Dan Meng

Orcid: 0009-0002-9868-5353

Affiliations:
  • Chinese Academy of Sciences (CAS), Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), China
  • University of Chinese Academy of Sciences (UCAS), School of Cyber Security, China


According to our database1, Dan Meng authored at least 248 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency.
Cybersecur., December, 2025

An Efficient Speculative Federated Tree Learning System With a Lightweight NN-Based Predictor.
IEEE Trans. Parallel Distributed Syst., August, 2025

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning.
CoRR, August, 2025

Pepper: Preference-Aware Active Trapping for Ransomware.
Proc. ACM Softw. Eng., 2025

FineGCP: Fine-grained dependency graph community partitioning for attack investigation.
Comput. Secur., 2025

Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

CASPR: Context-Aware Security Policy Recommendation.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

The Road to Trust: Building Enclaves within Confidential VMs.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

RobSparse: Automatic Search for GPU-Friendly Robust and Sparse Vision Transformers.
Proceedings of the MultiMedia Modeling, 2025

Poseidon: A NAS-Based Ensemble Defense Method Against Multiple Perturbations.
Proceedings of the MultiMedia Modeling, 2025

Neo: Towards Efficient Fully Homomorphic Encryption Acceleration using Tensor Core.
Proceedings of the 52nd Annual International Symposium on Computer Architecture, 2025

FAST: An FHE Accelerator for Scalable-parallelism with Tunable-bit.
Proceedings of the 52nd Annual International Symposium on Computer Architecture, 2025

Critical Variable State-Aware Directed Greybox Fuzzing.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head Attention.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

Jack of All Trades, Master of None: PMP-Guided Adaptive Multi-Teacher Distillation with Meta-Learning.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

RanDoctor: System-Level Ransomware Detection with ProbSparse Self-Attention.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

LoRATEE: A Secure and Efficient Inference Framework for Multi-Tenant LoRA LLMs Based on TEE.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

LegoZK: A Dynamically Reconfigurable Accelerator for Zero-Knowledge Proof.
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2025

ET-Former: Robust Transformer-Based Representation for Encrypted Traffic Classification.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator.
Proceedings of the 22nd ACM International Conference on Computing Frontiers, 2025

ROBIN: A Novel Framework for Accelerating Robust Multi-Variant Training.
Proceedings of the 30th Asia and South Pacific Design Automation Conference, 2025

2024
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024

A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks.
ACM Trans. Embed. Comput. Syst., September, 2024

Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs.
CoRR, 2024

The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
CoRR, 2024

Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption.
CoRR, 2024

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs.
CoRR, 2024

DyCom: A Dynamic Community Partitioning Technique for System Audit Logs.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Analyzing Cache Timing-based Side Channel Vulnerability through Cache Line Composition.
Proceedings of the IEEE Military Communications Conference, 2024

Trinity: A General Purpose FHE Accelerator.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy.
Proceedings of the IEEE International Performance, 2024

Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Search Robust and Adaptable Architecture.
Proceedings of the IEEE International Conference on Acoustics, 2024

SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

FakeGuard: Novel Architecture Support for Deepfake Detection Networks.
Proceedings of the Euro-Par 2024: Parallel Processing, 2024

EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

KSM: Killer of Spectre and Meltdown Attacks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

A Module Level Security Evaluation Method Based on Model Checking.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors.
IEEE Trans. Computers, November, 2023

Scalable Kernel $k$-Means With Randomized Sketching: From Theory to Algorithm.
IEEE Trans. Knowl. Data Eng., September, 2023

HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption.
IEEE Trans. Parallel Distributed Syst., April, 2023

Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

Representation-enhanced APT Detection Using Contrastive Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

MemInspect: Memory Forensics for investigating Fileless Attacks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs.
Proceedings of the 41st IEEE International Conference on Computer Design, 2023

TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Improving Adversarial Robustness via Channel and Depth Compatibility.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks.
Microprocess. Microsystems, March, 2022

CPP: A lightweight memory page management extension to prevent code pointer leakage.
J. Syst. Archit., 2022

Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
Cybersecur., 2022

Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations.
CoRR, 2022

Deepro: Provenance-based APT Campaigns Detection via GNN.
Proceedings of the IEEE International Conference on Trust, 2022

TACC: a secure accelerator enclave for AI workloads.
Proceedings of the SYSTOR '22: The 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13, 2022

DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022

Randomized Sketches for Clustering: Fast and Optimal Kernel $k$-Means.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining.
Proceedings of the IEEE Military Communications Conference, 2022

In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

Analysis of DRAM Vulnerability Using Computation Tree Logic.
Proceedings of the IEEE International Conference on Communications, 2022

HyBP: Hybrid Isolation-Randomization Secure Branch Predictor.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Conditional address propagation: an efficient defense mechanism against transient execution attacks.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Distributed Randomized Sketching Kernel Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection.
IEEE Trans. Very Large Scale Integr. Syst., 2021

Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks.
IEEE Trans. Computers, 2021

A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor.
J. Comput. Sci. Technol., 2021

DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
CoRR, 2021

Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Binary Neural Network Hashing for Image Retrieval.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

FCEP: A Fast Concolic Execution for Reaching Software Patches.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
Proceedings of the Security and Privacy in Communication Networks, 2021

Towards Heap-Based Memory Corruption Discovery.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

Energy-saving CNN with Clustering Channel Pruning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Fast CNN Inference by Adaptive Sparse Matrix Decomposition.
Proceedings of the International Joint Conference on Neural Networks, 2021

Automatic CNN Compression Based on Hyper-parameter Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Distributed Nyström Kernel Learning with Communications.
Proceedings of the 38th International Conference on Machine Learning, 2021

What Matters: Attentive and Relational Feature Aggregation Network for Video-Text Retrieval.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Towards Open World Traffic Classification.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

A Lightweight Isolation Mechanism for Secure Branch Predictors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

ShuffleFL: gradient-preserving federated learning using trusted execution environment.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

2020
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2020

Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory.
IEEE Trans. Neural Networks Learn. Syst., 2020

Efficient Return Address Verification Based on Dislocated Stack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Program Slice based Vulnerable Code Clone Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MLTracer: Malicious Logins Detection System via Graph Neural Network.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Malware Detection Based on Term Frequency Analysis of GPRs Features.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A novel network traffic classification approach via discriminative feature learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Deep Unsupervised Hybrid-similarity Hadamard Hashing.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Adaptive Relation Discovery from Focusing Seeds on Large Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Zipper Stack: Shadow Stacks Without Shadow.
Proceedings of the Computer Security - ESORICS 2020, 2020

SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

RCecker: a lightweight rule-based mechanism for backward control-flow integrity.
Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020

DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

Analyzing The Security of The Cache Side Channel Defences With Attack Graphs.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Divide-and-Conquer Learning with Nyström: Optimal Rate and Algorithm.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks.
ACM Trans. Archit. Code Optim., 2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation.
IEEE Access, 2019

Building Trust in Container Environment.
Proceedings of the 18th IEEE International Conference On Trust, 2019

DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

MMNR: A Network Representation Framework Based on Multi-View Motif Fusion.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features.
Proceedings of the International Joint Conference on Neural Networks, 2019

Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Prototype-Based Malware Traffic Classification with Novelty Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Deep Malware Detection Method Based on General-Purpose Register Features.
Proceedings of the Computational Science - ICCS 2019, 2019

Asymmetric Deep Cross-modal Hashing.
Proceedings of the Computational Science - ICCS 2019, 2019

Effective Self Attention Modeling for Aspect Based Sentiment Analysis.
Proceedings of the Computational Science - ICCS 2019, 2019

Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019

Ranking and Sampling in Open-Domain Question Answering.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

CacheGuard: a security-enhanced directory architecture against continuous attacks.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

NPUFort: a secure architecture of DNN accelerator against model inversion attack.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fast and Multilevel Semantic-Preserving Discrete Hashing.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

Community Focusing: Yet Another Query-Dependent Community Detection.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Venice: An Effective Resource Sharing Architecture for Data Center Servers.
ACM Trans. Comput. Syst., 2018

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters.
Proceedings of the 17th IEEE International Conference On Trust, 2018

TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Efficient Algorithms of Parallel Skyline Join over Data Streams.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

Stateful Forward-Edge CFI Enforcement with Intel MPX.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018

Learning Sentiment-Specific Word Embedding via Global Sentiment Representation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Retrieving Objects by Partitioning.
IEEE Trans. Big Data, 2017

HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2016
High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation.
IEEE Trans. Cybern., 2016

An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification.
IEEE ACM Trans. Audio Speech Lang. Process., 2016

Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Delta-Generalization: High Accuracy Data Release for Privacy Preserving.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Efficient Skyline Query over Multiple Relations.
Proceedings of the International Conference on Computational Science 2016, 2016

TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Skyline Join Query Processing over Multiple Relations.
Proceedings of the Database Systems for Advanced Applications, 2016

Quantifying the Effect of Sentiment on Topic Evolution in Chinese Microblog.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
An approach of fast data manipulation in HDFS with supplementary mechanisms.
J. Supercomput., 2015

SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation.
IEEE Trans. Image Process., 2015

A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization.
IEEE Trans. Cybern., 2015

An empirical study of morphing on behavior-based network traffic classification.
Secur. Commun. Networks, 2015

A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Spectral Clustering for Large-Scale Social Networks via a Pre-Coarsening Sampling based NystrÖm Method.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

A virtual shared metadata storage for HDFS.
Proceedings of the 10th IEEE International Conference on Networking, 2015

MAMS: A Highly Reliable Policy for Metadata Service.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Skyline Query on Anti-correlated Distributions: From the Perspective of Spatial Index.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Lotus: A framework for query optimization based on distributed cache.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

An evaluation and analysis of graph processing frameworks on five key issues.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

A Supervised Parameter Estimation Method of LDA.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

Online Anomaly Detection by Improved Grammar Compression of Log Sequences.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Continuous similarity join on data streams.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Leveraging Deletion Neighborhoods and Trie for Efficient String Similarity Search and Join.
Proceedings of the Information Retrieval Technology, 2014

2013
Highly reliable message-passing mechanism for cluster file system.
Int. J. Parallel Emergent Distributed Syst., 2013

An Adaptive Resource Sharing Platform for Internet Data Center.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

OAMS: A Highly Reliable Metadata Service for Big Data Storage.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Determine the Hardware Choice to Improve HDFS Performance Deployed in a Commodity Cluster.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Zput: A speedy data uploading approach for the Hadoop Distributed File System.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
A Hardware-Based TCP Stream State Tracking and Reassembly Solution for 10G Backbone Traffic.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

TDWS: A Job Scheduling Algorithm Based on MapReduce.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

On Accuracy of Early Traffic Classification.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

A data locality optimization algorithm for large-scale data processing in Hadoop.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Clover: A Distributed File System of Expandable Metadata Service Derived from HDFS.
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012

An empirical study of morphing on network traffic classification.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Automatic performance debugging of SPMD-style parallel programs.
J. Parallel Distributed Comput., 2011

A Runtime Fault Detection Method for HPC Cluster.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Towards quantitative analysis of data intensive computing: a case study of Hadoop.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

2010
Transformer: A New Paradigm for Building Data-Parallel Programming Models.
IEEE Micro, 2010

Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
CoRR, 2010

Scalable Group Management in Large-Scale Virtualized Clusters
CoRR, 2010

LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems
CoRR, 2010

Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2010

A Case Study for SOA System Rejuvenation.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Online Event Correlations Analysis in System Logs of Large-Scale Cluster Systems.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Request Path Driven Model for Performance Fault Diagnoses.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

2009
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms
CoRR, 2009

Multidimensional Analysis of System Logs in Large-scale Cluster Systems
CoRR, 2009

Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2009

Single-particle 3d reconstruction from cryo-electron microscopy images on GPU.
Proceedings of the 23rd international conference on Supercomputing, 2009

Precise request tracing and performance debugging for multi-tier services of black boxes.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

2007
Dawning4000A high performance computer.
Frontiers Comput. Sci. China, 2007

The design methodology of Phoenix cluster system software stack.
Proceedings of the CHINA HPC 2007, 2007

Theory of commercial application management system and its implementation - AMPS.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

A layered design methodology of cluster system stack.
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007

2006
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Easy and reliable cluster management: the self-management experience of Fire Phoenix.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

A proactive fault-detection mechanism in large-scale cluster systems.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

An Integrated Adaptive Management System for Cluster-based Web Services.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

PhoenixG: A Unified Management Framework for Industrial Information Grid.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

A Failure-Aware Scheduling Strategy in Large-Scale Cluster System.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Destructive Transaction: Human-Oriented Cluster System Management Mechanism.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Efficient Metadata Distribution Policy for Cluster File Systems.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

Adaptive Management of a Utility Computing.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

2003
Design and Performance of the Dawning Cluster File System.
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003

2002
Semi-User-Level Communication Architecture.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

AppManager: A Powerful Service-Based Application Management System for Clusters.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

2001
Cluster and Grid Superservers: The Dawning Experiences in China.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001


  Loading...