default search action
Weizhi Meng 0001
Person information
- affiliation: Technical University of Denmark, Lyngby, Denmark
- affiliation (2014 - 2016): Institute for Infocomm Research, Singapore
- affiliation (PhD 2013): City University of Hong Kong, Hong Kong
Other persons with the same name
- Weizhi Meng
- Weizhi Meng 0002 — Alibaba Group, China
- Weizhi Meng 0003 — LinkedIn, Mountain View, CA, USA
- Yuxin Meng 0002 — Beijing No. 6 Hospital, Beijing, China
- Yuxin Meng 0003 — Ocean University of China, Qingdao, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j131]Brooke Lampe, Weizhi Meng:
can-train-and-test: A curated CAN dataset for automotive intrusion detection. Comput. Secur. 140: 103777 (2024) - [j130]Ye Yao, Tingfeng Han, Xudong Gao, Yizhi Ren, Weizhi Meng:
Deep video inpainting detection and localization based on ConvNeXt dual-stream network. Expert Syst. Appl. 247: 123331 (2024) - [j129]Ye Yao, Junyu Wang, Qi Chang, Yizhi Ren, Weizhi Meng:
High invisibility image steganography with wavelet transform and generative adversarial network. Expert Syst. Appl. 249: 123540 (2024) - [j128]Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng:
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing. IET Cyper-Phys. Syst.: Theory & Appl. 9(2): 99-101 (2024) - [j127]Yuan Chang, Jiliang Li, Ning Lu, Wenbo Shi, Zhou Su, Weizhi Meng:
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids. IEEE Internet Things J. 11(2): 1990-2005 (2024) - [j126]Gang Shen, Chengliangyi Xia, Yumei Li, Hua Shen, Weizhi Meng, Mingwu Zhang:
Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks. IEEE Internet Things J. 11(4): 6664-6676 (2024) - [j125]Zhuotao Lian, Qingkui Zeng, Weizheng Wang, Dequan Xu, Weizhi Meng, Chunhua Su:
Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles. IEEE Internet Things J. 11(4): 6722-6729 (2024) - [j124]Zhenyu Jiang, Jiliang Li, Qinnan Hu, Weizhi Meng, Witold Pedrycz, Zhou Su:
Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet Things J. 11(16): 26955-26969 (2024) - [j123]Jiliang Li, Yuheng Wang, Yuan Su, Zhou Su, Yuyi Wang, Weizhi Meng, Yinghua Shen:
Delayed packing attack and countermeasure against transaction information based applications. Inf. Sci. 652: 119742 (2024) - [j122]Xiaobo Yu, Weizhi Meng, Yi-Ning Liu, Fei Zhou:
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications. J. Netw. Comput. Appl. 223: 103823 (2024) - [j121]Zheng Zhang, Jingfeng Xue, Tian Chen, Yuhang Zhao, Weizhi Meng:
Flash controller-based secure execution environment for protecting code confidentiality. J. Syst. Archit. 152: 103172 (2024) - [j120]Palash Ray, Debasis Giri, Weizhi Meng, Soumyadeep Hore:
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection. Multim. Tools Appl. 83(19): 56569-56618 (2024) - [j119]Weizhi Meng, Rongxing Lu, Jun Zhang, Pierangela Samarati:
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices. IEEE Trans. Consumer Electron. 70(1): 3960-3962 (2024) - [j118]Mingbo Zhao, Weizhi Meng, Bingyi Liu, Yimin Yang:
Guest Editorial of the Special Section on Generative Artificial Intelligence With Applications on Consumer Electronics. IEEE Trans. Consumer Electron. 70(2): 4955-4957 (2024) - [j117]Meng Li, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures With Dynamically Private Accountability. IEEE Trans. Inf. Forensics Secur. 19: 2217-2230 (2024) - [j116]Ye Yao, Chen Wang, Hui Wang, Ke Wang, Yizhi Ren, Weizhi Meng:
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Trans. Inf. Forensics Secur. 19: 4406-4419 (2024) - [j115]Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, Qiuhua Wang:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024) - [j114]Yuan Su, Jiliang Li, Jiahui Li, Zhou Su, Weizhi Meng, Hao Yin, Rongxing Lu:
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems. IEEE Trans. Netw. Sci. Eng. 11(3): 2864-2875 (2024) - [j113]Simon Lucas Jonker, Malthe Jelstrup, Weizhi Meng, Brooke Lampe:
Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 154:1-154:22 (2024) - [c136]Siyu Li, Yi-Ning Liu, Fei Zhou, Yanze Kang, Weizhi Meng:
AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes. ACISP (3) 2024: 323-336 - [c135]Banghong Qin, Jianwei Liu, Xinxin Xing, Weizhi Meng, Yizhong Liu:
Mitigating Centralization in Access Control System with Blockchain and Distributed Storage. Blockchain 2024: 340-345 - [c134]Yingli Duan, Weizhi Meng, Wei-Yang Chiu:
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions. DSPP (1) 2024: 195-210 - [c133]Brooke Kidmose, Weizhi Meng:
can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets. EICC 2024: 19-28 - [c132]Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang:
An eID-Based Privacy-Enhanced Public Transportation Ticket System. ISPEC 2024: 292-309 - [c131]Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. ISPEC 2024: 365-382 - [c130]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao, Weizhi Meng:
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT. PerCom Workshops 2024: 88-93 - [c129]Yingli Duan, Weizhi Meng, Wei-Yang Chiu, Yu Wang:
DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices. SIGCOMM (Posters and Demos) 2024: 101-103 - [e34]Jun Shao, Sokratis K. Katsikas, Weizhi Meng:
Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings. Communications in Computer and Information Science 2004, Springer 2024, ISBN 978-981-99-9613-1 [contents] - [e33]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [e32]Guojun Wang, Haozhe Wang, Geyong Min, Nektarios Georgalas, Weizhi Meng:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1 [contents] - [i9]Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan:
