- Roosevelt University, Department of Computer Science, Chicago, IL, USA
- University of Texas at San Antonio, TX, USA
- Virginia Commonwealth University, Department of Computer Science, Richmond, VA, USA
- Western Illinois University, Department of Computer Science, IL, USA
- Monmouth University, Department of Computer Science, West Long Branch, NJ, USA
- Pennsylvania State University, Cyber Security Lab, University Park, PA, USA
- Nanjing University, China (PhD 2001)
According to our database1, Meng Yu authored at least 46 papers between 2002 and 2021.
Legend:Book In proceedings Article PhD thesis Other
IEEE Trans. Dependable Secur. Comput., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
EAI Endorsed Trans. Security Safety, 2019
J. Comput. Secur., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci., 2016
J. Internet Serv. Inf. Secur., 2015
EURASIP J. Wirel. Commun. Netw., 2015
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Secur. Commun. Networks, 2014
Int. J. Inf. Sec., 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the 11th IEEE International Conference on Trust, 2012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Comput. Stand. Interfaces, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010
J. Netw. Comput. Appl., 2009
Proceedings of the NBiS 2009, 2009
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the Information Systems Security, Second International Conference, 2006
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005
J. Comput. Secur., 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
JAPS-II: A Source to Source Parallelizing Compiler for Java.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002