default search action
Dejun Mu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Xuehua Zhao, Dejun Mu, Jiahui Yang, Jiahao Zhang:
Rational-quadratic kernel-based maximum correntropy Kalman filter for the non-Gaussian noises. J. Frankl. Inst. 361(18): 107286 (2024) - [j54]Peng Luo, Jia Liu, Jingting Xu, Qian Dang, Dejun Mu:
Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding. Remote. Sens. 16(8): 1331 (2024) - [j53]Lu Zhang, Dejun Mu, Jingyu Wang, Ruoyang Liu, Yifan He, Yaolei Li, Yu Tai, Shengbing Zhang, Xiaoya Fan, Huazhong Yang, Yongpan Liu:
RE-Specter: Examining the Architectural Features of Configurable CNN With Power Side-Channel. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 2916-2929 (2024) - [j52]Xiao Jing, Zhiang Wu, Lu Zhang, Zhe Li, Dejun Mu:
Electrical Fault Diagnosis From Text Data: A Supervised Sentence Embedding Combined With Imbalanced Classification. IEEE Trans. Ind. Electron. 71(3): 3064-3073 (2024) - 2023
- [j51]Yixian Liu, Dejun Mu:
An information asset priority evaluation method with analytic network process. Inf. Serv. Use 43(1): 19-25 (2023) - [j50]Lu Zhang, Dejun Mu, Yuxuan Huang, Jingyu Wang, Yifan He, Yaolei Li, Lizhou Liu, Kaiwei Zou, Huazhong Yang, Yongpan Liu:
Pareto Frequency-Aware Power Side-Channel Countermeasure Exploration on CNN Systolic Array. IEEE Trans. Circuits Syst. II Express Briefs 70(3): 1124-1128 (2023) - [c30]Shibo Tang, Jiacheng Zhu, Yifei Gao, Jing Zhou, Dejun Mu, Wei Hu:
Verifying RISC-V Privilege Transition Integrity Through Symbolic Execution. ATS 2023: 1-6 - [c29]Xiao Jing, Zhiang Wu, Dejun Mu:
Electrical Fault Diagnosis via Text Mining: A Weakly-Supervised Learning Model. CSCWD 2023: 1306-1311 - 2022
- [j49]Yinbo Yu, Jiajia Liu, Dejun Mu:
Counterexample-guided Spatial Flow Model Checking Methods for C Code. Int. J. Softw. Informatics 12(3): 263-284 (2022) - [j48]Yinbo Yu, Jiajia Liu, Dejun Mu:
A Points-to-Sensitive Model Checker for C Programs in IoT Firmware. IEEE Internet Things J. 9(19): 18998-19011 (2022) - 2021
- [j47]Lixiang Shen, Dejun Mu, Guo Cao, Maoyuan Qin, Jiacheng Zhu, Wei Hu:
Accelerating hardware security verification and vulnerability detection through state space reduction. Comput. Secur. 103: 102167 (2021) - [j46]Jinxiong Zhao, Sensen Guo, Dejun Mu:
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU. Comput. Secur. 111: 102459 (2021) - [j45]Xiaoxue Wu, Wei Zheng, Xiang Chen, Yu Zhao, Tingting Yu, Dejun Mu:
Improving high-impact bug report prediction with combination of interactive machine learning and active learning. Inf. Softw. Technol. 133: 106530 (2021) - [j44]Sensen Guo, Jinxiong Zhao, Xiaoyu Li, Junhong Duan, Dejun Mu, Xiao Jing:
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models. Secur. Commun. Networks 2021: 5578335:1-5578335:13 (2021) - [j43]Jinxiong Zhao, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, Dejun Mu:
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective. Secur. Commun. Networks 2021: 6699108:1-6699108:14 (2021) - 2020