ABC-Channel: An Advanced Blockchain-based Covert Channel. CoRR abs/2403.06261 (2024) - 2023
- [j112]Jiliang Li, Ziyi Zhao, Zhou Su, Weizhi Meng:
Gas-expensive patterns detection to optimize smart contracts. Appl. Soft Comput. 145: 110542 (2023) - [j111]Shi-Cho Cha, Weizhi Meng, Wen-Wei Li, Kuo-Hui Yeh:
A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2. Comput. Ind. Eng. 178: 109091 (2023) - [j110]Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Comput. Secur. 125: 103048 (2023) - [j109]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 128: 103179 (2023) - [j108]Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, Xi Zheng:
GenDroid: A query-efficient black-box android adversarial attack framework. Comput. Secur. 132: 103359 (2023) - [j107]Chengcheng Zhu, Jiale Zhang, Xiaobing Sun, Bing Chen, Weizhi Meng:
ADFL: Defending backdoor attacks in federated learning via adversarial distillation. Comput. Secur. 132: 103366 (2023) - [j106]Brooke Lampe, Weizhi Meng:
Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Commun. Surv. Tutorials 25(4): 2356-2426 (2023) - [j105]Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng:
MLCT: A multi-level contact tracing scheme with strong privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j104]Chengyi Qin, Lei Wu, Weizhi Meng, Zihui Xu, Su Li, Hao Wang:
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud. Expert Syst. Appl. 211: 118545 (2023) - [j103]Brooke Lampe, Weizhi Meng:
A survey of deep learning-based intrusion detection in automotive applications. Expert Syst. Appl. 221: 119771 (2023) - [j102]Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Editorial for special issue on security and trust on networked systems. Int. J. Netw. Manag. 33(3) (2023) - [j101]Wen-Wei Li, Weizhi Meng, Kuo-Hui Yeh, Shi-Cho Cha:
Trusting Computing as a Service for Blockchain Applications. IEEE Internet Things J. 10(13): 11326-11342 (2023) - [j100]Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j99]Binjie Liao, Hongyi Chen, Yu Wang, Weizhi Meng, Jun Zhang:
Analysis of hybrid attack and defense based on block withholding strategy. J. Inf. Secur. Appl. 78: 103620 (2023) - [j98]Jingkang Yang, Xiaobo Yu, Weizhi Meng, Yining Liu:
Dummy trajectory generation scheme based on generative adversarial networks. Neural Comput. Appl. 35(11): 8453-8469 (2023) - [j97]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. IEEE Trans. Inf. Forensics Secur. 18: 5964-5979 (2023) - [j96]Wei-Yang Chiu, Weizhi Meng, Chunpeng Ge:
NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0. IEEE Trans. Ind. Informatics 19(7): 7957-7965 (2023) - [j95]Hu Xiong, Hanxiao Wang, Weizhi Meng, Kuo-Hui Yeh:
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System. IEEE Trans. Ind. Informatics 19(11): 10977-10986 (2023) - [j94]Wensheng Gan, Kaixia Hu, Gengsen Huang, Wei-Che Chien, Han-Chieh Chao, Weizhi Meng:
Data Analytic for Healthcare Cyber Physical System. IEEE Trans. Netw. Sci. Eng. 10(5): 2490-2502 (2023) - [j93]ZengRi Zeng, Baokang Zhao, Han-Chieh Chao, Ilsun You, Kuo-Hui Yeh, Weizhi Meng:
Towards Intelligent Attack Detection Using DNA Computing. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 126:1-126:27 (2023) - [j92]Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, Weizhi Meng:
A secure and lightweight batch authentication scheme for Internet of Drones environment. Veh. Commun. 44: 100680 (2023) - [c128]Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng:
KEP: Keystroke Evoked Potential for EEG-Based User Authentication. AIS&P (1) 2023: 513-530 - [c127]Razy Youhana Adam, Weizhi Meng:
Securing 5G Positioning via Zero Trust Architecture. AIS&P (1) 2023: 563-578 - [c126]Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, Wenjuan Li:
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. ISPA/BDCloud/SocialCom/SustainCom 2023: 286-293 - [c125]Vince Biró, Wei-Yang Chiu, Weizhi Meng:
Securing IoT Firmware Dispatch Systems with Blockchain. Blockchain 2023: 229-238 - [c124]Wei-Yang Chiu, Weizhi Meng, Brooke Lampe:
No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices. DSN-S 2023: 137-141 - [c123]Grzegorz Jacek Kot, Weizhi Meng, Brooke Lampe:
Securing Offshore Installations Against Automatic Identification System Spoofing. GLOBECOM 2023: 4473-4478 - [c122]Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu:
A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. ICBC 2023: 1-3 - [c121]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. ICNC 2023: 336-342 - [c120]Weizhi Meng, Wei-Yang Chiu:
DataVaults: A Secure, Distributed and Privacy Preserving Personal Data Management Platform. ICDCS 2023: 1-4 - [c119]Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng, Brooke Lampe:
BlockPAT: A Blockchain-Enabled Second-Hand Physical Asset Tokenization Management System. ICDCS 2023: 1041-1042 - [c118]Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu:
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. ICICS 2023: 627-644 - [c117]Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, Brooke Lampe:
Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. ICPADS 2023: 2135-2142 - [c116]Brooke Lampe, Weizhi Meng:
can-logic: Automotive Intrusion Detection via Temporal Logic. IoT 2023: 113-120 - [c115]Katherine Cardoso Petulante Fernandes, Simon Lucas Jonker, Weizhi Meng, Brooke Lampe:
ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise. MetaCom 2023: 124-128 - [c114]Ensar Seker, Weizhi Meng:
XVRS: Extended Vulnerability Risk Scoring based on Threat Intelligence. MetaCom 2023: 516-523 - [c113]Mads Solberg Collingwood Pyke, Weizhi Meng, Brooke Lampe:
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. ML4CS 2023: 145-162 - [c112]Gergely Tuskó, Weizhi Meng, Brooke Lampe:
Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. TrustCom 2023: 1196-1205 - [c111]Brooke Lampe, Weizhi Meng:
can-train-and-test: A New CAN Intrusion Detection Dataset. VTC Fall 2023: 1-7 - [e31]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [e30]Weizhi Meng, Wenjuan Li:
Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 498, Springer 2023, ISBN 978-3-031-31419-3 [contents] - [e29]Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023 [contents] - [e28]Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya:
Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings. Lecture Notes in Computer Science 13777, Springer 2023, ISBN 978-3-031-22676-2 [contents] - [e27]Weizhi Meng, Zheng Yan, Vincenzo Piuri:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 [contents] - [e26]Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, Weizhi Meng, Yuanyuan Mu:
International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7-9, 2023, Proceedings, Part I. Communications in Computer and Information Science 1869, Springer 2023, ISBN 978-981-99-5843-6 [contents] - [e25]Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, Weizhi Meng, Yuanyuan Mu:
International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7-9, 2023, Proceedings, Part II. Communications in Computer and Information Science 1870, Springer 2023, ISBN 978-981-99-5846-7 [contents] - [e24]Moti Yung, Chao Chen, Weizhi Meng:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0 [contents] - [e23]Gabriele Lenzini, Weizhi Meng:
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings. Lecture Notes in Computer Science 13867, Springer 2023, ISBN 978-3-031-29503-4 [contents] - [i8]Wei-Yang Chiu, Weizhi Meng:
BlockFW - Towards Blockchain-based Rule-Sharing Firewall. CoRR abs/2303.13073 (2023) - [i7]Kamal Raj Sharma, Wei-Yang Chiu, Weizhi Meng:
Security Analysis on Social Media Networks via STRIDE Model. CoRR abs/2303.13075 (2023) - [i6]Alexandru Rusescu, Brooke Lampe, Weizhi Meng:
Protecting User Privacy in Online Settings via Supervised Learning. CoRR abs/2304.02870 (2023) - [i5]Meng Li, Mingwei Zhang, Qing Wang, Hanni Ding, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures with Dynamically Private Accountability. CoRR abs/2304.07937 (2023) - [i4]Brooke Lampe, Weizhi Meng:
can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection. CoRR abs/2308.04972 (2023) - [i3]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. CoRR abs/2309.00251 (2023) - [i2]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability. CoRR abs/2312.16954 (2023) - 2022
- [j91]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Commun. Surv. Tutorials 24(1): 280-305 (2022) - [j90]Jun Zhang, Houda Labiod, Weizhi Meng:
For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j89]Zhanwen Chen, Jiageng Chen, Weizhi Meng:
Threshold identity authentication signature: Impersonation prevention in social network services. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j88]Weizhi Meng, Thanassis Giannetsos, Christian Damsgaard Jensen:
Information and Future Internet Security, Trust and Privacy. Future Internet 14(12): 372 (2022) - [j87]Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j86]Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han:
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors. Int. J. Intell. Syst. 37(1): 287-304 (2022) - [j85]Ding Wang, Weizhi Meng:
Editorial: Security and Privacy Challenges in Internet of Things. Mob. Networks Appl. 27(1): 343-345 (2022) - [j84]Su Li, Lei Wu, Weizhi Meng, Zihui Xu, Chengyi Qin, Hao Wang:
DVPPIR: privacy-preserving image retrieval based on DCNN and VHE. Neural Comput. Appl. 34(17): 14355-14371 (2022) - [j83]Qian Zhou, Xiaojun Xie, Hua Dai, Weizhi Meng:
A novel rough set-based approach for minimum vertex cover of hypergraphs. Neural Comput. Appl. 34(24): 21793-21808 (2022) - [j82]Wenjuan Li, Weizhi Meng:
BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Netw. 36(4): 120-125 (2022) - [c110]Bingkun Wu, Weizhi Meng, Wei-Yang Chiu:
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. ACSAC 2022: 799-812 - [c109]Zhengzhong Sun, Wei-Yang Chiu, Weizhi Meng:
Mosaic - A Blockchain Consensus Algorithm Based on Random Number Generation. Blockchain 2022: 105-114 - [c108]Wei-Yang Chiu, Weizhi Meng:
DevLeChain - An Open Blockchain Development Platform for Decentralized Applications. Blockchain 2022: 167-176 - [c107]Jiaxin Deng, Simin Chen, Jiageng Chen, Weizhi Meng:
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. EISA 2022: 87-107 - [c106]Brooke Lampe, Weizhi Meng:
IDS for CAN: A Practical Intrusion Detection System for CAN Bus Security. GLOBECOM 2022: 1782-1787 - [c105]Xingguo Sun, Weizhi Meng, Wei-Yang Chiu, Brooke Lampe:
TDL-IDS: Towards A Transfer Deep Learning based Intrusion Detection System. GLOBECOM 2022: 2603-2608 - [c104]Andrei Nicolae Calugar, Weizhi Meng, Haijun Zhang:
Towards Artificial Neural Network Based Intrusion Detection with Enhanced Hyperparameter Tuning. GLOBECOM 2022: 2627-2632 - [c103]Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, Weizhi Meng:
AirChain - Towards Blockchain-based Aircraft Maintenance Record System. ICBC 2022: 1-3 - [c102]Zhen Liu, Yining Liu, Weizhi Meng:
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community. ICICS 2022: 221-239 - [c101]Jonathan Kvist Brittain, Wei-Yang Chiu, Weizhi Meng:
Towards A Scalable and Privacy-Preserving Blockchain-based European Parking System. ICPADS 2022: 322-329 - [c100]Bodi Bodi, Wei-Yang Chiu, Weizhi Meng:
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System. ISPEC 2022: 3-20 - [c99]August Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu, Weizhi Meng:
Designing Enhanced Robust 6G Connection Strategy with Blockchain. ISPEC 2022: 57-74 - [c98]Qi Yuan, Lujiao Shao, Xinyu Zhang, Xinrui Yu, Huiyue Sun, Jianghong Ma, Weizhi Meng, Xiao-Zhi Gao, Haijun Zhang:
A Collaborators Recommendation Method Based on Multi-feature Fusion. NCAA (1) 2022: 247-261 - [c97]Jiaqi Chen, Lujiao Shao, Haibin Zhou, Jianghong Ma, Weizhi Meng, Zenghui Wang, Haijun Zhang:
Extracting Key Information from Shopping Receipts by Using Bayesian Deep Learning via Multi-modal Features. NCAA (1) 2022: 378-393 - [c96]Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang:
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. NSS 2022: 374-386 - [c95]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, Liming Fang:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. ProvSec 2022: 210-227 - [c94]Jacob Krabbe Pedersen, Mikkel Bøchman, Weizhi Meng:
Security Analysis in Satellite Communication based on Geostationary Orbit. PST 2022: 1-10 - [c93]Yiming Sun, Weizhi Meng, Wenjuan Li:
Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. PST 2022: 1-5 - [c92]Yanze Kang, Xiaobo Yu, Weizhi Meng, Yining Liu:
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain. SciSec 2022: 21-35 - [c91]Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, Weizhi Meng:
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security. SciSec 2022: 51-67 - [e22]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e21]Wenjuan Li, Steven Furnell, Weizhi Meng:
Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13745, Springer 2022, ISBN 978-3-031-21310-6 [contents] - [e20]Weizhi Meng, Mauro Conti:
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings. Lecture Notes in Computer Science 13172, Springer 2022, ISBN 978-3-030-94028-7 [contents] - [e19]Weizhi Meng, Sokratis K. Katsikas:
Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers. Communications in Computer and Information Science 1403, Springer 2022, ISBN 978-3-030-93955-7 [contents] - [e18]Sokratis K. Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [e17]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0 [contents] - [e16]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1 [contents] - [e15]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0 [contents] - [e14]Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 [contents] - [e13]Weizhi Meng, Simone Fischer-Hübner, Christian Damsgaard Jensen:
ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings. IFIP Advances in Information and Communication Technology 648, Springer 2022, ISBN 978-3-031-06974-1 [contents] - [i1]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS. CoRR abs/2212.10830 (2022) - 2021
- [j81]Weizhi Meng, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu:
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges. IEEE Access 9: 108846-108850 (2021) - [j80]Zhiping Jin, Zhibiao Liang, Yu Wang, Weizhi Meng:
Mobile network traffic pattern classification with incomplete a priori information. Comput. Commun. 166: 262-270 (2021) - [j79]Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". Digit. Commun. Networks 7(2): 245-246 (2021) - [j78]Yanxi Huang, Fangzhou Zhu, Liang Liu, Weizhi Meng, Simin Hu, Renjun Ye, Ting Lv:
WNV-Detector: automated and scalable detection of wireless network vulnerabilities. EURASIP J. Wirel. Commun. Netw. 2021(1): 85 (2021) - [j77]Yiming Xiao, Liang Liu, Zuchao Ma, Zijie Wang, Weizhi Meng:
Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing. Trans. Emerg. Telecommun. Technol. 32(9) (2021) - [j76]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750]. Future Gener. Comput. Syst. 118: 492-494 (2021) - [j75]Weizhi Meng, Piotr Cofta, Tyrone W. A. Grandison:
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions. Int. J. Netw. Manag. 31(2) (2021) - [j74]Weizhi Meng, Wenjuan Li, Jianying Zhou:
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70: 60-71 (2021) - [j73]Zhaoman Liu, Lei Wu, Weizhi Meng, Hao Wang, Wei Wang:
Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT. IEEE Internet Things J. 8(18): 14322-14337 (2021) - [j72]Weizhi Meng, Yong Cai, Laurence T. Yang, Wei-Yang Chiu:
Hybrid Emotion-Aware Monitoring System Based on Brainwaves for Internet of Medical Things. IEEE Internet Things J. 8(21): 16014-16022 (2021) - [j71]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
My data, my control: A secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63: 103020 (2021) - [j70]Sven Groppe, Weizhi Meng:
Overview of the 2021 Edition of the Workshop on Very Large Internet of Things (VLIoT 2021). Open J. Internet Things 7(1): 18-22 (2021) - [j69]Wei-Yang Chiu, Weizhi Meng:
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities. Peer-to-Peer Netw. Appl. 14(5): 2874-2886 (2021) - [j68]Liang Liu, Yiting Wang, Weizhi Meng, Zhe Xu, Wenzhao Gao, Zuchao Ma:
Towards efficient and energy-aware query processing for industrial internet of things. Peer-to-Peer Netw. Appl. 14(6): 3895-3914 (2021) - [j67]Wenjuan Li, Weizhi Meng, Steven Furnell:
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144: 35-41 (2021) - [j66]Andrea Casanova, Lucia Cascone, Aniello Castiglione, Weizhi Meng, Chiara Pero:
User recognition based on periocular biometrics and touch dynamics. Pattern Recognit. Lett. 148: 114-120 (2021) - [j65]Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng:
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Trans. Inf. Forensics Secur. 16: 307-321 (2021) - [j64]Pengli Nie, Guangquan Xu, Litao Jiao, Shaoying Liu, Jian Liu, Weizhi Meng, Hongyue Wu, Meiqi Feng, Weizhe Wang, Zhengjun Jing, Xi Zheng:
Sparse Trust Data Mining. IEEE Trans. Inf. Forensics Secur. 16: 4559-4573 (2021) - [c90]Wei-Yang Chiu, Weizhi Meng:
Mind the Scraps: Attacking Blockchain Based on Selfdestruct. ACISP 2021: 451-469 - [c89]Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu, Chunpeng Ge:
ActAnyware - Blockchain-Based Software Licensing Scheme. BlockSys 2021: 559-573 - [c88]Wenjuan Li, Weizhi Meng, Javier Parra-Arnau, Kim-Kwang Raymond Choo:
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. DSC 2021: 1-8 - [c87]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement. DSC 2021: 1-8 - [c86]Mohamad Suhel Dalati, Weizhi Meng, Wei-Yang Chiu:
NGS: Mitigating DDoS Attacks using SDN-based Network Gate Shield. GLOBECOM 2021: 1-6 - [c85]Xiaobo Yu, Weizhi Meng, Lei Zhao, Yining Liu:
TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications. ISC 2021: 177-194 - [c84]Mohamad Muwfak Hlal, Weizhi Meng:
BALSAPro: Towards A Security Protocol for Bluetooth Low Energy. MSN 2021: 97-104 - [c83]Li Wang, Weizhi Meng, Wenjuan Li:
Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. MSN 2021: 486-493 - [c82]Jixin Zhang, Jiageng Chen, Weizhi Meng:
Efficient Attribute-Based Signature for Monotone Predicates. ProvSec 2021: 346-362 - [c81]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. PST 2021: 1-9 - [c80]Wei-Yang Chiu, Weizhi Meng:
Towards decentralized bicycle insurance system based on blockchain. SAC 2021: 249-256 - [c79]Kiruthiga Subramanian, Weizhi Meng:
Threat Hunting Using Elastic Stack: An Evaluation. SOLI 2021: 1-6 - [c78]Wenjuan Li, Weizhi Meng, Laurence T. Yang:
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. TrustCom 2021: 122-129 - [c77]Zihao Li, Weizhi Meng:
Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacks. WASA (2) 2021: 186-197 - [c76]Wenjuan Li, Weizhi Meng, Yu Wang, Jin Li:
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. WASA (2) 2021: 624-635 - [e12]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e11]Weizhi Meng, Li Li:
ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, Virtual Event, Hong Kong, 7 June, 2021. ACM 2021, ISBN 978-1-4503-8403-2 [contents] - [e10]Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents] - [e9]Joseph K. Liu, Sokratis K. Katsikas, Weizhi Meng, Willy Susilo, Rolly Intan:
Information Security - 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings. Lecture Notes in Computer Science 13118, Springer 2021, ISBN 978-3-030-91355-7 [contents] - 2020
- [j63]Kuo-Hui Yeh, Weizhi Meng, SK Hafizul Islam, Kuan Zhang, Ennan Zhai:
IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT. IEEE Access 8: 219690-219694 (2020) - [j62]Debiao He, Gerhard P. Hancke, Arcangelo Castiglione, Weizhi Meng:
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov). Comput. Electr. Eng. 87: 106860 (2020) - [j61]Wenjie Wang, Donghai Tian, Weizhi Meng, Xiaoqi Jia, Runze Zhao, Rui Ma:
MSYM: A multichannel communication system for android devices. Comput. Networks 168 (2020) - [j60]Zuchao Ma, Liang Liu, Weizhi Meng:
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks. Comput. Secur. 96: 101898 (2020) - [j59]Yulei Wu, Weizhi Meng, Zheng Yan, Vijay Varadharajan:
Editorial: Special issue on blockchain and communication networks. Digit. Commun. Networks 6(2): 145-146 (2020) - [j58]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j57]Wenjuan Li, Weizhi Meng, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Trans. Inf. Syst. 103-D(2): 196-203 (2020) - [j56]Weizhi Meng, Wenjuan Li, Laurence T. Yang, Peng Li:
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inf. Sec. 19(3): 279-290 (2020) - [j55]Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, Muhammad Tanveer:
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network. IEEE Internet Things J. 7(7): 5745-5759 (2020) - [j54]Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren:
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU. J. Inf. Secur. Appl. 55: 102565 (2020) - [j53]Xiao-di Wang, Weizhi Meng, Yi-Ning Liu:
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid. J. Inf. Secur. Appl. 55: 102628 (2020) - [j52]Wenjuan Li, Weizhi Meng, Man Ho Au:
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161: 102631 (2020) - [j51]Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang:
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation. J. Netw. Comput. Appl. 165: 102687 (2020) - [j50]Weizhi Meng, Wenjuan Li, Steven Tug, Jiao Tan:
Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities. J. Parallel Distributed Comput. 144: 268-277 (2020) - [j49]Liming Fang, Bo Zhao, Yang Li, Zhe Liu, Chunpeng Ge, Weizhi Meng:
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances. IEEE Netw. 34(6): 54-61 (2020) - [j48]Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, Lianyong Qi:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. Secur. Commun. Networks 2020: 7542726:1-7542726:10 (2020) - [j47]Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, Zehong Cao:
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM. Trans. Data Sci. 1(4): 25:1-25:18 (2020) - [j46]Weizhi Meng, Wenjuan Li, Liqiu Zhu:
Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks. IEEE Trans. Engineering Management 67(4): 1377-1386 (2020) - [j45]Kim-Kwang Raymond Choo, Zheng Yan, Weizhi Meng:
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities. IEEE Trans. Ind. Informatics 16(6): 4119-4121 (2020) - [c75]Zuchao Ma, Liang Liu, Weizhi Meng:
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks. ACISP 2020: 247-267 - [c74]Zhanwen Chen, Jiageng Chen, Weizhi Meng:
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing. DASC/PiCom/CBDCom/CyberSciTech 2020: 569-576 - [c73]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm. FCS 2020: 197-214 - [c72]Zuchao Ma, Liang Liu, Weizhi Meng:
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. ISC 2020: 255-273 - [c71]Andreas Heidelbach Engly, Anton Ruby Larsen, Weizhi Meng:
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection. NSS 2020: 277-291 - [c70]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication. SpaCCS 2020: 251-265 - [c69]Wenjuan Li, Weizhi Meng, Hui Zhu:
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. TrustCom 2020: 1179-1186 - [c68]Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, Renjun Ye:
SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. TrustCom 2020: 1194-1199 - [p1]Zhi Lin, Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics 2020: 141-159 - [e8]Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger:
Deep Biometrics. Unsupervised and Semi-Supervised Learning, Springer International Publishing 2020, ISBN 978-3-030-32583-1 [contents] - [e7]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e6]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e5]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [e4]Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7 [contents]
2010 – 2019
- 2019
- [j44]Lihong Tang, Wanlun Ma, Marthie Grobler, Weizhi Meng, Yu Wang, Sheng Wen:
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access 7: 75556-75567 (2019) - [j43]Liang Liu, Jingxiu Yang, Weizhi Meng:
Detecting malicious nodes via gradient descent and support vector machine in Internet of Things. Comput. Electr. Eng. 77: 339-353 (2019) - [j42]Weizhi Meng, Lijun Jiang, Kim-Kwang Raymond Choo, Yu Wang, Chong Jiang:
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones. Comput. Electr. Eng. 78: 230-241 (2019) - [j41]Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j40]Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, Hanxiao Xue:
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j39]Wenjuan Li, Steven Tug, Weizhi Meng, Yu Wang:
Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96: 481-489 (2019) - [j38]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. Future Gener. Comput. Syst. 100: 736-750 (2019) - [j37]Liang Liu, Zuchao Ma, Weizhi Meng:
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101: 865-879 (2019) - [j36]Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li:
Enhancing the security of FinTech applications with map-based graphical password authentication. Future Gener. Comput. Syst. 101: 1018-1027 (2019) - [j35]Saurabh Singh, In-Ho Ra, Weizhi Meng, Maninder Kaur, Gi Hwan Cho:
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology. Int. J. Distributed Sens. Networks 15(4) (2019) - [j34]Irfan Mehmood, Amin Ullah, Khan Muhammad, Der-Jiunn Deng, Weizhi Meng, Fadi Al-Turjman, Muhammad Sajjad, Victor Hugo C. de Albuquerque:
Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms From Big Data Repositories. IEEE Internet Things J. 6(6): 9246-9255 (2019) - [j33]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Design of multi-view based email classification for IoT systems via semi-supervised learning. J. Netw. Comput. Appl. 128: 56-63 (2019) - [j32]Rishikesh Sahay, Weizhi Meng, Christian Damsgaard Jensen:
The application of Software Defined Networking on securing computer networks: A survey. J. Netw. Comput. Appl. 131: 89-108 (2019) - [j31]Zhaoqing Pan, Ching-Nung Yang, Victor S. Sheng, Naixue Xiong, Weizhi Meng:
Machine Learning for Wireless Multimedia Data Security. Secur. Commun. Networks 2019: 7682306:1-7682306:2 (2019) - [j30]Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, Chunhua Su:
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors 19(14): 3091 (2019) - [j29]Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen:
Security, Privacy, and Trust on Internet of Things. Wirel. Commun. Mob. Comput. 2019 (2019) - [c67]Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. AsiaCCS 2019: 241-246 - [c66]Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo:
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones. Inscrypt 2019: 208-224 - [c65]Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. ESORICS (1) 2019: 493-511 - [c64]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c63]Constantinos Pouyioukka, Thanassis Giannetsos, Weizhi Meng:
CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts. IFIPTM 2019: 147-161 - [c62]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. ISPEC 2019: 453-463 - [c61]Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, Jing Li:
SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. ML4CS 2019: 140-153 - [c60]Deina Kellezi, Christian Boegelund, Weizhi Meng:
Towards Secure Open Banking Architecture: An Evaluation with OWASP. NSS 2019: 185-198 - [c59]Jun Zhang, Houda Labiod, Weizhi Meng:
A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites. NTMS 2019: 1-5 - [c58]Weizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou:
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications. SEC 2019: 180-193 - [e3]Jianying Zhou, Robert H. Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - [e2]Weizhi Meng, Piotr Cofta, Christian Damsgaard Jensen, Tyrone Grandison:
Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings. IFIP Advances in Information and Communication Technology 563, Springer 2019, ISBN 978-3-030-33715-5 [contents] - [e1]Weizhi Meng, Steven Furnell:
Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers. Communications in Computer and Information Science 1095, Springer 2019, ISBN 978-981-15-0757-1 [contents] - 2018
- [j28]Wenjuan Li, Weizhi Meng, Chunhua Su, Lam For Kwok:
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access 6: 6530-6539 (2018) - [j27]Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou, Rongxing Lu:
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access 6: 7234-7243 (2018) - [j26]Weizhi Meng, Elmar Tischhauser, Qingju Wang, Yu Wang, Jinguang Han:
When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access 6: 10179-10188 (2018) - [j25]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace H. S. Ip:
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Clust. Comput. 21(1): 299-310 (2018) - [j24]Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76: 252-264 (2018) - [j23]Weizhi Meng:
Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling. Computer 51(7): 36-43 (2018) - [j22]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Future Internet 10(1): 6 (2018) - [j21]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j20]Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Waixi Liu, Yang Xiang:
A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122: 26-35 (2018) - [j19]Weizhi Meng, Wenjuan Li, Duncan S. Wong:
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multim. Tools Appl. 77(23): 30167-30185 (2018) - [j18]Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, Christian W. Probst:
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 761-773 (2018) - [c57]Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - [c56]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c55]David Madsen, Wenjuan Li, Weizhi Meng, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. ICA3PP (4) 2018: 481-494 - [c54]Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. ISPEC 2018: 313-328 - [c53]Weizhi Meng, Zhe Liu:
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. ISPEC 2018: 373-390 - [c52]Steven Tug, Weizhi Meng, Yu Wang:
CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection. iThings/GreenCom/CPSCom/SmartData 2018: 1228-1235 - [c51]Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen:
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS. NSS 2018: 251-265 - [c50]Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang:
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. NSS 2018: 304-318 - [c49]Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c48]Rishikesh Sahay, D. A. Sepulveda, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems. SciSec 2018: 191-198 - [c47]Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han:
CPMap: Design of Click-Points Map-Based Graphical Password Authentication. SEC 2018: 18-32 - [c46]Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. TrustCom/BigDataSE 2018: 1208-1213 - 2017
- [j17]Weizhi Meng, Wenjuan Li, Lam-for Kwok, Kim-Kwang Raymond Choo:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65: 213-229 (2017) - [j16]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip:
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77: 135-145 (2017) - [j15]Weizhi Meng, Wenjuan Li, Yang Xiang, Kim-Kwang Raymond Choo:
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78: 162-169 (2017) - [j14]Weizhi Meng, Wenjuan Li, Lam For Kwok:
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments. IEEE Trans. Netw. Serv. Manag. 14(1): 233-245 (2017) - [c45]Weizhi Meng, Lee Wang Hao, Man Ho Au, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. ACISP (2) 2017: 301-313 - [c44]Weizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou:
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. ACNS 2017: 145-162 - [c43]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. CSS 2017: 163-175 - [c42]Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. CSS 2017: 267-279 - [c41]Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au:
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. GLOBECOM 2017: 1-6 - [c40]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. GPC 2017: 402-415 - [c39]Weizhi Meng, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. ICISC 2017: 327-338 - [c38]Weizhi Meng, Man Ho Au:
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. IFIPTM 2017: 152-159 - [c37]Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au:
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. ISC 2017: 291-308 - [c36]Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. NSS 2017: 199-213 - 2016
- [j13]Wenjuan Li, Weizhi Meng, Xiapu Luo, Lam-for Kwok:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. Comput. Secur. 60: 177-192 (2016) - [j12]Wenjuan Li, Weizhi Meng:
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3): 265-276 (2016) - [j11]Weizhi Meng:
