Meng Yue

Orcid: 0000-0002-1473-3729

According to our database1, Meng Yue authored at least 77 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN.
IEEE Trans. Netw. Serv. Manag., June, 2024

Multi-Agent Graph-Attention Deep Reinforcement Learning for Post-Contingency Grid Emergency Voltage Control.
IEEE Trans. Neural Networks Learn. Syst., March, 2024

Bi-Level Adaptive Storage Expansion Strategy for Microgrids Using Deep Reinforcement Learning.
IEEE Trans. Smart Grid, 2024

Discovery and Characterization of Cross-Area and Intra-Area SSOs Sensitive to Delay in Droop Control of Grid-Forming Converters.
CoRR, 2024

A Case Study on Modeling Adequacy of a Grid with Subsynchronous Oscillations Involving IBRs.
CoRR, 2024

On Modeling Adequacy and Stability Analysis of IBR-related Subsynchronous Oscillations in Multimachine Systems.
CoRR, 2024

PIDGeuN: Graph Neural Network-Enabled Transient Dynamics Prediction of Networked Microgrids Through Full-Field Measurement.
IEEE Access, 2024

Advancing H&E-to-IHC Virtual Staining with Task-Specific Domain Knowledge for HER2 Scoring.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

Cooperative Multi-Agent Deep Reinforcement Learning for Adaptive Decentralized Emergency Voltage Control.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2024

2023
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

Deep-Learning-Based Koopman Modeling for Online Control Synthesis of Nonlinear Power System Transient Dynamics.
IEEE Trans. Ind. Informatics, October, 2023

DeepGraphONet: A Deep Graph Operator Network to Learn and Zero-Shot Transfer the Dynamic Response of Networked Systems.
IEEE Syst. J., September, 2023

GAN-LSTM-Based ADS-B Attack Detection in the Context of Air Traffic Control.
IEEE Internet Things J., July, 2023

Consumer-source authentication with conditional anonymity in information-centric networking.
Inf. Sci., May, 2023

MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack.
IET Inf. Secur., May, 2023

Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN.
IEEE Trans. Netw. Sci. Eng., 2023

DeepONet-grid-UQ: A trustworthy deep operator framework for predicting the power grid's post-fault trajectories.
Neurocomputing, 2023

Federated contrastive learning models for prostate cancer diagnosis and Gleason grading.
CoRR, 2023

On Approximating the Dynamic Response of Synchronous Generators via Operator Learning: A Step Towards Building Deep Operator-based Power Grid Simulators.
CoRR, 2023

MAP-GAN: Generative Adversarial Network for Privacy Preserving of Multiple Facial Attributes.
Proceedings of the 18th International Conference on Intelligent Systems and Knowledge Engineering, 2023

Modeling Adequacy of Droop-Controlled Grid-Forming Converters for Transient Studies: Singular Perturbation Analysis.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

Integrating Learning and Physics based Computation for Fast Online Transient Analysis.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

2022
LDoS attack detection method based on traffic classification prediction.
IET Inf. Secur., 2022

Can lymphovascular invasion be predicted by contrast-enhanced CT imaging features in patients with esophageal squamous cell carcinoma? A preliminary retrospective study.
BMC Medical Imaging, 2022

Glassoformer: A Query-Sparse Transformer for Post-Fault Power Grid Voltage Prediction.
Proceedings of the IEEE International Conference on Acoustics, 2022

LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication.
Proceedings of the Big Data Intelligence and Computing, 2022

Post-Fault Power Grid Voltage Prediction via 1D-CNN with Spatial Coupling.
Proceedings of the 5th International Conference on Artificial Intelligence for Industries, 2022

2021
High-Potency Models of LDoS Attack Against CUBIC + RED.
IEEE Trans. Inf. Forensics Secur., 2021

Low-High Burst: A Double Potency Varying-RTT Based Full-Buffer Shrew Attack Model.
IEEE Trans. Dependable Secur. Comput., 2021

Coherent Detection of Synchronous Low-Rate DoS Attacks.
Secur. Commun. Networks, 2021

I-CIFA: An improved collusive interest flooding attack in named data networking.
J. Inf. Secur. Appl., 2021

Adaptive Load Shedding for Grid Emergency Control via Deep Reinforcement Learning.
CoRR, 2021

Reliability Assessment Model of IMA Partition Software Using Stochastic Petri Nets.
IEEE Access, 2021

A Detection Method for I-CIFA Attack in NDN Network.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

Content Security over ICN based Smart Grid: A Cryptographic Solution.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Optimization of Airborne AFDX Transmission Delay Based on Revised RSP Method.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Modeling and Simulation on Dynamic Reliability of Multi-partition Software of IMA Based on TimeNET4.4.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
An ADS-B Message Authentication Method Based on Certificateless Short Signature.
IEEE Trans. Aerosp. Electron. Syst., 2020

The detection method of low-rate DoS attack based on multi-feature fusion.
Digit. Commun. Networks, 2020

Enabling Cyberattack-Resilient Load Forecasting through Adversarial Machine Learning.
CoRR, 2020

Review on Set-Theoretic Methods for Safety Verification and Control of Power System.
CoRR, 2020

Mitigation measures of collusive interest flooding attacks in named data networking.
Comput. Secur., 2020

Detecting DoS Attacks Based on Multi-Features in SDN.
IEEE Access, 2020

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network.
IEEE Access, 2020

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey.
IEEE Access, 2020

A Novel Zero-Watermarking Scheme Based on Variable Parameter Chaotic Mapping in NSPD-DCT Domain.
IEEE Access, 2020

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN.
IEEE Access, 2020

Machine-Learning-Based Online Transient Analysis via Iterative Computation of Generator Dynamics.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Descriptive Analytics-Based Anomaly Detection for Cybersecure Load Forecasting.
IEEE Trans. Smart Grid, 2019

Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks.
IEEE Trans. Smart Grid, 2019

Detecting LDoS attack bursts based on queue distribution.
IET Inf. Secur., 2019

Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks.
Comput. Networks, 2019

CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A secret classified label control model based on the identity-based cryptography.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Analysis of the Information Service Levels of the Agricultural Economy in the Environment of the Internet of Things and the Cloud Computing.
Proceedings of the Cyber Security Intelligence and Analytics, 2019

2018
A Bayesian Approach-Based Outage Prediction in Electric Utility Systems Using Radar Measurement Data.
IEEE Trans. Smart Grid, 2018

Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network.
Int. J. Commun. Syst., 2018

Bayesian Belief Network Model Quantification Using Distribution-Based Node Probability and Experienced Data Updates for Software Reliability Assessment.
IEEE Access, 2018

An Approach of Security Protection for VSAT Network.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Research on SWIM Services Dynamic Migration Mechanism.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
An adaptive KPCA approach for detecting LDoS attack.
Int. J. Commun. Syst., 2017

2016
Low-Rate DoS Attacks Detection Based on Network Multifractal.
IEEE Trans. Dependable Secur. Comput., 2016

Flow-oriented detection of low-rate denial of service attacks.
Int. J. Commun. Syst., 2016

A New Exploration of FB-Shrew Attack.
IEEE Commun. Lett., 2016

Spatial-temporal load forecasting using AMI data.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

A Particle Filter-Based Approach for Effectively Detecting Low-Rate Denial of Service Attacks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
SEDP-based detection of low-rate DoS attacks.
Int. J. Commun. Syst., 2015

2014
Research on the Aggregation and Synchronization of LDDoS Attack Based On Euclidean Distance.
J. Softw., 2014

Cross-correlation Based Synchronization Mechanism of LDDoS Attacks.
J. Networks, 2014

DDoS: Flood vs. Shrew.
J. Comput., 2014

A Revised Incremental Conductance MPPT Algorithm for Solar PV Generation Systems.
CoRR, 2014

2012
Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2010
The Approach of ACARS Data Encryption and Authentication.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2000
Dynamic workspace analysis and motion planning for a micro biped walking robot.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000

1999
Kinematic workspace analyses of a miniature walking robot.
Proceedings of the Proceedings 1999 IEEE/RSJ International Conference on Intelligent Robots and Systems. Human and Environment Friendly Robots with High Intelligence and Emotional Quotients, 1999


  Loading...