- [j42]Maoyuan Qin, Xinmu Wang, Baolei Mao, Dejun Mu, Wei Hu:
A formal model for proving hardware timing properties and identifying timing channels. Integr. 72: 123-133 (2020) - [j41]Xiaoxue Wu, Wei Zheng, Xiang Chen, Fang Wang, Dejun Mu:
CVE-assisted large-scale security bug report dataset construction method. J. Syst. Softw. 160 (2020) - [j40]Lu Zhang, Dejun Mu, Wei Hu, Yu Tai:
Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis. IEEE Netw. 34(3): 44-49 (2020) - [j39]Xiaoxue Wu, Wei Zheng, Minchao Pu, Jie Chen, Dejun Mu:
Invalid bug reports complicate the software aging situation. Softw. Qual. J. 28(1): 195-220 (2020) - [j38]Lu Zhang, Dejun Mu, Wei Hu, Yu Tai, Jeremy Blackstone, Ryan Kastner:
Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2124-2137 (2020) - [j37]Weixin Hua, Dejun Mu, Zhigao Zheng, Dawei Guo:
Online multi-person tracking assist by high-performance detection. J. Supercomput. 76(6): 4076-4094 (2020) - [c28]Xiaoxue Wu, Weiqiang Fu, Dejun Mu, Deming Mao, Hui Zhang, Wei Zheng:
Improving the Security of Wireless Network Through Cross-project Security Issue Prediction. ICCC 2020: 1179-1184
2010 – 2019
- 2019
- [j36]Lantian Guo, Dejun Mu, Xiaoyan Cai, Gang Tian, Fei Hao:
Personalized QoS Prediction for Service Recommendation With a Service-Oriented Tensor Model. IEEE Access 7: 55721-55731 (2019) - [j35]Jia Jia, Atiq ur Rehman, Muhammad Hussain, Dejun Mu, Muhammad Kamran Siddiqui, Imran Zulfiqar Cheema:
Consensus-Based Multi-Person Decision Making Using Consistency Fuzzy Preference Graphs. IEEE Access 7: 178870-178878 (2019) - [j34]Xiaoxue Wu, Wei Zheng, Dejun Mu, Ning Li:
UTCPredictor: An uncertainty-aware novel teaching cases predictor. Comput. Appl. Eng. Educ. 27(6): 1518-1530 (2019) - [j33]Maoyuan Qin, Wei Hu, Xinmu Wang, Dejun Mu, Baolei Mao:
Theorem proof based gate level information flow tracking for hardware security verification. Comput. Secur. 85: 225-239 (2019) - [j32]Xing Zhang, Dejun Mu, Yitong Zhang, Henghao You, Hongrui Wang:
Type Synthesis of Multi-Loop Spatial Mechanisms With Three Translational Output Parameters Based on Virtual-Loop Theory and Assur Groups. Robotica 37(6): 1104-1119 (2019) - [j31]Zhaohui Gao, Dejun Mu, Yongmin Zhong, Chengfan Gu:
Constrained Unscented Particle Filter for SINS/GNSS/ADS Integrated Airship Navigation in the Presence of Wind Field Disturbance. Sensors 19(3): 471 (2019) - 2018
- [j30]Yu Tai, Wei Hu, Dejun Mu, Baolei Mao, Lu Zhang:
Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design. IEEE Access 6: 1822-1831 (2018) - [j29]Dejun Mu, Lantian Guo, Xiaoyan Cai, Fei Hao:
Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking. IEEE Access 6: 3107-3119 (2018) - [j28]Dongxu Huang, Dejun Mu, Libin Yang, Xiaoyan Cai:
CoDetect: Financial Fraud Detection With Anomaly Feature Detection. IEEE Access 6: 19161-19174 (2018) - [j27]Libin Yang, Yu Zheng, Xiaoyan Cai, Hang Dai, Dejun Mu, Lantian Guo, Tao Dai:
A LSTM Based Model for Personalized Context-Aware Citation Recommendation. IEEE Access 6: 59618-59627 (2018) - [j26]Dejun Mu, Junhong Duan, Xiaoyu Li, Hang Dai, Xiaoyan Cai, Lantian Guo:
Expede Herculem: Learning Multi Labels From Single Label. IEEE Access 6: 61410-61418 (2018) - [j25]Changjian Fang, Youquan Wang, Dejun Mu, Zhiang Wu:
Next-App Prediction by Fusing Semantic Information With Sequential Behavior. IEEE Access 6: 73489-73498 (2018) - [j24]Lixiang Shen, Dejun Mu, Guo Cao, Maoyuan Qin, Jeremy Blackstone, Ryan Kastner:
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection. Comput. Secur. 78: 267-280 (2018) - [j23]Xu Jiang, Dejun Mu, Huixiang Zhang:
Unix Domain Sockets Applied in Android Malware Should Not Be Ignored. Inf. 9(3): 54 (2018) - [j22]Weixin Hua, Dejun Mu, Dawei Guo, Hang Liu:
Visual tracking based on stacked Denoising Autoencoder network with genetic algorithm optimization. Multim. Tools Appl. 77(4): 4253-4269 (2018) - [j21]Zhaohui Gao, Dejun Mu, Yongmin Zhong, Chengfan Gu:
A Strap-Down Inertial Navigation/Spectrum Red-Shift/Star Sensor (SINS/SRS/SS) Autonomous Integrated System for Spacecraft Navigation. Sensors 18(7): 2039 (2018) - [j20]Baolei Mao, Wei Hu, Alric Althoff, Janarbek Matai, Yu Tai, Dejun Mu, Timothy Sherwood, Ryan Kastner:
Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(9): 1719-1732 (2018) - [j19]Deming Mao, Ling Zhang, Xiaoyu Li, Dejun Mu:
Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System. Wirel. Commun. Mob. Comput. 2018: 7579161:1-7579161:16 (2018) - [c27]Wei Hu, Xinmu Wang, Dejun Mu:
Security Path Verification Through Joint Information Flow Analysis. APCCAS 2018: 415-418 - [c26]Lu Zhang, Wei Hu, Armaiti Ardeshiricham, Yu Tai, Jeremy Blackstone, Dejun Mu, Ryan Kastner:
Examining the consequences of high-level synthesis optimizations on power side-channel. DATE 2018: 1167-1170 - [c25]Maoyuan Qin, Wei Hu, Dejun Mu, Yu Tai:
Property Based Formal Security Verification for Hardware Trojan Detection. IVSW 2018: 62-67 - 2017
- [j18]Lantian Guo, Xiaoyan Cai, Fei Hao, Dejun Mu, Changjian Fang, Libin Yang:
Exploiting Fine-Grained Co-Authorship for Personalized Citation Recommendation. IEEE Access 5: 12714-12725 (2017) - [j17]Changjian Fang, Dejun Mu, Zhenghong Deng, Zhiang Wu:
Word-sentence co-ranking for automatic extractive text summarization. Expert Syst. Appl. 72: 189-195 (2017) - [j16]Libin Yang, Xiaoyan Cai, Shirui Pan, Hang Dai, Dejun Mu:
Multi-document summarization based on sentence cluster using non-negative matrix factorization. J. Intell. Fuzzy Syst. 33(3): 1867-1879 (2017) - [j15]Shuai Ren, Xiangmo Zhao, Tao Zhang, Fangxia Shi, Dejun Mu:
基于局部高度与Mean Shift的三维模型信息隐藏算法 (Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis). 计算机科学 44(3): 187-191 (2017) - [c24]Yu Tai, Wei Hu, Dejun Mu, Baolei Mao, Lantian Guo, Maoyuan Qin:
A Simplifying Logic Approach for Gate Level Information Flow Tracking. ChinaCom (2) 2017: 302-311 - 2016
- [j14]Zhe Li, Huixiang Zhang, Dejun Mu, Lantian Guo:
Random Time Delay Effect on Out-of-Sequence Measurements. IEEE Access 4: 7509-7518 (2016) - [j13]Yu Tai, Wei Hu, Huixiang Zhang, Dejun Mu, Xing-Li Huang:
