin Wang
, Gewangzi Du, Gang Shi, Dan Meng:
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. ISPA/BDCloud/SocialCom/SustainCom 2020: 337-344 - [c97]Wanqian Zhang, Dayan Wu, Yu Zhou
, Bo Li
, Weiping Wang
, Dan Meng:
Deep Unsupervised Hybrid-similarity Hadamard Hashing. ACM Multimedia 2020: 3274-3282 - [c96]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033 - [c95]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c94]Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. TrustCom 2020: 194-201 - [c93]Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. TrustCom 2020: 293-300 - [c92]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c91]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687 - [i14]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020) - [i13]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j16]Limin Wang
, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Colored Petri Net Based Cache Side Channel Vulnerability Evaluation. IEEE Access 7: 169825-169843 (2019) - [j15]Jun Zhang, Rui Hou, Wei Song
, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019) - [c90]Zhuo Wang, Weiping Wang
, Chaokun Wang, Xiaoyan Gu
, Bo Li
, Dan Meng:
Community Focusing: Yet Another Query-Dependent Community Detection. AAAI 2019: 329-337 - [c89]Wanqian Zhang, Dayan Wu, Jing Liu, Bo Li, Xiaoyan Gu
, Weiping Wang, Dan Meng:
Fast and Multilevel Semantic-Preserving Discrete Hashing. BMVC 2019: 157 - [c88]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c87]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c86]Xingbin Wang
, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - [c85]Yanfu Xu, Zheng Lin, Yuanxin Liu, Rui Liu, Weiping Wang
, Dan Meng:
Ranking and Sampling in Open-Domain Question Answering. EMNLP/IJCNLP (1) 2019: 2412-2421 - [c84]Peinan Li, Lutan Zhao
, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276 - [c83]Ningning Cai
, Can Ma, Weiping Wang, Dan Meng:
Effective Self Attention Modeling for Aspect Based Sentiment Analysis. ICCS (5) 2019: 3-14 - [c82]Jingzi Gu, Jinchao Zhang, Zheng Lin, Bo Li
, Weiping Wang, Dan Meng:
Asymmetric Deep Cross-modal Hashing. ICCS (5) 2019: 41-54 - [c81]Fang Li, Chao Yan, Ziyuan Zhu, Dan Meng:
A Deep Malware Detection Method Based on General-Purpose Register Features. ICCS (3) 2019: 221-235 - [c80]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. ICICS 2019: 3-17 - [c79]Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. ICICS 2019: 165-180 - [c78]Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. ICICS 2019: 181-196 - [c77]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. ICICS 2019: 341-356 - [c76]Jiarong Wang, Lijun Cai, Aimin Yu, Dan Meng:
Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection. ICTAI 2019: 947-954 - [c75]Fang Li, Jinrong Han, Ziyuan Zhu, Dan Meng:
Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features. IJCNN 2019: 1-8 - [c74]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels. ISPA/BDCloud/SocialCom/SustainCom 2019: 614-621 - [c73]Jingjing Xu, Aimin Yu, Lijun Cai, Dan Meng:
MMNR: A Network Representation Framework Based on Multi-View Motif Fusion. ISPA/BDCloud/SocialCom/SustainCom 2019: 792-801 - [c72]Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:
Building Trust in Container Environment. TrustCom/BigDataSE 2019: 1-9 - [i12]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. CoRR abs/1902.00888 (2019) - [i11]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - [i10]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels. CoRR abs/1910.12021 (2019) - 2018
