Xu, Meng-Dan
1589  Ergebnisse:
Personensuche X
?
1

An Enhanced Adaptive Neighbourhood Adjustment Strategy on M..:

, In: Lecture Notes in Electrical Engineering; Frontier Computing,
Xu, Meng ; Chen, Yuanfang ; Wang, Dan. - p. 52-62 , 2022
 
?
2

MCFHNet: Multi-Channel Fusion Hybrid Network for Efficient ..:

, In: 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC),
Chen, Jiaming ; Wang, Dan ; Hu, Bo... - p. 4821-4825 , 2022
 
?
3

Cluster and grid superservers: The dawning experiences in C..:

, In: Proceedings 2001 IEEE International Conference on Cluster Computing,
Zhiwei Xu ; Ninghui Sun ; Dan Meng. - p. 351,352,353,354,355,356,357,358 , 2001
 
?
4

TensorFHE: Achieving Practical Computation on Encrypted Dat..:

, In: 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA),
Fan, Shengyu ; Wang, Zhiwei ; Xu, Weizhi... - p. 922-934 , 2023
 
?
5

fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Usin..:

, In: 2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
Li, Yinglong ; Meng, Dan ; Xu, Xinchen... - p. 175-184 , 2023
 
?
6

In-depth Testing of x86 Instruction Disassemblers with Feed..:

, In: 2022 IEEE 40th International Conference on Computer Design (ICCD),
Wang, Guang ; Zhu, Ziyuan ; Cheng, Xu. - p. 463-470 , 2022
 
?
7

fuzzyCom: Privacy-Aware Trajectory Data Compression Using F..:

, In: 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS),
Li, Yinglong ; Shi, Jinyuan ; Meng, Dan... - p. 613-619 , 2022
 
?
8

DEPCOMM: Graph Summarization on System Audit Logs for Attac..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Xu, Zhiqiang ; Fang, Pengcheng ; Liu, Changlin... - p. 540-557 , 2022
 
?
9

A novel network traffic classification approach via discrim..:

, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing,
Zhao, Lixin ; Cai, Lijun ; Yu, Aimin.. - p. 1026-1033 , 2020
 
?
10

Prototype-Based Malware Traffic Classification with Novelty..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Zhao, Lixin ; Cai, Lijun ; Yu, Aimin.. - p. 3-17 , 2020
 
?
11

Zipper Stack: Shadow Stacks Without Shadow:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
Li, Jinfeng ; Chen, Liwei ; Xu, Qizhen... - p. 338-358 , 2020
 
?
12

An Approach for Poisoning Attacks Against RNN-Based Cyber A..:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Xu, Jinghui ; Wen, Yu ; Yang, Chun. - p. 1680-1687 , 2020
 
?
13

MMNR: A Network Representation Framework Based on Multi-Vie..:

, In: 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom),
Xu, Jingjing ; Yu, Aimin ; Cai, Lijun. - p. 792-801 , 2019
 
?
14

Role-based Log Analysis Applying Deep Learning for Insider ..:

, In: Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors,
Zhang, Dongxue ; Zheng, Yang ; Wen, Yu... - p. 18-20 , 2018
 
?
15

An evaluation and analysis of graph processing frameworks o..:

, In: Proceedings of the 12th ACM International Conference on Computing Frontiers,
Gao, Yun ; Zhou, Wei ; Han, Jizhong... - p. 1-8 , 2015
 
1-15