Generating optimized gate level information flow tracking logic for enforcing multilevel security. Autom. Control. Comput. Sci. 50(5): 361-368 (2016) - [c23]Jinghua Li, Xiaoyan Liu, Huixiang Zhang, Dejun Mu:
A Scalable Cloud-Based Android App Repackaging Detection Framework. GPC 2016: 113-125 - [c22]Wei Hu, Andrew Becker, Armita Ardeshiricham, Yu Tai, Paolo Ienne, Dejun Mu, Ryan Kastner:
Imprecise security: quality and complexity tradeoffs for hardware information flow tracking. ICCAD 2016: 95 - 2015
- [j12]Yansu Hu, Ang Gao, Zhijun Wang, Dejun Mu:
基于GPU加速的定向凝固相场模拟计算研究 (GPU Application on the Phase-field Simulation). 计算机科学 42(7): 19-21 (2015) - [c21]Lantian Guo, Xianrong Zheng, Chen Ding, Dejun Mu, Zhe Li:
Cloud Service Recommendation: State of the Art and Research Challenges. CCGRID 2015: 761-764 - [c20]Baolei Mao, Wei Hu, Alric Althoff, Janarbek Matai, Jason Oberg, Dejun Mu, Timothy Sherwood, Ryan Kastner:
Quantifying Timing-Based Information Flow in Cryptographic Hardware. ICCAD 2015: 552-559 - 2014
- [j11]Tao Yang, Dejun Mu, Wei Hu, Huixiang Zhang:
Energy-efficient border intrusion detection using wireless sensors network. EURASIP J. Wirel. Commun. Netw. 2014: 46 (2014) - [j10]Dejun Mu, Wei Hu, Baolei Mao, Bo Ma:
A bottom-up approach to verifiable embedded system information flow security. IET Inf. Secur. 8(1): 12-17 (2014) - [j9]Wei Hu, Dejun Mu, Jason Oberg, Baolei Mao, Mohit Tiwari, Timothy Sherwood, Ryan Kastner:
Gate-Level Information Flow Tracking for Security Lattices. ACM Trans. Design Autom. Electr. Syst. 20(1): 2:1-2:25 (2014) - [c19]Jing Zhou, Dejun Mu, Feisheng Yang, Guanzhong Dai:
Labor division for swarm robotic systems with arbitrary finite number of task types. ICIA 2014: 1113-1118 - [c18]Jing Zhou, Dejun Mu, Feisheng Yang, Guanzhong Dai:
A novel approach for analysing collective dynamics of large-scale multi-robot system in task allocation. ICIA 2014: 1137-1142 - 2013
- [j8]Wei Hu, Jason Oberg, Janet Barrientos, Dejun Mu, Ryan Kastner:
Expanding Gate Level Information Flow Tracking for Multilevel Security. IEEE Embed. Syst. Lett. 5(2): 25-28 (2013) - [c17]Bo Ma, Dejun Mu, Wei Fan, Wei Hu:
Improvements the Seccomp Sandbox Based on PBE Theory. AINA Workshops 2013: 323-328 - [c16]Chunlei Chen, Dejun Mu, Huixiang Zhang, Wei Hu:
Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU. CyberC 2013: 194-201 - 2012
- [j7]Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner:
On the Complexity of Generating Gate Level Information Flow Tracking Logic. IEEE Trans. Inf. Forensics Secur. 7(3): 1067-1080 (2012) - [c15]Wei Hu, Jason Oberg, Dejun Mu, Ryan Kastner:
Simultaneous information flow security and circuit redundancy in Boolean gates. ICCAD 2012: 585-590 - [c14]Chunlei Chen, Dejun Mu, Huixiang Zhang, Bo Hong:
A GPU-accelerated Approximate Algorithm for Incremental Learning of Gaussian Mixture Model. IPDPS Workshops 2012: 1937-1943 - 2011
- [j6]Yansu Hu, Dejun Mu, Ang Gao, Guanzhong Dai:
The Research of QoS Approach in Web Servers. Int. J. Comput. Commun. Control 6(4): 635-646 (2011) - [j5]Ang Gao, Dejun Mu, Yansu Hu:
A QoS Control Approach in Differentiated Web Caching Service. J. Networks 6(1): 62-70 (2011) - [j4]Wei Hu, Jason Oberg, Ali Irturk, Mohit Tiwari, Timothy Sherwood, Dejun Mu, Ryan Kastner:
Theoretical Fundamentals of Gate Level Information Flow Tracking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 30(8): 1128-1140 (2011) - [c13]Jianbo Lu, Guanzhong Dai, Dejun Mu, Jiang Yu, Haipeng Li:
QoS Guarantee in Tomcat Web Server: A Feedback Control Approach. CyberC 2011: 183-189
2000 – 2009
- 2009
- [j3]Hangxing Wu, Fengyuan Ren, Dejun Mu, Xianwu Gong:
An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks. Comput. Commun. 32(7-10): 1138-1147 (2009) - [c12]Xiaofeng Miao, Dejun Mu, Xingwen Han, Degang Zhang:
A Hybrid Differential Evolution for Numerical Optimization. BMEI 2009: 1-5 - [p1]Guoqing Zhang, Wu Chen, Zhong Xu, Hong Liang, Dejun Mu, Li Gao:
Geocast Routing in Urban Vehicular Ad Hoc Networks. Computer and Information Science 2009: 23-31 - 2008
- [c11]Hao Xu, Dejun Mu:
A Cluster Based Stable Multicast Routing Protocol in Ad Hoc Network. EUC (2) 2008: 723-728 - [c10]Yehang Zhu, Benjamin C. M. Fung, Dejun Mu, Yanling Li:
An Efficient Hybrid Hierarchical Document Clustering Method. FSKD (2) 2008: 395-399 - [c9]Yuting Zhao, Guanzhong Dai, Dejun Mu:
Performance Evaluation of Real-Time Video over Wireless Ad Hoc Networks. GCC 2008: 653-657 - [c8]Wenping Pan, Dejun Mu, Hangxing Wu, Lei Yao:
Feedback Control-Based QoS Guarantees in Web Application Servers. HPCC 2008: 328-334 - [c7]Wenping Pan, Dejun Mu, Hangxing Wu, Xinjia Zhang, Lei Yao:
Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers. NPC 2008: 74-85 - 2007
- [c6]Dejun Mu, Zhen Huang:
A new type of parallel finger mechanism. ROBIO 2007: 584-588 - 2006
- [j2]Zhiqun Deng, Guanzhong Dai, Ting Xie, Daowu Zhou, Dejun Mu, Xinjia Zhang:
A new node organization mechanism of a campus Grid and performance analysis. Concurr. Comput. Pract. Exp. 18(14): 1787-1798 (2006) - [c5]Yehang Zhu, Guanzhong Dai, Benjamin C. M. Fung, Dejun Mu:
Document Clustering Method Based on Frequent Co-occurring Words. PACLIC 2006 - [c4]Zhi Zhang, Guanzhong Dai, Dejun Mu:
Bandwidth-Aware Multipath Routing Protocol for Mobile Ad Hoc Networks. UIC 2006: 322-330 - 2004
- [c3]Zhiqun Deng, Dejun Mu, Guanzhong Dai, Wanlin Zhu:
Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks. AWCC 2004: 82-87 - [c2]Zhiqun Deng, Guanzhong Dai, Dejun Mu, Zhicong Liu:
Construct Campus Peer-to-Peer Networks. AWCC 2004: 88-93 - [c1]Zhiqun Deng, Zhicong Liu, Hong Luo, Guanzhong Dai, Xinjia Zhang, Dejun Mu, Hongji Tang:
Nodes' Organization Mechanisms on Campus Grid Services Environment. GCC 2004: 464-471
1990 – 1999
- 1995
- [j1]Dejun Mu, Guanzhong Dai, K. J. Ray Liu, Kung Yao:
Comments on "Multiphase systolic algorithms for spectral decomposition" [and reply]. IEEE Trans. Signal Process. 43(2): 555-556 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint