default search action
Weizhi Meng 0001
Yuxin Meng 0001
Person information
- affiliation: Technical University of Denmark, Lyngby, Denmark
- affiliation (2014 - 2016): Institute for Infocomm Research, Singapore
- affiliation (PhD 2013): City University of Hong Kong, Hong Kong
Other persons with the same name
- Weizhi Meng 0002 — Alibaba Group, China
- Weizhi Meng 0003 — LinkedIn, Mountain View, CA, USA
- Yuxin Meng 0002 — Beijing No. 6 Hospital, Beijing, China
- Yuxin Meng 0003 — Ocean University of China, Qingdao, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j136]Jiaxing Li, Yu-An Tan, Xinyu Liu, Weizhi Meng, Yuanzhang Li:
Interpretable adversarial example detection via high-level concept activation vector. Comput. Secur. 150: 104218 (2025) - 2024
- [j135]Brooke Lampe, Weizhi Meng:
can-train-and-test: A curated CAN dataset for automotive intrusion detection. Comput. Secur. 140: 103777 (2024) - [j134]Tian Chen, Yu-an Tan, Chunying Li, Zheng Zhang, Weizhi Meng, Yuanzhang Li:
SecureComm: A Secure Data Transfer Framework for Neural Network Inference on CPU-FPGA Heterogeneous Edge Devices. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 811-822 (2024) - [j133]Ye Yao, Tingfeng Han, Xudong Gao, Yizhi Ren, Weizhi Meng:
Deep video inpainting detection and localization based on ConvNeXt dual-stream network. Expert Syst. Appl. 247: 123331 (2024) - [j132]Ye Yao, Junyu Wang, Qi Chang, Yizhi Ren, Weizhi Meng:
High invisibility image steganography with wavelet transform and generative adversarial network. Expert Syst. Appl. 249: 123540 (2024) - [j131]Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng:
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing. IET Cyper-Phys. Syst.: Theory & Appl. 9(2): 99-101 (2024) - [j130]Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Security, Privacy, and Trust Management on Decentralized Systems and Networks. Int. J. Netw. Manag. 34(6) (2024) - [j129]Yuan Chang, Jiliang Li, Ning Lu, Wenbo Shi, Zhou Su, Weizhi Meng:
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids. IEEE Internet Things J. 11(2): 1990-2005 (2024) - [j128]Gang Shen, Chengliangyi Xia, Yumei Li, Hua Shen, Weizhi Meng, Mingwu Zhang:
Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks. IEEE Internet Things J. 11(4): 6664-6676 (2024) - [j127]Zhuotao Lian, Qingkui Zeng, Weizheng Wang, Dequan Xu, Weizhi Meng, Chunhua Su:
Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles. IEEE Internet Things J. 11(4): 6722-6729 (2024) - [j126]Zhenyu Jiang, Jiliang Li, Qinnan Hu, Weizhi Meng, Witold Pedrycz, Zhou Su:
Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet Things J. 11(16): 26955-26969 (2024) - [j125]Jiliang Li, Yuheng Wang, Yuan Su, Zhou Su, Yuyi Wang, Weizhi Meng, Yinghua Shen:
Delayed packing attack and countermeasure against transaction information based applications. Inf. Sci. 652: 119742 (2024) - [j124]Xiaobo Yu, Weizhi Meng, Yi-Ning Liu, Fei Zhou:
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications. J. Netw. Comput. Appl. 223: 103823 (2024) - [j123]Zheng Zhang, Jingfeng Xue, Tian Chen, Yuhang Zhao, Weizhi Meng:
Flash controller-based secure execution environment for protecting code confidentiality. J. Syst. Archit. 152: 103172 (2024) - [j122]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based privacy-preserving public key searchable encryption with strong traceability. J. Syst. Archit. 155: 103264 (2024) - [j121]Palash Ray, Debasis Giri, Weizhi Meng, Soumyadeep Hore:
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection. Multim. Tools Appl. 83(19): 56569-56618 (2024) - [j120]Weizhi Meng, Rongxing Lu, Jun Zhang, Pierangela Samarati:
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices. IEEE Trans. Consumer Electron. 70(1): 3960-3962 (2024) - [j119]Mingbo Zhao, Weizhi Meng, Bingyi Liu, Yimin Yang:
Guest Editorial of the Special Section on Generative Artificial Intelligence With Applications on Consumer Electronics. IEEE Trans. Consumer Electron. 70(2): 4955-4957 (2024) - [j118]Meng Li, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures With Dynamically Private Accountability. IEEE Trans. Inf. Forensics Secur. 19: 2217-2230 (2024) - [j117]Ye Yao, Chen Wang, Hui Wang, Ke Wang, Yizhi Ren, Weizhi Meng:
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Trans. Inf. Forensics Secur. 19: 4406-4419 (2024) - [j116]Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, Qiuhua Wang:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024) - [j115]Zhengmin Kong, Jing Song, Shaoshi Yang, Li Gan, Weizhi Meng, Tao Huang, Sheng Chen:
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels. IEEE Trans. Inf. Forensics Secur. 19: 10130-10140 (2024) - [j114]Yuan Su, Jiliang Li, Jiahui Li, Zhou Su, Weizhi Meng, Hao Yin, Rongxing Lu:
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems. IEEE Trans. Netw. Sci. Eng. 11(3): 2864-2875 (2024) - [j113]Simon Lucas Jonker, Malthe Jelstrup, Weizhi Meng, Brooke Lampe:
Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 154:1-154:22 (2024) - [c138]Siyu Li, Yi-Ning Liu, Fei Zhou, Yanze Kang, Weizhi Meng:
AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes. ACISP (3) 2024: 323-336 - [c137]Banghong Qin, Jianwei Liu, Xinxin Xing, Weizhi Meng, Yizhong Liu:
Mitigating Centralization in Access Control System with Blockchain and Distributed Storage. Blockchain 2024: 340-345 - [c136]Yingli Duan, Weizhi Meng, Wei-Yang Chiu:
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions. DSPP (1) 2024: 195-210 - [c135]Brooke Kidmose, Weizhi Meng:
can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets. EICC 2024: 19-28 - [c134]Yimeng Li, Xuejiao Liu, Xueshuang Xiang, Yu-An Tan, Weizhi Meng:
Incremental Learning Strategy with Multi-dimensional Knowledge Distillation for One-stage Object Detection. INDIN 2024: 1-6 - [c133]Kanagaratnam Anojjan, Weizhi Meng, Brooke Kidmose, Yu Wang:
An eID-Based Privacy-Enhanced Public Transportation Ticket System. ISPEC 2024: 292-309 - [c132]Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. ISPEC 2024: 365-382 - [c131]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao, Weizhi Meng:
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT. PerCom Workshops 2024: 88-93 - [c130]Brooke Kidmose, Weizhi Meng:
can-fp: An Attack-Aware Analysis of False Alarms in Automotive Intrusion Detection Models. PST 2024: 1-12 - [c129]Yingli Duan, Weizhi Meng, Wei-Yang Chiu, Yu Wang:
DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices. SIGCOMM (Posters and Demos) 2024: 101-103 - [e34]Jun Shao, Sokratis K. Katsikas, Weizhi Meng:
Emerging Information Security and Applications - 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings. Communications in Computer and Information Science 2004, Springer 2024, ISBN 978-981-99-9613-1 [contents] - [e33]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [e32]Guojun Wang, Haozhe Wang, Geyong Min, Nektarios Georgalas, Weizhi Meng:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1 [contents] - [i10]Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan:
ABC-Channel: An Advanced Blockchain-based Covert Channel. CoRR abs/2403.06261 (2024) - [i9]Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang:
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 1761 (2024) - 2023
- [j112]Jiliang Li, Ziyi Zhao, Zhou Su, Weizhi Meng:
Gas-expensive patterns detection to optimize smart contracts. Appl. Soft Comput. 145: 110542 (2023) - [j111]Shi-Cho Cha, Weizhi Meng, Wen-Wei Li, Kuo-Hui Yeh:
A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2. Comput. Ind. Eng. 178: 109091 (2023) - [j110]Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Comput. Secur. 125: 103048 (2023) - [j109]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 128: 103179 (2023) - [j108]Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, Xi Zheng:
GenDroid: A query-efficient black-box android adversarial attack framework. Comput. Secur. 132: 103359 (2023) - [j107]Chengcheng Zhu, Jiale Zhang, Xiaobing Sun, Bing Chen, Weizhi Meng:
ADFL: Defending backdoor attacks in federated learning via adversarial distillation. Comput. Secur. 132: 103366 (2023) - [j106]Brooke Lampe, Weizhi Meng:
Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Commun. Surv. Tutorials 25(4): 2356-2426 (2023) - [j105]Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng:
MLCT: A multi-level contact tracing scheme with strong privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j104]Chengyi Qin, Lei Wu, Weizhi Meng, Zihui Xu, Su Li, Hao Wang:
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud. Expert Syst. Appl. 211: 118545 (2023) - [j103]Brooke Lampe, Weizhi Meng:
A survey of deep learning-based intrusion detection in automotive applications. Expert Syst. Appl. 221: 119771 (2023) - [j102]Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Editorial for special issue on security and trust on networked systems. Int. J. Netw. Manag. 33(3) (2023) - [j101]Wen-Wei Li, Weizhi Meng, Kuo-Hui Yeh, Shi-Cho Cha:
Trusting Computing as a Service for Blockchain Applications. IEEE Internet Things J. 10(13): 11326-11342 (2023) - [j100]Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j99]Binjie Liao, Hongyi Chen, Yu Wang, Weizhi Meng, Jun Zhang:
Analysis of hybrid attack and defense based on block withholding strategy. J. Inf. Secur. Appl. 78: 103620 (2023) - [j98]Jingkang Yang, Xiaobo Yu, Weizhi Meng, Yining Liu:
Dummy trajectory generation scheme based on generative adversarial networks. Neural Comput. Appl. 35(11): 8453-8469 (2023) - [j97]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. IEEE Trans. Inf. Forensics Secur. 18: 5964-5979 (2023) - [j96]Wei-Yang Chiu, Weizhi Meng, Chunpeng Ge:
NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0. IEEE Trans. Ind. Informatics 19(7): 7957-7965 (2023) - [j95]Hu Xiong, Hanxiao Wang, Weizhi Meng, Kuo-Hui Yeh:
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System. IEEE Trans. Ind. Informatics 19(11): 10977-10986 (2023) - [j94]Wensheng Gan, Kaixia Hu, Gengsen Huang, Wei-Che Chien, Han-Chieh Chao, Weizhi Meng:
Data Analytic for Healthcare Cyber Physical System. IEEE Trans. Netw. Sci. Eng. 10(5): 2490-2502 (2023) - [j93]ZengRi Zeng, Baokang Zhao, Han-Chieh Chao, Ilsun You, Kuo-Hui Yeh, Weizhi Meng:
Towards Intelligent Attack Detection Using DNA Computing. ACM Trans. Multim. Comput. Commun. Appl. 19(3s): 126:1-126:27 (2023) - [j92]Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, Weizhi Meng:
A secure and lightweight batch authentication scheme for Internet of Drones environment. Veh. Commun. 44: 100680 (2023) - [c128]Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng:
KEP: Keystroke Evoked Potential for EEG-Based User Authentication. AIS&P (1) 2023: 513-530 - [c127]Razy Youhana Adam, Weizhi Meng:
Securing 5G Positioning via Zero Trust Architecture. AIS&P (1) 2023: 563-578 - [c126]Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, Wenjuan Li:
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. ISPA/BDCloud/SocialCom/SustainCom 2023: 286-293 - [c125]Vince Biró, Wei-Yang Chiu, Weizhi Meng:
Securing IoT Firmware Dispatch Systems with Blockchain. Blockchain 2023: 229-238 - [c124]Wei-Yang Chiu, Weizhi Meng, Brooke Lampe:
No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices. DSN-S 2023: 137-141 - [c123]Grzegorz Jacek Kot, Weizhi Meng, Brooke Lampe:
Securing Offshore Installations Against Automatic Identification System Spoofing. GLOBECOM 2023: 4473-4478 - [c122]Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu:
A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. ICBC 2023: 1-3 - [c121]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. ICNC 2023: 336-342 - [c120]Weizhi Meng, Wei-Yang Chiu:
DataVaults: A Secure, Distributed and Privacy Preserving Personal Data Management Platform. ICDCS 2023: 1-4 - [c119]Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng, Brooke Lampe:
BlockPAT: A Blockchain-Enabled Second-Hand Physical Asset Tokenization Management System. ICDCS 2023: 1041-1042 - [c118]Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu:
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. ICICS 2023: 627-644 - [c117]Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, Brooke Lampe:
Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. ICPADS 2023: 2135-2142 - [c116]Brooke Lampe, Weizhi Meng:
can-logic: Automotive Intrusion Detection via Temporal Logic. IoT 2023: 113-120 - [c115]Katherine Cardoso Petulante Fernandes, Simon Lucas Jonker, Weizhi Meng, Brooke Lampe:
ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise. MetaCom 2023: 124-128 - [c114]Ensar Seker, Weizhi Meng:
XVRS: Extended Vulnerability Risk Scoring based on Threat Intelligence. MetaCom 2023: 516-523 - [c113]Mads Solberg Collingwood Pyke, Weizhi Meng, Brooke Lampe:
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. ML4CS 2023: 145-162 - [c112]Gergely Tuskó, Weizhi Meng, Brooke Lampe:
Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. TrustCom 2023: 1196-1205 - [c111]Brooke Lampe, Weizhi Meng:
can-train-and-test: A New CAN Intrusion Detection Dataset. VTC Fall 2023: 1-7 - [e31]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [e30]Weizhi Meng, Wenjuan Li:
Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 498, Springer 2023, ISBN 978-3-031-31419-3 [contents] - [e29]Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023 [contents] - [e28]Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya:
Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings. Lecture Notes in Computer Science 13777, Springer 2023, ISBN 978-3-031-22676-2 [contents] - [e27]Weizhi Meng, Zheng Yan, Vincenzo Piuri:
Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings. Lecture Notes in Computer Science 14341, Springer 2023, ISBN 978-981-99-7031-5 [contents] - [e26]Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, Weizhi Meng, Yuanyuan Mu:
International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7-9, 2023, Proceedings, Part I. Communications in Computer and Information Science 1869, Springer 2023, ISBN 978-981-99-5843-6 [contents] - [e25]Haijun Zhang, Yinggen Ke, Zhou Wu, Tianyong Hao, Zhao Zhang, Weizhi Meng, Yuanyuan Mu:
International Conference on Neural Computing for Advanced Applications - 4th International Conference, NCAA 2023, Hefei, China, July 7-9, 2023, Proceedings, Part II. Communications in Computer and Information Science 1870, Springer 2023, ISBN 978-981-99-5846-7 [contents] - [e24]Moti Yung, Chao Chen, Weizhi Meng:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0 [contents] - [e23]Gabriele Lenzini, Weizhi Meng:
Security and Trust Management - 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings. Lecture Notes in Computer Science 13867, Springer 2023, ISBN 978-3-031-29503-4 [contents] - [i8]Wei-Yang Chiu, Weizhi Meng:
BlockFW - Towards Blockchain-based Rule-Sharing Firewall. CoRR abs/2303.13073 (2023) - [i7]Kamal Raj Sharma, Wei-Yang Chiu, Weizhi Meng:
Security Analysis on Social Media Networks via STRIDE Model. CoRR abs/2303.13075 (2023) - [i6]Alexandru Rusescu, Brooke Lampe, Weizhi Meng:
Protecting User Privacy in Online Settings via Supervised Learning. CoRR abs/2304.02870 (2023) - [i5]Meng Li, Mingwei Zhang, Qing Wang, Hanni Ding, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures with Dynamically Private Accountability. CoRR abs/2304.07937 (2023) - [i4]Brooke Lampe, Weizhi Meng:
can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection. CoRR abs/2308.04972 (2023) - [i3]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. CoRR abs/2309.00251 (2023) - [i2]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability. CoRR abs/2312.16954 (2023) - 2022
- [j91]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Commun. Surv. Tutorials 24(1): 280-305 (2022) - [j90]Jun Zhang, Houda Labiod, Weizhi Meng:
For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j89]Zhanwen Chen, Jiageng Chen, Weizhi Meng:
Threshold identity authentication signature: Impersonation prevention in social network services. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j88]Weizhi Meng, Thanassis Giannetsos, Christian Damsgaard Jensen:
Information and Future Internet Security, Trust and Privacy. Future Internet 14(12): 372 (2022) - [j87]Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j86]Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han:
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors. Int. J. Intell. Syst. 37(1): 287-304 (2022) - [j85]Ding Wang, Weizhi Meng:
Editorial: Security and Privacy Challenges in Internet of Things. Mob. Networks Appl. 27(1): 343-345 (2022) - [j84]Su Li, Lei Wu, Weizhi Meng, Zihui Xu, Chengyi Qin, Hao Wang:
DVPPIR: privacy-preserving image retrieval based on DCNN and VHE. Neural Comput. Appl. 34(17): 14355-14371 (2022) - [j83]Qian Zhou, Xiaojun Xie, Hua Dai, Weizhi Meng:
A novel rough set-based approach for minimum vertex cover of hypergraphs. Neural Comput. Appl. 34(24): 21793-21808 (2022) - [j82]Wenjuan Li, Weizhi Meng:
BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Netw. 36(4): 120-125 (2022) - [c110]Bingkun Wu, Weizhi Meng, Wei-Yang Chiu:
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. ACSAC 2022: 799-812 - [c109]