Meng Yue

Orcid: 0000-0002-1473-3729

Affiliations:
  • Civil Aviation University of China, College of Safety Science and Engineering, Tianjin, China
  • Tianjin University, School of Electronic Information Engineering, China (PhD 2017)


According to our database1, Meng Yue authored at least 59 papers between 2012 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
OCREN: A countermeasure for ADS-B attacks in the context of air traffic control.
Expert Syst. Appl., 2026

2025
A DDoS attack detection method based on IQR and DFFCNN in SDN.
J. Netw. Comput. Appl., 2025

TrustCNAV: Certificateless aggregate authentication of civil navigation messages in GNSS.
Comput. Secur., 2025

Blockchain security threats: A comprehensive classification and impact assessment.
Comput. Networks, 2025

Trustworthy Management of Network Resources Based on Blockchain.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

SPRLP: Spatial-aware Pathfinding Routing for Aeronautical Ad-Hoc Networks based on Location Prediction.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

IMOEG: IMO-ELM-GRNN-Based ADS-B Attack Detection and Recovery.
Proceedings of the 2025 3rd International Conference on Communication Networks and Machine Learning, 2025

Design and Implementation of a Multi-Level Dynamic Key Management Scheme for Secure Aeronautical Broadband Communication Systems.
Proceedings of the 2025 3rd International Conference on Communication Networks and Machine Learning, 2025

Method for Filtering DDoS Attack Traffic through Routing Path within SDN Domain.
Proceedings of the 11th IEEE Conference on Big Data Security on Cloud, 2025

DAD: Enhancing Multi-Class DDoS Attack Classification using Data Augmentation with DRCGAN.
Proceedings of the 2025 4th International Conference on Big Data, 2025

Research on BBR Fairness in Multiple Scenarios.
Proceedings of the 2025 4th International Conference on Big Data, 2025

FMLM: A federated meta-learning method for learning multimodal data features.
Proceedings of the 2025 4th International Conference on Big Data, 2025

2024
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN.
IEEE Trans. Netw. Serv. Manag., June, 2024

A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

VLDoS: Variable Low-Rate DoS Attack Model for BBR Algorithm in TCP.
Proceedings of the Security and Privacy in Communication Networks, 2024

Data Source Authentication Protocol for Aviation Broadband Communication System.
Proceedings of the International Wireless Communications and Mobile Computing, 2024

Aviation Communication Protection Protocol Based on SM4 Cryptography Algorithm.
Proceedings of the Computer and Communication Engineering - 4th International Conference, 2024

2023
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

GAN-LSTM-Based ADS-B Attack Detection in the Context of Air Traffic Control.
IEEE Internet Things J., July, 2023

Consumer-source authentication with conditional anonymity in information-centric networking.
Inf. Sci., May, 2023

Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN.
IEEE Trans. Netw. Sci. Eng., 2023

2022
LDoS attack detection method based on traffic classification prediction.
IET Inf. Secur., 2022

LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication.
Proceedings of the Big Data Intelligence and Computing, 2022

2021
High-Potency Models of LDoS Attack Against CUBIC + RED.
IEEE Trans. Inf. Forensics Secur., 2021

Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model.
IEEE Trans. Dependable Secur. Comput., 2021

Coherent Detection of Synchronous Low-Rate DoS Attacks.
Secur. Commun. Networks, 2021

I-CIFA: An improved collusive interest flooding attack in named data networking.
J. Inf. Secur. Appl., 2021

Reliability Assessment Model of IMA Partition Software Using Stochastic Petri Nets.
IEEE Access, 2021

A Detection Method for I-CIFA Attack in NDN Network.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

Content Security over ICN based Smart Grid: A Cryptographic Solution.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Optimization of Airborne AFDX Transmission Delay Based on Revised RSP Method.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Modeling and Simulation on Dynamic Reliability of Multi-partition Software of IMA Based on TimeNET4.4.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
An ADS-B Message Authentication Method Based on Certificateless Short Signature.
IEEE Trans. Aerosp. Electron. Syst., 2020

The detection method of low-rate DoS attack based on multi-feature fusion.
Digit. Commun. Networks, 2020

Mitigation measures of collusive interest flooding attacks in named data networking.
Comput. Secur., 2020

Detecting DoS Attacks Based on Multi-Features in SDN.
IEEE Access, 2020

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network.
IEEE Access, 2020

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey.
IEEE Access, 2020

A Novel Zero-Watermarking Scheme Based on Variable Parameter Chaotic Mapping in NSPD-DCT Domain.
IEEE Access, 2020

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN.
IEEE Access, 2020

2019
Detecting LDoS attack bursts based on queue distribution.
IET Inf. Secur., 2019

Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks.
Comput. Networks, 2019

CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A secret classified label control model based on the identity-based cryptography.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network.
Int. J. Commun. Syst., 2018

An Approach of Security Protection for VSAT Network.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Research on SWIM Services Dynamic Migration Mechanism.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
An adaptive KPCA approach for detecting LDoS attack.
Int. J. Commun. Syst., 2017

2016
Low-Rate DoS Attacks Detection Based on Network Multifractal.
IEEE Trans. Dependable Secur. Comput., 2016

Flow-oriented detection of low-rate denial of service attacks.
Int. J. Commun. Syst., 2016

A New Exploration of FB-Shrew Attack.
IEEE Commun. Lett., 2016

A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
SEDP-based detection of low-rate DoS attacks.
Int. J. Commun. Syst., 2015

2014
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance.
J. Softw., 2014

Cross-correlation Based Synchronization Mechanism of LDDoS Attacks.
J. Networks, 2014

DDoS: Flood vs. Shrew.
J. Comput., 2014

2012
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...