- [j14]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j13]Boyan Zhao
, Rui Hou, Jianbo Dong, Michael C. Huang
, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM Trans. Comput. Syst. 36(1): 2:1-2:26 (2018) - [c71]Peng Fu
, Zheng Lin, Fengcheng Yuan, Weiping Wang
, Dan Meng:
Learning Sentiment-Specific Word Embedding via Global Sentiment Representation. AAAI 2018: 4808-4815 - [c70]Jun Zhang, Rui Hou, Wei Song, Zhiyuan Zhan, Boyan Zhao, Mingyu Chen, Dan Meng:
Stateful Forward-Edge CFI Enforcement with Intel MPX. ACA 2018: 79-94 - [c69]Guang Yang, Lijun Cai, Aimin Yu, Jiangang Ma, Dan Meng, Yu Wu:
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model. BigDataService 2018: 9-16 - [c68]Dan Meng:
SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors. CCS 2018: 2177 - [c67]Jinchao Zhang, Jingzi Gu, Shuai Cheng, Bo Li
, Weiping Wang, Dan Meng:
Efficient Algorithms of Parallel Skyline Join over Data Streams. ICA3PP (1) 2018: 184-199 - [c66]Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. TrustCom/BigDataSE 2018: 360-371 - [c65]Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. TrustCom/BigDataSE 2018: 763-773 - 2017
- [j12]Zhiyong Chen, Wei Zhang, Bin Hu
, Xiaochun Cao, Si Liu, Dan Meng:
Retrieving Objects by Partitioning. IEEE Trans. Big Data 3(1): 44-54 (2017) - [c64]Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. IPCCC 2017: 1-9 - [c63]Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng:
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. SEC 2017: 568-584 - [c62]Min Zhu, Bibo Tu, Wei Wei, Dan Meng:
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM. VEE 2017: 242-256 - 2016
- [j11]Zheng Lin, Xiaolong Jin, Xueke Xu, Yuanzhuo Wang, Xueqi Cheng, Weiping Wang
, Dan Meng:
An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification. IEEE ACM Trans. Audio Speech Lang. Process. 24(3): 432-444 (2016) - [j10]Xiaochun Cao, Ling Du, Xingxing Wei, Dan Meng, Xiaojie Guo:
High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation. IEEE Trans. Cybern. 46(5): 1132-1143 (2016) - [c61]Peng Fu, Zheng Lin, Hailun Lin, Fengcheng Yuan, Weiping Wang, Dan Meng:
Quantifying the Effect of Sentiment on Topic Evolution in Chinese Microblog. APWeb (1) 2016: 531-542 - [c60]Jinchao Zhang, Zheng Lin, Bo Li
, Weiping Wang, Dan Meng:
Skyline Join Query Processing over Multiple Relations. DASFAA Workshops 2016: 353-361 - [c59]Yun Gao, Wei Zhou, Jizhong Han, Dan Meng:
Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution. HPCC/SmartCity/DSS 2016: 102-109 - [c58]Xianyi Zheng, Yanhong He, Jiangang Ma, Gang Shi, Dan Meng:
TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment. HPCC/SmartCity/DSS 2016: 663-670 - [c57]Xianyi Zheng, Lulu Yang, Jiangang Ma, Gang Shi, Dan Meng:
TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms. ISCC 2016: 456-462 - [c56]Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. Trustcom/BigDataSE/ISPA 2016: 194-200 - [c55]Liang Wang, Weiping Wang
, Jingzi Gu, Dan Meng:
Delta-Generalization: High Accuracy Data Release for Privacy Preserving. Trustcom/BigDataSE/ISPA 2016: 1861-1866 - [c54]Xianyi Zheng, Lulu Yang, Gang Shi, Dan Meng:
Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms. Trustcom/BigDataSE/ISPA 2016: 1944-1950 - 2015
- [j9]Buyun Qu, Zhibin Zhang, Xingquan Zhu
, Dan Meng:
An empirical study of morphing on behavior-based network traffic classification. Secur. Commun. Networks 8(1): 68-79 (2015) - [j8]Liang Yang
, Xiaochun Cao, Di Jin, Xiao Wang, Dan Meng:
