Suivre
Meng Yu
Titre
Citée par
Citée par
Année
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
3912005
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1642017
Incentive compatible moving target defense against vm-colocation attacks in clouds
Y Zhang, M Li, K Bai, M Yu, W Zang
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
1432012
ADL-MVDR: All deep learning MVDR beamformer for target speech separation
Z Zhang, Y Xu, M Yu, SX Zhang, L Chen, D Yu
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
1132021
Self-supervised text-independent speaker verification using prototypical momentum contrastive learning
W Xia, C Zhang, C Weng, M Yu, D Yu
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
652021
Deep learning based multi-source localization with source splitting and its effectiveness in multi-talker speech recognition
AS Subramanian, C Weng, S Watanabe, M Yu, D Yu
Computer Speech & Language 75, 101360, 2022
642022
Enhancing end-to-end multi-channel speech separation via spatial feature learning
R Gu, SX Zhang, L Chen, Y Xu, M Yu, D Su, Y Zou, D Yu
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
622020
Mycloud: supporting user-configured privacy protection in cloud computing
M Li, W Zang, K Bai, M Yu, P Liu
Proceedings of the 29th Annual Computer Security Applications Conference, 59-68, 2013
612013
Audio-visual speech separation and dereverberation with a two-stage multimodal network
K Tan, Y Xu, SX Zhang, M Yu, D Yu
IEEE Journal of Selected Topics in Signal Processing 14 (3), 542-553, 2020
512020
Seq2seq attentional siamese neural networks for text-dependent speaker verification
Y Zhang, M Yu, N Li, C Yu, J Cui, D Yu
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
492019
Self-healing workflow systems under attacks
M Yu, P Liu, W Zang
24th International Conference on Distributed Computing Systems, 2004 …, 2004
492004
Far-field location guided target speech extraction using end-to-end speech recognition objectives
AS Subramanian, C Weng, M Yu, SX Zhang, Y Xu, S Watanabe, D Yu
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
432020
Joint training of complex ratio mask based beamformer and acoustic model for noise robust asr
Y Xu, C Weng, L Hui, J Liu, M Yu, D Su, D Yu
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
412019
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
M Li, Y Zhang, K Bai, W Zang, M Yu, X He
SECRYPT, 321-326, 2012
412012
FAST-RIR: Fast neural diffuse room impulse response generator
A Ratnarajah, SX Zhang, M Yu, Z Tang, D Manocha, D Yu
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
382022
Neural spatio-temporal beamformer for target speech separation
Y Xu, M Yu, SX Zhang, L Chen, C Weng, J Liu, D Yu
arXiv preprint arXiv:2005.03889, 2020
382020
Speaker-aware target speaker enhancement by jointly learning with speaker embedding extraction
X Ji, M Yu, C Zhang, D Su, T Yu, X Liu, D Yu
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
382020
Generalized spatio-temporal rnn beamformer for target speech separation
Y Xu, Z Zhang, M Yu, SX Zhang, D Yu
arXiv preprint arXiv:2101.01280, 2021
372021
Jointly Adversarial Enhancement Training for Robust End-to-End Speech Recognition.
B Liu, S Nie, S Liang, W Liu, M Yu, L Chen, S Peng, C Li
Interspeech, 491-495, 2019
362019
Improving virtualization security by splitting hypervisor into smaller components
W Pan, Y Zhang, M Yu, J Jing
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
332012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20