基本信息
孟丹 男 博导 中国科学院信息工程研究所
电子邮件: mengdan@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
电子邮件: mengdan@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100093
研究领域
中国科学院信息工程研究所党委书记。中国计算机学会理事,《信息安全学报》执行主编,《计算机学报》和《计算机研究与发展》编委, 国务院政府特殊津贴专家。
近年来主要从事网络空间安全和计算机体系结构安全方面的研究工作,提出了网络空间内置安全思想和基于基础软硬件协同的防御体系。
主持承担了核高基、国家863计划、国家自然科学基金项目几十余项。获得国家科技进步二等奖三项,中科院科技进步一等奖一项,中科院杰出科技贡献奖一项,网络安全优秀人才奖一项。发表学术论文百余篇(其中CCF A类15篇),申请发明专利和软件著作权百余项。
招生信息
招生专业
083900-网络空间安全081201-计算机系统结构
招生方向
系统安全理论与技术网络和计算机体系结构
教育背景
1988-09--1995-07 哈尔滨工业大学 硕士、博士1984-09--1988-07 哈尔滨工业大学 学士
学历
学位
哈尔滨工业大学 19910401--19951201 工学博士学位
出国学习工作
1998-1999年先后在香港大学和美国USC大学做访问学者
工作经历
工作简历
2023-12~现在, 中国科学院信息工程研究所, 党委书记2015-07~2023-12,中国科学院信息工程研究所, 所长2011-10~2015-07,中国科学院信息工程研究所, 副所长2009-10~2011-09,中国科学院高技术研究与发展局, 副局长2006-12~2009-09,中国科学院计算技术研究所, 副所长2005-01~2006-11,中国科学院计算技术研究所, 所长助理1999-11~2004-12,中国科学院计算技术研究所智能中心, 研究员1998-09~1999-10,香港大学,美国USC大学, 访问学者1996-01~1998-07,中国科学院计算技术研究所, 博士后
专利与奖励
奖励信息
(1) 网络安全优秀人才奖, 一等奖, 部委级, 2017(2) 国家科学技术进步奖, 二等奖, 国家级, 2007(3) 科学院杰出科技成就奖, 一等奖, 部委级, 2006(4) 国家科学技术进步奖, 二等奖, 国家级, 2004(5) 国家科学技术进步奖, 二等奖, 国家级, 2001(6) 中科院科技进步一等奖, 一等奖, 部委级, 2000(7) 中科院京区优秀党员, , 部委级, 2000(8) 中科院计算所优秀员工, , 研究所(学校), 2000(9) 中科院首届"十佳"博士后, , 院级, 1998
出版信息
发表论文
(1) TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU, IEEE International Symposium on High-Performance Computer Architecture, HPCA 2023, Montreal, QC, Canada., 2023, 第 5 作者(2) SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 第 9 作者(3) ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE, 2023 60th ACM/IEEE Design Automation Conference (DAC), 2023, 第 4 作者(4) HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 第 7 作者(5) Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 第 9 作者(6) 基于边界检测的安全数据预取方案, Security Data Prefetching Scheme Based on Boundary Detection, 信息安全学报, 2022, 第 4 作者(7) Distributed Randomized Sketching Kernel Learning, AAAI (CCF A), 2022, 第 3 作者(8) 互联网信息服务内容安全要求及评估框架研究, Security Requirements and Evaluation Framework for Internet Information Service Content, 信息安全学报, 2022, 第 4 作者(9) CPP: A lightweight memory page management extension to prevent code pointer leakage, JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 第 6 作者(10) SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022, 第 5 作者(11) DepComm: Graph Summarization on System Audit Logs for Attack Investigation, IEEE Symposium on Security and Privacy (S&P), 2022, 第 3 作者(12) Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks, MICROPROCESSORS AND MICROSYSTEMS, 2022, 第 6 作者(13) Binary Neural Network Hashing for Image Retrieval, SIGIR (CCF-A类会议), 2021, 第 6 作者(14) Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks, IEEE TRANSACTIONS ON COMPUTERS, 2021, 第 7 作者(15) Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 第 6 作者(16) NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks, ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), 2021, 第 1 作者(17) Spatiotemporal Patterns of Urbanization in the Three Most Developed Urban Agglomerations in China Based on Continuous Nighttime Light Data (2000-2018), REMOTE SENSING, 2021, 第 8 作者(18) Distributed Nystrom Kernel Learning with Communications, Proceedings of the 38th International Conference on Machine Learning, 2021, 第 1 