


default search action
Dan Meng 0002
Person information
- affiliation: Chinese Academy of Sciences (CAS), Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering (IIE), China
- affiliation: University of Chinese Academy of Sciences (UCAS), School of Cyber Security, China
Other persons with the same name
- Dan Meng — disambiguation page
- Dan Meng 0001
— OPPO Research Institute, Shenzhen, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Zhaoyang Wang, Yanfei Hu, Yu Wen, Boyang Zhang, Shuailou Li, Wenbo Wang, Zheng Liu, Dan Meng:
FineGCP: Fine-grained dependency graph community partitioning for attack investigation. Comput. Secur. 151: 104311 (2025) - [j21]Zhuoyu Tian
, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. Cybersecur. 8(1): 98 (2025) - [j20]Yuhui Zhang, Hong Liao, Lutan Zhao, Yuncong Shao, Zhihong Tian, XiaoFeng Wang, Dan Meng, Rui Hou:
An Efficient Speculative Federated Tree Learning System With a Lightweight NN-Based Predictor. IEEE Trans. Parallel Distributed Syst. 36(8): 1728-1743 (2025) - [c70]Yan Wang
, Xingbin Wang
, Yulan Su
, Sisi Zhang
, Zechao Lin
, Dan Meng
, Rui Hou
:
ROBIN: A Novel Framework for Accelerating Robust Multi-Variant Training. ASP-DAC 2025: 1120-1125 - [c69]Zihao Yang, Mengxin Zheng, Shengyu Fan, Qian Lou, Rui Hou, Dan Meng, Mingzhe Zhang:
Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator. CF 2025: 128-131 - [c68]Zhengbang Yang, Lutan Zhao, Peinan Li, Han Liu, Kai Li, Boyan Zhao, Dan Meng, Rui Hou:
LegoZK: A Dynamically Reconfigurable Accelerator for Zero-Knowledge Proof. HPCA 2025: 113-126 - [c67]Zechao Lin, Sisi Zhang, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
LoRATEE: A Secure and Efficient Inference Framework for Multi-Tenant LoRA LLMs Based on TEE. ICASSP 2025: 1-5 - [c66]Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:
RanDoctor: System-Level Ransomware Detection with ProbSparse Self-Attention. ICASSP 2025: 1-5 - [c65]Sisi Zhang, Zechao Lin, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
Jack of All Trades, Master of None: PMP-Guided Adaptive Multi-Teacher Distillation with Meta-Learning. ICASSP 2025: 1-5 - [c64]Xu Chen, Ningning Cui, Zhe Pan, Liwei Chen, Gang Shi, Dan Meng:
Critical Variable State-Aware Directed Greybox Fuzzing. ICSE 2025: 141-152 - [c63]Shengyu Fan
, Xianglong Deng
, Liang Kong
, Guiming Shi
, Guang Fan
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
FAST: An FHE Accelerator for Scalable-parallelism with Tunable-bit. ISCA 2025: 92-106 - [c62]Dian Jiao
, Xianglong Deng
, Zhiwei Wang
, Shengyu Fan
, Yi Chen
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
Neo: Towards Efficient Fully Homomorphic Encryption Acceleration using Tensor Core. ISCA 2025: 107-121 - [c61]Yulan Su, Sisi Zhang, Zechao Lin, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
Poseidon: A NAS-Based Ensemble Defense Method Against Multiple Perturbations. MMM (3) 2025: 215-228 - [c60]Yulan Su, Sisi Zhang, Yan Wang, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
RobSparse: Automatic Search for GPU-Friendly Robust and Sparse Vision Transformers. MMM (3) 2025: 311-325 - [c59]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
The Road to Trust: Building Enclaves within Confidential VMs. NDSS 2025 - [c58]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. SP 2025: 2827-2845 - [i12]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. CoRR abs/2505.07239 (2025) - 2024
- [j19]Xingbin Wang
, Yan Wang
, Yulan Su
, Sisi Zhang
, Dan Meng, Rui Hou
:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024) - [j18]Xingbin Wang
, Boyan Zhao
, Yulan Su
, Sisi Zhang
, Fengkai Yuan
, Jun Zhang
, Dan Meng
, Rui Hou
:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024) - [j17]Tongshuai Wu
, Liwei Chen
, Gewangzi Du
, Dan Meng, Gang Shi
:
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 19: 3986-4000 (2024) - [c57]Yifan Zhu
, Peinan Li
, Yunkai Bai
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure. DAC 2024: 2:1-2:6 - [c56]Yunkai Bai
, Peinan Li
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks. DAC 2024: 3:1-3:6 - [c55]Yan Wang
, Xingbin Wang
, Zechao Lin
, Yulan Su
, Sisi Zhang
, Rui Hou
, Dan Meng
:
Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense. DAC 2024: 5:1-5:6 - [c54]Xingbin Wang
, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46 - [c53]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [c52]Shuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng:
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy. IPCCC 2024: 1-10 - [c51]Haolai Wei
, Liwei Chen
, Zhijie Zhang
, Gang Shi
, Dan Meng
:
Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. ISSTA 2024: 730-742 - [c50]Zhijie Zhang
, Liwei Chen
, Haolai Wei
, Gang Shi
, Dan Meng
:
Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization. ISSTA 2024: 1351-1363 - [c49]Yunkai Bai, Peinan Li, Yubiao Huang, Michael C. Huang, Shijun Zhao, Lutan Zhao, Fengwei Zhang, Dan Meng, Rui Hou:
HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management. MICRO 2024: 105-120 - [c48]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. MICRO 2024: 338-351 - [c47]Feng He, Shijun Zhao, Dan Meng, Rui Hou:
MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. TrustCom 2024: 37-48 - [c46]Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng:
DyCom: A Dynamic Community Partitioning Technique for System Audit Logs. TrustCom 2024: 1486-1493 - [i11]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i10]Shengyu Fan, Xianglong Deng, Zhuoyu Tian, Zhicheng Hu, Liang Chang, Rui Hou, Dan Meng, Mingzhe Zhang:
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption. CoRR abs/2403.10188 (2024) - [i9]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - [i8]Zhiwei Wang, Haoqi He, Lutan Zhao, Peinan Li, Zhihao Li, Dan Meng, Rui Hou:
Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs. CoRR abs/2410.05934 (2024) - [i7]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. CoRR abs/2410.13405 (2024) - 2023
- [j16]Fengkai Yuan
, Kai Wang
, Jiameng Ying, Rui Hou
, Lutan Zhao, Peinan Li
, Yifan Zhu, Zhenzhou Ji
, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023) - [j15]Tao Xue
, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [j14]Zhiwei Wang
, Peinan Li
, Rui Hou
, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c45]Yifan Zhu, Peinan Li, Lutan Zhao, Dan Meng, Rui Hou:
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. DAC 2023: 1-6 - [c44]Shengyu Fan, Zhiwei Wang, Weizhi Xu
, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934 - [c43]Zhiwei Wang, Peinan Li, Rui Hou, Dan Meng:
NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs. ICCD 2023: 357-365 - [c42]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture. ICPADS 2023: 340-347 - [c41]Shuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng:
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark. SRDS 2023: 93-106 - [c40]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. TrustCom 2023: 1-9 - [c39]Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:
Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. TrustCom 2023: 920-928 - 2022
- [j13]Jiameng Ying
, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022) - [j12]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022) - [c38]Peinan Li, Rui Hou, Lutan Zhao
, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552 - [c37]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359 - [c36]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao
, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c35]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71 - [c34]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [i6]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - [i5]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022) - 2021
- [j11]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [j10]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021) - [j9]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j8]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou
, Zhenzhou Ji
, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021) - [c33]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168 - [c32]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272 - [c31]Fengkai Yuan, Kai Wang
, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad
, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c30]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c29]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c28]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - [c27]Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng:
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. IJCNN 2021: 1-10 - [c26]Xingbin Wang
, Boyan Zhao, Rui Hou, Amro Awad
, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - 2020
- [j7]Dan Meng, Rui Hou
, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [j6]Jinfeng Li
, Liwei Chen, Gang Shi, Kai Chen
, Dan Meng:
ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3165-3176 (2020) - [j5]Jinfeng Li
, Qizhen Xu
, Yongyue Li
, Liwei Chen, Gang Shi, Dan Meng:
Efficient Return Address Verification Based on Dislocated Stack. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3398-3407 (2020) - [c25]Tao Xue, Yu Wen, Bo Luo
, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c24]Xingbin Wang
, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c23]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164 - [c22]Xingbin Wang
, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197 - [c21]Kai Wang
, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413 - [c20]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. ESORICS (1) 2020: 338-358 - [c19]Wenyan An, Liwei Chen, Jinxin Wang
, Gewangzi Du, Gang Shi, Dan Meng:
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. ISPA/BDCloud/SocialCom/SustainCom 2020: 337-344 - [c18]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c17]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c16]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687 - [i4]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020) - [i3]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j4]Jun Zhang, Rui Hou, Wei Song
, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019) - [c15]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c14]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c13]Xingbin Wang
, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - [c12]Peinan Li, Lutan Zhao
, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276 - [i2]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. CoRR abs/1902.00888 (2019) - [i1]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - 2018
- [j3]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j2]Boyan Zhao
, Rui Hou, Jianbo Dong, Michael C. Huang
, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM Trans. Comput. Syst. 36(1): 2:1-2:26 (2018) - [c11]Jun Zhang, Rui Hou, Wei Song, Zhiyuan Zhan, Boyan Zhao, Mingyu Chen, Dan Meng:
Stateful Forward-Edge CFI Enforcement with Intel MPX. ACA 2018: 79-94 - 2017
- [c10]Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. IPCCC 2017: 1-9 - [c9]Liwei Chen, Mengyu Ma, Wenhao Zhang, Gang Shi, Dan Meng:
Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. SEC 2017: 568-584 - 2016
- [c8]Xianyi Zheng, Yanhong He, Jiangang Ma, Gang Shi, Dan Meng:
TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment. HPCC/SmartCity/DSS 2016: 663-670 - [c7]Xianyi Zheng, Lulu Yang, Jiangang Ma, Gang Shi, Dan Meng:
TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms. ISCC 2016: 456-462 - [c6]Fangxiao Ning, Min Zhu, Ruibang You, Gang Shi, Dan Meng:
Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. Trustcom/BigDataSE/ISPA 2016: 194-200 - [c5]Xianyi Zheng, Lulu Yang, Gang Shi, Dan Meng:
Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms. Trustcom/BigDataSE/ISPA 2016: 1944-1950 - 2014
- [j1]Yu Wen, Weiping Wang
, Li Guo, Dan Meng:
Automated Power Control for Virtualized Infrastructures. J. Comput. Sci. Technol. 29(6): 1111-1122 (2014) - 2013
- [c4]Bo Li, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng:
DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data. CSE 2013: 1303-1309
2000 – 2009
- 2009
- [c3]Guangming Tan, Ziyu Guo, Mingyu Chen, Dan Meng:
Single-particle 3d reconstruction from cryo-electron microscopy images on GPU. ICS 2009: 380-389 - 2007
- [c2]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c1]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-28 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint