Meng Luo

ORCID: 0000-0003-2274-5719
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Human Mobility and Location-Based Analysis
  • Digital and Cyber Forensics
  • Mobile Agent-Based Network Management
  • Memory Processes and Influences
  • Memory and Neural Mechanisms
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Crime Patterns and Interventions
  • Service-Oriented Architecture and Web Services
  • Epilepsy research and treatment
  • Advanced Technologies in Various Fields
  • Software System Performance and Reliability
  • Network Security and Intrusion Detection
  • Humor Studies and Applications
  • Domain Adaptation and Few-Shot Learning
  • Economic and Technological Developments in Russia
  • Sentiment Analysis and Opinion Mining
  • Comics and Graphic Narratives
  • Data Management and Algorithms
  • Advanced Text Analysis Techniques
  • Narrative Theory and Analysis
  • Simulation and Modeling Applications
  • Multimodal Machine Learning Applications
  • Neural and Behavioral Psychology Studies
  • Traffic Prediction and Management Techniques

National University of Singapore
2024

Wuhan University
2016-2022

Xidian University
2022

Beijing University of Posts and Telecommunications
2019

Peking University
2013-2016

Renmin University of China
2012

Zhen Ding Technology (Taiwan)
2012

Existing literature suggests that feedback could effectively reduce false memories in younger adults. However, it is unclear whether memory performance older adults also might be affected by feedback. The current study tested the hypothesis can use immediate to adjust their strategy, similar adults, but after removed, may not able maintain using strategy. Older will display more than due a reduction attentional resources. In Study 1, both and adjusted gist processing item-specific biases...

10.1371/journal.pone.0168896 article EN cc-by PLoS ONE 2016-12-29

Heterogeneous model aggregation (HMA) is an effective paradigm that integrates on-device trained models heterogeneous in architecture and target task into a comprehensive model. Recent works adopt knowledge distillation to amalgamate the of learned features predictions from realize HMA. However, most them ignore disclosure exposes privacy attacks. Moreover, aggregated may suffer imbalanced supervision caused by uneven distribution amalgamated about each class show bias. In this article,...

10.1109/tdsc.2022.3183170 article EN IEEE Transactions on Dependable and Secure Computing 2022-06-15

We investigated the psychological mechanism of survival processing advantage from perspective false memory in two experiments. Using a DRM paradigm combination with analysis based on signal detection theory, we were able to separately examine participants' utilization verbatim representation and gist representation. Specifically, Experiment 1, participants rated semantically related words scenario for condition but pleasantness same lists non-survival control condition. The results showed...

10.1007/s11427-013-4537-6 article EN cc-by Science China Life Sciences 2013-08-27

Private user information can be compromised while revealing individual location data in widely used location-based social networks (LBSNs). In order to reveal the risk of privacy faced by users, we demonstrate a method, which transforms into Bayesian networks, infer private through and relationships among users LBSNs, such as Gowalla, regardless whether are active or inactive. Location from easily like consumption level. For example, people who frequently appear expensive restaurants likely...

10.1504/ijes.2016.076112 article EN International Journal of Embedded Systems 2016-01-01

This paper proposes a multiple factor bandwidth strategy (MFBS), an anonymity assessment scheme based on strategy. We first analyzed the path selection algorithm mechanism and constraint conditions then elaborated overall architecture key module design of MFBS scheme. A detailed was carried out so that it can be applied for evaluation Tor’s anonymous communication system. Finally, according to running data in node resource file network, we from different dimensions. By evaluating consumed by...

10.3390/sym11020203 article EN Symmetry 2019-02-11

Abstract With the rapid development of IoT technology, medical is one current research focuses and hotspots. In practical application IoT, achieving accurate localization effective data fusion conducive to improving operational efficiency reducing power consumption network. Therefore, this paper uses SVM KNN algorithms improve accuracy, proposes an event-driven cluster-tree algorithm DFC based on special characteristics in IoT.The a combined topology dynamically partition clusters decide...

10.21203/rs.3.rs-2292673/v1 preprint EN cc-by Research Square (Research Square) 2022-12-03
Coming Soon ...