A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization. IEEE Trans. Cybern. 45(11): 2585-2598 (2015) - [j7]Xiaochun Cao, Hua Zhang, Xiaojie Guo, Si Liu, Dan Meng:
SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation. IEEE Trans. Image Process. 24(9): 2746-2759 (2015) - [j6]Youwei Wang, Can Ma, Weiping Wang
, Dan Meng:
An approach of fast data manipulation in HDFS with supplementary mechanisms. J. Supercomput. 71(5): 1736-1753 (2015) - [c53]Zhenyan Liu, Dan Meng, Weiping Wang, Chunxia Zhang:
A Supervised Parameter Estimation Method of LDA. APWeb 2015: 401-410 - [c52]Yun Gao, Wei Zhou, Jizhong Han, Dan Meng, Zhang Zhang, Zhiyong Xu:
An evaluation and analysis of graph processing frameworks on five key issues. Conf. Computing Frontiers 2015: 11:1-11:8 - [c51]Ying Kang, Xiaoyan Gu
, Weiping Wang
, Dan Meng:
Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks. CIKM 2015: 33-42 - [c50]Chaoyong Li, Gong Cheng, Jinwen Zhong, Can Ma, Weiping Wang
, Dan Meng, Qing Wang, Bo Wang:
Lotus: A framework for query optimization based on distributed cache. FSKD 2015: 1189-1196 - [c49]Debin Jia, Zhengwei Liu, Xiaoyan Gu, Bo Li
, Jingzi Gu, Weiping Wang, Dan Meng:
LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data. ICA3PP (2) 2015: 134-148 - [c48]Jinchao Zhang, Dong Zhang, Bo Yu, Bo Li
, Weiping Wang, Dan Meng:
Skyline Query on Anti-correlated Distributions: From the Perspective of Spatial Index. ICA3PP (4) 2015: 386-401 - [c47]Jiang Zhou, Yong Chen
, Weiping Wang
, Dan Meng:
MAMS: A Highly Reliable Policy for Metadata Service. ICPP 2015: 729-738 - [c46]Jiang Zhou, Yong Chen
, Xiaoyan Gu
, Weiping Wang
, Dan Meng:
A virtual shared metadata storage for HDFS. NAS 2015: 265-274 - [c45]Ying Kang, Bo Yu, Weiping Wang, Dan Meng:
Spectral Clustering for Large-Scale Social Networks via a Pre-Coarsening Sampling based NystrÖm Method. PAKDD (2) 2015: 106-118 - [c44]Ying Kang, Dong Zhang, Bo Yu, Xiaoyan Gu, Weiping Wang, Dan Meng:
Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method. WAIM 2015: 413-425 - [c43]Zheng Lin, Weiping Wang
, Xiaolong Jin, Jiguang Liang, Dan Meng:
A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction. WWW (Companion Volume) 2015: 67-68 - 2014
- [j5]Yu Wen, Weiping Wang
, Li Guo, Dan Meng:
Automated Power Control for Virtualized Infrastructures. J. Comput. Sci. Technol. 29(6): 1111-1122 (2014) - [c42]Jia Cui, Dan Meng, Zhong-Tao Chen:
Leveraging Deletion Neighborhoods and Trie for Efficient String Similarity Search and Join. AIRS 2014: 1-13 - [c41]Jia Cui, Weiping Wang
, Dan Meng, Zhenyan Liu:
Continuous similarity join on data streams. ICPADS 2014: 552-559 - [c40]Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng:
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. INTRUST 2014: 328-345 - [c39]Yun Gao, Wei Zhou, Zhang Zhang, Jizhong Han, Dan Meng, Zhiyong Xu:
Online Anomaly Detection by Improved Grammar Compression of Log Sequences. SDM 2014: 911-919 - 2013
- [j4]Jiang Zhou, Can Ma, Jin Xiong, Weiping Wang
, Dan Meng:
Highly reliable message-passing mechanism for cluster file system. Int. J. Parallel Emergent Distributed Syst. 28(6): 556-575 (2013) - [c38]Zhang Zhang, Jizhong Han, Bo Li, Wei Zhou, Dan Meng:
Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds. CSC 2013: 84-91 - [c37]Youwei Wang, Weiping Wang
, Can Ma, Dan Meng:
Zput: A speedy data uploading approach for the Hadoop Distributed File System. CLUSTER 2013: 1-5 - [c36]Jiang Zhou, Jing Guo, Weiping Wang
, Cuilan Du, Xiaoyan Gu, Dan Meng:
OAMS: A Highly Reliable Metadata Service for Big Data Storage. CSE 2013: 1287-1294 - [c35]Youwei Wang, Ge Fu, Weiping Wang
