Dejun Mu

Orcid: 0000-0002-9047-5055

According to our database1, Dejun Mu authored at least 86 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RE-Specter: Examining the Architectural Features of Configurable CNN With Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024

Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding.
Remote. Sens., April, 2024

Electrical Fault Diagnosis From Text Data: A Supervised Sentence Embedding Combined With Imbalanced Classification.
IEEE Trans. Ind. Electron., March, 2024

Rational-quadratic kernel-based maximum correntropy Kalman filter for the non-Gaussian noises.
J. Frankl. Inst., 2024

2023
Pareto Frequency-Aware Power Side-Channel Countermeasure Exploration on CNN Systolic Array.
IEEE Trans. Circuits Syst. II Express Briefs, March, 2023

An information asset priority evaluation method with analytic network process.
Inf. Serv. Use, 2023

Electrical Fault Diagnosis via Text Mining: A Weakly-Supervised Learning Model.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Verifying RISC-V Privilege Transition Integrity Through Symbolic Execution.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
A Points-to-Sensitive Model Checker for C Programs in IoT Firmware.
IEEE Internet Things J., 2022

Counterexample-guided Spatial Flow Model Checking Methods for C Code.
Int. J. Softw. Informatics, 2022

2021
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective.
Secur. Commun. Networks, 2021

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models.
Secur. Commun. Networks, 2021

Improving high-impact bug report prediction with combination of interactive machine learning and active learning.
Inf. Softw. Technol., 2021

DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU.
Comput. Secur., 2021

Accelerating hardware security verification and vulnerability detection through state space reduction.
Comput. Secur., 2021

2020
Online multi-person tracking assist by high-performance detection.
J. Supercomput., 2020

Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Invalid bug reports complicate the software aging situation.
Softw. Qual. J., 2020

Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis.
IEEE Netw., 2020

CVE-assisted large-scale security bug report dataset construction method.
J. Syst. Softw., 2020

A formal model for proving hardware timing properties and identifying timing channels.
Integr., 2020

Improving the Security of Wireless Network Through Cross-project Security Issue Prediction.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Constrained Unscented Particle Filter for SINS/GNSS/ADS Integrated Airship Navigation in the Presence of Wind Field Disturbance.
Sensors, 2019

Type Synthesis of Multi-Loop Spatial Mechanisms With Three Translational Output Parameters Based on Virtual-Loop Theory and Assur Groups.
Robotica, 2019

Theorem proof based gate level information flow tracking for hardware security verification.
Comput. Secur., 2019

UTCPredictor: An uncertainty-aware novel teaching cases predictor.
Comput. Appl. Eng. Educ., 2019

Consensus-Based Multi-Person Decision Making Using Consistency Fuzzy Preference Graphs.
IEEE Access, 2019

Personalized QoS Prediction for Service Recommendation With a Service-Oriented Tensor Model.
IEEE Access, 2019

2018
Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System.
Wirel. Commun. Mob. Comput., 2018

Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

A Strap-Down Inertial Navigation/Spectrum Red-Shift/Star Sensor (SINS/SRS/SS) Autonomous Integrated System for Spacecraft Navigation.
Sensors, 2018

Visual tracking based on stacked Denoising Autoencoder network with genetic algorithm optimization.
Multim. Tools Appl., 2018

Unix Domain Sockets Applied in Android Malware Should Not Be Ignored.
Inf., 2018

Symbolic execution based test-patterns generation algorithm for hardware Trojan detection.
Comput. Secur., 2018

A LSTM Based Model for Personalized Context-Aware Citation Recommendation.
IEEE Access, 2018

Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design.
IEEE Access, 2018

Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking.
IEEE Access, 2018

Expede Herculem: Learning Multi Labels From Single Label.
IEEE Access, 2018

CoDetect: Financial Fraud Detection With Anomaly Feature Detection.
IEEE Access, 2018

Next-App Prediction by Fusing Semantic Information With Sequential Behavior.
IEEE Access, 2018

Property Based Formal Security Verification for Hardware Trojan Detection.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Examining the consequences of high-level synthesis optimizations on power side-channel.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Security Path Verification Through Joint Information Flow Analysis.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
基于局部高度与Mean Shift的三维模型信息隐藏算法 (Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis).
计算机科学, 2017

Multi-document summarization based on sentence cluster using non-negative matrix factorization.
J. Intell. Fuzzy Syst., 2017

Word-sentence co-ranking for automatic extractive text summarization.
Expert Syst. Appl., 2017

Exploiting Fine-Grained Co-Authorship for Personalized Citation Recommendation.
IEEE Access, 2017

A Simplifying Logic Approach for Gate Level Information Flow Tracking.
Proceedings of the Communications and Networking, 2017

2016
Generating optimized gate level information flow tracking logic for enforcing multilevel security.
Autom. Control. Comput. Sci., 2016

Random Time Delay Effect on Out-of-Sequence Measurements.
IEEE Access, 2016

Imprecise security: quality and complexity tradeoffs for hardware information flow tracking.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

A Scalable Cloud-Based Android App Repackaging Detection Framework.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
基于GPU加速的定向凝固相场模拟计算研究 (GPU Application on the Phase-field Simulation).
计算机科学, 2015

Quantifying Timing-Based Information Flow in Cryptographic Hardware.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

Cloud Service Recommendation: State of the Art and Research Challenges.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Gate-Level Information Flow Tracking for Security Lattices.
ACM Trans. Design Autom. Electr. Syst., 2014

A bottom-up approach to verifiable embedded system information flow security.
IET Inf. Secur., 2014

Energy-efficient border intrusion detection using wireless sensors network.
EURASIP J. Wirel. Commun. Netw., 2014

A novel approach for analysing collective dynamics of large-scale multi-robot system in task allocation.
Proceedings of the IEEE International Conference on Information and Automation, 2014

Labor division for swarm robotic systems with arbitrary finite number of task types.
Proceedings of the IEEE International Conference on Information and Automation, 2014

2013
Expanding Gate Level Information Flow Tracking for Multilevel Security.
IEEE Embed. Syst. Lett., 2013

Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Improvements the Seccomp Sandbox Based on PBE Theory.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
On the Complexity of Generating Gate Level Information Flow Tracking Logic.
IEEE Trans. Inf. Forensics Secur., 2012

A GPU-accelerated Approximate Algorithm for Incremental Learning of Gaussian Mixture Model.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Simultaneous information flow security and circuit redundancy in Boolean gates.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

2011
Theoretical Fundamentals of Gate Level Information Flow Tracking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2011

A QoS Control Approach in Differentiated Web Caching Service.
J. Networks, 2011

The Research of QoS Approach in Web Servers.
Int. J. Comput. Commun. Control, 2011

QoS Guarantee in Tomcat Web Server: A Feedback Control Approach.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2009
Geocast Routing in Urban Vehicular Ad Hoc Networks.
Proceedings of the Computer and Information Science 2009 [outstanding papers from the 8th ACIS/IEEE International Conference on Computer and Information Science, 2009

An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks.
Comput. Commun., 2009

A Hybrid Differential Evolution for Numerical Optimization.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Feedback Control-Based QoS Guarantees in Web Application Servers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Performance Evaluation of Real-Time Video over Wireless Ad Hoc Networks.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

An Efficient Hybrid Hierarchical Document Clustering Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
A new type of parallel finger mechanism.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

2006
A new node organization mechanism of a campus Grid and performance analysis.
Concurr. Comput. Pract. Exp., 2006

Bandwidth-Aware Multipath Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Document Clustering Method Based on Frequent Co-occurring Words.
Proceedings of the 20st Pacific Asia Conference on Language, Information and Computation, 2006

2004
Nodes' Organization Mechanisms on Campus Grid Services Environment.
Proceedings of the Grid and Cooperative Computing, 2004

Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Construct Campus Peer-to-Peer Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

1995
Comments on "Multiphase systolic algorithms for spectral decomposition" [and reply].
IEEE Trans. Signal Process., 1995


  Loading...