Meng Yu
Orcid: 0000-0003-2630-5956Affiliations:
- Roosevelt University, Department of Computer Science, Chicago, IL, USA
- University of Texas at San Antonio, TX, USA
- Virginia Commonwealth University, Department of Computer Science, Richmond, VA, USA
- Western Illinois University, Department of Computer Science, IL, USA
- Monmouth University, Department of Computer Science, West Long Branch, NJ, USA
- Pennsylvania State University, Cyber Security Lab, University Park, PA, USA
- Nanjing University, China (PhD 2001)
According to our database1,
Meng Yu
authored at least 50 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
IEEE Trans. Dependable Secur. Comput., 2023
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023
2021
IEEE Trans. Dependable Secur. Comput., 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
EAI Endorsed Trans. Security Safety, 2019
2018
J. Comput. Secur., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci., 2016
2015
J. Internet Serv. Inf. Secur., 2015
EURASIP J. Wirel. Commun. Netw., 2015
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
2014
Secur. Commun. Networks, 2014
Int. J. Inf. Sec., 2014
Cloud computing for detecting high-order genome-wide epistatic interaction via dynamic clustering.
BMC Bioinform., 2014
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013
Proceedings of the Bioinformatics Research and Applications, 9th International Symposium, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2011
Comput. Stand. Interfaces, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Proceedings of the SECRYPT 2010, 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the NBiS 2009, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
Proceedings of the Computer Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Information Systems Security, Second International Conference, 2006
2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur., 2005
J. Comput. Secur., 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
2003
Intrusion Masking for Distributed Atomic Operations.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
JAPS-II: A Source to Source Parallelizing Compiler for Java.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002