, Xinran Liu, Can Ma, Dan Meng:
Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster. CSE 2013: 1295-1302 - [c34]Bo Li, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng:
DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data. CSE 2013: 1303-1309 - [c33]Qing Li, Yong Li, Bibo Tu, Dan Meng:
An Adaptive Resource Sharing Platform for Internet Data Center. HPCC/EUC 2013: 1179-1186 - 2012
- [c32]Buyun Qu, Zhibin Zhang, Le Guo, Xingquan Zhu
, Li Guo, Dan Meng:
An empirical study of morphing on network traffic classification. CHINACOM 2012: 227-232 - [c31]Youwei Wang, Jiang Zhou, Can Ma, Weiping Wang
, Dan Meng, Jason Kei:
Clover: A Distributed File System of Expandable Metadata Service Derived from HDFS. CLUSTER 2012: 126-134 - [c30]Yanrong Zhao, Weiping Wang
, Dan Meng, Xiufeng Yang, Shubin Zhang, Jun Li, Gang Guan:
A data locality optimization algorithm for large-scale data processing in Hadoop. ISCC 2012: 655-661 - [c29]Qingqing Feng, Jizhong Han, Yun Gao, Dan Meng:
Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing. NAS 2012: 89-93 - [c28]Xiaoyan Gu, Xiufeng Yang, Weiping Wang
, Yan Jin, Dan Meng:
CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing. NAS 2012: 94-98 - [c27]Yanrong Zhao, Ruan Yuan, Weiping Wang
, Dan Meng, Shubin Zhang, Jun Li:
A Hardware-Based TCP Stream State Tracking and Reassembly Solution for 10G Backbone Traffic. NAS 2012: 154-163 - [c26]Yanrong Zhao, Weiping Wang
, Dan Meng, YongChun Lv, Shubin Zhang, Jun Li:
TDWS: A Job Scheduling Algorithm Based on MapReduce. NAS 2012: 313-319 - [c25]Buyun Qu, Zhibin Zhang, Li Guo, Dan Meng:
On Accuracy of Early Traffic Classification. NAS 2012: 348-354 - 2011
- [j3]Xu Liu, Jianfeng Zhan, Kunlin Zhan, Weisong Shi, Lin Yuan, Dan Meng, Lei Wang:
Automatic performance debugging of SPMD-style parallel programs. J. Parallel Distributed Comput. 71(7): 925-937 (2011) - [c24]Peng Wang
, Dan Meng, Zhaoxia Han, Xu Liu:
Towards quantitative analysis of data intensive computing: a case study of Hadoop. ICAC 2011: 193-194 - [c23]Linping Wu, Hongbing Luo, Jianfeng Zhan, Dan Meng:
A Runtime Fault Detection Method for HPC Cluster. PDCAT 2011: 68-72 - [i9]Xu Liu, Jianfeng Zhan, Kunlin Zhan, Weisong Shi, Lin Yuan, Dan Meng, Lei Wang:
Automatic Performance Debugging of SPMD-style Parallel Programs. CoRR abs/1103.6087 (2011) - 2010
- [j2]Peng Wang
, Dan Meng, Jizhong Han, Jianfeng Zhan, Bibo Tu, Xiaofeng Shi, Le Wan:
Transformer: A New Paradigm for Building Data-Parallel Programming Models. IEEE Micro 30(4): 55-64 (2010) - [c22]Guanhua Tian, Dan Meng, Yong Li:
Request Path Driven Model for Performance Fault Diagnoses. ISPA 2010: 298-305 - [c21]Wei Zhou, Jianfeng Zhan, Dan Meng, Zhihong Zhang:
Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems. NPC 2010: 262-276 - [c20]Guanhua Tian, Jianfeng Zhan, Chao Ren, Dan Meng:
A Case Study for SOA System Rejuvenation. PDPTA 2010: 97-103 - [i8]Xu Liu, Lin Yuan, Jianfeng Zhan, Bibo Tu, Dan Meng:
Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/1002.4264 (2010) - [i7]Wei Zhou, Jianfeng Zhan, Dan Meng, Dongyan Xu, Zhihong Zhang:
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems. CoRR abs/1003.0951 (2010) - [i6]Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes. CoRR abs/1003.0955 (2010) - [i5]Wei Zhou, Lei Wang, Dan Meng, Lin Yuan, Jianfeng Zhan:
Scalable Group Management in Large-Scale Virtualized Clusters. CoRR abs/1003.5794 (2010) - [i4]Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, Dongyan Xu, Yabing Huang, Dan Meng:
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes. CoRR abs/1007.4057 (2010)
2000 – 2009
- 2009
- [c19]Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang:
Precise request tracing and performance debugging for multi-tier services of black boxes. DSN 2009: 337-346 - [c18]Guangming Tan, Ziyu Guo, Mingyu Chen, Dan Meng:
Single-particle 3d reconstruction from cryo-electron microscopy images on GPU. ICS 2009: 380-389 - [i3]Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng:
Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/0906.1326 (2009) - [i2]Wei Zhou, Jianfeng Zhan, Dan Meng:
Multidimensional Analysis of System Logs in Large-scale Cluster Systems. CoRR abs/0906.1328 (2009) - [i1]Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng:
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms. CoRR abs/0906.1346 (2009) - 2008
- [c17]Xu Liu, Bibo Tu, Jianfeng Zhan, Dan Meng:
A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers. PDCAT 2008: 263-266 - 2007
- [j1]Ninghui Sun, Dan Meng:
Dawning4000A high performance computer. Frontiers Comput. Sci. China 1(1): 20-25 (2007) - [c16]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c15]Chao Ren, Dan Meng, Danjun Liu, Jianfeng Zhan:
Theory of commercial application management system and its implementation - AMPS. Parallel and Distributed Computing and Networks 2007: 75-83 - [c14]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182 - 2006
- [c13]Jianfeng Zhan, Gengpu Liu, Lei Wang, Bibo Tu, Yi Jin, Yang Li, Yan Hao, Xuehai Hong, Dan Meng, Ninghui Sun:
PhoenixG: A Unified Management Framework for Industrial Information Grid. CCGRID 2006: 489-496 - [c12]Linping Wu, Dan Meng, Jianfeng Zhan, Lei Wang, Bibo Tu:
A Failure-Aware Scheduling Strategy in Large-Scale Cluster System. CCGRID 2006: 645-648 - [c11]Ying Jiang, Dan Meng, Chao Ren, Jianfeng Zhan:
An Integrated Adaptive Management System for Cluster-based Web Services. CLUSTER 2006 - [c10]Linping Wu, Dan Meng, Wen Gao, Jianfeng Zhan:
A proactive fault-detection mechanism in large-scale cluster systems. IPDPS 2006 - [c9]Zhihong Zhang, Dan Meng, Jianfeng Zhan, Lei Wang, Linping Wu, Huang Wei:
Easy and reliable cluster management: the self-management experience of Fire Phoenix. IPDPS 2006 - [c8]Linping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu:
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems. PDCAT 2006: 364-367 - 2005
- [c7]Ying Jiang, Dan Meng, Yi Liang, Danjun Liu, Jianfeng Zhan:
Adaptive Management of a Utility Computing. CLUSTER 2005: 1-2 - [c6]Jin Xiong, Rongfeng Tang, Sining Wu, Dan Meng, Ninghui Sun:
An Efficient Metadata Distribution Policy for Cluster File Systems. CLUSTER 2005: 1-10 - [c5]Taoying Liu, Zhiwei Xu, Ninghui Sun, Dan Meng:
Destructive Transaction: Human-Oriented Cluster System Management Mechanism. IPDPS 2005 - 2003
- [c4]Jin Xiong, Sining Wu, Dan Meng, Ninghui Sun, Guojie Li:
Design and Performance of the Dawning Cluster File System. CLUSTER 2003: 232- - 2002
- [c3]Qinghua Ye, Limin Xiao, Dan Meng, Wen Gao, Yi Liang, Ying Jiang:
AppManager: A Powerful Service-Based Application Management System for Clusters. ICPP Workshops 2002: 537-546 - [c2]Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu:
Semi-User-Level Communication Architecture. IPDPS 2002 - 2001
- [c1]Zhiwei Xu, Ninghui Sun, Dan Meng, Wei Li:
Cluster and Grid Superservers: The Dawning Experiences in China. CLUSTER 2001: 351-358
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-01 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint