Publications
Please also refer to the publication list by years of our research lab.
Conferences
- Prasad Calyam, Mayank Kejriwal, Kannappan Palaniappan, Vijay Anand, Bharat Bhargava, Jianlin Cheng, Weichao Wang, Sanjay Kumar Madria, Kerk Kee, Rohit Chadha, Mukesh Singhal, Venkata Sriram Siddhardh Nadendla, Suranjan Panigrahi, Patrice Buzzanell, Meng Yu, Linquan Bai, and Sajal K. Das. "Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents." In Proceedings of The 52nd IEEE Applied Imagery Pattern Recognition Workshop. Saint Louis, MO Sept 27-29, 2023
- Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu, “On the Cost-Effectiveness of TrustZone De- fense on ARM Platform.” In Proceedings of 21st World Conference on Information Security Applica- tions (WISA), Virtual Event, August 26-28, 2020
- Li Liu, An Wang, Wanyu Zang, Meng Yu, Mengbai Xiao and Songqing Chen. "Shuffler: Mitigate Cross-VM Side-channel Attacks via Hypervisor Scheduling". The 2018 International Conference on Security and Privacy in Communication Networks (SECURECOMM).
- Li Liu, An Wang, Wanyu Zang, Meng Yu, Songqing Chen. “Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.” In IEEE ICC 2018 Communication and Information Systems Security Symposium.
- Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger. “Trust- Shadow: Secure Execution of Unmodified Applications with ARM TrustZone.” In The 15th ACM International Conference on Mobile Systems (MobiSys 2017). June 19th - 23rd, 2017. Niagara Falls, NY, USA.
- Jin Han, Wanyu Zang, Songqing Chen, Meng Yu. “Reducing Security Risks of Clouds through Virtual Machine Placement.” In The 31th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec’17). July 19th - 21st. Philadelphia, PA, USA.
- Zili Zha, Min Li, Wanyu Zang, Meng Yu, Songqing Chen. “AppGuard: A Hardware Virtualization Based Approach on Protecting User Applications from Untrusted Commodity Operating System.” In 2015 International Conference on Computing, Networking and Communications (Invited Position Paper). February 16-19, 2015. Anaheim, California, USA. [PDF]
- Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai. “Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.” In The 19th European Symposium on Research in Computer Security (ESORICS 2014). September 7-11, 2014, Wroclaw, Poland. Accep- tance rate: 20%. [PDF]
- Bin Wang, Xiaochun Yang, Wanyu Zang and Meng Yu. “Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.” In The 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2014). June 23-25, 2014, Harbin, China.
- Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu. MyCloud -- Supporting User-Configured Privacy Protection in Cloud Computing. In Annual Computer Security Applications Conference. New Orleans, Louisiana USA, December 2013. Acceptance rate: 19%. [PDF]
- Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu and Peng Liu. Revealing Abuses of Channel Assignment Protocols in Multi-Channel Wireless Networks: An Investigation Logic Approach. In the 17th European Symposium on Research in Computer Security (ESORICS 2012). Acceptance rate: 20%.
- Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He. Improving Cloud Survivability through Dependency based Virtual Machine Placement (short paper). In the International Conference on Security and Cryptography (SECRYPT'12), Rome,Italy, 24-27 July 2012. [PDF]
- Qijun Gu, Wanyu Zang, Meng Yu, and Peng Liu. Collaborative Traffic-aware Intrusion Monitoring in Multi-channel Mesh Networks. In the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), Liverpool, UK, 25-27 June 2012.
- Wuqiong Pan, Yulong Zhang, Meng Yu, and Jiwu Jing. Improving Virtualization Security by Splitting Hypervisor into Smaller Components. In The 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'12), Institut Mines-Télécom, Paris, France. July 11-13, 2012. [PDF]
- Yulong Zhang, Min Li, Kun Bai, Meng Yu, and Wanyu Zang. Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. In IFIP International Information Security and Privacy Conference 2012, Heraklion, Crete, Greece, 4-6 June 2012. Acceptance rate: 25%. [PDF]
- Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, and Meng Yu. An efficient RSA Implementation without Precomputation. In The 7th China International Conference on Information Security and Cryptology (Inscrypt'2011), Beijing, China, November 30 - Dec 3 2011.
- Qijun Gu, Meng Yu, Wanyu Zang, and Peng Liu. Lightweight attacks against channel assignment protocols in mimc wireless networks. In IEEE ICC, Communication and Information System Security Symposium, Kyoto, Japan, 5-9 June 2011. Acceptance rate: 38.5%.
- Heywoong Kim, Qijun Gu, Meng Yu, Wangyu Zang, and Peng Liu. A simulation framework for performance analysis of multi-interface and multi-channel wireless net- works in inet/omnet++. In Proceedings of the 2010 Spring Simulation Multiconference, SpringSim ’10, pages 101:1–101:8, New York, NY, USA, 2010. ACM.
- Meng Yu, Alex Hai Wang, Wanyu Zang, and Peng Liu. Evaluating survivability and costs of three virtual machine based server architectures. In Internatinoal Conference on Security and Cryptography, pages 478–485, 2010.
- Wanyu Zang, Qijun Gu, Meng Yu, and Peng Liu. An attack-resilient channel assignment mac protocol. In Proceedings of the 2009 International Conference on Network-Based Information Systems, NBIS ’09, pages 246–253, Indianapolis, Indiana. USA, 2009. IEEE Computer Society. Acceptance rate: 37%.
- Kun Bai, Meng Yu, and Peng Liu. Trace: Zero-down-time database damage tracking, quarantine, and cleansing with negligible run-time overhead. In Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security, ESORICS ’08, pages 161–176, Berlin, Heidelberg, 2008. Springer-Verlag. Acceptance rate: 22%.
- Meng Yu, Wanyu Zang, and Peng Liu. Database isolation and filtering against data corruption attacks. In Annual Computer Security Applications Conference, pages 97–106, Miami, Florida, December 2007. Acceptance rate: 22%.
- Meng Yu, Wanyu Zang, and Barbara Reagor. Decentralized trust management based on the reputation of information sources. In IEEE International Conference on Networking, Sensing and Control (ICNSC’2007), pages 212–217, 2007.
- Wanyu Zang and Meng Yu. A dead-lock free self-healing algorithm for distributed transactional processes. In International Conference on Information systems security (ICISS’06), pages 289–302, December 2006. Acceptance rate: 30%.
- Meng Yu, Wanyu Zang, and Peng Liu. Defensive execution of transactional processes against attacks. In Annual Computer Security Applications Conference (ACSAC’05), pages 515–526, Tucson, Arizona, USA, December 2005. Acceptance rate: 19.6%.
- Meng Yu, Wanyu Zang, Peng Liu, and Jiacun Wang. The architecture of an automatic distributed recovery system. In IEEE International Conference on Networking, Sensing and Control, pages 999–1004, Tucson, Arizona, 2005.
- Meng Yu, Peng Liu, and Wanyu Zang. Self-healing workflow systems under attacks. In 24th International Conference on Distributed Computing Systems (ICDCS’04), pages 418 – 425, 2004. Acceptance rate: 17.68%.
- Meng Yu, Peng Liu, and Wanyu Zang. Intrusion masking for distributed atomic opera- tions. In The 18th IFIP International Information Security Conference, pages 229–240, Athens Chamber of Commerce and Industry, Greece, 26-28 May 2003. IFIP Technical Committee 11, Kluwer Academic Publishers. Acceptance rate: 27%.
- Meng Yu, Peng Liu, and Wanyu Zang. Multi-version based attack recovery of work- flow. In The 19th Annual Computer Security Applications Conference (ACSAC’03), pages 142–151, Las Vegas, Nevada, December 2003. Acceptance rate: 30%.
Journals
- Ganapathy Mani, Marina Haliem, Bharat Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin and Meng Yu. "Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense." IEEE Transactions on Dependable and Secure Computing, accepted (December, 2022).
- Jin Han,Wanyu Zang,Meng Yu and Ravi Sandhu,“QuantifyCo-Residency Risks in the Cloud through Deep Learning.” IEEE Transactions on Dependable and Secure Computing, Volume 18, Number 4, July 2021
- Naiwei Liu, Meng Yu, Wanyu Zang, and Ravi Sandhu, “Cost and Effectiveness of TrustZone De- fense and Side-Channel Attack on ARM Platform.” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 11, Number 4, Dec. 2020, pages 1-15
- Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi Sandhu. “Adaptive Noise Injection against SideChannel Attacks on ARM Platform.” EAI Endorsed Transactions on Security and Safety, Vol 6, No. 19, 2019.
- Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger. "Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM" Manuscript Type: SI-Emerging Attacks and Solutions for Secure Hardware in the Internet of Things". IEEE Transactions on Dependable and Secure Computing. Accepted. 2018
- Jin Han, Wanyu Zang, Li Liu, Songqing Chen, Meng Yu. “Risk-aware Multi-Objectives Optimized Virtual Machine Placement in Cloud.” Journal of Computer Security, Accepted, 2018.
- Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Wanyu Zang, Meng Yu. “Energy Efficient Approx- imate Self-Adaptive Data Collection in Wireless Sensor Networks.” Frontiers of Computer Science, Volume 10, issue 5, page 936-950, October 2016.
- David S Jackson, Wanyu Zang, Qijun Gu, Meng Yu. “Robust Detection of Rogue Signals in Cooper- ative Spectrum Sensing.” Journal of Internet Service and Information Security (JISIS), Vol. 5, No. 2, 2015.
- David S Jackson, Wanyu Zang, Qijun Gu, Wei Cheng and Meng Yu. “Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.” EURASIP Journal on Wireless Communications and Networking (Section: SI: Dynamic Spectrum Access for Throughput, Delay & Fairness Enhancement In Cognitive Radio Networks), 2014.
- Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu and Wanyu Zang. l“Obtaining K-Obfuscation for Profile Privacy in Social Networks.” Special issue of Security and Communication Networks (Wiley), Accepted, 2014.
- Shanchen Pang, Tan Li, Feng Dai, Meng Yu. “Particle Swarm Optimization Algorithm for Multi- salesman Problem with Time and Capacity Constraints.” Applied Mathematics & Information Sci- ences. Vol. 7, No. 6, 2439-2444 2013. http://dx.doi.org/10.12785/amis/070637
- Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang. “Risk balance defense approach against intrusions for network server.” International Journal of Information Security. October 2013. http://link. springer.com/article/10.1007%2Fs10207-013-0214-9.
- Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia, “Quantita- tive survivability evaluation of three virtual machine-based server architectures.” Journal of Network and Computer Applications. Volume 36, Issue 2, March 2013, Pages 781–790
- Peng Liu and Meng Yu. Damage assessment and repair in attack resilient distributed database systems. Computer Standards and Interfaces, 33:96–107, January 2011.
- Meng Yu, Wanyu Zang, and Peng Liu. Recovery of data integrity under multi-tier archi- tectures. IET Information Security, 4(4):344–351, 2010.
- Meng Yu, Peng Liu, and Wanyu Zang. The implementation and evaluation of a recovery system for workflows. Journal of Network and Computer Applications, 32:158–183, January 2009.
- Wanyu Zang, Peng Liu, and Meng Yu. How resilient is the internet against ddos attacks? — a game theoretic analysis of signature-based rate limiting. The International Journal of Intelligent Control and Systems, 12(4):307–316, December 2007.
- Wanyu Zang, Meng Yu, and Peng Liu. A distributed algorithm for workflow recovery. International Journal on Intelligent Control and Systems, 12(1):56–62, March 2007.
- Peng Liu, Wanyu Zang, and Meng Yu. Incentive-based modeling and inference of at- tacker intent, objectives, and strategies. ACM Transaction on Information System Secu- rity, 8:78–118, February 2005.
- Meng Yu, Peng Liu, and Wanyu Zang. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security, 13:623–658, July 2005.
Book Chapters
- Wanyu Zang, Meng Yu, and Peng Liu. Incentive-based methods for inferring attacker intent and strategies and measuring attack resilience. In H. Raghav Rao and Shambhu Upadhyaya, editors, Handbooks in Information Systems: Information Assurance, Secu- rity and Privacy Services, volume 4, pages 679–705. Emerald Group Publishing Limited, 2009.
- Peng Liu, Sushil Jajodia, and Meng Yu. Damage quarantine and recovery in data process- ing systems. In Database Security Handbook: Applications and Trends, pages 383–407. Springer, 2008.
- Meng Yu, Peng Liu, Wanyu Zang, and Sushil Jajodia. Trusted recovery. In Ting Yu and Sushil Jajodia, editors, Secure data management in decentralized systems, pages 59–94. Springer, 2007.
- Peng Liu, Meng Yu, and Jiwu Jing. Information assurance. In Hossein Bidgoli, editor, Handbook of Information Security, volume 2, pages 110–126. John Wiley & Sons, Inc., 2006.
Papers during Ph.D. and M.S. study (before 2002)
- Xuelin Yang, Meng Yu, and Li Xie. A run-time technique for parallel loop identifica- tion based on distributed systems. Journal of Software, China, 13(8):1718–1722, 2002.
- Meng Yu, Guihai Chen, Xuelin Yang, Li Xie, and Minyi Guo. Japs-ii: A parallizing compiler for java. Journal of Software, China, 13(4):739–747, 2002.
- Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, and Li Xie. Japs-ii: A source to source par- allelizing compiler for java. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications - Volume 1, PDPTA'02, pages 164–170. CSREA Press, 2002. Acceptance rate: 30%.
- Meng Yu, Wanyu Zang, and Li Xie. Parallelism analysis based on generalized method invocation model. Journal of Computers, China, (4):403–408, April 2002.
- Meng Yu, Wanyu Zang, and Li Xie. Method invocation localizaing optimization in parallelizaing object-oriented languages. Journal of Computers, China, (4):409–416, April 2002.
- Wanyu Zang, Meng Yu, and Li Xie. An optimized routing protocol for ad-hoc mobile network with unidirectional links (ouaor). Journal of Computers, China, (10):1030– 1037, 2002.
- Wanyu Zang, Meng Yu, and Li Xie. A survey of on-demand routing protocols for ad-hoc mobile networks. Journal of Computers, China, (10):1009–1017, 2002.
Meng Yu, Wanyu Zang, Li Xie, and Minyi Guo. A survey of parallel object-oriented languages. Journal of Software, China, 12(6):822–829, 2001. - Wanyu Zang, Meng Yu, and Li Xie. A routing protocol for ad-hoc mobile network with unidirectional links (uaor). Journal of Computers, China, (10):1030–1037, 2001.
- Wanyu Zang, Meng Yu, and Li Xie. Stable cluster based hybrid routing protocol for ad-hoc mobile networks. Journal of Computers, China, (12):1262–1271, 2001.
- Qing Gu, Daoxu Chen, and Meng Yu. Validation test of distributed program based on event sequencing constraints. Journal of Software, China, 11(8):1053–1059, 2000.
- Xuelin Yang, Meng Yu, and Li Xie. New development of automatic parallel compilation. Journal of Software, China, 11(9):1268–1275, 2000.
- Qing Gu, Meng Yu, and Li Xie. NC++ - a now based object-oriented distributed pro- gramming language. In OOT China’99 and TOOLS Asia’99, Nanjing, China, 1999.
- Meng Yu and Tianshun Yao. A hybrid method for collating chinese text: HMCTC. Journal of Chinese Information, China, (2), 1998.
Technical Reports
You may also find the following non peer-reviewed technical reports interesting.
- Yulong Zhang, Wuqiong Pan, Qingpei Wang, Kun Bai, Meng Yu. Technical Report: HypeBIOS: Enforcing VM Isolation with Minimized and Decomposed Cloud TCB. 2012. [PDF]
- Yulong Zhang, Min Li, Benjamin Wilder, Meng Yu, Kun Bai, Peng Liu. Technical Report: NeuCloud: Enabling Privacy-preserving Monitoring in Cloud Computing. 2011. [PDF]