作者(19) A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor, A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor, JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2021, 第 6 作者(20) Coupling Analysis of the Thermal Landscape and Environmental Carrying Capacity of Urban Expansion in Beijing (China) over the Past 35 Years, SUSTAINABILITY, 2021, 第 5 作者(21) Variations in the Effects of Landscape Patterns on the Urban Thermal Environment during Rapid Urbanization (1990-2020) in Megacities, REMOTE SENSING, 2021, 第 5 作者(22) A Highly Reliable Metadata Service for Large-Scale Distributed File Systems (CCF-A), TPDS, 2020, (23) Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment, 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, 通讯作者(24) ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 第 5 作者(25) Extremely Sparse Johnson-Lindenstrauss Transform: From Theory to Algorithm, 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, 第 4 作者(26) Comprehensive assessment of the coupling coordination degree between urbanization and ecological environment in the Siberian and Far East Federal Districts, Russia from 2005 to 2017, PEERJ, 2020, 第 5 作者(27) 松耦合数据中心体系架构研究综述, A survey of disaggregated data center architecture, 高技术通讯, 2020, 第 6 作者(28) DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks, TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, 第 6 作者(29) 智能回复系统研究综述, Research on Intelligent Reply System: A Survey, 信息安全学报, 2020, 第 4 作者(30) Deep Unsupervised Hybrid-similarity Hadamard Hashing, ACM MM (CCF-A类会议), 2020, 第 6 作者(31) Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor, IEEE TRANSACTIONS ON COMPUTERS, 2020, 第 1 作者(32) Adaptive Relation Discovery from Focusing Seeds on Large Networks, ICDE, 2020, 第 6 作者(33) 瞬态执行漏洞攻击及防御综述, A survey of transient execution attacks and defenses, 高技术通讯, 2020, 第 6 作者(34) AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism, The 18th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA), 2020, 第 5 作者(35) RCecker: A Lightweight Rule-based Mechanism for Backward Control-Flow Integrity, 17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020), 2020, 第 4 作者(36) Zipper Stack: Shadow Stacks Without Shadow, The 25th European Symposium on Research in Computer Security (ESORICS), 2020, 第 7 作者(37) CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 第 5 作者(38) 基于底层数据流分析的恶意软件检测方法, Malware Detection Method Based on Low-level Data Flow Analysis, 信息安全学报, 2020, 第 4 作者(39) AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 第 4 作者(40) Efficient Return Address Verification Based on Dislocated Stack, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 第 6 作者(41) A Novel Network Traffic Classification Approach via Discriminative Feature Learning, PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, 第 5 作者(42) Sketch Kernel Ridge Regression Using Circulant Matrix: Algorithm and Theory, IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 第 4 作者(43) GuardSpark++: fine-grained purpose-aware access control for secure data sharing and analysis in Spark, Annual Computer Security Applications Conference (ACSAC), 2020, 第 5 作者(44) Analyzing the Security of the Cache Side Channel Defences with Attack Graphs, 25th Asia and South Pacific Design Automation Conference, ASP-DAC 