default search action
Meng Yu 0001
Person information
- affiliation: Roosevelt University, Department of Computer Science, Chicago, IL, USA
- affiliation: University of Texas at San Antonio, TX, USA
- affiliation: Virginia Commonwealth University, Department of Computer Science, Richmond, VA, USA
- affiliation: Western Illinois University, Department of Computer Science, IL, USA
- affiliation: Monmouth University, Department of Computer Science, West Long Branch, NJ, USA
- affiliation: Pennsylvania State University, Cyber Security Lab, University Park, PA, USA
- affiliation (PhD 2001): Nanjing University, China
Other persons with the same name
- Meng Yu — disambiguation page
- Meng Yu 0002 — Sandbridge Technologies, Tarrytown, NY, USa (and 1 more)
- Meng Yu 0003 — Tencent AI Lab, Bellevue, WA, USA (and 1 more)
- Meng Yu 0004 — Wuhan University of Technology, School of Logistics Engineering, China
- Meng Yu 0005 — East China Jiaotong University, School of Information Engineering, Nanchang, China
- Meng Yu 0006 — National University of Defense Technology, Changsha, China
- Meng Yu 0007 — University of St. Andrews, School of Computer Science, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. IEEE Trans. Dependable Secur. Comput. 20(6): 4853-4867 (2023) - [c30]Prasad Calyam, Mayank Kejriwal, Praveen Rao, Jianlin Cheng, Weichao Wang, Linquan Bai, V. Sriram Siddhardh Nadendla, Sanjay Madria, Sajal K. Das, Rohit Chadha, Khaza Anuarul Hoque, Kannappan Palaniappan, Kiran Neupane, Roshan Lal Neupane, Sankeerth Gandhari, Mukesh Singhal, Lotfi Ben Othmane, Meng Yu, Vijay Anand, Bharat K. Bhargava, Brett Robertson, Kerk F. Kee, Patrice Buzzanell, Natalie A. Bolton, Harsh Taneja:
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents. AIPR 2023: 1-8 - 2021
- [j17]Jin Han, Wanyu Zang, Meng Yu, Ravi S. Sandhu:
Quantify Co-Residency Risks in the Cloud Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 18(4): 1568-1579 (2021) - 2020
- [j16]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 1-15 (2020) - [c29]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
On the Cost-Effectiveness of TrustZone Defense on ARM Platform. WISA 2020: 203-214
2010 – 2019
- 2019
- [j15]Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Trans. Security Safety 6(19): e1 (2019) - [j14]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - 2018
- [j13]Jin Han, Wangyu Zang, Li Liu, Songqing Chen, Meng Yu:
Risk-aware multi-objective optimized virtual machine placement in the cloud. J. Comput. Secur. 26(5): 707-730 (2018) - [c28]Li Liu, An Wang, Wanyu Zang, Meng Yu, Songqing Chen:
Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks. ICC 2018: 1-6 - [c27]Li Liu, An Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen:
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling. SecureComm (1) 2018: 491-511 - 2017
- [c26]Jin Han, Wanyu Zang, Songqing Chen, Meng Yu:
Reducing Security Risks of Clouds Through Virtual Machine Placement. DBSec 2017: 275-292 - [c25]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [i1]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - 2016
- [j12]Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Wanyu Zang, Meng Yu:
Energy efficient approximate self-adaptive data collection in wireless sensor networks. Frontiers Comput. Sci. 10(5): 936-950 (2016) - 2015
- [j11]David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng, Meng Yu:
Exploiting and defending trust models in cooperative spectrum sensing. EURASIP J. Wirel. Commun. Netw. 2015: 4 (2015) - [j10]David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu:
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing. J. Internet Serv. Inf. Secur. 5(2): 4-23 (2015) - [c24]Zili Zha, Min Li, Wanyu Zang, Meng Yu, Songqing Chen:
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system. ICNC 2015: 685-689 - 2014
- [j9]Xuan Guo, Meng Yu, Ning Yu, Yi Pan:
Cloud computing for detecting high-order genome-wide epistatic interaction via dynamic clustering. BMC Bioinform. 15: 102 (2014) - [j8]Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. Int. J. Inf. Sec. 13(3): 255-269 (2014) - [j7]Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu, Wanyu Zang:
Obtaining K-obfuscation for profile privacy in social networks. Secur. Commun. Networks 7(9): 1384-1398 (2014) - [c23]Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai:
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. ESORICS (1) 2014: 310-325 - [c22]Bin Wang, Xiaochun Yang, Wanyu Zang, Meng Yu:
Approximate Self-Adaptive Data Collection in Wireless Sensor Networks. WASA 2014: 564-575 - 2013
- [j6]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia:
Quantitative survivability evaluation of three virtual machine-based server architectures. J. Netw. Comput. Appl. 36(2): 781-790 (2013) - [c21]Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. ACSAC 2013: 59-68 - [c20]Xuan Guo, Xiaojun Ding, Meng Yu, Yi Pan:
Cloud Computing for De Novo Metagenomic Sequence Assembly. ISBRA 2013: 185-198 - 2012
- [c19]Wuqiong Pan, Yulong Zhang, Meng Yu, Jiwu Jing:
Improving Virtualization Security by Splitting Hypervisor into Smaller Components. DBSec 2012: 298-313 - [c18]Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu:
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. ESORICS 2012: 289-306 - [c17]Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang:
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. SEC 2012: 388-399 - [c16]Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He:
Improving Cloud Survivability through Dependency based Virtual Machine Placement. SECRYPT 2012: 321-326 - [c15]Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. TrustCom 2012: 793-800 - 2011
- [j5]Peng Liu, Meng Yu:
Damage assessment and repair in attack resilient distributed database systems. Comput. Stand. Interfaces 33(1): 96-107 (2011) - [c14]Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu:
An Efficient RSA Implementation without Precomputation. Inscrypt 2011: 251-268 - [c13]Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. ICC 2011: 1-6 - 2010
- [j4]Meng Yu, Wanyu Zang, Peng Liu:
Recovery of data integrity under multi-tier architectures. IET Inf. Secur. 4(4): 344-351 (2010) - [c12]Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu:
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485 - [c11]Heywoong Kim, Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++. SpringSim 2010: 101 - [e1]Qijun Gu, Wanyu Zang, Meng Yu:
Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 42, Springer 2010, ISBN 978-3-642-11525-7 [contents]
2000 – 2009
- 2009
- [j3]Meng Yu, Peng Liu, Wanyu Zang:
The implementation and evaluation of a recovery system for workflows. J. Netw. Comput. Appl. 32(1): 158-183 (2009) - [c10]Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253 - 2008
- [c9]Kun Bai, Meng Yu, Peng Liu:
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead. ESORICS 2008: 161-176 - [p2]Peng Liu, Sushil Jajodia, Meng Yu:
Damage Quarantine and Recovery in Data Processing Systems. Handbook of Database Security 2008: 383-407 - 2007
- [c8]Meng Yu, Wanyu Zang, Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106 - [c7]Meng Yu, Wanyu Zang, Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources. ICNSC 2007: 212-217 - [p1]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia:
Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 - 2006
- [c6]Wanyu Zang, Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. ICISS 2006: 289-302 - 2005
- [j2]Meng Yu, Peng Liu, Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations. J. Comput. Secur. 13(4): 623-658 (2005) - [j1]Peng Liu, Wanyu Zang, Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) - [c5]Meng Yu, Wanyu Zang, Peng Liu:
Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526 - 2004
- [c4]Meng Yu, Peng Liu, Wanyu Zang:
Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425 - 2003
- [c3]Meng Yu, Peng Liu, Wanyu Zang:
Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-150 - [c2]Meng Yu, Peng Liu, Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 - 2002
- [c1]Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java. PDPTA 2002: 164-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint