Mengyuan Li

Orcid: 0009-0008-2721-4021

According to our database1, Mengyuan Li authored at least 105 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Trajectory representation learning with multilevel attention for driver identification.
Expert Syst. Appl., 2025

2024
General Quasi Overlap Functions and Fuzzy Neighborhood Systems-Based Fuzzy Rough Sets With Their Applications.
IEEE Trans. Knowl. Data Eng., December, 2024

Real-Time Estimation of BDS-3 Satellite Clock Offset with Ambiguity Resolution Using B1C/B2a Signals.
Remote. Sens., May, 2024

(I, O)-Fuzzy Rough Sets Based on Overlap Functions With Their Applications to Feature Selection and Image Edge Extraction.
IEEE Trans. Fuzzy Syst., April, 2024

Industrial-oriented machine learning big data framework for temporal-spatial error prediction and control with DTSMGCN model.
J. Intell. Manuf., March, 2024

Thermal error prediction of precision boring machine tools based on extreme gradient boosting algorithm-improved sailed fish optimizer-bi-directional ordered neurons-long short-term memory neural network model and physical-edge-cloud system.
Eng. Appl. Artif. Intell., January, 2024

Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling.
CoRR, 2024

CAMASim: A Comprehensive Simulation Framework for Content-Addressable Memory based Accelerators.
CoRR, 2024

Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices.
CoRR, 2024

Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR, 2024

Variable scale fuzzy β-covering group approximation space and variable scale multi-granulation FCRSs with applications.
Appl. Soft Comput., 2024

A global feature interaction network (GFINet) for image segmentation of GaN chips.
Adv. Eng. Informatics, 2024

Efficient Near-Field User Localization and Channel Reconstruction via Image Keypoint Detection.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

High-Quality Distractors Generation for Human Exam Based on Reinforcement Learning from Preference Feedback.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

Hierarchical Policy Learning with Noisy Networks based Multi-round Conversational Recommendation.
Proceedings of the International Conference on Networking and Network Applications, 2024

A multi-factor real-time monitoring mechanism for the "mining" behavior of blockchain networks.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

C4CAM: A Compiler for CAM-based In-memory Accelerators.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Thermal error prediction and control method combining residual-based one-dimensional convolution-minimum gate unit model with physical-data-edge-cloud terminal architecture.
Neural Comput. Appl., July, 2023

BDS/GPS/Galileo Precise Point Positioning Performance Analysis of Android Smartphones Based on Real-Time Stream Data.
Remote. Sens., June, 2023

Sequence-to-sequence based LSTM network modeling and its application in thermal error control framework.
Appl. Soft Comput., May, 2023

Rapid Estimation of Undifferenced Multi-GNSS Real-Time Satellite Clock Offset Using Partial Observations.
Remote. Sens., April, 2023

Low-Profile Broadband Dual-Polarized Dipole Antenna for Base Station Applications.
Sensors, 2023

Remote Sensing Object Detection Based on Strong Feature Extraction and Prescreening Network.
IEEE Geosci. Remote. Sens. Lett., 2023

Mask Conditional Synthetic Satellite Imagery.
CoRR, 2023

Investigating the Moderating Effect of Massively Multiplayer Online (MMO) Games on the Correlation Between Flow and Game Addiction: A Meta-Analysis.
Australas. J. Inf. Syst., 2023

CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

AoI Minimization for Sensor Networks With Adaptive Packet and Energy Arrival.
Proceedings of the 24th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2023

Accelerating Polynomial Modular Multiplication with Crossbar-Based Compute-in-Memory.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

ChatVQG: A VQG Dataset Containing Diversified Conversational Questions and Guiding Information for Proactive Chatting with the Elderly.
Proceedings of the International Conference on Asian Language Processing, 2023

Enhanced SHL Recognition Using Machine Learning and Deep Learning Models with Multi-source Data.
Proceedings of the Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing, 2023

A Novel Framework for Adaptive Quadruped Robot Locomotion Learning in Uncertain Environments.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Research on the Key Application of Computer Biometric Technology in Power Self-Service Terminal.
Proceedings of the Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA 2023), 2023

2022
STN-Track: Multiobject Tracking of Unmanned Aerial Vehicles by Swin Transformer Neck and New Data Association Method.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Optimizing the Land Use and Land Cover Pattern to Increase Its Contribution to Carbon Neutrality.
Remote. Sens., 2022

Performance of Multi-GNSS in the Asia-Pacific Region: Signal Quality, Broadcast Ephemeris and Precise Point Positioning (PPP).
Remote. Sens., 2022

Basis Matching Chirplet Transform and Its Application in Tight Sandstone Gas Reservoir Identification.
IEEE Geosci. Remote. Sens. Lett., 2022

Second-Order Horizontal Multi-Synchrosqueezing Transform for Hydrocarbon Reservoir Identification.
IEEE Geosci. Remote. Sens. Lett., 2022

Semi-overlap functions and novel fuzzy reasoning algorithms with applications.
Inf. Sci., 2022

CrowdIM: Crowd-Inspired Intelligent Manufacturing Space Design.
IEEE Internet Things J., 2022

New mist-edge-fog-cloud system architecture for thermal error prediction and control enabled by deep-learning.
Eng. Appl. Artif. Intell., 2022

Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 challenge: Report.
CoRR, 2022

Deep Multi-Scale U-Net Architecture and Noise-Robust Training Strategies for Histopathological Image Segmentation.
CoRR, 2022

Pseudo Overlap Functions, Fuzzy Implications and Pseudo Grouping Functions with Applications.
Axioms, 2022

Correlation analysis-based thermal error control with ITSA-GRU-A model and cloud-edge-physical collaboration framework.
Adv. Eng. Informatics, 2022

Geometric-thermal error control system for gear profile grinding machine.
Adv. Eng. Informatics, 2022

vSGX: Virtualizing SGX Enclaves on AMD SEV.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Coupling Enhanced Emergency Braking Approach for Double Pendulum Cranes.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2022

Associative Memory Based Experience Replay for Deep Reinforcement Learning.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022


iMARS: an in-memory-computing architecture for recommendation systems.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Scene Adaptive Persistent Target Tracking and Attack Method Based on Deep Reinforcement Learning.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2022

Deep Multi-Scale U-Net Architecture and Label-Noise Robust Training Strategies for Histopathological Image Segmentation.
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022

2021
Automatic Sounding Generalization Maintaining the Characteristics of Submarine Topography.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

An Improved Swin Transformer-Based Model for Remote Sensing Object Detection and Instance Segmentation.
Remote. Sens., 2021

PBCNN: Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection.
Comput. Networks, 2021

DeepEBV: a deep learning model to predict Epstein-Barr virus (EBV) integration sites.
Bioinform., 2021

DeepHPV: a deep learning model to predict human papillomavirus integration sites.
Briefings Bioinform., 2021

A Variable Prediction Horizon Self-Tuning Method for Nonlinear Model Predictive Speed Control on PMSM Rotor Position System.
IEEE Access, 2021

CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
Proceedings of the 30th USENIX Security Symposium, 2021

Novel Imaging Biomarkers to Evaluate Heart Dysfunction Post-chemotherapy: A Preclinical MRI Feasibility Study.
Proceedings of the Statistical Atlases and Computational Models of the Heart. Multi-Disease, Multi-View, and Multi-Center Right Ventricular Segmentation in Cardiac MRI Challenge, 2021

Decentralized Multi-AGV Task Allocation based on Multi-Agent Reinforcement Learning with Information Potential Field Rewards.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

A Novel Feature Selection Method on Mutual Information and Improved Gravitational Search Algorithm for High Dimensional Biomedical Data.
Proceedings of the 13th International Conference on Computer and Automation Engineering, 2021

A Quantization Framework for Neural Network Adaption at the Edge.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Unary Coding Controlled Simultaneous Wireless Information and Power Transfer.
IEEE Trans. Wirel. Commun., 2020

Evaluation of Real-Time PPP-Based Tide Measurement Using IGS Real-Time Service.
Sensors, 2020

Deep Learning-Based FDD Non-Stationary Massive MIMO Downlink Channel Reconstruction.
IEEE J. Sel. Areas Commun., 2020

What makes learners a good fit for hybrid learning? Learning competences as predictors of experience and satisfaction in hybrid learning space.
Br. J. Educ. Technol., 2020

Deep Learning Based Fast Downlink Channel Reconstruction For FDD Massive MIMO Systems.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Towards Non-task-specific Distillation of BERT via Sentence Representation Approximation.
Proceedings of the 1st Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 10th International Joint Conference on Natural Language Processing, 2020

Highly Reliable Autonomous Redundancy for Automatic Control on Ground Test and Launch Facilities in Launch Site.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

Detecting Malicious Web Requests Using an Enhanced TextCNN.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Nonvolatile and Energy-Efficient FeFET-Based Multiplier for Energy-Harvesting Devices.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

Guiding Variational Response Generator to Exploit Persona.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
MemeFaceGenerator: Adversarial Synthesis of Chinese Meme-face from Natural Sentences.
CoRR, 2019

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Proceedings of the 28th USENIX Security Symposium, 2019

Alignment of an Unmarked Deformable Sheet Like Object Based on NURBS Fitting.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Performance Analysis of the Unary Coding Aided SWIPT in a Single-User Z-Channel.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Pipeline to Build and Test Robust 3D T1 Mapping-Based Heart Models for EP Interventions: Preliminary Results.
Proceedings of the Functional Imaging and Modeling of the Heart, 2019

Defeating Speculative-Execution Attacks on SGX with HyperRace.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
H∞ Robust Control of a Large-Piston MEMS Micromirror for Compact Fourier Transform Spectrometer Systems.
Sensors, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Research on the Architecture and Technologies of the "Internet+" Smart Site.
Proceedings of the 12th International Conference on Software, 2018

Cine and Multicontrast Late Enhanced MRI Registration for 3D Heart Model Construction.
Proceedings of the Statistical Atlases and Computational Models of the Heart. Atrial Segmentation and LV Quantification Challenges, 2018

A Hierarchical Framework for Intelligent Launch Site System.
Proceedings of the IEEE International Conference on Information and Automation, 2018

FPGA Implementation of Pulse Coupled Neural Network on for Time Series of an Image.
Proceedings of the International Conference on Electronics and Electrical Engineering Technology, 2018

Environmental Noise Classification Using Convolution Neural Networks.
Proceedings of the International Conference on Electronics and Electrical Engineering Technology, 2018

An Architecture of FPGA-Based Controller on Automatic Control System for Test and Launch in Launch Site.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2017
A novel broadcast authentication protocol for internet of vehicles.
Peer-to-Peer Netw. Appl., 2017

F-norm distance metric based robust 2DPCA and face recognition.
Neural Networks, 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Trace ratio 2DLDA with L1-norm optimization.
Neurocomputing, 2017

Joint subcarrier and power allocation for OFDMA based mobile edge computing system.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
PLC programs' checking method and strategy based on module state transfer.
Proceedings of the IEEE International Conference on Information and Automation, 2015

SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Using the Kinect to detect potentially harmful hand postures in pianists.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014


  Loading...