2020, 2020, 第 1 作者(45) Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features, 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019, 第 4 作者(46) Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise, PROCEEDINGS OF THE 26TH ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS), 2019, 第 6 作者(47) Effective Self Attention Modeling for Aspect Based Sentiment Analysis, COMPUTATIONAL SCIENCE - ICCS 2019, PT V, 2019, 第 4 作者(48) Asymmetric Deep Cross-modal Hashing, COMPUTATIONAL SCIENCE - ICCS 2019, PT V, 2019, 第 6 作者(49) RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 通讯作者(50) Community Focusing: Yet Another Query-Dependent Community Detection, AAAI, 2019, 第 6 作者(51) 软件定义网络流的安全要素知识图谱研究, Research on Security Elements Knowledge Graph of Flows in Software-Defined Network, 信息安全学报, 2019, 第 4 作者(52) NPUFort: A Secure Architecture of DNN Accelerator Against Model Inversion Attack, CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, 第 5 作者(53) Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks, 2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2019, 第 5 作者(54) CacheGuard: A Security-Enhanced Directory Architecture Against Continuous Attacks, CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, 第 6 作者(55) Venice: An Effective Resource Sharing Architecture for Data Center Servers, ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2019, 第 10 作者(56) A Deep Malware Detection Method Based on General-Purpose Register Features, COMPUTATIONAL SCIENCE - ICCS 2019, PT III, 2019, 第 4 作者(57) Security-first Architecture: Deploying Single-direction Physically Isolated Active Security Processors for Safeguarding the Future Computing, PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, 通讯作者(58) Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model, 2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, 第 5 作者(59) 内置安全:将安全作为基因融入体系结构设计, 前沿科学, 2018, 第 1 作者(60) Learning Sentiment-Specific Word Embedding via Global Sentiment Representation, THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, 第 5 作者(61) 基于硬件的代码复用攻击防御机制综述, A survey of hardware mechanisms against code-reuse attacks, 高技术通讯, 2018, 第 6 作者(62) 弘扬奋斗精神 促进科技创新, 中国政协, 2018, 第 1 作者(63) 抓科技提升促产业发展推动国家网络空间安全战略实现新跨越, 中国信息安全, 2018, 第 1 作者(64) CPU Security Benchmark, PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, 第 9 作者(65) Role-based Log Analysis Applying Deep Learning for Insider Threat Detection, PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, 第 7 作者(66) A Convolutional Neural Network based Classifier for Uncompressed Malware Samples, PROCEEDINGS OF THE 1ST WORKSHOP ON SECURITY-ORIENTED DESIGNS OF COMPUTER ARCHITECTURES AND PROCESSORS (SECARCH'18), 2018, 第 7 作者(67) TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records, 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, 第 5 作者(68) A General and Expandable Insider Threat Detection System through the Baseline Anomaly Detection and Scenario-driven Alarm Filters, Trustcom 2018, 2018, 第 1 作者(69) 基于配件加权标记的代码重用攻击防御框架, A Framework based on Gadget Weighted Tagging (GWT) to Protect Against Code Reuse Attacks, 信息安全学报, 2018, 第 4 作者(70) 文本情绪分析综述, Text Emotion Analysis: A Survey, 计算机研究与发展, 2018, 第 5 作者(71) 基于卷积神经网络和用户信息的微博话题追踪模型, Convolutional Neural Network and