Dan Meng

ORCID: 0000-0002-0872-3540
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Rough Sets and Fuzzy Logic
  • Distributed and Parallel Computing Systems
  • Multi-Criteria Decision Making
  • Fuzzy Logic and Control Systems
  • Software System Performance and Reliability
  • Advanced Algebra and Logic
  • Advanced Data Storage Technologies
  • Privacy-Preserving Technologies in Data
  • Data Management and Algorithms
  • Advanced Database Systems and Queries
  • Network Security and Intrusion Detection
  • Distributed systems and fault tolerance
  • Advanced Computational Techniques and Applications
  • Fuzzy Systems and Optimization
  • Advanced Malware Detection Techniques
  • Data Mining Algorithms and Applications
  • Logic, Reasoning, and Knowledge
  • Complex Network Analysis Techniques
  • Web Data Mining and Analysis
  • Cryptography and Data Security
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Software Reliability and Analysis Research
  • Advanced Graph Neural Networks

Institute of Information Engineering
2015-2025

Chinese Academy of Sciences
2015-2025

University of Chinese Academy of Sciences
2016-2025

Southwestern University of Finance and Economics
2012-2024

Southwest University
2005-2024

University of Science and Technology Liaoning
2022

Art Institute of Portland
2020

Central South University
2016-2018

Institute of Computing Technology
2003-2013

Wuhan University of Science and Technology
2013

Abstract The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies. Despite initial explorations into the application LLMs in there is a lack comprehensive overview this research area. This paper addresses gap by providing systematic literature review, covering analysis over 300 works, encompassing 25 more than 10 downstream scenarios. Our three...

10.1186/s42400-025-00361-w article EN cc-by Cybersecurity 2025-02-05

10.1016/j.camwa.2011.10.049 article EN publisher-specific-oa Computers & Mathematics with Applications 2011-11-08

The Fermatean fuzzy set (FFS) is a momentous generalization of intuitionistic and Pythagorean that can more accurately portray the complex vague information elements has stronger expert flexibility during decision analysis. Combined Compromise Solution (CoCoSo) approach powerful decision-making technique to choose ideal objective by fusing three aggregation strategies. In this paper, an integrated, multi-criteria group-decision-making (MCGDM) based on CoCoSo FFS used assess green suppliers....

10.3390/e24060776 article EN cc-by Entropy 2022-05-31

Automatic Text Summarization (ATS), utilizing Natural Language Processing (NLP) algorithms, aims to create concise and accurate summaries, thereby significantly reducing the human effort required in processing large volumes of text. ATS has drawn considerable interest both academic industrial circles. Many studies have been conducted past survey methods; however, they generally lack practicality for real-world implementations, as often categorize previous methods from a theoretical...

10.48550/arxiv.2403.02901 preprint EN arXiv (Cornell University) 2024-03-05

Causality analysis generates a dependency graph from system audit logs, which has emerged as an important solution for attack investigation. In the graph, nodes represent entities (e.g., processes and files) edges dependencies among process writing to file). Despite promising early results, causality often produces large (> 100,000 edges) it is daunting task security analysts inspect such To address challenges in investigation, we propose DEPCOMM, summarization approach that summary by...

10.1109/sp46214.2022.9833632 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Federated Learning (FL) is a promising approach to privacy-preserving machine learning. However, recent works reveal that gradients can leak private data. Using trusted SGX-processors for this task yields gradient-preserving but requires prevent exploitation of any side-channel attacks.

10.1145/3457388.3458665 article EN 2021-04-29

10.3724/sp.j.1016.2010.01859 article EN Chinese Journal of Computers 2010-12-01

Cloud computing drives the design and development of diverse programming models for massive data processing. transformer framework aims to facilitate building data-parallel models. has two layers: a common runtime system model-specific system. using transformer, authors show how implement three models: dryad-like flow, MapReduce, All-Pairs.

10.1109/mm.2010.75 article EN IEEE Micro 2010-07-01

Abstract In the age of big data, plenty valuable sensing data have been shared to enhance scientific innovation. However, this may cause unexpected privacy leakage. Although numerous preservation techniques, such as perturbation, encryption, and anonymization, proposed conceal sensitive information, it is usually at cost application utility. Moreover, most existing works did not distinguished underlying factors, features sampling rate, which contribute differently utility information implied...

10.1186/s13673-018-0137-6 article EN cc-by Human-centric Computing and Information Sciences 2018-05-09

Soft set theory and interval are all mathematical tools for dealing with uncertainties.This paper is devoted to the discussion of soft its application.The notion sets introduced by combining set.Several operations on presented in a manner parallel that used defining lattice structures established.In addition, based decision making problem analyzed.

10.1080/18756891.2013.773192 article EN cc-by International Journal of Computational Intelligence Systems 2013-01-01

Interval-valued fuzzy set (briefly, IVFS) is a generalization of that may better model imperfect information. Similarity measure useful tool for determining the similarity degree between two concepts. In this paper, definition IVFSs presented. Th ree approaches to constructing measures are proposed. Based on approaches, three computation formulae calculating obtained. The properties examined as whole.

10.3233/ifs-141492 article EN Journal of Intelligent & Fuzzy Systems 2015-06-23

Recent technological advances have accelerated the design and deployment of kinds secure applications on smartphones. Although users can access handle their data flexibly stably with mobile devices, not only computing it poses security challenges a new dimension that disclose lots sensitive privacy information over open devices networks as well. Thus, more malwares are emerging to compromise OS steal from these applications. In this paper, we propose payment framework TrustPAY TrustZone...

10.1109/iscc.2016.7543781 article EN 2016-06-01

As a novel computing paradigm, e.g., cloud computing, become popular, researchers proposed various resource sharing techniques and provision techniques. However, very limited literatures pay attentions to the reliability of dynamically provided resources. In this paper, we propose failure rules aware node policy for heterogeneous services consolidated in infrastructure. We evaluate our with simulation approach, i.e., implement simulator service consolidation platform, which take...

10.1109/ispa.2010.69 article EN 2010-09-01

Hadoop Distributed File System (HDFS) is the storage component of framework, which designed for maintaining and processing huge datasets efficiently among cluster nodes. To cooperate with MapReduce, computation infrastructure Hadoop, data required to be uploaded from local file systems HDFS. Unfortunately when massive scale, uploading procedure becomes extremely time-consuming, causes serious delay urgent tasks. This primary contribution this paper proposition Zput, a speedy mechanism can...

10.1109/cluster.2013.6702648 article EN 2013-09-01

10.1006/jabr.1995.1263 article EN publisher-specific-oa Journal of Algebra 1995-09-01
Coming Soon ...