基本信息

孟丹 男 博导 中国科学院信息工程研究所
电子邮件: mengdan@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
电子邮件: mengdan@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
研究领域
中国科学院信息工程研究所党委书记。中国计算机学会理事,《信息安全学报》执行主编,《计算机学报》和《计算机研究与发展》编委, 国务院政府特殊津贴专家。
近年来主要从事网络空间安全和计算机体系结构安全方面的研究工作,提出了网络空间内置安全思想和基于基础软硬件协同的防御体系。
主持承担了核高基、国家863计划、国家自然科学基金项目几十余项。获得国家科技进步二等奖三项,中科院科技进步一等奖一项,中科院杰出科技贡献奖一项,网络安全优秀人才奖一项。发表学术论文百余篇(其中CCF A类15篇),申请发明专利和软件著作权百余项。
招生信息
招生专业
083900-网络空间安全081201-计算机系统结构
招生方向
系统安全理论与技术网络和计算机体系结构
教育背景
1988-09--1995-07 哈尔滨工业大学 硕士、博士1984-09--1988-07 哈尔滨工业大学 学士
学历
学位
哈尔滨工业大学 19910401--19951201 工学博士学位
出国学习工作
1998-1999年先后在香港大学和美国USC大学做访问学者
工作经历
工作简历
2023-12~现在, 中国科学院信息工程研究所, 党委书记2015-07~2023-12,中国科学院信息工程研究所, 所长2011-10~2015-07,中国科学院信息工程研究所, 副所长2009-10~2011-09,中国科学院高技术研究与发展局, 副局长2006-12~2009-09,中国科学院计算技术研究所, 副所长2005-01~2006-11,中国科学院计算技术研究所, 所长助理1999-11~2004-12,中国科学院计算技术研究所智能中心, 研究员1998-09~1999-10,香港大学,美国USC大学, 访问学者1996-01~1998-07,中国科学院计算技术研究所, 博士后
专利与奖励
奖励信息
(1) 网络安全优秀人才奖, 一等奖, 部委级, 2017(2) 国家科学技术进步奖, 二等奖, 国家级, 2007(3) 科学院杰出科技成就奖, 一等奖, 部委级, 2006(4) 国家科学技术进步奖, 二等奖, 国家级, 2004(5) 国家科学技术进步奖, 二等奖, 国家级, 2001(6) 中科院科技进步一等奖, 一等奖, 部委级, 2000(7) 中科院京区优秀党员, , 部委级, 2000(8) 中科院计算所优秀员工, , 研究所(学校), 2000(9) 中科院首届"十佳"博士后, , 院级, 1998
出版信息
发表论文
[1] 吴同帅, 陈李维, 杜戈王子, 史岗, 孟丹. UltraVCS: Ultra-fine-grained Variable-based Code Slicing for Automated Vulnerability Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2024, 第 5 作者null(null): [2] 张志杰, 陈李维, 魏浩来, 史岗, 孟丹. Prospector: Boosting Directed Greybox Fuzzing for Large-scale Target Sets with Iterative Prioritization. International Symposium on Software Testing and Analysis. 2024, 第 5 作者null(null): [3] 李芳, 朱子元, 闫超, 孟丹. 基于集成学习技术的恶意软件检测方法. 信息安全学报[J]. 2024, 第 4 作者9(1): 137-155, http://lib.cqvip.com/Qikan/Article/Detail?id=7111281046.[4] 魏浩来, 陈李维, 张志杰, 史岗, 孟丹. Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC. International Symposium on Software Testing and Analysis. 2024, 第 5 作者null(null): [5] 范胜玉, 王志伟, 徐卫志, 侯锐, 孟丹, 张明喆. TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. IEEE International Symposium on High-Performance Computer Architecture, HPCA 2023, Montreal, QC, Canada.. 2023, 第 5 作者[6] 朱轶凡, 李沛南, 赵路坦, 孟丹, 侯锐. ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. 2023 60th ACM/IEEE Design Automation Conference (DAC). 2023, 第 4 作者https://ieeexplore.ieee.org/document/10247744.[7] Xue, Tao, Wen, Yu, Luo, Bo, Li, Gang, Li, Yingjiu, Zhang, Boyang, Zheng, Yang, Hu, Yanfei, Meng, Dan. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 9 作者20(2): 1104-1123, http://dx.doi.org/10.1109/TDSC.2022.3149544.[8] 李子威, 周玉灿, 樊海慧, 古晓艳, 李波, 孟丹. Preserving Potential Neighbors for Low-Degree Nodes via Reweighting in Link Prediction. ICONIP. 2023, 第 6 作者https://springer.longhoe.net/chapter/10.1007/978-981-99-8082-6_43.[9] Wang, Zhiwei, Li, Peinan, Hou, Rui, Li, Zhihao, Cao, Jiangfeng, Wang, XiaoFeng, Meng, Dan. HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2023, 第 7 作者34(4): 1067-1081, http://dx.doi.org/10.1109/TPDS.2022.3228628.[10] Yuan, Fengkai, Wang, Kai, Ying, Jiameng, Hou, Rui, Zhao, Lutan, Li, Peinan, Zhu, Yifan, Ji, Zhenzhou, Meng, Dan. Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2023, 第 9 作者42(4): 1280-1294, http://dx.doi.org/10.1109/TCAD.2022.3193325.[11] 2023 42nd International Symposium on Reliable Distributed Systems (SRDS). 2023, 第 6 作者[12] 吝常青, 田鑫, 侯锐, 孟丹. 基于边界检测的安全数据预取方案. 信息安全学报[J]. 2022, 第 4 作者7(1): 114-125, http://lib.cqvip.com/Qikan/Article/Detail?id=7106611177.[13] Yin Rong, Liu Yong, Meng Dan. Distributed Randomized Sketching Kernel Learning. Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)[J]. 2022, 第 3 作者[14] Ying, Jiameng, Hou, Rui, Zhao, Lutan, Yuan, Fengkai, Zhao, Penghui, Meng, Dan. CPP: A lightweight memory page management extension to prevent code pointer leakage. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2022, 第 6 作者130: http://dx.doi.org/10.1016/j.sysarc.2022.102679.[15] 王宇航, 郭涛, 张潇丹, 孟丹, 韩冀中, 周熙. 互联网信息服务内容安全要求及评估框架研究. 信息安全学报[J]. 2022, 第 4 作者7(1): 27-39, http://lib.cqvip.com/Qikan/Article/Detail?id=7106611171.[16] Tao Xue, Yu Wen, Boyang Zhang, Yang Zheng, Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Transactions on Dependable and Secure Computing (TDSC)[J]. 2022, 第 5 作者[17] Zhiqiang Xu, Yu Wen, Dan Meng. DepComm: Graph Summarization on System Audit Logs for Attack Investigation. IEEE Symposium on Security and Privacy (S&P). 2022, 第 3 作者[18] Wang, Kai, Yuan, Fengkai, Zhao, Lutan, Hou, Rui, Ji, Zhenzhou, Meng, Dan. Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. MICROPROCESSORS AND MICROSYSTEMS[J]. 2022, 第 6 作者89: http://dx.doi.org/10.1016/j.micpro.2021.104420.[19] Wanqian Zhang, 吴大衍, Yu Zhou, Bo Li, Weiping Wang, Dan Meng. Binary Neural Network Hashing for Image Retrieval. SIGIR (CCF-A类会议). 2021, 第 6 作者[20] Zhao, Lutan, Li, Peinan, Hou, Rui, Huang, Michael C, Liu, Peng, Zhang, Lixin, Meng, Dan. Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE TRANSACTIONS ON COMPUTERS[J]. 2021, 第 7 作者70(7): 963-978, http://dx.doi.org/10.1109/TC.2020.2997555.[21] Wang, Kai, Yuan, Fengkai, Zhao, Lutan, Hou, Rui, Ji, Zhenzhou, Meng, Dan. Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS[J]. 2021, 第 6 作者29(2): 347-358, https://www.webofscience.com/wos/woscc/full-record/WOS:000613352000009.[22] 孟丹. NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). 2021, 第 1 作者[23] Li, Yu, Ye, Haipeng, Gao, Xing, Sun, Dongqi, Li, Zehong, Zhang, Ninghui, Leng, Xuejing, Meng, Dan, Zheng, Ji. Spatiotemporal Patterns of Urbanization in the Three Most Developed Urban Agglomerations in China Based on Continuous Nighttime Light Data (2000-2018). REMOTE SENSING[J]. 2021, 第 8 作者13(12): http://dx.doi.org/10.3390/rs13122245.[24] Zhao, LuTan, Hou, Rui, Wang, Kai, Su, YuLan, Li, PeiNan, Meng, Dan. A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2021, 第 6 作者36(5): 1022-1036, [25] 孟丹. Distributed Nystrom Kernel Learning with Communications. Proceedings of the 38th International Conference on Machine Learning. 2021, 第 1 作者[26] Yu Li, Haipeng Ye, Xu Sun, Ji Zheng, Dan Meng. Coupling Analysis of the Thermal Landscape and Environmental Carrying Capacity of Urban Expansion in Beijing (China) over the Past 35 Years. SUSTAINABILITY[J]. 2021, 第 5 作者13(2): https://doaj.org/article/c1b76069cade49a3becdc219f120a8d8.[27] Haipeng Ye, Zehong Li, Ninghui Zhang, Xuejing Leng, Dan Meng, Ji Zheng, Yu Li. Variations in the Effects of Landscape Patterns on the Urban Thermal Environment during Rapid Urbanization (1990-2020) in Megacities. REMOTE SENSING[J]. 2021, 第 5 作者13(17): http://dx.doi.org/10.3390/rs13173415.[28] 李晔, 李沛南, 赵路坦, 侯锐, 张立新, 孟丹. 瞬态执行漏洞攻击及防御综述. 高技术通讯[J]. 2020, 第 6 作者30(8): 774-782, http://lib.cqvip.com/Qikan/Article/Detail?id=7102778104.[29] An Wenyan, Chen Liwei, Du gewangzi, Shi Gang, Meng Dan. AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. The 18th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA)[J]. 2020, 第 5 作者[30] Li Jinfeng, Chen Liwei, Xu Qizhen, Tian Linan, Shi Gang, Chen Kai, Meng Dan. Zipper Stack: Shadow Stacks Without Shadow. The 25th European Symposium on Research in Computer Security (ESORICS). 2020, 第 7 作者http://arxiv.org/abs/1902.00888.[31] Li, Xiaoxin, Li, Jiazhen, Hou, Rui, Meng, Dan, ACM. RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity. 17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020). 2020, 第 4 作者158-164, http://dx.doi.org/10.1145/3387902.3392629.[32] Zhao, Suya, Wei, Renzheng, Cai, Lijun, Yu, Aimin, Meng, Dan, Zhou, J, Luo, X, Shen, Q, Xu, Z. CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 5 作者11999: 181-196, [33] Wei, Renzheng, Cai, Lijun, Yu, Aimin, Meng, Dan, Zhou, J, Luo, X, Shen, Q, Xu, Z. AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 4 作者11999: 341-356, [34] 韩锦荣, 张元曈, 朱子元, 孟丹. 基于底层数据流分析的恶意软件检测方法. 信息安全学报[J]. 2020, 第 4 作者5(4): 123-137, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200409&flag=1.[35] Li, Jinfeng, Xu, Qizhen, Li, Yongyue, Chen, Liwei, Shi, Gang, Meng, Dan. Efficient Return Address Verification Based on Dislocated Stack. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2020, 第 6 作者39(11): 3398-3407, http://dx.doi.org/10.1109/TCAD.2020.3012645.[36] Yin, Rong, Liu, Yong, Wang, Weiping, Meng, Dan. Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (TNNLS)[J]. 2020, 第 4 作者31(9): 3512-3524, https://www.webofscience.com/wos/woscc/full-record/WOS:000566342500029.[37] Zhao, Lixin, Cai, Lijun, Yu, Aimin, Xu, Zhen, Meng, Dan, ACM. A Novel Network Traffic Classification Approach via Discriminative Feature Learning. PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20). 2020, 第 5 作者1026-1033, http://dx.doi.org/10.1145/3341105.3373844.[38] Tao Xue, Yu Wen, Boyang Zhang, Yang Zheng, Dan Meng. GuardSpark++: fine-grained purpose-aware access control for secure data sharing and analysis in Spark. Annual Computer Security Applications Conference (ACSAC). 2020, 第 5 作者[39] Limin Wang, Ziyuan Zhu. Analyzing the Security of the Cache Side Channel Defences with Attack Graphs. 25th Asia and South Pacific Design Automation Conference, ASP-DAC 2020[J]. 2020, [40] J. Zhou*, Y. Chen, W. Wang, S. He, D. Meng. A Highly Reliable Metadata Service for Large-Scale Distributed File Systems (CCF-A). TPDS[J]. 2020, 31(2): 374-392, [41] Zhu, Jianping, Hou, Rui, Wang, XiaoFeng, Wang, Wenhao, Cao, Jiangfeng, Zhao, Boyan, Wang, Zhongpu, Zhang, Yuhui, Ying, Jiameng, Zhang, Lixin, Meng, Dan, IEEE. Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020). 2020, 第 11 作者1450-1465, [42] Li, Jinfeng, Chen, Liwei, Shi, Gang, Chen, Kai, Meng, Dan. ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2020, 第 5 作者39(11): 3165-3176, http://dx.doi.org/10.1109/TCAD.2020.3012640.[43] Zheng, Ji, Hu, Yingjie, Boldanov, Tamir, Bazarzhapov, Tcogto, Meng, Dan, Li, Yu, Dong, Suocheng. Comprehensive assessment of the coupling coordination degree between urbanization and ecological environment in the Siberian and Far East Federal Districts, Russia from 2005 to 2017. PEERJ[J]. 2020, 第 5 作者8: https://doaj.org/article/b03bdddd5f0040d1a039590759c61dee.[44] Yin, Rong, Liu, Yong, Wang, Weiping, Meng, Dan, Plant, C, Wang, H, Cuzzocrea, A, Zaniolo, C, Wu, X. Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020)[J]. 2020, 第 4 作者1376-1381, [45] 赵博彦, 侯锐, 张乾龙, 包云岗, 张立新, 孟丹. 松耦合数据中心体系架构研究综述. 高技术通讯[J]. 2020, 第 6 作者30(1): 1-12, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=GJSX202001002&v=MDg3OThNMUZyQ1VSN3FlWitkcEZpbm1VTHJOSWlmWWRyRzRITkhNcm85RlpvUjhlWDFMdXhZUzdEaDFUM3FUclc=.[46] Wang, Xingbin, Hou, Rui, Zhao, Boyan, Yuan, Fengkai, Zhang, Jun, Meng, Dan, Qian, Xuehai, ACM. DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV). 2020, 第 6 作者19-34, http://dx.doi.org/10.1145/3373376.3378532.[47] Wanqian Zhang, 吴大衍, Yu Zhou, Bo Li, Weiping Wang, Dan Meng. Deep Unsupervised Hybrid-similarity Hadamard Hashing. ACM MM (CCF-A类会议). 2020, 第 6 作者[48] Meng, Dan, Hou, Rui, Shi, Gang, Tu, Bibo, Yu, Aimin, Zhu, Ziyuan, Jia, Xiaoqi, Wen, Yu, Yang, Yun. Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE TRANSACTIONS ON COMPUTERS[J]. 2020, 第 1 作者69(11): 1571-1583, https://www.webofscience.com/wos/woscc/full-record/WOS:000576255400002.[49] 岳世峰, 林政, 王伟平, 孟丹. 智能回复系统研究综述. 信息安全学报[J]. 2020, 第 4 作者5(1): 20-34, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200103&flag=1.[50] Wang, Zhuo, Wang, Chaokun, Wang, Weiping, Gu, Xiaoyan, Li, Bo, Meng, Dan, IEEE. Adaptive Relation Discovery from Focusing Seeds on Large Networks. ICDE[J]. 2020, 第 6 作者217-228, [51] CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security London United Kingdom November 11 - 15, 2019. 2019, 第 6 作者[52] Li, Fang, Han, Jinrong, Zhu, Ziyuan, Meng, Dan, IEEE. Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2019, 第 4 作者[53] Liu Fucheng, Wen Yu, Zhang Dongxue, Jiang Xihe, Xing Xinyu, Meng Dan, ACM. Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. PROCEEDINGS OF THE 26TH ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS). 2019, 第 6 作者1777-1794, http://dx.doi.org/10.1145/3319535.3363224.[54] Cai, Ningning, Ma, Can, Wang, Weiping, Meng, Dan. Effective Self Attention Modeling for Aspect Based Sentiment Analysis. COMPUTATIONAL SCIENCE - ICCS 2019, PT V[J]. 2019, 第 4 作者11540: 3-14, [55] Gu, Jingzi, Zhang, JinChao, Lin, Zheng, Li, Bo, Wang, Weiping, Meng, Dan. Asymmetric Deep Cross-modal Hashing. COMPUTATIONAL SCIENCE - ICCS 2019, PT V[J]. 2019, 第 6 作者11540: 41-54, [56] Zhang, Jun, Hou, Rui, Song, Wei, Mckee, Sally A, Jia, Zhen, Zheng, Chen, Chen, Mingyu, Zhang, Lixin, Meng, Dan. RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION[J]. 2019, 第 9 作者 通讯作者 15(4): [57] 游瑞邦, 袁子牧, 涂碧波, 孟丹. 软件定义网络流的安全要素知识图谱研究. 信息安全学报[J]. 2019, 第 4 作者4(4): 68-83, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190405&flag=1.[58] Wang Zhuo, Wang Weiping, Wang Chaokun, Gu Xiaoyan, Li Bo, Meng Dan. Community Focusing: Yet Another Query-Dependent Community Detection. AAAI. 2019, 第 6 作者329-337, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485292600041.[59] Wang, Xingbin, Hou, Rui, Zhu, Yifan, Zhang, Jun, Meng, Dan, Assoc Comp Machinery. NPUFort: A Secure Architecture of DNN Accelerator Against Model Inversion Attack. CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS. 2019, 第 5 作者190-196, http://dx.doi.org/10.1145/3310273.3323070.[60] Li Peinan, Zhao Lutan, Hou Rui, Zhang Lixin, Meng Dan, IEEE. Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. 2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA). 2019, 第 5 作者264-276, [61] Wang, Kai, Yuan, Fengkai, Hou, Rui, Lin, Jingqiang, Ji, Zhenzhou, Meng, Dan, Assoc Comp Machinery. CacheGuard: A Security-Enhanced Directory Architecture Against Continuous Attacks. CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS. 2019, 第 6 作者32-41, http://dx.doi.org/10.1145/3310273.3323051.[62] Zhao, Boyan, Hou, Rui, Dong, Jianbo, Huang, Michael, Mckee, Sally A, Zhang, Qianlong, Liu, Yueji, Li, Ye, Zhang, Lixin, Meng, Dan. Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM TRANSACTIONS ON COMPUTER SYSTEMS[J]. 2019, 第 10 作者36(1): https://www.webofscience.com/wos/woscc/full-record/WOS:000462524200002.[63] Li, Fang, Yan, Chao, Zhu, Ziyuan, Meng, Dan. A Deep Malware Detection Method Based on General-Purpose Register Features. COMPUTATIONAL SCIENCE - ICCS 2019, PT III[J]. 2019, 第 4 作者11538(null): 221-235, [64] Meng Dan, ACM. Security-first Architecture: Deploying Single-direction Physically Isolated Active Security Processors for Safeguarding the Future Computing. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18). 2018, 第 1 作者 通讯作者 1-1, http://dx.doi.org/10.1145/3267494.3267500.[65] Yang, Guang, Cai, Lijun, Yuaimin, Ma, Jiangang, Meng, Dan, Wu, Yu, IEEE. Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model. 2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018). 2018, 第 5 作者9-16, http://dx.doi.org/10.1109/BigDataService.2018.00011.[66] 孟丹, 侯锐. 内置安全:将安全作为基因融入体系结构设计. 前沿科学[J]. 2018, 第 1 作者12(4): 82-86, http://lib.cqvip.com/Qikan/Article/Detail?id=7001585991.[67] Fu Peng, Lin Zheng, Yuan Fengcheng, Wang Weiping, Meng Dan, AAAI. Learning Sentiment-Specific Word Embedding via Global Sentiment Representation. THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE[J]. 2018, 第 5 作者4808-4815, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485488904110.[68] 张军, 侯锐, 詹志远, 张立新, 陈明宇, 孟丹. 基于硬件的代码复用攻击防御机制综述. 高技术通讯[J]. 2018, 第 6 作者28(4): 299-312, http://lib.cqvip.com/Qikan/Article/Detail?id=676203088.[69] 孟丹. 弘扬奋斗精神 促进科技创新. 中国政协[J]. 2018, 第 1 作者35-35, http://lib.cqvip.com/Qikan/Article/Detail?id=675638158.[70] Zhu Jianping, Song Wei, Zhu Ziyuan, Ying Jiameng, Li Boya, Tu Bibo, Shi Gang, Hou Rui, Meng Dan, ACM. CPU Security Benchmark. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18). 2018, 第 9 作者8-14, http://dx.doi.org/10.1145/3267494.3267499.[71] 孟丹. 抓科技提升促产业发展推动国家网络空间安全战略实现新跨越. 中国信息安全[J]. 2018, 第 1 作者66-67, http://lib.cqvip.com/Qikan/Article/Detail?id=7000596274.[72] Zhang Dongxue, Zheng Yang, Wen Yu, Xu Yujue, Wang Jingchuo, Yu Yang, Meng Dan, ACM. Role-based Log Analysis Applying Deep Learning for Insider Threat Detection. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18). 2018, 第 7 作者18-20, http://dx.doi.org/10.1145/3267494.3267495.[73] Yang Chun, Wen Yu, Guo Jianbin, Song Haitao, Li Linfeng, Che Haoyang, Meng Dan, ACM. A Convolutional Neural Network based Classifier for Uncompressed Malware Samples. PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18). 2018, 第 7 作者15-17, http://dx.doi.org/10.1145/3267494.3267496.[74] Wang Jiarong, Cai Lijun, Yu Aimin, Zhu Min, Meng Dan, IEEE. TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE). 2018, 第 5 作者360-371, [75] 孟丹. A General and Expandable Insider Threat Detection System through the Baseline Anomaly Detection and Scenario-driven Alarm Filters. Trustcom 2018. 2018, 第 1 作者[76] 马梦雨, 陈李维, 史岗, 孟丹. 基于配件加权标记的代码重用攻击防御框架. 信息安全学报[J]. 2018, 第 4 作者3(5): 75-91, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180507&flag=1.[77] 李然, 林政, 林海伦, 王伟平, 孟丹. 文本情绪分析综述. 计算机研究与发展[J]. 2018, 第 5 作者55(1): 30-52, http://lib.cqvip.com/Qikan/Article/Detail?id=674133349.[78] CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security Toronto Canada 15 October 2018. 2018, 第 1 作者[79] 付鹏,林政,袁凤程,林海伦,王伟平,孟丹, , , , , . 基于卷积神经网络和用户信息的微博话题追踪模型*. 模式识别与人工智能[J]. 2017, 30(1): 73-80, http://manu46.magtech.com.cn/Jweb_prai/CN/abstract/abstract11186.shtml.[80] Chen, Zhiyong, Zhang, Wei, Hu, Bin, Cao, Xiaochun, Liu, Si, Meng, Dan. Retrieving Objects by Partitioning. IEEE TRANSACTIONS ON BIG DATA[J]. 2017, 第 6 作者3(1): 44-54, [81] 马梦雨, 陈李维, 孟丹. 内存数据污染攻击和防御综述. 信息安全学报[J]. 2017, 第 3 作者2(4): 82-98, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20170407&flag=1.[82] 郑显义, 史岗, 孟丹. 系统安全隔离技术研究综述. 计算机学报[J]. 2017, 第 3 作者40(5): 1057-1079, http://lib.cqvip.com/Qikan/Article/Detail?id=672066264.