| 2009 |
24 | | Wanyu Zang,
Qijun Gu,
Meng Yu,
Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol.
NBiS 2009: 246-253 |
23 | | Meng Yu,
Peng Liu,
Wanyu Zang:
The implementation and evaluation of a recovery system for workflows.
J. Network and Computer Applications 32(1): 158-183 (2009) |
| 2008 |
22 | | Kun Bai,
Meng Yu,
Peng Liu:
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.
ESORICS 2008: 161-176 |
21 | | Jing Li,
Meng Yu:
Multi-Source Multihop Wireless Networks: A Trellis Representation and Network Coding.
ICC 2008: 2740-2744 |
| 2007 |
20 | | Meng Yu,
Wanyu Zang,
Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks.
ACSAC 2007: 97-106 |
19 | | Meng Yu,
Jing Li,
Rick S. Blum,
Kameran Azadet:
Toward Maximizing Throughput in Wireless Relay: A General User Cooperation Model.
CISS 2007: 25-30 |
18 | | Meng Yu,
Jing Li,
Rick S. Blum:
User Cooperation Through Network Coding.
ICC 2007: 4064-4069 |
17 | | Meng Yu,
Wanyu Zang,
Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources.
ICNSC 2007: 212-217 |
16 | | Xiaoguang Liu,
Meng Yu,
Gang Wang,
Jing Liu:
CrossTree: A new HTC architecture with high reliability and scalability.
ICPADS 2007: 1-7 |
15 | | Meng Yu,
Peng Liu,
Wanyu Zang,
Sushil Jajodia:
Trusted Recovery.
Secure Data Management in Decentralized Systems 2007: 59-94 |
| 2006 |
14 | | Meng Yu,
Shaomei Wang:
Study on Scheduling System Based on Multi-Agent of Container Terminal.
CSCWD 2006: 579-584 |
13 | | Wanyu Zang,
Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
ICISS 2006: 289-302 |
12 | | Wen-hui Li,
Meng Yu,
Zhen-hua Zhang,
Dong-fei Liu,
Jian-yuan Wang:
A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm.
ISMIS 2006: 68-76 |
11 | | Murat Uysal,
Jing Li,
Meng Yu:
Error rate performance analysis of coded free-space optical links over gamma-gamma atmospheric turbulence channels.
IEEE Transactions on Wireless Communications 5(6): 1229-1233 (2006) |
| 2005 |
10 | | Meng Yu,
Wanyu Zang,
Peng Liu:
Defensive Execution of Transactional Processes against Attacks.
ACSAC 2005: 515-526 |
9 | | Peng Liu,
Wanyu Zang,
Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) |
8 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations.
Journal of Computer Security 13(4): 623-658 (2005) |
| 2004 |
7 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Self-Healing Workflow Systems under Attacks.
ICDCS 2004: 418-425 |
| 2003 |
6 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Multi-Version Attack Recovery for Workflow System.
ACSAC 2003: 142-151 |
5 | | Meng Yu,
Indriyati Atmosukarto,
Wee Kheng Leow,
Zhiyong Huang,
Rong Xu:
3D Model Retrieval With Morphing-Based Geometric and Topological Feature Maps.
CVPR (2) 2003: 656-661 |
4 | | Brian A. Barsky,
Daniel R. Horn,
Stanley A. Klein,
Jeffrey A. Pang,
Meng Yu:
Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques.
ICCSA (3) 2003: 246-255 |
3 | | Brian A. Barsky,
Daniel R. Horn,
Stanley A. Klein,
Jeffrey A. Pang,
Meng Yu:
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques.
ICCSA (3) 2003: 256-265 |
2 | | Meng Yu,
Peng Liu,
Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations.
SEC 2003: 229-240 |
| 2002 |
1 | | Meng Yu,
Minyi Guo,
Yi Pan,
Wanyu Zang,
Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java.
PDPTA 2002: 164-170 |