Meng Yu

Affiliations:
  • Roosevelt University, Department of Computer Science, Chicago, IL, USA
  • University of Texas at San Antonio, TX, USA
  • Virginia Commonwealth University, Department of Computer Science, Richmond, VA, USA
  • Western Illinois University, Department of Computer Science, IL, USA
  • Monmouth University, Department of Computer Science, West Long Branch, NJ, USA
  • Pennsylvania State University, Cyber Security Lab, University Park, PA, USA
  • Nanjing University, China (PhD 2001)


According to our database1, Meng Yu authored at least 46 papers between 2002 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Quantify Co-Residency Risks in the Cloud Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

On the Cost-Effectiveness of TrustZone Defense on ARM Platform.
Proceedings of the Information Security Applications - 21st International Conference, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform.
EAI Endorsed Trans. Security Safety, 2019

2018
Risk-aware multi-objective optimized virtual machine placement in the cloud.
J. Comput. Secur., 2018

Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2018

Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Reducing Security Risks of Clouds Through Virtual Machine Placement.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci., 2016

2015
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
J. Internet Serv. Inf. Secur., 2015

Exploiting and defending trust models in cooperative spectrum sensing.
EURASIP J. Wirel. Commun. Netw., 2015

AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Obtaining <i>K</i>-obfuscation for profile privacy in social networks.
Secur. Commun. Networks, 2014

Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec., 2014

Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
Proceedings of the Information Security and Privacy Research, 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
Damage assessment and repair in attack resilient distributed database systems.
Comput. Stand. Interfaces, 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Recovery of data integrity under multi-tier architectures.
IET Inf. Secur., 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010

2009
The implementation and evaluation of a recovery system for workflows.
J. Netw. Comput. Appl., 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

2008
Damage Quarantine and Recovery in Data Processing Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

2007
Trusted Recovery.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Decentralized Trust Management based on the Reputation of Information Sources.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Database Isolation and Filtering against Data Corruption Attacks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005

Specifying and using intrusion masking models to process distributed operations.
J. Comput. Secur., 2005

Defensive Execution of Transactional Processes against Attacks.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Self-Healing Workflow Systems under Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Multi-Version Attack Recovery for Workflow System.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
JAPS-II: A Source to Source Parallelizing Compiler for Java.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002


  Loading...