[83] Zhu Min, Tu Bibo, Wei Wei, Meng Dan. HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM. ACM SIGPLAN NOTICES[J]. 2017, 第 4 作者52(7): 242-256, [84] 朱民, 涂碧波, 孟丹. 虚拟化软件栈安全研究. 计算机学报[J]. 2017, 第 3 作者40(2): 481-504, http://lib.cqvip.com/Qikan/Article/Detail?id=671226242.[85] Chen Liwei, Ma Mengyu, Zhang Wenhao, Shi Gang, Meng Dan, DiVimercati SD, Martinelli F. Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017. 2017, 第 5 作者502: 568-584, [86] 孟丹. 系统安全隔离技术研究综述 优先出版. 计算机学报. 2017, 第 1 作者[87] Ning, Fangxiao, Wen, Yu, Shi, Gang, Meng, Dan, IEEE. Efficient Tamper-Evident logging of Distributed Systems via Concurrent Authenticated Tree. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2017, 第 4 作者[88] 康颖, 古晓艳, 于博, 林政, 王伟平, 孟丹. 一种面向大规模社会信息网络的多层社区发现算法. 计算机学报[J]. 2016, 第 6 作者39(1): 169-182, http://lib.cqvip.com/Qikan/Article/Detail?id=668051802.[89] 杨光, 马建刚, 于爱民, 孟丹. 内部威胁检测研究. 信息安全学报[J]. 2016, 第 4 作者1(3): 21-36, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20160303&flag=1.[90] Ning, Fangxiao, Zhu, Min, You, Ruibang, Shi, Gang, Meng, Dan, IEEE. Group-based Memory Deduplication against Covert Channel Attacks in Virtualized Environments. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 5 作者194-200, [91] Wang, Liang, Wang, Weiping, Gu, Jingzi, Meng, Dan, IEEE. Delta-Generalization: High Accuracy Data Release for Privacy Preserving. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 4 作者1861-1866, [92] Gao Yun, Zhou Wei, Han Jizhong, Meng Dan, Chen J, Yang LT. Reducing the Communication Costs of Graph Analysis by Read-only Replicas and Prioritized Execution. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS). 2016, 第 4 作者102-109, http://dx.doi.org/10.1109/HPCC-SmartCity-DSS.2016.171.[93] Zheng, Xianyi, He, Yanhong, Ma, Jiangang, Shi, Gang, Meng, Dan, Chen, J, Yang, LT. TZ-KPM Kernel Protection Mechanism on Embedded Devices on Hardware-assisted Isolated Environment. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS). 2016, 第 5 作者663-670, http://dx.doi.org/10.1109/HPCC-SmartCity-DSS.2016.208.[94] 孟丹. 创刊词. 信息安全学报[J]. 2016, 第 1 作者3, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849544849484849.[95] 郑显义, 李文, 孟丹. TrustZone技术的分析与研究. 计算机学报[J]. 2016, 第 3 作者39(9): 1912-1928, http://lib.cqvip.com/Qikan/Article/Detail?id=669845573.[96] 文雨, 王伟平, 孟丹. 面向内部威胁检测的用户跨域行为模式挖掘. 计算机学报[J]. 2016, 第 3 作者39(8): 1555-1569, http://lib.cqvip.com/Qikan/Article/Detail?id=669627941.[97] 陈重韬, 王伟平, 孟丹, 崔甲, 胡斌. 面向海量NetFlow数据的存储和查询处理方法研究. 高技术通讯[J]. 2016, 第 3 作者26(6): 534-541, http://lib.cqvip.com/Qikan/Article/Detail?id=670849566.[98] 赵剑锋, 史岗, 孟丹. 进程安全保护技术综述. 哈尔滨工业大学学报[J]. 2016, 第 3 作者48(5): 77-84, https://d.wanfangdata.com.cn/periodical/hebgydxxb201605013.[99] Lin, Zheng, Jin, Xiaolong, Xu, Xueke, Wang, Yuanzhuo, Cheng, Xueqi, Wang, Weiping, Meng, Dan. An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING[J]. 2016, 第 7 作者 通讯作者 24(3): http://dx.doi.org/10.1109/TASLP.2015.2512041.[100] 柳童, 史岗, 孟丹. 代码重用攻击与防御机制综述. 信息安全学报[J]. 2016, 第 3 作者1(2): 15-27, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20160202&flag=1.[101] 王良, 王伟平, 孟丹. 基于加权贝叶斯网络的隐私数据发布方法. 计算机研究与发展[J]. 2016, 第 3 作者53(10): 2343-2353, http://lib.cqvip.com/Qikan/Article/Detail?id=7000068581.[102] Zheng, Xianyi, Yang, Lulu, Shi, Gang, Meng, Dan, IEEE. Secure Mobile Payment employing Trusted Computing on TrustZone Enabled Platforms. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 4 作者1944-1950, [103] Cao, Xiaochun, Du, Ling, Wei, Xingxing, Meng, Dan, Guo, Xiaojie. High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation. IEEE TRANSACTIONS ON CYBERNETICS[J]. 2016, 第 4 作者46(5): 1132-1143, http://dx.doi.org/10.1109/TCYB.2015.2423678.[104] 王良, 王伟平, 孟丹. FVS k-匿名:一种基于k-匿名的隐私保护方法. 高技术通讯[J]. 2015, 第 3 作者228-238, http://lib.cqvip.com/Qikan/Article/Detail?id=665439401.[105] Qu, Buyun, Zhang, Zhibin, Zhu, Xingquan, Meng, Dan. An empirical study of morphing on behavior-based network traffic classification. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 第 4 作者8(1): 68-79, https://www.webofscience.com/wos/woscc/full-record/WOS:000346335900008.[106] Lin Zheng, Wang Weiping, Jin Xiaolong, Liang Jiguang, Meng Dan, ACM. A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction. WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB. 2015, 第 5 作者67-68, http://dx.doi.org/10.1145/2740908.2742713.[107] 康颖, 张栋, 于博, 古晓艳, 王伟平, 孟丹. Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method. WAIM. 2015, 第 6 作者[108] 康颖, 古晓艳, 王伟平, 孟丹. Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks. CIKM. 2015, 第 4 作者[109] Cao, Xiaochun, Zhang, Hua, Guo, Xiaojie, Liu, Si, Meng, Dan. SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation. IEEE TRANSACTIONS ON IMAGE PROCESSING[J]. 2015, 第 5 作者24(9): 2746-2759, http://dx.doi.org/10.1109/TIP.2015.2428055.[110] Wang, Youwei, Ma, Can, Wang, Weiping, Meng, Dan. An approach of fast data manipulation in HDFS with supplementary mechanisms. JOURNAL OF SUPERCOMPUTING[J]. 2015, 第 4 作者71(5): 1736-1753, https://www.webofscience.com/wos/woscc/full-record/WOS:000353786700009.[111] Yang, Liang, Cao, Xiaochun, Jin, Di, Wang, Xiao, Meng, Dan. A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization. IEEE TRANSACTIONS ON CYBERNETICS[J]. 2015, 第 5 作者45(11): 2585-2598, http://dx.doi.org/10.1109/TCYB.2014.2377154.[112] 王有为, 王伟平, 孟丹. 基于统计方法的Hive数据仓库查询优化实现. 计算机研究与发展[J]. 2015, 第 3 作者52(6): 1452-1462, http://lib.cqvip.com/Qikan/Article/Detail?id=665059289.[113] 贾德宾, 刘政伟, 古晓艳, 李波, 谷井子, 王伟平, 孟丹. LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data. The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015). 2015, 第 7 作者[114] 李晨, 涂碧波, 孟丹, 冯圣中. 基于多安全机制的Linux应用沙箱的设计与实现. 集成技术[J]. 2014, 第 3 作者3(4): 31-37, https://jcjs.siat.ac.cn/jcjs/article/abstract/201404004?st=article_issue.[115] Wen, Yu, Wang, WeiPing, Guo, Li, Meng, Dan. Automated Power Control for Virtualized Infrastructures. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY[J]. 2014, 第 4 作者29(6): 1111-1122, https://www.webofscience.com/wos/woscc/full-record/WOS:000345382500015.[116] 刘振岩, 孟丹, 王伟平, 王勇. 基于偏斜数据集的文本分类特征选择方法研究. 中文信息学报[J]. 2014, 第 2 作者28(2): 116-121, http://lib.cqvip.com/Qikan/Article/Detail?id=49865833.[117] 崔甲, 王伟平, 陈重韬, 孟丹. 基于滑动窗口的数据流字符串近似查询. 高技术通讯[J]. 2014, 第 4 作者895-902, http://lib.cqvip.com/Qikan/Article/Detail?id=662831634.[118] 李青, 李勇, 涂碧波, 孟丹. QOS保证的数据中心动态资源供应方法. 计算机学报[J]. 2014, 第 4 作者37(12): 2395-2407, http://lib.cqvip.com/Qikan/Article/Detail?id=663245487.[119] 周江, 王伟平, 孟丹, 马灿, 古晓艳, 蒋杰. 面向大数据分析的分布式文件系统关键技术. 计算机研究与发展[J]. 2014, 第 3 作者51(2): 382-394, http://lib.cqvip.com/Qikan/Article/Detail?id=48436797.[120] 李勇, 张章, 孟丹, 韩冀中, 李青, 王旻. 面向混合负载的集群资源弹性调度. 高技术通讯[J]. 2014, 第 3 作者782-790, http://lib.cqvip.com/Qikan/Article/Detail?id=662624172.[121] 高赟, 周薇, 韩冀中, 孟丹. 一种基于文法压缩的日志异常检测算法. 计算机学报[J]. 2014, 第 4 作者37(1): 73-86, http://lib.cqvip.com/Qikan/Article/Detail?id=48544435.[122] 文雨, 孟丹, 詹剑锋. 数据中心应用请求级行为特征分析. 计算机学报[J]. 2013, 第 2 作者36(5): 1004-1014, http://lib.cqvip.com/Qikan/Article/Detail?id=45850221.[123] 文雨, 孟丹, 詹剑锋. 面向应用服务级目标的虚拟化资源管理. 软件学报[J]. 2013, 第 2 作者24(2): 358-377, http://lib.cqvip.com/Qikan/Article/Detail?id=44794572.[124] 古晓艳, 王伟平, 孟丹, 杨秀峰, 周江. 高效支持多维网络OLAP的数据立方体模型CI-DCG. 高技术通讯[J]. 2013, 第 3 作者23(10): 1030-1037, http://lib.cqvip.com/Qikan/Article/Detail?id=47614036.[125] 冯清青, 孟丹, 韩冀中. 基于分级编码的高可靠存储策略. 高技术通讯[J]. 2013, 第 2 作者23(11): 1103-1109, http://lib.cqvip.com/Qikan/Article/Detail?id=48009074.[126] Zhang Zhang, Han Jizhong, Li Bo, Zhou Wei, Meng Dan, IEEE Comp Soc. Lynn: A Multi-Dimensional Dynamic Resource Management System for Distributed Applications in Clouds. 2013 INTERNATIONAL CONFERENCE ON CLOUD AND SERVICE COMPUTING (CSC 2013). 2013, 第 5 作者84-91, [127] Zhou Jiang, Guo Jing, Wang Weiping, Du Cuilan, Gu Xiaoyan, Meng Dan, Chen J, Cuzzocrea A, Yang LT. OAMS: A Highly Reliable Metadata Service for Big Data Storage. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013). 2013, 第 6 作者1287-1294, [128] Li Bo, Zhang Jingjie, Chen Mingyu, Zhang JinChao, Wang Kunpeng, Meng Dan. DIFTSAS: a DIstributed Full Text Search and Analysis System for Big Data. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013)[J]. 2013, 第 6 作者1303-1309, [129] Li, Qing, Li, Yong, Tu, Bibo, Meng, Dan, IEEE. An Adaptive Resource Sharing Platform for Internet Data Center. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC). 2013, 第 4 作者1179-1186, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.167.[130] 赵彦荣, 王伟平, 孟丹, 张书彬, 李均. 基于Hadoop的高效连接查询处理算法CHMJ. 软件学报[J]. 2012, 第 3 作者23(8): 2032-2041, http://lib.cqvip.com/Qikan/Article/Detail?id=42822810.[131] 张翔, 霍志刚, 马捷, 孟丹. 虚拟机快速全系统在线迁移. 计算机研究与发展[J]. 2012, 第 4 作者49(3): 661-668, http://lib.cqvip.com/Qikan/Article/Detail?id=41043906.[132] 马灿, 孟丹, 熊劲. 基于分布式索引和目录聚合的海量小文件存储研究. 高技术通讯[J]. 2012, 第 2 作者22(10): 1035-1040, http://lib.cqvip.com/Qikan/Article/Detail?id=43852720.[133] 屈步云, 谭建龙, 孟丹. ISP网络间TCP包载荷重复度测量与分析. 计算机研究与发展[J]. 2012, 第 3 作者89-95, http://lib.cqvip.com/Qikan/Article/Detail?id=1003429568.[134] 马灿, 孟丹, 熊劲. 曙光星云分布式文件系统:海量小文件存取. 小型微型计算机系统[J]. 2012, 第 2 作者33(7): 1481-1488, http://xwxt.sict.ac.cn/CN/Y2012/V33/I7/1481.[135] Zhou Wei, Wang Lei, Meng Dan, Yuan Lin, Zhan Jianfeng. Scalable group management in large-scale virtualized clusters. 高技术通讯英文版[J]. 2011, 第 3 作者17(3): 263-271, http://lib.cqvip.com/Qikan/Article/Detail?id=39456980.[136] 李波, 孟丹, 霍志刚. 基于全局地址空间的高效I/O虚拟化方法研究. 小型微型计算机系统[J]. 2011, 第 2 作者32(11): 2274-2279, http://xwxt.sict.ac.cn/CN/Y2011/V32/I11/2274.[137] 李波, 孟丹, 霍志刚. 多核下基于远程直接内存访问的高效远程过程调用研究. 高技术通讯[J]. 2011, 第 2 作者21(7): 681-686, http://lib.cqvip.com/Qikan/Article/Detail?id=38597353.[138] Liu, Xu, Zhan, Jianfeng, Zhan, Kunlin, Shi, Weisong, Yuan, Lin, Meng, Dan, Wang, Lei. Automatic performance debugging of SPMD-style parallel programs. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING[J]. 2011, 第 6 作者71(7): 925-937, http://dx.doi.org/10.1016/j.jpdc.2011.03.006.[139] 孟丹. 请求路径驱动的性能错误诊断模型. IEEE International Symposium on Parallel and Distributed Processing with Applications. 2010, 第 1 作者[140] Wang, Peng, Meng, Dan, Han, Jizhong, Zhan, Jianfeng, Tu, Bibo, Shi, Xiaofeng, Wan, Le. TRANSFORMER: A NEW PARADIGM FOR BUILDING DATA-PARALLEL PROGRAMMING MODELS. IEEE MICRO[J]. 2010, 第 2 作者30(4): 55-64, https://www.webofscience.com/wos/woscc/full-record/WOS:000280949100009.[141] 张攀勇, 孟丹, 霍志刚. 多核环境下高效集合通信关键技术研究. 计算机学报[J]. 2010, 第 2 作者317-325, http://lib.cqvip.com/Qikan/Article/Detail?id=32963276.[142] 孟丹. 分布式服务的协同选择再生框架. IEEE International Conference on Parallel and Distributed Systems. 2010, 第 1 作者[143] 孟丹, 詹剑锋, 涂碧波, 王鹏. 数据密集型计算编程模型研究进展. 计算机研究与发展[J]. 2010, 第 1 作者1993-2002, http://lib.cqvip.com/Qikan/Article/Detail?id=35890488.[144] 孟丹. 基于数据去冗余的虚拟机在线迁移技术研究. IEEE International Conference on Cluster Computing 2010. 2010, 第 1 作者[145] 孟丹. 当代高速互联网络虚拟化的性能和可扩展性研究. IEEE International Conference on Cluster Computing 2010. 2010, 第 1 作者[146] 孟丹. 基于复本的高可用机群文件系统元数据管理技术. IEEE International Conference on Cluster Computing 2010. 2010, 第 1 作者[147] 孟丹. SOA系统再生的案例分析. International Conference on Parallel and Distributed Processing Techniques and Applications. 2010, 第 1 作者[148] 田冠华, 孟丹, 詹剑锋. 云计算环境下基于失效规则的资源动态提供策略. 计算机学报[J]. 2010, 第 2 作者1859-1872, http://lib.cqvip.com/Qikan/Article/Detail?id=35344805.[149] 孟丹. 云计算环境下基于失效规律的资源动态提供方法. 计算机学报,IEEE International Symposium on Parallel and Distributed Processing with Applications. 2010, 第 1 作者[150] 孟丹. 变形金刚: 一种构建数据并行编程模型的新范式. IEEE Micro. 2010, 第 1 作者[151] 孟丹. 大规模机群系统的在线事件相关性分析. IFIP Internationsal Conference on Network and Parallel Computing. 2010, 第 1 作者[152] 陈撰, 熊劲, 孟丹. Replication-based Highly Available Metadata Management for Cluster File Systems. IEEE International Conference on Cluster Computing 2010. 2010, 第 3 作者[153] Tan Guangming, Guo Ziyu, Chen Mingyu, Meng Dan, Gschwind M, Nicolau A, Salapura V, Moreira J. Single-particle 3D Reconstruction from Cryo-Electron Microscopy Images on GPU. ICS'09: PROCEEDINGS OF THE 2009 ACM SIGARCH INTERNATIONAL CONFERENCE ON SUPERCOMPUTING. 2009, 第 4 作者380-389, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000268247500037.[154] Zhang Zhihong, Zhan Jianfeng, Li Yong, Wang Lei, Meng Dan, Sang Bo, IEEE. Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009). 2009, 第 5 作者337-346, [155] 田冠华, 詹剑锋, 孟丹. 多层服务系统选择性再生框架. 计算机学报[J]. 2009, 第 3 作者1938-1946, http://lib.cqvip.com/Qikan/Article/Detail?id=31781016.[156] 李剑宇, 唐荣峰, 熊劲, 孟丹. 基于对象存储的机群文件系统数据通路. 计算机工程[J]. 2008, 第 4 作者34(10): 49-51, http://lib.cqvip.com/Qikan/Article/Detail?id=27271379.[157] 江滢, 孟丹. 基于接纳时间比控制和比例积分调节器的接纳控制机制. 计算机研究与发展[J]. 2007, 第 2 作者44(1): 65-70, http://lib.cqvip.com/Qikan/Article/Detail?id=24115181.[158] 刘耕圃, 詹剑锋, 李扬, 王磊, 涂碧波, 孟丹. 一种适应行业信息系统的通用管理框架. 计算机应用研究[J]. 2007, 第 6 作者24(6): 287-288,311, http://lib.cqvip.com/Qikan/Article/Detail?id=24640365.[159] Liang Yi, Fan Jianping, Meng Dan, Di Ruihua, Jin H, Rana OF, Pan Y, Prasanna VK. A strategy-proof combinatorial auction-based grid resource allocation system. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS. 2007, 第 3 作者4494: 254-+, [160] 郝颜, 涂碧波, 詹剑锋, 孟丹. Phoenix集群操作系统Web Portal的设计与实现. 计算机工程[J]. 2006, 第 4 作者32(15): 93-95,98, http://lib.cqvip.com/Qikan/Article/Detail?id=22459064.[161] Wu Linping, Dan Meng, Zhan Jianfeng, Lei Wang, Tu Bibo, Turner SJ, Lee BS, Cai W. A failure-aware scheduling strategy in large-scale cluster system. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID. 2006, 第 2 作者645-+, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000238329200093.