Evaluating the effect of multi-touch behaviours on Android unlock patterns. Inf. Comput. Secur. 24(3): 277-287 (2016) - [j10]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. J. Netw. Comput. Appl. 68: 126-139 (2016) - [j9]Weizhi Meng, Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan:
JuiceCaster: Towards automatic juice filming attacks on smartphones. J. Netw. Comput. Appl. 68: 201-212 (2016) - [c35]Weizhi Meng, Wenjuan Li, Duncan S. Wong, Jianying Zhou:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. ACNS 2016: 629-647 - [c34]Weizhi Meng, Wenjuan Li, Lijun Jiang, Liying Meng:
On Multiple Password Interference of Touch Screen Patterns and Text Passwords. CHI 2016: 4818-4822 - [c33]Wenjuan Li, Lijun Jiang, Weizhi Meng, Lam-for Kwok:
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. IFIPTM 2016: 146-153 - [c32]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip:
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. NSS 2016: 433-449 - [c31]Weizhi Meng, Lee Wang Hao, S. P. T. Krishnan:
A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks. SG-CRC 2016: 99-106 - [c30]Weizhi Meng, Xiapu Luo, Wenjuan Li, Yan Li:
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. Trustcom/BigDataSE/ISPA 2016: 1061-1068 - 2015
- [j8]Weizhi Meng, Duncan S. Wong, Steven Furnell, Jianying Zhou:
Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3): 1268-1293 (2015) - [j7]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Networks 8(18): 3883-3895 (2015) - [c29]Weizhi Meng, Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan:
Charging Me and I Know Your Secrets!: Towards Juice Filming Attacks on Smartphones. CPSS@ASIACSS 2015: 89-98 - [c28]Wenjuan Li, Weizhi Meng:
An empirical study on email classification using supervised machine learning in real environments. ICC 2015: 7438-7443 - [c27]Weizhi Meng:
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. NSS 2015: 147-161 - 2014
- [j6]Yuxin Meng, Lam-for Kwok:
Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection. Comput. Commun. 38: 50-59 (2014) - [j5]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43: 189-204 (2014) - [j4]Weizhi Meng, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 22(2): 155-166 (2014) - [j3]Yuxin Meng, Lam-for Kwok:
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. J. Netw. Comput. Appl. 39: 83-92 (2014) - [c26]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Enhancing email classification using data reduction and disagreement-based semi-supervised learning. ICC 2014: 622-627 - [c25]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. IFIPTM 2014: 61-76 - [c24]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. ISC 2014: 465-476 - [c23]Yuxin Meng, Duncan S. Wong, Lam-for Kwok:
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. SAC 2014: 1680-1687 - [c22]Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. TrustCom 2014: 174-181 - 2013
- [j2]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Comput. Networks 57(17): 3630-3640 (2013) - [j1]Yuxin Meng, Lam-for Kwok:
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection. Int. J. Comput. Intell. Syst. 6(4): 626-638 (2013) - [c21]Wenjuan Li, Yuxin Meng, Lam-for Kwok:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. CIS 2013: 518-522 - [c20]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection. HPCC/EUC 2013: 175-182 - [c19]Yuxin Meng, Wenjuan Li, Lam-for Kwok, Yang Xiang:
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice. INCoS 2013: 181-188 - [c18]Wenjuan Li, Yuxin Meng:
Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. ISNN (2) 2013: 622-629 - [c17]Yuxin Meng, Lam-for Kwok:
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. ISPEC 2013: 1-15 - [c16]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. NSS 2013: 40-53 - [c15]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. SEC 2013: 55-68 - [c14]Yuxin Meng, Lam-for Kwok:
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. TrustCom/ISPA/IUCC 2013: 241-248 - 2012
- [c13]Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok:
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. Inscrypt 2012: 331-350 - [c12]Yuxin Meng, Lam-for Kwok:
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction. CSS 2012: 483-497 - [c11]Yuxin Meng, Lam-for Kwok:
A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection. FSKD 2012: 505-509 - [c10]Yuxin Meng, Wenjuan Li:
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. ICICS 2012: 349-356 - [c9]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection. ISMIS 2012: 115-124 - [c8]Yuxin Meng:
Designing Click-Draw Based Graphical Password Scheme for Better Authentication. NAS 2012: 39-48 - [c7]Yuxin Meng, Lam-for Kwok:
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. NSS 2012: 1-14 - [c6]Yuxin Meng, Wenjuan Li:
Evaluating the effect of user guidelines on creating click-draw based graphical passwords. RACS 2012: 322-327 - [c5]Yuxin Meng, Lam-for Kwok, Wenjuan Li:
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. SecureComm 2012: 203-221 - [c4]Yuxin Meng, Wenjuan Li:
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. TrustCom 2012: 223-230 - 2011
- [c3]Yuxin Meng, Lam-for Kwok:
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. IAS 2011: 74-79 - [c2]Yuxin Meng, Lam-for Kwok:
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. CIS 2011: 978-982 - [c1]Yuxin Meng:
The practice on using machine learning for network anomaly intrusion detection. ICMLC 2011: 576-581
Coauthor Index
aka: Lam For Kwok
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint