Mengyuan Li

According to our database1, Mengyuan Li authored at least 35 papers between 2014 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Unary Coding Controlled Simultaneous Wireless Information and Power Transfer.
IEEE Trans. Wirel. Commun., 2020

Evaluation of Real-Time PPP-Based Tide Measurement Using IGS Real-Time Service.
Sensors, 2020

Deep Learning-Based FDD Non-Stationary Massive MIMO Downlink Channel Reconstruction.
IEEE J. Sel. Areas Commun., 2020

CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
CoRR, 2020

Towards Non-task-specific Distillation of BERT via Sentence Representation Approximation.
CoRR, 2020

What makes learners a good fit for hybrid learning? Learning competences as predictors of experience and satisfaction in hybrid learning space.
Br. J. Educ. Technol., 2020

Deep Learning Based Fast Downlink Channel Reconstruction For FDD Massive MIMO Systems.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Highly Reliable Autonomous Redundancy for Automatic Control on Ground Test and Launch Facilities in Launch Site.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

Detecting Malicious Web Requests Using an Enhanced TextCNN.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Nonvolatile and Energy-Efficient FeFET-Based Multiplier for Energy-Harvesting Devices.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

Guiding Variational Response Generator to Exploit Persona.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
MemeFaceGenerator: Adversarial Synthesis of Chinese Meme-face from Natural Sentences.
CoRR, 2019

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Proceedings of the 28th USENIX Security Symposium, 2019

Alignment of an Unmarked Deformable Sheet Like Object Based on NURBS Fitting.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Performance Analysis of the Unary Coding Aided SWIPT in a Single-User Z-Channel.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Pipeline to Build and Test Robust 3D T1 Mapping-Based Heart Models for EP Interventions: Preliminary Results.
Proceedings of the Functional Imaging and Modeling of the Heart, 2019

Defeating Speculative-Execution Attacks on SGX with HyperRace.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
H∞ Robust Control of a Large-Piston MEMS Micromirror for Compact Fourier Transform Spectrometer Systems.
Sensors, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Research on the Architecture and Technologies of the "Internet+" Smart Site.
Proceedings of the 12th International Conference on Software, 2018

Cine and Multicontrast Late Enhanced MRI Registration for 3D Heart Model Construction.
Proceedings of the Statistical Atlases and Computational Models of the Heart. Atrial Segmentation and LV Quantification Challenges, 2018

A Hierarchical Framework for Intelligent Launch Site System.
Proceedings of the IEEE International Conference on Information and Automation, 2018

2017
A novel broadcast authentication protocol for internet of vehicles.
Peer Peer Netw. Appl., 2017

F-norm distance metric based robust 2DPCA and face recognition.
Neural Networks, 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Trace ratio 2DLDA with L1-norm optimization.
Neurocomputing, 2017

Joint subcarrier and power allocation for OFDMA based mobile edge computing system.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
PLC programs' checking method and strategy based on module state transfer.
Proceedings of the IEEE International Conference on Information and Automation, 2015

SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Using the Kinect to detect potentially harmful hand postures in pianists.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014


  Loading...