[162] 武林平, 孟丹, 梁毅, 涂碧波, 王磊. LUNF——基于节点失效特征的机群作业调度策略. 计算机研究与发展[J]. 2005, 第 2 作者42(6): 1000-1005, http://lib.cqvip.com/Qikan/Article/Detail?id=15707293.[163] 孟丹, 张志宏, 陈明宇. 高生产率计算系统. 计算机研究与发展[J]. 2005, 第 1 作者42(4): 563-569, http://lib.cqvip.com/Qikan/Article/Detail?id=15431681.[164] 李艳红, 孟丹, 周应超, 武林平. 检查点系统中进程地址空间的优化存储策略. 计算机工程与应用[J]. 2005, 第 2 作者41(29): 94-96,113, http://lib.cqvip.com/Qikan/Article/Detail?id=20255875.[165] 孟丹, 詹剑锋, 王磊, 涂碧波, 张志宏. 一体化机群操作系统Phoenix. 计算机研究与发展[J]. 2005, 第 1 作者42(6): 979-986, http://lib.cqvip.com/Qikan/Article/Detail?id=15707289.[166] 詹剑锋, 王磊, 孟丹. 高可用机群系统辅助测试工具:HABench. 计算机工程与应用[J]. 2005, 第 3 作者41(8): 95-97,107, http://lib.cqvip.com/Qikan/Article/Detail?id=15114291.[167] 熊劲, 范志华, 马捷, 唐荣锋, 李晖, 孟丹. DCFS2的元数据一致性策略. 计算机研究与发展[J]. 2005, 第 6 作者42(6): 1019-1027, http://lib.cqvip.com/Qikan/Article/Detail?id=15707296.[168] 虞岩松, 霍志刚, 马捷, 孟丹. S0ckvia——机群环境中的高效socket. 计算机工程与应用[J]. 2005, 第 4 作者41(18): 117-121,218, http://lib.cqvip.com/Qikan/Article/Detail?id=15889240.[169] 詹剑锋, 张志宏, 王磊, 孟丹, 倪广宝, 马捷. 基于机群中间件监控系统的设计和实现. 计算机工程与应用[J]. 2005, 第 4 作者41(22): 134-137,207, http://lib.cqvip.com/Qikan/Article/Detail?id=18002008.[170] 林基, 周小成, 孟丹. 基于智能网卡支持的并行通信协议. 计算机研究与发展[J]. 2005, 第 3 作者42(6): 971-978, http://lib.cqvip.com/Qikan/Article/Detail?id=15707288.[171] 陈熠, 孟丹, 詹剑锋, 甄宁. 基于联邦的数据公告的设计与实现. 计算机工程与应用[J]. 2004, 第 2 作者40(25): 107-110, http://lib.cqvip.com/Qikan/Article/Detail?id=10222300.[172] 刘建华, 焦丽梅, 孟丹. Windows终端模式下NC服务器的性能分析. 计算机应用[J]. 2004, 第 3 作者24(3): 147-149,152, http://lib.cqvip.com/Qikan/Article/Detail?id=9234094.[173] 徐志伟, 孟丹, 孙凝晖. 高性能计算机曙光4000A的网格使能特征. 计算机研究与发展[J]. 2004, 第 2 作者41(12): 2079-2087, http://lib.cqvip.com/Qikan/Article/Detail?id=11460287.[174] 秦军, 古志民, 孟丹. PCMD在机群管理系统中的应用及其改进. 计算机工程与科学[J]. 2004, 第 3 作者26(4): 95-97, http://lib.cqvip.com/Qikan/Article/Detail?id=9384851.[175] 于雪平, 孟丹. 数据库应用的高可用性及实现技术. 计算机应用研究[J]. 2004, 第 2 作者21(5): 5-8,14, http://lib.cqvip.com/Qikan/Article/Detail?id=10115934.[176] 周应超, 苗彦超, 郝敏, 孟丹. 基于CATV网络的视频服务器接入控制分析. 计算机工程与应用[J]. 2004, 第 4 作者40(13): 135-139,152, http://lib.cqvip.com/Qikan/Article/Detail?id=9682477.[177] 周应超, 苗彦超, 郝敏, 孟丹. 视频服务器性能测试研究. 计算机工程[J]. 2004, 第 4 作者30(14): 133-135, http://dx.doi.org/10.3969/j.issn.1000-3428.2004.14.051.[178] 梁毅, 孟丹, 樊建平. RB-FIFT——一种结合Firstfit及预约回填策略的机群作业调度算法. 计算机研究与发展[J]. 2004, 第 2 作者41(11): 1902-1910, http://lib.cqvip.com/Qikan/Article/Detail?id=11498846.[179] 秦军, 孟丹, 古志民. Java RMI及多线程技术在机群管理系统中的应用. 计算机工程与应用[J]. 2004, 第 2 作者40(13): 108-110, http://lib.cqvip.com/Qikan/Article/Detail?id=9682473.[180] 周应超, 苗彦超, 郝敏, 孟丹. 视频服备器性能测试研究. 计算机工程[J]. 2004, 第 4 作者30(14): 133-135, http://lib.cqvip.com/Qikan/Article/Detail?id=10346095.[181] 叶庆华, 梁毅, 孟丹. 一种简化的基于First—Fit的Backfilling调度策略—RB—FIFT. 计算机工程与应用[J]. 2003, 第 3 作者39(2): 70-74, http://lib.cqvip.com/Qikan/Article/Detail?id=7193170.[182] 贺劲, 吴思宁, 孟丹, 徐志伟. 网络文件系统中的元数据存取优化研究. 微电子学与计算机[J]. 2003, 第 3 作者20(3): 41-47, http://lib.cqvip.com/Qikan/Article/Detail?id=7590094.[183] 孟丹, 胡雨壮. PVFS文件系统吞吐率分析和改进. 计算机科学[J]. 2003, 第 1 作者30(3): 134-137, http://lib.cqvip.com/Qikan/Article/Detail?id=7788462.[184] 吴思宁, 贺劲, 熊劲, 孟丹. DCFS机群文件系统服务器组关键技术研究. 微电子学与计算机[J]. 2003, 第 4 作者20(6): 30-33,37, http://lib.cqvip.com/Qikan/Article/Detail?id=8007708.[185] 胡雨壮, 孟丹. 一个提高机群文件系统吞吐率的方法及其实现. 计算机工程与应用[J]. 2003, 第 2 作者39(18): 87-89,99, http://lib.cqvip.com/Qikan/Article/Detail?id=8003443.[186] 叶庆华, 孟丹, 江滢. 曙光3000机群作业管理系统JOSS的设计与实现. 计算机工程[J]. 2003, 第 2 作者29(6): 42-44, http://lib.cqvip.com/Qikan/Article/Detail?id=7613062.[187] 高帆, 马捷, 孟丹. BCL/IP:机群系统域网中TCP/IP协议的实现. 计算机工程与应用[J]. 2003, 第 3 作者39(34): 180-183, http://lib.cqvip.com/Qikan/Article/Detail?id=9178090.[188] 孙凝晖, 孟丹. 曙光3000超级服务器设计的关键问题研究. 计算机学报[J]. 2002, 第 2 作者25(11): 1121-1132, http://lib.cqvip.com/Qikan/Article/Detail?id=7134254.[189] 贺劲, 孟丹. 曙光机群文件系统DCFS负载平衡策略. 计算机工程与应用[J]. 2002, 第 2 作者38(14): 109-111, http://lib.cqvip.com/Qikan/Article/Detail?id=6413811.[190] 贺劲, 徐志伟, 孟丹, 马捷, 冯军. 基于高速通信协议的COSMOS机群文件系统性能研究. 计算机研究与发展[J]. 2002, 第 3 作者39(2): 129-135, http://lib.cqvip.com/Qikan/Article/Detail?id=5974128.[191] 胡雨壮, 孟丹. NFS和PVFS文件系统吞吐率分析. 计算机工程与应用[J]. 2002, 第 2 作者38(21): 59-63, http://lib.cqvip.com/Qikan/Article/Detail?id=6895978.[192] 郭福顺, 李莲治, 孟丹. Concurrent C语言在分布式系统上实现中的存储组织与分配. 哈尔滨工业大学学报[J]. 1995, 第 3 作者27(4): 44, http://lib.cqvip.com/Qikan/Article/Detail?id=1643644.
发表著作
(1) 网络空间内置式主动防御, Built-in Active Defense in Cyberspace, 科学出版社, 2021-03, 第 1 作者