Meng Zhang

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China


According to our database1, Meng Zhang authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification.
Comput. Networks, 2024

2022
MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Trust, 2022

2021
AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Deep Learning based Automatic Modulation Classification Exploiting the Frequency and Spatiotemporal Domain of Signals.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
A Secure Constellation Design for Polarized Modulation in Wireless Communications.
IEEE Access, 2020

Automatic Modulation Classification Using Combination of Variational Mode Decomposition and Multifractal Analysis.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2017
Electromagnetic side channel analysis of laser facsimile.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal.
IET Signal Process., 2016

Method for detecting text information leakage in electromagnetic radiation from a computer display.
IET Inf. Secur., 2016

Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modulation recognition of PSK and QAM signals based on envelope spectrum analysis.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A novel wavelet based independent component analysis method for pre-processing computer video leakage signal.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Computer recognition based on the compromising emanations fingerprint.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
POSTER: A Security Adaptive Steganography System Applied on Digital Audio.
Proceedings of the Security and Privacy in Communication Networks, 2015

A spectrum efficient polarized OFDM scheme for wireless depolarized channel.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect.
Proceedings of the 22nd International Conference on Telecommunications, 2015

A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Classified removable storage medium control based on the access control matrix.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014


  Loading...