Mengmeng Ge

Orcid: 0000-0001-6912-6152

According to our database1, Mengmeng Ge authored at least 44 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IoTSecSim: A framework for modelling and simulation of security in Internet of things.
Comput. Secur., January, 2024

Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception.
Comput. Secur., 2024

2023
Knowledge-Based Embodied Question Answering.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks.
Comput. Networks, April, 2023

Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception.
ACM Trans. Internet Techn., 2022

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
Sensors, 2022

Self-supervised 3D Semantic Representation Learning for Vision-and-Language Navigation.
CoRR, 2022

An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm.
Comput. Networks, 2022

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Depth-Aware Vision-and-Language Navigation using Scene Query Attention Network.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Joint cognitive optimization of transmit waveform and receive filter against deceptive interference.
Signal Process., 2021

Robot Communication: Network Traffic Classification Based on Deep Neural Network.
Frontiers Neurorobotics, 2021

Model-based Cybersecurity Analysis: Past Work and Future Directions.
CoRR, 2021

Towards a deep learning-driven intrusion detection approach for Internet of Things.
Comput. Networks, 2021

Automated Security Assessment for the Internet of Things.
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

2020
Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis.
Digit. Signal Process., 2020

Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things.
CoRR, 2020

Composite Metrics for Network Security Analysis.
CoRR, 2020

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception.
CoRR, 2020

CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study.
Proceedings of the Smart Grid and Internet of Things - 4th EAI International Conference, 2020

Mainlobe Jamming Suppression Via Independent Component Analysis for Polarimetric SIMO Radar.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things.
CoRR, 2019

Deep Learning-Based Intrusion Detection for IoT Networks.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Multi-Objective Security Hardening Optimisation for Dynamic Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
An Efficient Security System for Mobile Data Monitoring.
Wirel. Commun. Mob. Comput., 2018

Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities.
Future Gener. Comput. Syst., 2018

A systematic evaluation of cybersecurity metrics for dynamic networks.
Comput. Networks, 2018

Optimal Deployments of Defense Mechanisms for the Internet of Things.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

Evaluating the Security of IoT Networks with Mobile Devices.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Automated security investment analysis of dynamic networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A framework for automating security analysis of the internet of things.
J. Netw. Comput. Appl., 2017

Evaluating the Effectiveness of Security Metrics for Dynamic Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Security Modeling and Analysis of Cross-Protocol IoT Devices.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

2016
Survey on key revocation mechanisms in wireless sensor networks.
J. Netw. Comput. Appl., 2016

Security Modelling and Analysis of Dynamic Enterprise Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A Framework for Modeling and Assessing Security of the Internet of Things.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2008
Application and Practice of System Integration Approach in Intelligent Human Motion Recognition.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...