User Information Based Model for Microblog Topic Tracking, 模式识别与人工智能, 2017, 第 6 作者(72) Retrieving Objects by Partitioning, IEEE TRANSACTIONS ON BIG DATA, 2017, 第 6 作者(73) 内存数据污染攻击和防御综述, A Survey of Memory Corruption Attack and Defense, 信息安全学报, 2017, 第 3 作者(74) 系统安全隔离技术研究综述, A Survey on System Security Isolation Technology, 计算机学报, 2017, 第 3 作者(75) HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM, ACM SIGPLAN NOTICES, 2017, 第 4 作者(76) 虚拟化软件栈安全研究, The Security Research of Virtualization Software Stack, 计算机学报, 2017, 第 3 作者(77) Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks, ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 第 5 作者(78) 系统安全隔离技术研究综述 优先出版, 计算机学报, 2017, 第 1 作者(79) Efficient Tamper-Evident logging of Distributed Systems via Concurrent Authenticated Tree, 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017, 第 4 作者(80) 内部威胁检测研究, Survey of Insider Threat Detection, 信息安全学报, 2016, 第 4 作者(81) 一种面向大规模社会信息网络的多层社区发现算法, A Multilevel Community Detection Algorithm for Large-Scale Social Information Networks, 计算机学报, 2016, 第 6 作者(82) Group-based Memory Deduplication against Covert Channel Attacks in Virtualized Environments, 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, 第 5 作者(83) Delta-Generalization: High Accuracy Data Release for Privacy Preserving, 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, 第 4 作者(84) Reducing the Communication Costs of Graph Analysis by Read-only Replicas and Prioritized Execution, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, 第 4 作者(85) TZ-KPM Kernel Protection Mechanism on Embedded Devices on Hardware-assisted Isolated Environment, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, 第 5 作者(86) 创刊词, 信息安全学报, 2016, 第 1 作者(87) 面向内部威胁检测的用户跨域行为模式挖掘, Mining User Cross-Domain Behavior Patterns for Insider Threat Detection, 计算机学报, 2016, 第 3 作者(88) TrustZone技术的分析与研究, Analysis and Research on TrustZone Technology, 计算机学报, 2016, 第 3 作者(89) 面向海量NetFlow数据的存储和查询处理方法研究, Research on storage and query processing for massive NetFlow data, 高技术通讯, 2016, 第 3 作者(90) 进程安全保护技术综述, A survey on the studies of security guard technology for process, 哈尔滨工业大学学报, 2016, 第 3 作者(91) An Unsupervised Cross-Lingual Topic Model Framework for Sentiment Classification, IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2016, 通讯作者(92) 代码重用攻击与防御机制综述, A Survey of Code Reuse Attack and Defense Mechanisms, 信息安全学报, 2016, 第 3 作者(93) 基于加权贝叶斯网络的隐私数据发布方法, Privacy Preserving Data Publishing via Weighted Bayesian Networks, 计算机研究与发展, 2016, 第 3 作者(94) Secure Mobile Payment employing Trusted Computing on TrustZone Enabled Platforms, 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, 第 4 作者(95) High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation, IEEE TRANSACTIONS ON CYBERNETICS, 2016, 第 4 作者(96) An empirical study of morphing on behavior-based network traffic classification, SECURITY AND COMMUNICATION NETWORKS, 2015, 第 4 作者(97) FVS k-匿名:一种基于k-匿名的隐私保护方法, FVS k-anonymity: an anonymous privacy protection method based on k-anonymity, 高技术通讯, 2015, 第 3 作者(98) A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction, WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2015, 第 5 作者(99) Fast Multiway Maximum Margin Clustering Based on Genetic Algorithm via the NystrÖm Method, WAIM, 2015, 第 6 作者(100) Scalable Clustering Algorithm via a Triangle Folding Processing for Complex Networks, CIKM, 2015, 第 4 作者(101) SLED: Semantic Label Embedding Dictionary Representation for Multilabel Image Annotation, IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 第 5 作者(102) An approach of fast data manipulation in HDFS with supplementary mechanisms, JOURNAL OF SUPERCOMPUTING, 2015, 第 4 作者(103) A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph Regularization, IEEE TRANSACTIONS ON CYBERNETICS, 2015, 第 5 作者(104) LuBase: A Search-Efficient Hybrid Storage System for Massive Text Data, The 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), 2015, 第 7 作者(105) 基于统计方法的Hive数据仓库查询优化实现, Query Optimization by Statistical Approach for Hive Data Warehouse, 计算机研究与发展, 2015, 第 3 作者(106) 基于多安全机制的Linux应用沙箱的设计与实现, Design and Implementation of Linux Application Sandbox Based on Multiple Security Mechanisms, 集成技术, 2014, 第 3 作者(107) Automated Power Control for Virtualized Infrastructures, JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 第 4 作者(108) 基于偏斜数据集的文本分类特征选择方法研究, Feature Selection for Skewed Text Categorization, 中文信息学报, 2014, 第 2 作者(109) 基于滑动窗口的数据流字符串近似查询, Sliding-window based approximate string search on data streams, 高技术通讯, 2014, 第 4 作者(110) QOS保证的数据中心动态资源供应方法, QoS-Guaranteed Dynamic Resource Provision in Internet Data Centers, 计算机学报, 2014, 第 4 作者(111) 面向混合负载的集群资源弹性调度, Cluster elastic resource scheduling for mixed workloads, 高技术通讯, 2014, 第 3 作者(112) 面向大数据分析的分布式文件系统关键技术, Key Technology in Distributed File System Towards Big Data Analysis, 计算机研究与发展, 2014, 第 3 作者(113) 一种基于文法压缩的日志异常检测算法, An Online Log Anomaly Detection Method Based on Grammar Compression, 计算机学报, 2014, 第 4 作者(114) 数据中心应用请求级行为特征分析, Request Behavior Characterization for Data Center Application, 计算机学报, 2013, 第 2 作者(115) 面向应用服务级目标的虚拟化资源管理, Adaptive Virtualized Resource Management for Application's SLO Guarantees, 软件学报, 2013, 第 2 作者(116) 高效支持多维网络OLAP的数据立方体模型CI-DCG, CI-DCG:an efficient data cube model for supporting OLAP on multidimensional networks, 高技术通讯, 2013, 第 3 作者(117) 基于分级编码的高可靠存储策略, A high reliable storage architecture with hierarchical coding, 高技术通讯, 2013, 第 2 作者(118) OAMS: A Highly Reliable Metadata Service for Big Data Storage, 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, 第 6 作者(119) Lynn: A Multi-Dimensional Dynamic Resource Management System for Distributed Applications in Clouds, 2013 INTERNATIONAL CONFERENCE ON CLOUD AND SERVICE COMPUTING (CSC 2013), 2013, 第 5 作者(120) DIFTSAS: a DIstributed Full Text Search and Analysis System for Big Data, 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, 第 6 作者(121) An Adaptive Resource Sharing Platform for Internet Data Center, 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, 第 4 作者(122) 基于Hadoop的高效连接查询处理算法CHMJ, Efficient Join Query Processing Algorithm CHMJ Based on Hadoop, 软件学报, 2012, 第 3 作者(123) 虚拟机快速全系统在线迁移, Fast and Live Whole-System Migration of Virtual Machines, 计算机研究与发展, 2012, 第 4 作者(124) 基于分布式索引和目录聚合的海量小文件存储研究, Research on enormous storage for small files based on distributed indexing and directory aggregation, 高技术通讯, 2012, 第 2 作者(125) ISP网络间TCP包载荷重复度测量与分析, Measuring and Analyzing TCP Payload Duplicates Across ISPs, 计算机研究与发展, 