default search action
Tianhui Meng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Haiyang Huang, Tianhui Meng, Jianxiong Guo, Xuekai Wei, Weijia Jia:
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing. ACM Trans. Sens. Networks 20(3): 55:1-55:21 (2024) - [i1]Jiayan Chen, Zhirong Qian, Tianhui Meng, Xitong Gao, Tian Wang, Weijia Jia:
Fed-Credit: Robust Federated Learning with Credibility Management. CoRR abs/2405.11758 (2024) - 2021
- [j5]Weiwei Liu, Huaming Wu, Tianhui Meng, Rui Wang, Yang Wang, Chengzhong Xu:
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol. J. Syst. Archit. 117: 102102 (2021) - [j4]Tianhui Meng, Yubin Zhao, Katinka Wolter, Cheng-Zhong Xu:
On Consortium Blockchain Consistency: A Queueing Network Model Approach. IEEE Trans. Parallel Distributed Syst. 32(6): 1369-1382 (2021) - 2020
- [c9]Jingya Lv, Yang Wang, Tianhui Meng, Cheng-Zhong Xu:
NLC: An Efficient Caching Algorithm Based on Non-critical Path Least Counts for In-Memory Computing. CLOUD 2020: 80-95 - [c8]Tongzheng Sun, Jingpan Xiong, Yang Wang, Tianhui Meng, Xi Chen, Cheng-Zhong Xu:
RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing. EDGE 2020: 15-22 - [c7]Tianhui Meng, Huaming Wu, Zhihao Shang, Yubin Zhao, Cheng-Zhong Xu:
CoOMO: Cost-efficient Computation Outsourcing with Multi-site Offloading for Mobile-Edge Services. MSN 2020: 113-120 - [c6]Rui Wang, Kejiang Ye, Tianhui Meng, Cheng-Zhong Xu:
Performance Evaluation on Blockchain Systems: A Case Study on Ethereum, Fabric, Sawtooth and Fisco-Bcos. SCC 2020: 120-134
2010 – 2019
- 2018
- [j3]Tianhui Meng, Katinka Wolter, Huaming Wu, Qiushi Wang:
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks. Pervasive Mob. Comput. 45: 4-18 (2018) - 2017
- [b1]Tianhui Meng:
Security and Performance Tradeoff Analysis of Offloading Policies in Mobile Cloud Computing. Free University of Berlin, Dahlem, Germany, 2017 - [c5]Tianhui Meng, Zhihao Shang, Katinka Wolter:
An empirical performance and security evaluation of android container solutions. Cyber Security 2017: 1-8 - [c4]Zhihao Shang, Tianhui Meng, Katinka Wolter:
HyperStar2: Easy Distribution Fitting of Correlated Data. ICPE 2017: 139-142 - 2016
- [j2]Yubin Zhao, Xiaofan Li, Sha Zhang, Tianhui Meng, Yiwen Zhang:
Practical Performance Analysis for Multiple Information Fusion Based Scalable Localization System Using Wireless Sensor Networks. Sensors 16(9): 1346 (2016) - [j1]Tianhui Meng, Xiaofan Li, Sha Zhang, Yubin Zhao:
A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model. Sensors 16(10): 1606 (2016) - [c3]Tianhui Meng, Katinka Wolter:
Analysis of Mitigation Measures for Timing Attacks in Mobile-Cloud Offloading Systems. MMB/DFT 2016: 168-182 - 2015
- [c2]Tianhui Meng, Qiushi Wang, Katinka Wolter:
Model-Based Quantitative Security Analysis of Mobile Offloading Systems Under Timing Attacks. ASMTA 2015: 143-157 - [c1]Tianhui Meng, Katinka Wolter, Qiushi Wang:
Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks. EPEW 2015: 32-46
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 01:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint