Publication

Publications-Sorted by Time


Note: Weizhi Meng was previously known as Yuxin Meng.


My publications at Google Scholar and DBLP.

Before you download the papers, please carefully read and comply with relevant copyright of publishers.


Books:

  1. Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou. Botnets: Architectures, Countermeasures, and Challenges. CRC Press, Taylor & Francis, October 2019. (Access the book)


  2. Weizhi Meng, Xiapu Luo, Steven Furnell and Jianying Zhou. Protecting Mobile Networks and Devices: Challenges and Solutions. CRC Press, Taylor & Francis, November 2016. (Access the book)



Chapters in Books:

  1. Zhi Lin, Weizhi Meng, Wenjuan Li and Duncan S. Wong. Developing Cloud-based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics (Book), Richard Jiang (eds), Springer, July 2019. (Access the chapter)

  2. Weizhi Meng, Jianying Zhou, and Lam-For Kwok. A Review of Intrusion Detection and Prevention on Mobile Devices: The Last Decade. Intrusion Detection and Prevention for Mobile Ecosystems (Book), Georgios Kambourakis, Asaf Shabtai, Konstantinos Kolias, and Dimitrios Damopoulos (eds), CRC Press, Taylor & Francis, July 2017. (Access the chapter)

  3. Lijun Jiang and Weizhi Meng. Smartphone User Authentication Using Touch Dynamics in the Big Data Era: Challenges and Opportunities. Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Book), R. Jiang, S. Al-Madeed, D. Crookes, A. Beghdadi, A. Bouridane (eds), Springer, pp. 163-178, December 2016. (Access the chapter)

  4. Weizhi Meng and Wenjuan Li. A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends. Networking for Big Data (Book), Shui Yu, Xiaodong Lin, Jelena Misic, Xuemin (Sherman) Shen (eds), CRC Press, Taylor & Francis, pp. 195-213, August 2015. (Access the chapter)

  5. Yuxin Meng, Wenjuan Li and Lam-For Kwok. A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends. Case Studies in Secure Computing-Achievements and Trends (Book), Biju Issa, Nauman Israr (eds), CRC Press, Taylor & Francis, pp. 191-208, September 2014. (Access the chapter)

  6. Yuxin Meng, Yang Xiang and Lam-For Kwok. Applications of Machine Learning in Intrusion Detection. The State of the Art in Intrusion Prevention and Detection (Book), Al-Sakib Khan Pathan (eds), CRC Press, Taylor & Francis, pp. 311-332, January 2014. (Access the chapter)

  7. Yuxin Meng and Lam-For Kwok. Enhancing Intrusion Detection Systems Using Intelligent False Alarm Filter: Selecting the Best Machine Learning Algorithm. Architectures and Protocols for Secure Information Technology (Book), Ruiz Martínez, Pereníguez-García and Marín-López (eds), IGI-Global, pp. 214-236, September 2013. (Access the chapter)



Journal Articles:

  1. Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au. Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, In Press, IEICE. [IF=0.576]

  2. Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, and Tanveer M. THP: An SDN-based Authentication Scheme Resistant to Multiple Attacks in IoT. IEEE Internet of Things Journal, In Press, IEEE. [IF=9.515]

  3. Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li. Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security, In Press, Springer. [IF=1.822]

  4. Weizhi Meng, Lijun Jiang, Kim-Kwang Raymond Choo, Yu Wang, and Chong Jiang. Towards Detection of Juice Filming Charging Attacks via Supervised CPU Usage Analysis on Smartphones. Computers and Electrical Engineering, In Press, Elsevier. [IF=2.189]

  5. Weizhi Meng, Wenjuan Li, Liqiu Zhu. Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, IEEE, In Press. [IF=1.867]

  6. Irfan Mehmood, Amin Ullah, Khan Muhammad, Der-Jiunn Deng, Weizhi Meng, Fadi Al-Turjman, Muhammad Sajjad, and Victor Hugo C. de Albuquerque. Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories. IEEE Internet of Things Journal, In Press, IEEE. [IF=9.515]

  7. Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au. Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, In Press, Elsevier. [IF=5.768]

  8. -----------------------------------------------------
  9. Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. Adaptive Machine Learning-based Alarm Reduction via Edge Computing for Distributed Intrusion Detection Systems. Concurrency and Computation: Practice and Experience, vol. 31, no. 19, Wiley. [IF=1.167]

  10. Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li. Enhancing the Security of FinTech Applications with Map-Based Graphical Password Authentication. Future Generation Computer Systems, vol. 101, pp. 1018-1027, Elsevier, December 2019. [IF=5.768] (Download the paper)

  11. Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, and Weizhi Meng. Attribute-Based Information Flow Control. The Computer Journal, In Press, Oxford University Press, vol. 62, no. 8, pp. 1214-1231, 2019. [IF=0.98, CCF B] (Download the paper)

  12. Liang Liu, Zuchao Ma, and Weizhi Meng. Detection of Multiple-Mix-Attack Malicious Nodes Using Perceptron-based Trust in IoT Networks. Future Generation Computer Systems, vol. 101, pp. 865-879, Elsevier, December 2019. [IF=5.768] (Download the paper)

  13. Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, and Chunhua Su. Y-DWMS: A Digital Watermark Management System Based On Smart Contract. Sensors, vol. 19, no. 14, pp. 1-17, MDPI, 2019. [IF=3.031] (Download the paper)

  14. Lihong Tang, Wanlun Ma, Marthie Grobler, Weizhi Meng, Yu Wang, Sheng Wen. Faces are Protected as Privacy: An Automatic Tagging Framework against Unpermitted Photo Sharing in Social Media. IEEE Access, IEEE, vol. 7, no. 1, pp. 75556-75567, 2019. [IF=4.098]

  15. Rishikesh Sahay, Weizhi Meng, D.A. Sepulveda Estay, Christian D. Jensen, and Michael Bruhn Barfod. CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships. Future Generation Computer Systems, vol. 100, pp. 736-750, Elsevier, 2019. [IF=5.768]

  16. Liang Liu, Jingxiu Yang, and Weizhi Meng. Detecting Malicious Nodes via Gradient Descent and Support Vector Machine in Internet of Things. Computers and Electrical Engineering, vol. 77, pp. 339-353, Elsevier, 2019. [IF=2.189]

  17. Saurabh Singh, In-Ho Ra, Weizhi Meng, Maninder Kaur, and Gi Hwan Cho. SH-BlockCC: A Secure and Efficient IoT Smart Home Architecture based on Cloud Computing and Blockchain Technology. International Journal of Distributed Sensor Networks, vol. 15, no 4, pp. 1-18, SAGE, 2019. [IF=1.614] (Download the paper or the draft)

  18. Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang. Designing Collaborative Blockchained Signature-based Intrusion Detection in IoT environments. Future Generation Computer Systems, vol. 96, pp. 481-489, Elsevier, 2019. [IF=5.768] (Download the paper or the draft)

  19. Rishikesh Sahay, Weizhi Meng, and Christian D. Jensen. The Application of Software Defined Networking on Securing Computer Networks: A Survey. Journal of Network and Computer Applications, vol. 131, pp. 89-108, Elsevier, 2019. [IF=5.273] (Download the paper or the draft)

  20. Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, vol. 128, pp. 56-63, Elsevier, 2019. [IF=5.273] (Download the paper or the draft)

  21. Weizhi Meng, Wenjuan Li, and Duncan S. Wong. Enhancing Touch Behavioral Authentication via Cost-based Intelligent Mechanism on Smartphones. Multimedia Tools and Applications, vol. 77, no. 23, pp. 30167-30185, Springer, 2018. [IF=1.541] (Download the paper or the draft)

  22. Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, Yang Xiang. A fog-based privacy-preserving approach for distributed signature-based intrusion detection. Journal of Parallel and Distributed Computing, vol. 122, pp. 26-35, Elsevier, December 2018. [IF=1.815] (Download the paper or the draft)

  23. Weizhi Meng. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling. IEEE Computer, vol. 51, no. 7, pp. 36-43, IEEE, July 2018. [IF=1.940] (Download the paper or the draft)

  24. Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, and Yang Xiang. JFCGuard: Detecting Juice Filming Charging Attack via Processor Usage Analysis on Smartphones. Computers & Security, vol. 76, pp. 252-264, Elsevier, 2018. [IF=2.862] (Download the paper or the draft)

  25. Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, and Yang Xiang. TouchWB: Touch Behavioral User Authentication Based on Web Browsing on Smartphones. Journal of Network and Computer Applications, vol. 117, pp. 1-9, Elsevier, 2018. [IF=3.991] (Download the paper or the draft)

  26. Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, and Christian W. Probst. Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 761-773, IEEE, 2018. [IF=3.286] (Download the paper or the draft)

  27. Weizhi Meng, Elmar Wolfgang Tischhauser, Qingju Wang, Yu Wang, and Jinguang Han. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access, vol. 6, no. 1, pp. 10179-10188, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  28. Wenjuan Li, Weizhi Meng, Chunhua Su, and Lam For Kwok. False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access, vol. 6, no. 1, pp. 6530-6539, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  29. Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou and Rongxing Lu. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access, vol. 6, no. 1, pp. 7234-7243, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  30. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Investigating the Influence of Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. Future Internet [Invited Feature Article], Special Issue on Security and Privacy in Wireless and Mobile Networks, vol. 10, no. 1, pp. 1-16, 2018. (Download the paper or the draft)




  31. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Developing Advanced Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. Cluster Computing, vol. 21, no. 1, pp. 299-310, Springer, 2018. [IF=2.040] (Download the paper or the draft)

  32. Weizhi Meng, Wenjuan Li and Lam-For Kwok. Towards Effective and Robust List-based Packet Filter for Signature-based Network Intrusion Detection: An Engineering Approach. HKIE Transactions, vol. 24, no. 4, pp. 204-215, Taylor & Francis, 2017. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017 and published in this Special Issue) (Download the paper)

  33. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective Trust-based Packet Filtering in Collaborative Network Environments. IEEE Transactions on Network and Service Management, vol. 14, no. 1, pp. 233-245, IEEE, 2017. [IF=3.134] (Download the paper or the draft)

  34. Weizhi Meng, Wenjuan Li, Lam-For Kwok and Kim-Kwang Raymond Choo. Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security, vol. 65, pp. 213-229, Elsevier, 2017. [IF=2.849] (Download the paper or the draft)

  35. Weizhi Meng, Wenjuan Li, Yang Xiang and Kim-Kwang Raymond Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017. [IF=3.5] (Download the paper or the draft)

  36. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model. Journal of Network and Computer Applications, vol. 77, pp. 135-145, Elsevier, 2017. [IF=3.5] (Download the paper or the draft)

  37. Wenjuan Li, Weizhi Meng, Xiapu Luo and Lam-For Kwok. MVPSys: Towards Practical Multi-View Based False Alarm Reduction System in Network Intrusion Detection. Computers & Security, vol. 60, pp. 177-192, Elsevier, 2016. [IF=1.64] (Download the paper or the draft)

  38. Weizhi Meng, Wang Hao Lee, S.R. Murali and S.P.T. Krishnan. JuiceCaster: Towards Automatic Juice Filming Attacks on Smartphones. Journal of Network and Computer Applications, vol. 68, pp. 201-212, Elsevier, 2016. [IF=2.331] (Download the paper or the draft)

  39. Wenjuan Li, Weizhi Meng and Lam-For Kwok. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network and Computer Applications, vol. 68, pp. 126-139, Elsevier, 2016. [IF=2.331] (Download the paper or the draft)

  40. Weizhi Meng. Evaluating the Effect of Multi-Touch Behaviours on Android Unlock Patterns. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 277-287, Emerald, 2016. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  41. Wenjuan Li and Weizhi Meng. Enhancing Collaborative Intrusion Detection Networks Using Intrusion Sensitivity in Detecting Pollution Attacks. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 265-276, Emerald, 2016. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  42. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection. Security and Communication Networks, vol. 8, no, 18, pp. 3883-3895, Wiley, 2015. [IF=0.72] (Download the paper or the draft)

  43. Weizhi Meng, Duncan S. Wong, Steven Furnell, and Jianying Zhou. Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1268-1293, 2015. [IF=6.49] (Download the paper or the draft)

  44. Weizhi Meng and Lam-For Kwok. Enhancing the Performance of Signature-based Network Intrusion Detection Systems: An Engineering Approach. HKIE Transactions, vol. 21, no. 4, pp. 209-222, Taylor & Francis, December 2014. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014 and published in this Special Issue) (Download the paper)

  45. Weizhi Meng, Wenjuan Li and Lam-For Kwok. EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. Computers & Security, vol. 43, pp. 189-204, Elsevier, June 2014. [IF=1.172] (Download the paper or the draft)

  46. Weizhi Meng, Duncan S. Wong and Lam-For Kwok. The Effect of Adaptive Mechanism on Behavioural Biometric Based Mobile Phone Authentication. Information Management and Computer Security, vol. 22, no. 2, pp. 155-166, Emerald, 2014. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  47. Yuxin Meng and Lam-For Kwok. Adaptive Blacklist-based Packet Filter with A Statistic-based Approach in Network Intrusion Detection. Journal of Network and Computer Applications, vol. 39, pp. 83-92, Elsevier, 2014. [IF=1.772] (Download the paper or the draft))

  48. Yuxin Meng and Lam-For Kwok. Adaptive Non-Critical Alarm Reduction Using Hash-based Contextual Signatures in Intrusion Detection. Computer Communications, vol. 38, pp. 50-59, Elsevier, 2014. [IF=1.695] (Download the paper or the draft)

  49. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection. Computer Networks, vol. 57, no. 17, pp. 3630-3640, Elsevier, 2013. [IF=1.282] (Download the paper)

  50. Yuxin Meng and Lam-For Kwok. Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection. International Journal of Computational Intelligence Systems, vol. 6, no. 4, pp. 626-638, Taylor & Francis, May 2013. [IF: 0.451] (Download the paper)



Conference Papers:

    2019

  1. Deina Kellezi, Christian Boegelund and Weizhi Meng. Towards Secure Open Banking Architecture: An Evaluation with OWASP. The 13th International Conference on Network and System Security (NSS 2019), December 2019.

  2. Hao Jiang, Weizhi Meng, Chunhua Su and Kim-Kwang Raymond Choo. CAVAEva: An Engineering Platform for Evaluating Commercial Anti-Virus Applications on Smartphones. The 15th International Conference on Information Security and Cryptology (Inscrypt 2019), December 2019.

  3. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), November 2019.

  4. Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li. SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019), September 2019.

  5. Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su. Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 24th European Symposium on Research in Computer Security (ESORICS 2019), September 2019.

  6. Constantinos Pouyioukka, Thanassis Giannetsos, and Weizhi Meng. CrowdLED: Towards Crowd-Empowered & Privacy-Preserving Data Sharing using Smart Contracts. 13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019), July 2019.

  7. Yan Li, Zilong Wang, Yingjiu Li, Robert Deng, Binbin Chen, Weizhi Meng, and Hui Li. A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019), July 2019.

  8. Jun Zhang, Houda Labiod, and Weizhi Meng. A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites. The 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2019), June 2019.

  9. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou. SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications. The 34th IFIP International Conference on Information Security and Privacy Protection (IFIP SEC 2019), pp. 180-193, June 2019. (Download the paper)

  10. 2018

  11. Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, and Kouichi Sakurai. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 101-114, December 2018. (Download the paper)

  12. David Madsen, Wenjuan Li, Weizhi Meng and Yu Wang. Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. The 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), pp. 481-494, November 2018. (Download the paper)

  13. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li. Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification. The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), pp. 313-328, September 2018. (Download the paper)

  14. Weizhi Meng and Zhe Liu. TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones. The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), pp. 373-390, September 2018. (Best Paper Award) (Download the paper)

  15. Rishikesh Sahay, D.A Sepúlveda-Estay, Weizhi Meng, Christian D. Jensen, and Michael Bruhn Barfod. CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems. The 1st International Conference on Science of Cyber Security (SciSec 2018), pp. 191-198, August 2018. (Download the paper)

  16. Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, and Sherman S. M. Chow. Position Paper on Blockchain Technology: Smart Contract and Applications. The 12th International Conference on Network and System Security (NSS 2018), pp. 474-483, August 2018. (Download the paper)

  17. Francisco-Javier Rodrigo-Gines, Javier Parra-Arnau, Weizhi Meng, and Yu Wang. PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. The 12th International Conference on Network and System Security (NSS 2018), pp. 304-318, August 2018. (Download the paper)

  18. Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, and Christian D. Jensen. Analyzing the Communication Security between Smartphones and IoT based on CORAS. The 12th International Conference on Network and System Security (NSS 2018), pp. 251-265, August 2018. (Download the paper)

  19. Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, and Jinguang Han. CPMap: Design of Click-Points Map-based Graphical Password Authentication. The 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC 2018), pp. 18-32, September 2018. (Download the paper)

  20. Steven Tug, Weizhi Meng, and Yu Wang. CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection. The 1st IEEE International Conference on Blockchain (Blockchain 2018), pp. 1228-1235, July 2018. (Download the paper)

  21. Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), pp. 1208-1213, July 2018. (Download the paper)

  22. Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst. Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. The 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 759-767, July 2018. (Download the paper or the draft)

  23. 2017

  24. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. The 2017 IEEE Global Communications Conference (GLOBECOM 2017), pp. 1-6, December 2017. (Download the paper or the draft)

  25. Weizhi Meng, Wang Hao Lee, Zhe Liu, Chunhua Su and Yan Li. Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. The 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), pp. 327-338, 2017. (Download the paper or the draft)

  26. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. The 20th Information Security Conference (ISC 2017), pp. 291-308, November 2017. (Download the paper)

  27. Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au. Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling. The 9th International Symposium on Cyberspace Safety and Security (CSS 2017), pp. 163-175, October 2017. (Download the paper)

  28. Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng and Jin Li. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing. The 9th International Symposium on Cyberspace Safety and Security (CSS 2017), pp. 267-279, October 2017. (Download the paper)

  29. Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su and Jin Li. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. The 11th International Conference on Network and System Security (NSS 2017), pp. 99-213, August 2017. (Download the paper)

  30. Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou. A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. The 15th International Conference on Applied Cryptography and Network Security (ACNS 2017), pp. 145-162, July 2017.(Download the paper)

  31. Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu. Exploring Effect of Location Number on Map-Based Graphical Password Authentication. The 22nd Australasian Conference on Information Security and Privacy (ACISP 2017), vol 2, pp. 301-313, July 2017. (Download the paper)

  32. Weizhi Meng and Man Ho Au. Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. The 11th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2017), pp. 152-159, June 2017. (Download the paper)

  33. Wenjuan Li, Weizhi Meng, and Lam-For Kwok. SOOA: Exploring Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 402-415, May 2017. (Download the paper)

  34. 2016

  35. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 10th International Conference on Network and System Security (NSS 2016), pp. 433-449, September 2016. (Best Student Paper Award) (Download the paper)

  36. Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 1061-1068, August 2016. (Download the paper)

  37. Wenjuan Li, Lijun Jiang, Weizhi Meng and Lam For Kwok. Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. The 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), pp. 146-153, July 2016. (Download the paper)

  38. Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou. TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), pp. 629-647, June 2016. (AR=35/183=19%) (Download the paper)

  39. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. On Multiple Password Interference of Touch Screen Patterns and Text Passwords. ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818-4822, May 2016. (Download the paper)

  40. Weizhi Meng, Wang Hao Lee and S.P.T Krishnan. A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks. The Singapore Cyber Security R&D Conference (SG-CRC 2016), pp. 99-106, January 2016. (Download the paper)

  41. 2015

  42. Weizhi Meng. RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. The 9th International Conference on Network and System Security (NSS 2015), Springer, pp. 147-161, November 2015. (Download the paper)

  43. Wenjuan Li and Weizhi Meng. An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments. The 2015 IEEE International Conference on Communications (ICC 2015), IEEE, pp. 7438-7443, June 2015. (Download the paper)

  44. Weizhi Meng, Wang Hao Lee, S.R. Murali and S.P.T. Krishnan. Charging Me and I Know Your Secrets! Towards Juice Filming Attacks on Smartphones. ACM Workshop on Cyber-Physical System Security (CPSS 2015), in conjunction with AsiaCCS'15, ACM, pp. 89-98, April 2015. (Download the paper or the draft)


  45. Before 2015

  46. Weizhi Meng, Wenjuan Li and Lam-For Kwok. An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. The 17th International Conference on Information Security (ISC 2014), Springer, pp. 465-476, October 2014. (Download the paper)

  47. Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang. Towards Designing An Email Classification System Using Multi-View Based Semi-Supervised Learning. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), IEEE, pp. 174-181, September 2014. (Download the paper)

  48. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. The 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014), Springer, pp. 61-76, July 2014. (Download the paper)

  49. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning. The 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, June 2014. (Download the paper)

  50. Yuxin Meng, Duncan S. Wong and Lam-For Kwok. Design of Touch Dynamics based User Authentication with an Adaptive Mechanism on Mobile Phones. The 29th Annual ACM Symposium on Applied Computing: the 13th edition of the Computer Security track (ACM SAC SEC 2014), ACM, pp. 1680-1687, March 2014. (Download the paper or the draft)

  51. Wenjuan Li, Yuxin Meng and Lam-For Kwok. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. The 9th International Conference on Computational Intelligence and Security (CIS 2013), IEEE, pp. 518-522, December 2013. (Download the paper)

  52. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, November 2013. (Download the paper or the draft)

  53. Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang. Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice. The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), IEEE, pp. 181-188, September 2013. (Download the paper)

  54. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive False Alarm Reduction Using Cloud as a Service. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, IEEE, pp. 420-425, August 2013. (Download the paper)

  55. Yuxin Meng and Lam-For Kwok. Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), IEEE, pp. 241-248, July 2013. (Download the paper or the draft)

  56. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones. The 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP Advances in Information and Communication Technology 405, Springer, pp. 55-68, July 2013. (Download the paper)

  57. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. The 7th International Conference on Network and System Security (NSS 2013), Lecture Notes in Computer Science 7873, Springer, pp. 40-53, June 2013. (Download the paper or the draft)

  58. Wenjuan Li and Yuxin Meng. Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. The 10th International Symposium on Neural Networks (ISNN 2013), Lecture Notes in Computer Science 7952, Part II, Springer, pp. 622-629, July 2013. (Download the paper)

  59. Yuxin Meng and Lam-For Kwok. Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection. The 9th Information Security Practice and Experience Conference (ISPEC 2013), Lecture Notes in Computer Science 7863, Springer, pp. 1-16, May 2013. (Download the paper)

  60. Yuxin Meng, Duncan S. Wong, Roman Schlegel, and Lam-For Kwok. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. The 8th China International Conference on Information Security and Cryptology (INSCRYPT 2012), Lecture Notes in Computer Science 7763, Springer, pp. 331-350, November 2012. (Download the paper or the draft)

  61. Yuxin Meng and Lam-For Kwok. Intrusion Detection using Disagreement-based Semi-Supervised Learning: Detection Enhancement and False Alarm Reduction. The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Lecture Notes in Computer Science 7672, Springer, pp. 483-497, December 2012. (Download the paper)

  62. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Intelligent Alarm Filter Using Knowledge-based Alert Verification in Network Intrusion Detection. The 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 2012), Lecture Notes in Artificial Intelligence 7661, Springer, pp. 115-124, December 2012. (Download the paper or the draft)

  63. Yuxin Meng and Lam-For Kwok. Enhancing List-based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. The 6th International Conference on Network and System Security (NSS 2012), Lecture Notes in Computer Science 7645, Springer, pp. 1-14, November 2012. (Download the paper)

  64. Yuxin Meng and Wenjuan Li. Evaluating the Effect of User Guidelines on Creating Click-Draw based Graphical Passwords. The 2012 ACM Research in Applied Computation Symposium (ACM RACS 2012), ACM, pp. 322-327, October 2012. (Download the paper)

  65. Yuxin Meng and Wenjuan Li. Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. The 14th International Conference on Information and Communications Security (ICICS 2012), Lecture Notes in Computer Science 7618, Springer, pp. 349-356, October 2012. (Download the paper or the draft)

  66. Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach Using Bayesian Inference in Network Intrusion Detection. The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), Lecture Notes in ICST 106, Springer, pp. 203-221, September 2012. (Download the paper or the draft)

  67. Yuxin Meng and Wenjuan Li. Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), IEEE, pp. 223-230, June 2012. (Download the paper or the draft)

  68. Yuxin Meng. Designing Click-Draw Based Graphical Password Scheme for Better Authentication. The 7th IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS 2012), IEEE, pp. 39-48, June 2012. (Download the paper the draft)

  69. Yuxin Meng and Lam-For Kwok. A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection. The 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), IEEE, pp. 505-509, May 2012. (Download the paper or the draft)

  70. Yuxin Meng and Wenjuan Li. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection. The 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), IEEE(IARIA), pp. 75-81, May 2012. (Download the paper- open access)

  71. Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Single Character Frequency-based Exclusive Signature Matching Scheme. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Studies in Computational Intelligence, Springer, pp. 67-80, May 2012. (Selected paper and published in Springer) (Download the paper or the draft)

  72. Yuxin Meng and Lam-For Kwok. Adaptive Context-aware Packet Filter Scheme using Statistic-based Blacklist Generation in Network Intrusion Detection. The 7th International Conference on Information Assurance and Security (IAS 2011), IEEE, pp. 74-79, December 2011. (Download the paper or the draft)

  73. Yuxin Meng and Lam-For Kwok. Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection. The 6th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2011), Advances in Intelligent and Soft Computing, Springer, pp. 573-584, December 2011. (Download the paper or the draft)

  74. Yuxin Meng and Lam-For Kwok. A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. The 7th International Conference on Computational Intelligence and Security (CIS 2011), IEEE, pp. 978-982, December 2011. (Download the paper or the draft)

  75. Yuxin Meng and Lam-For Kwok. A Framework for Protocol Vulnerability Condition Detection. The 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), IEEE(IARIA), pp. 91-96, August 2011. (Download the paper- open access)

  76. Yuxin Meng. The practice on using machine learning for network anomaly intrusion detection. The 2011 International Conference on Machine Learning and Cybernetics (ICMLC 2011), IEEE, pp. 576-581, July 2011. (Download the paper or the draft)






Return


https://www.staff.dtu.dk/weme/publication
7 DECEMBER 2019