2012, 第 3 作者(126) 曙光星云分布式文件系统:海量小文件存取, Dawning Nebula Distributed File System HVFS:for Large Scale Small File Access, 小型微型计算机系统, 2012, 第 2 作者(127) Scalable group management in large-scale virtualized clusters, Scalable group management in large-scale virtualized clusters, 高技术通讯英文版, 2011, 第 3 作者(128) 基于全局地址空间的高效I/O虚拟化方法研究, Research on Global Address Space-based High Performance Network Virtualization, 小型微型计算机系统, 2011, 第 2 作者(129) 多核下基于远程直接内存访问的高效远程过程调用研究, Study on RDMA-based high performance RPC in multi-core systems, 高技术通讯, 2011, 第 2 作者(130) Automatic performance debugging of SPMD-style parallel programs, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2011, 第 6 作者(131) 请求路径驱动的性能错误诊断模型, IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010, 第 1 作者(132) TRANSFORMER: A NEW PARADIGM FOR BUILDING DATA-PARALLEL PROGRAMMING MODELS, IEEE MICRO, 2010, 第 2 作者(133) 多核环境下高效集合通信关键技术研究, Research of Collectives Optimization on Modern Multicore Clusters, 计算机学报, 2010, 第 2 作者(134) 分布式服务的协同选择再生框架, IEEE International Conference on Parallel and Distributed Systems, 2010, 第 1 作者(135) 数据密集型计算编程模型研究进展, Review of Programming Models for Data-Intensive Computing, 计算机研究与发展, 2010, 第 1 作者(136) 基于数据去冗余的虚拟机在线迁移技术研究, IEEE International Conference on Cluster Computing 2010, 2010, 第 1 作者(137) 当代高速互联网络虚拟化的性能和可扩展性研究, IEEE International Conference on Cluster Computing 2010, 2010, 第 1 作者(138) 基于复本的高可用机群文件系统元数据管理技术, IEEE International Conference on Cluster Computing 2010, 2010, 第 1 作者(139) SOA系统再生的案例分析, International Conference on Parallel and Distributed Processing Techniques and Applications, 2010, 第 1 作者(140) 云计算环境下基于失效规则的资源动态提供策略, Reliable Resource Provision Policy for Cloud Computing, 计算机学报, 2010, 第 2 作者(141) 云计算环境下基于失效规律的资源动态提供方法, 计算机学报,IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010, 第 1 作者(142) 变形金刚: 一种构建数据并行编程模型的新范式, IEEE Micro, 2010, 第 1 作者(143) 大规模机群系统的在线事件相关性分析, IFIP Internationsal Conference on Network and Parallel Computing, 2010, 第 1 作者(144) Replication-based Highly Available Metadata Management for Cluster File Systems, IEEE International Conference on Cluster Computing 2010, 2010, 第 3 作者(145) Single-particle 3D Reconstruction from Cryo-Electron Microscopy Images on GPU, ICS'09: PROCEEDINGS OF THE 2009 ACM SIGARCH INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, 2009, 第 4 作者(146) Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes, 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, 第 5 作者(147) 多层服务系统选择性再生框架, Selective Rejuvenation Framework for Multi-Tier Services, 计算机学报, 2009, 第 3 作者(148) 基于对象存储的机群文件系统数据通路, Cluster File System Data Path Based on Object Storage, 计算机工程, 2008, 第 4 作者(149) 基于接纳时间比控制和比例积分调节器的接纳控制机制, Enforcing Admission Control Using Admission-Time-Ratio and PI Controller, 计算机研究与发展, 2007, 第 2 作者(150) 一种适应行业信息系统的通用管理框架, Unified Management Framework for Industrial Information System, 计算机应用研究, 2007, 第 6 作者(151) A strategy-proof combinatorial auction-based grid resource allocation system, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2007, 第 3 作者(152) Phoenix集群操作系统Web Portal的设计与实现, Design and Implementation of Phoenix Operation System Web Portal, 计算机工程, 2006, 第 4 作者(153) A failure-aware scheduling strategy in large-scale cluster system, SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, 