default search action
Ke Meng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Ke Meng 0001 — University of New South Wales, School of Electrical and Engineering and Telecommunications, Sydney, Australia (and 6 more)
- Ke Meng 0002 — City University of Hong Kong, Department of Biomedical Engineering (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Meng Chen, Dongbao Qian, Yixuan Wang, Junyan An, Ke Meng, Shuai Xu, Sheng Liu, Meiyan Sun, Miao Li, Chunying Pang:
Systematic Review of Machine Learning Applied to the Secondary Prevention of Ischemic Stroke. J. Medical Syst. 48(1): 8 (2024) - [j16]Wenjie Jin, Zhewei Zhang, Tongzhou Wu, Ke Meng, Qi Wang, Wanting Tong, Cong Wang, Gaofei Yin, Baodong Xu:
Retrieval of Leaf Area Index From MODIS Surface Reflectance by Incorporating the Subpixel Information From Decametric-Resolution Data. IEEE Trans. Geosci. Remote. Sens. 62: 1-17 (2024) - [j15]Qi Wang, Zhewei Zhang, Tongzhou Wu, Wenjie Jin, Ke Meng, Qian Song, Cong Wang, Gaofei Yin, Baodong Xu:
Exploring the Optimized Leaf Area Index Retrieval Strategy Based on the Look-up Table Approach for Decametric-Resolution Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - [c22]Mingyi Li, Junmin Xiao, Kewei Zhang, Zhiheng Lin, Chaoyang Shui, Ke Meng, Zehua Wang, Yunfei Pang, Guangming Tan:
A Coordinated Strategy for GNN Combining Computational Graph and Operator Optimizations. ICS 2024: 460-472 - [c21]Zhiheng Lin, Ke Meng, Chaoyang Shui, Kewei Zhang, Junmin Xiao, Guangming Tan:
Exploiting Fine-Grained Redundancy in Set-Centric Graph Pattern Mining. PPoPP 2024: 175-187 - [c20]Tao He, Shuxian Hu, Longbin Lai, Dongze Li, Neng Li, Xue Li, Lexiao Liu, Xiaojian Luo, Bingqing Lyu, Ke Meng, Sijie Shen, Li Su, Lei Wang, Jingbo Xu, Wenyuan Yu, Weibin Zeng, Lei Zhang, Siyuan Zhang, Jingren Zhou, Xiaoli Zhou, Diwen Zhu:
GraphScope Flex: LEGO-like Graph Computing Stack. SIGMOD Conference Companion 2024: 386-399 - [i2]Ke Meng, Kai Chen:
Navigating Efficiency in MobileViT through Gaussian Process on Global Architecture Factors. CoRR abs/2406.04820 (2024) - 2023
- [j14]Yanfeng Zhao, Jing Jia, Yuzheng Dong, Ke Meng:
Optimal dosing strategy and sensitivity analysis of a within-host drug resistance model with continuous and impulsive drug treatment. J. Appl. Math. Comput. 69(3): 2277-2293 (2023) - [j13]Wenyuan Yu, Tao He, Lei Wang, Ke Meng, Ye Cao, Diwen Zhu, Sanhong Li, Jingren Zhou:
Vineyard: Optimizing Data Sharing in Data-Intensive Analytics. Proc. ACM Manag. Data 1(2): 200:1-200:27 (2023) - [j12]Ke Meng, Yan Wo:
An image compression and encryption scheme for similarity retrieval. Signal Process. Image Commun. 119: 117044 (2023) - [j11]Yilong Sun, Zhiyong Wu, Ke Meng, Yunhui Zheng:
Vehicular Task Offloading and Job Scheduling Method Based on Cloud-Edge Computing. IEEE Trans. Intell. Transp. Syst. 24(12): 14651-14662 (2023) - [c19]Xiaodan Liu, Yang Li, Jing Liao, Yuanfu Tang, Binkun Xu, Sheng Xiang, Wei Meng, Ke Meng:
Design of Trading Mode and Decision-Making for Independent Energy Storage Participating in in-depth Peak Regulation. CRC 2023: 106-111 - [c18]Xiaodan Liu, Yuanfu Tang, Yang Li, Jing Liao, Binkun Xu, Sheng Xiang, Yuqing Liu, Ke Meng:
Novel Energy Storage Devices Operation Control Strategy Based on Spot Market. CRC 2023: 196-201 - [c17]Yang Li, Binkun Xu, Anrong Gong, Ke Meng, Shengjie Geng, Sheng Xiang:
Price Modeling and Influencing Factors Analysis of STATE GRID APP Mechanism. CRC 2023: 248-253 - [c16]Jierui Jin, Jie Zhang, Xiaolong Xu, Ke Meng, Xiaokang Zhou, Lianyong Qi, Xuyun Zhang, Wanchun Dou:
Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence. DASC/PiCom/CBDCom/CyberSciTech 2023: 730-737 - [c15]Ke Meng, Liang Geng, Xue Li, Qian Tao, Wenyuan Yu, Jingren Zhou:
Efficient Multi-GPU Graph Processing with Remote Work Stealing. ICDE 2023: 191-204 - [c14]Xue Li, Ke Meng, Lu Qin, Longbin Lai, Wenyuan Yu, Zhengping Qian, Xuemin Lin, Jingren Zhou:
Flash: A Framework for Programming Distributed Graph Processing Algorithms. ICDE 2023: 232-244 - [c13]Kewei Zhang, Junmin Xiao, Zhiheng Lin, Ke Meng, Chaoyang Shui, Mingyi Li, Guangming Tan:
GraphPar: Efficient Workload-Aware Subgraph Matching System on Multiple GPUs. ICPADS 2023: 775-782 - [i1]Tao He, Shuxian Hu, Longbin Lai, Dongze Li, Neng Li, Xue Li, Lexiao Liu, Xiaojian Luo, Binqing Lyu, Ke Meng, Sijie Shen, Li Su, Lei Wang, Jingbo Xu, Wenyuan Yu, Weibin Zeng, Lei Zhang, Siyuan Zhang, Jingren Zhou, Xiaoli Zhou, Diwen Zhu:
GraphScope Flex: LEGO-like Graph Computing Stack. CoRR abs/2312.12107 (2023) - 2022
- [j10]Dayin Shi, Zhiyong Wu, Longbo Zhang, Benjia Hu, Ke Meng:
Multi-Scale Deep Residual Shrinkage Network for Atrial Fibrillation Recognition. Int. J. Comput. Intell. Appl. 21(3): 2250015:1-2250015:19 (2022) - [j9]Kexin Liu, Chen Tian, Qingyue Wang, Yanqing Chen, Bingchuan Tian, Wenhao Sun, Ke Meng, Long Yan, Lei Han, Jie Fu, Wanchun Dou, Guihai Chen:
PayDebt: Reduce Buffer Occupancy Under Bursty Traffic on Large Clusters. IEEE Trans. Parallel Distributed Syst. 33(12): 4707-4722 (2022) - [j8]Zhangyong Wu, Ke Meng, Yan Wo, Xudong Zhong:
Masquerade attack on biometric hashing via BiohashGAN. Vis. Comput. 38(3): 821-835 (2022) - [c12]Zhongzhe Hu, Junmin Xiao, Zheye Deng, Mingyi Li, Kewei Zhang, Xiaoyang Zhang, Ke Meng, Ninghui Sun, Guangming Tan:
MegTaiChi: dynamic tensor-based memory management optimization for DNN training. ICS 2022: 25:1-25:13 - [c11]Junmin Xiao, Yunfei Pang, Qing Xue, Chaoyang Shui, Ke Meng, Hui Ma, Mingyi Li, Xiaoyang Zhang, Guangming Tan:
W-Cycle SVD: A Multilevel Algorithm for Batched SVD on GPUs. SC 2022: 82:1-82:16 - 2021
- [j7]Hui Lin, Yan Wo, Yuanlu Wu, Ke Meng, Guoqiang Han:
Robust source camera identification against adversarial attacks. Comput. Secur. 100: 102079 (2021) - [c10]Kexin Liu, Chen Tian, Qingyue Wang, Hao Zheng, Peiwen Yu, Wenhao Sun, Yonghui Xu, Ke Meng, Lei Han, Jie Fu, Wanchun Dou, Guihai Chen:
Floodgate: taming incast in datacenter networks. CoNEXT 2021: 30-44 - [c9]Zhiyong Wu, Ke Meng, Xiukun Yan, Dayin Shi, Benjia Hu:
Abstraction Refinement Approach for Web Service Selection using Skyline Computations. SERVICES 2021: 66-71 - 2020
- [j6]Xiaoyu Guo, Cheng Chen, Yuanyuan Lu, Ke Meng, Hongyu Chen, Kangneng Zhou, Zhiliang Wang, Ruoxiu Xiao:
Retinal Vessel Segmentation Combined With Generative Adversarial Networks and Dense U-Net. IEEE Access 8: 194551-194560 (2020) - [c8]Chaoyang Shui, Xianzhi Yu, Yujin Yan, Yinshan Wang, Ke Meng, Guangming Tan:
Revisiting linpack algorithm on large-scale CPU-GPU heterogeneous systems. PPoPP 2020: 411-412
2010 – 2019
- 2019
- [c7]Ke Meng, Jiajia Li, Guangming Tan, Ninghui Sun:
A pattern based algorithmic autotuner for graph processing on GPUs. PPoPP 2019: 201-213 - 2017
- [c6]Ke Meng, Guangming Tan:
RING: NUMA-Aware Message-Batching Runtime for Data-Intensive Applications. ICPADS 2017: 368-375 - 2015
- [j5]Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao:
Network forensics analysis using Wireshark. Int. J. Secur. Networks 10(2): 91-106 (2015) - 2014
- [j4]Daisuke Takahashi, Yang Xiao, Ke Meng:
Virtual flow-net for accountability and forensics of computer and network systems. Secur. Commun. Networks 7(12): 2509-2526 (2014) - 2013
- [c5]Hui Zeng, Hongmei Julia Deng, Ke Meng, Song Luo, Xiang Yu, Apurva N. Mody, Matthew Sherman, Jude Muller, Zhenxing Wang:
From Spectrum Agility to Network Agility: Proactive and Adaptive Reconfiguration for Reliable Communication in Tactical Networks. MILCOM 2013: 1663-1668 - 2012
- [j3]Yang Xiao, Ke Meng, Daisuke Takahashi:
Accountability using flow-net: design, implementation, and performance evaluation. Secur. Commun. Networks 5(1): 29-49 (2012) - [j2]Zheng Li, Moustafa Mohamed, Xi Chen, Eric Dudley, Ke Meng, Li Shang, Alan Rolf Mickelson, Russ Joseph, Manish Vachharajani, Brian Schwartz, Yihe Sun:
Reliability Modeling and Management of Nanophotonic On-Chip Networks. IEEE Trans. Very Large Scale Integr. Syst. 20(1): 98-111 (2012)
2000 – 2009
- 2009
- [j1]Ke Meng, Yang Xiao, Susan V. Vrbsky:
Building a wireless capturing tool for WiFi. Secur. Commun. Networks 2(6): 654-668 (2009) - 2008
- [c4]Ke Meng, Russ Joseph, Robert P. Dick, Li Shang:
Multi-optimization power management for chip multiprocessors. PACT 2008: 177-186 - 2007
- [c3]Ke Meng, Frank Huebbers, Russ Joseph, Yehea I. Ismail:
Modeling and Characterizing Power Variability in Multicore Architectures. ISPASS 2007: 146-157 - 2006
- [c2]Yangyi Jiang, Hengxi Zhang, Jiang Xie, Ke Meng:
An Estimation Model of Research Cost Based on Rough Set and Artificial Neural Network. ICIC (2) 2006: 766-771 - [c1]Ke Meng, Russ Joseph:
Process variation aware cache leakage management. ISLPED 2006: 262-267
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint