Meng Yu

According to our database1, Meng Yu authored at least 85 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Risk-aware multi-objective optimized virtual machine placement in the cloud.
Journal of Computer Security, 2018

Deep Extractor Network for Target Speaker Recovery From Single Channel Speech Mixtures.
CoRR, 2018

Text-Dependent Speech Enhancement for Small-Footprint Robust Keyword Detection.
Proceedings of the Interspeech 2018, 2018

Deep Extractor Network for Target Speaker Recovery from Single Channel Speech Mixtures.
Proceedings of the Interspeech 2018, 2018

Permutation Invariant Training of Generative Adversarial Network for Monaural Speech Separation.
Proceedings of the Interspeech 2018, 2018

Path Planning for Multi-robot Systems in Intelligent Warehouse.
Proceedings of the Internet and Distributed Computing Systems, 2018

Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Risk Driving Behaviors Detection Using Pressure Cushion.
Proceedings of the Internet and Distributed Computing Systems, 2017

A Sensor-Based Human Activity Recognition System via Restricted Boltzmann Machine and Extended Space Forest.
Proceedings of the Internet and Distributed Computing Systems, 2017

The Research on the Container Truck Scheduling Based on Fuzzy Control and Ant Colony Algorithm.
Proceedings of the Human Centered Computing - Third International Conference, 2017

Reducing Security Risks of Clouds Through Virtual Machine Placement.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci., 2016

Finding hank: or how to sim an octopus.
Proceedings of the Special Interest Group on Computer Graphics and Interactive Techniques Conference, 2016

Continuous Gesture Recognition Based on Hidden Markov Model.
Proceedings of the Internet and Distributed Computing Systems, 2016

Distributed flocking with biconnected topology for multi-agent systems.
Proceedings of the 9th International Conference on Human System Interactions, 2016

2015
Stochastic observability-based analytic optimization of SINS multiposition alignment.
IEEE Trans. Aerospace and Electronic Systems, 2015

A Stationary North-Finding Scheme for an Azimuth Rotational IMU Utilizing a Linear State Equality Constraint.
Sensors, 2015

Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
J. Internet Serv. Inf. Secur., 2015

Exploiting and defending trust models in cooperative spectrum sensing.
EURASIP J. Wireless Comm. and Networking, 2015

AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Obtaining K-obfuscation for profile privacy in social networks.
Security and Communication Networks, 2014

Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec., 2014

Cloud computing for detecting high-order genome-wide epistatic interaction via dynamic clustering.
BMC Bioinformatics, 2014

Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014

A tabu search heuristic for the single row layout problem with shared clearances.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Network and Computer Applications, 2013

Cloud Computing for De Novo Metagenomic Sequence Assembly.
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013

The Design and Implementation of a Mobile Massive Open Online Courses Platform.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

MyCloud: supporting user-configured privacy protection in cloud computing.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Multi-Channel l1 Regularized Convex Speech Enhancement Model and Fast Computation by the Split Bregman Method.
IEEE Trans. Audio, Speech & Language Processing, 2012

Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
Proceedings of the Information Security and Privacy Research, 2012

Exploring Off Time Nature for Speech Enhancement.
Proceedings of the INTERSPEECH 2012, 2012

Constrained Multichannel Speech Dereverberation.
Proceedings of the INTERSPEECH 2012, 2012

A Triple-Microphone Real-Time Speech Enhancement Algorithm Based on Approximate Array Analytical Solutions.
Proceedings of the INTERSPEECH 2012, 2012

Research on Cooperative Scheduling at Container Terminal under Uncertainties.
Proceedings of the Pervasive Computing and the Networked World, 2012

Facial expression recognition using geometric and appearance features.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012

Improving Virtualization Security by Splitting Hypervisor into Smaller Components.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2011
Damage assessment and repair in attack resilient distributed database systems.
Computer Standards & Interfaces, 2011

Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2011

The Design of Intelligent Access Control Systems Based on Jess.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Modeling Category Identification Using Sparse Instance Representation.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

An Efficient RSA Implementation without Precomputation.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Facial feature detection and tracking with a 3D constrained local model.
PhD thesis, 2010

Recovery of data integrity under multi-tier architectures.
IET Information Security, 2010

Face Detection and Tracking with 3D PGA CLM.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010

Convexity and fast speech extraction by split bregman method.
Proceedings of the INTERSPEECH 2010, 2010

Reducing musical noise in blind source separation by time-domain sparse filters and split bregman method.
Proceedings of the INTERSPEECH 2010, 2010

2009
The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications, 2009

A Geometry-Inclusive Analysis for Single-Relay Systems.
Int. J. Digital Multimedia Broadcasting, 2009

The Sandblaster Software-Defined Radio Platform for Mobile 4G Wireless Communications.
Int. J. Digital Multimedia Broadcasting, 2009

A nonlocally weighted soft-constrained natural gradient algorithm for blind separation of reverberant speech.
Proceedings of the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2009

An Attack-Resilient Channel Assignment MAC Protocol.
Proceedings of the NBiS 2009, 2009

2008
Damage Quarantine and Recovery in Data Processing Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Multi-Source Multihop Wireless Networks: A Trellis Representation and Network Coding.
Proceedings of IEEE International Conference on Communications, 2008

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008

2007
Trusted Recovery.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

CrossTree: A new HTC architecture with high reliability and scalability.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Decentralized Trust Management based on the Reputation of Information Sources.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

User Cooperation Through Network Coding.
Proceedings of IEEE International Conference on Communications, 2007

Toward Maximizing Throughput in Wireless Relay: A General User Cooperation Model.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

Fibre Centred Tensor Faces.
Proceedings of the British Machine Vision Conference 2007, 2007

Database Isolation and Filtering against Data Corruption Attacks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Error rate performance analysis of coded free-space optical links over gamma-gamma atmospheric turbulence channels.
IEEE Trans. Wireless Communications, 2006

A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm.
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006

A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
Proceedings of the Information Systems Security, Second International Conference, 2006

Study on Scheduling System Based on Multi-Agent of Container Terminal.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005

Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security, 2005

Is amplify-and-forward practically better than decode-and-forward or vice versa?
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Defensive Execution of Transactional Processes against Attacks.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Self-Healing Workflow Systems under Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques.
Proceedings of the Computational Science and Its Applications, 2003

Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques.
Proceedings of the Computational Science and Its Applications, 2003

3D Model Retrieval With Morphing-Based Geometric and Topological Feature Maps.
Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2003), 2003

Multi-Version Attack Recovery for Workflow System.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
JAPS-II: A Source to Source Parallelizing Compiler for Java.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002


  Loading...