2006, 第 2 作者(154) LUNF——基于节点失效特征的机群作业调度策略, LUNF-A Cluster Job Scheduling Strategy Using Characterization of Nodes' Failure, 计算机研究与发展, 2005, 第 2 作者(155) 高生产率计算系统, High Productivity Computing Systems, 计算机研究与发展, 2005, 第 1 作者(156) 检查点系统中进程地址空间的优化存储策略, Optimization Strategies of Process Address Space Storage in Checkpoint System, 计算机工程与应用, 2005, 第 2 作者(157) 一体化机群操作系统Phoenix, Fully Integrated Cluster Operating System: Phoenix, 计算机研究与发展, 2005, 第 1 作者(158) 高可用机群系统辅助测试工具:HABench, Assistant Testing Tools of High-Availability Clusters: HABench, 计算机工程与应用, 2005, 第 3 作者(159) DCFS2的元数据一致性策略, Metadata Consistency in DCFS2, 计算机研究与发展, 2005, 第 6 作者(160) S0ckvia——机群环境中的高效socket, Sockvia-a High Performance Socket in Clusters, 计算机工程与应用, 2005, 第 4 作者(161) 基于机群中间件监控系统的设计和实现, The Design and Implementation of Monitoring System Based on Cluster Middleware, 计算机工程与应用, 2005, 第 4 作者(162) 基于智能网卡支持的并行通信协议, Parallel Communication Protocol Based on Smart NICs, 计算机研究与发展, 2005, 第 3 作者(163) 基于联邦的数据公告的设计与实现, The Design and Implemention of Federated Data Bulletin Service, 计算机工程与应用, 2004, 第 2 作者(164) 高性能计算机曙光4000A的网格使能特征, Grid-Enabling Features of the Dawning 4000A High-Performance Computer, 计算机研究与发展, 2004, 第 2 作者(165) PCMD在机群管理系统中的应用及其改进, The Application and Improvement of PCMD in Cluster Management Systems, 计算机工程与科学, 2004, 第 3 作者(166) 数据库应用的高可用性及实现技术, Database Application High Availability Technology and Implementation, 计算机应用研究, 2004, 第 2 作者(167) 视频服务器性能测试研究, Research on Performance Testing of Video Server, 计算机工程, 2004, 第 4 作者(168) RB-FIFT——一种结合Firstfit及预约回填策略的机群作业调度算法, RB-FIFIT-A Cluster Job Scheduling Algorithm Combining Firstfit, Reservation and Backfilling, 计算机研究与发展, 2004, 第 2 作者(169) Java RMI及多线程技术在机群管理系统中的应用, The Application of Java RMI and Multi-thread Technology in Cluster Management System, 计算机工程与应用, 2004, 第 2 作者(170) 基于CATV网络的视频服务器接入控制分析, Analysis of Admission Control for Video Server on CATV Network, 计算机工程与应用, 2004, 第 4 作者(171) 视频服备器性能测试研究, 计算机工程, 2004, 第 4 作者(172) 一种简化的基于First—Fit的Backfilling调度策略—RB—FIFT, A Simplified Backfilling Algorithm Based on FirstFit-RB-FIFT, 计算机工程与应用, 2003, 第 3 作者(173) 网络文件系统中的元数据存取优化研究, Research for Meta-data Operation Optimizing in Network File Systems, 微电子学与计算机, 2003, 第 3 作者(174) PVFS文件系统吞吐率分析和改进, Throughput Analysis and Improvement of PVFS, 计算机科学, 2003, 第 1 作者(175) DCFS机群文件系统服务器组关键技术研究, Research for the Key Technology of Werver Group in DCFS Cluster Filesystem, 微电子学与计算机, 2003, 第 4 作者(176) 一个提高机群文件系统吞吐率的方法及其实现, A Design and Implemntation for Throughput Improvement of Cluster File Systems, 计算机工程与应用, 2003, 第 2 作者(177) 曙光3000机群作业管理系统JOSS的设计与实现, Design and Implementation of Dawing 3000 Cluster Job Management Software, 计算机工程, 2003, 第 2 作者(178) BCL/IP:机群系统域网中TCP/IP协议的实现, BCL/IP: an Implementation of TCP/IP on SAN of Cluster, 计算机工程与应用, 2003, 第 3 作者(179) 曙光3000超级服务器设计的关键问题研究, Key Design Issues of Dawning3000 Superserver, 计算机学报, 2002, 第 2 作者(180) 曙光机群文件系统DCFS负载平衡策略, Load-Balance Policy in DCFS,d the Dawning Cluster Filesystem, 计算机工程与应用, 2002, 第 2 作者(181) NFS和PVFS文件系统吞吐率分析, Throughput Analysis of NFS and PVFS, 计算机工程与应用, 2002, 第 2 作者(182) Concurrent C语言在分布式系统上实现中的存储组织与分配, 哈尔滨工业大学学报, 1995, 第 3 作者
发表著作
(1) 网络空间内置式主动防御, Built-in Active Defense in Cyberspace, 科学出版社, 2021-03, 第 1 作者