Meng Shen

Orcid: 0000-0002-1867-0972

Affiliations:
  • Beijing Institute of Technology, School of Cyberspace Science and Technology, China
  • Shandong University, Jinan, China (former)
  • Tsinghua University, Beijing, China (PhD 2014)


According to our database1, Meng Shen authored at least 126 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Artificial Intelligence for Web 3.0: A Comprehensive Survey.
ACM Comput. Surv., October, 2024

Secure Semantic Communications: Challenges, Approaches, and Opportunities.
IEEE Netw., July, 2024

MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag., April, 2024

Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary.
IEEE Internet Things J., February, 2024

Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2024

Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Confidence-Aware Sentiment Quantification via Sentiment Perturbation Modeling.
IEEE Trans. Affect. Comput., 2024

Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR, 2024

The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024

Freshness-aware Block Propagation Optimization in 6G-based Web 3.0: An Evolutionary Game Approach.
CoRR, 2024

Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Security and Privacy in Web 3.0
Springer, ISBN: 978-981-97-5751-0, 2024

2023
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur., December, 2023

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features.
Inf. Sci., October, 2023

Blockchains for Artificial Intelligence of Things: A Comprehensive Survey.
IEEE Internet Things J., August, 2023

R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers.
IEEE/ACM Trans. Netw., April, 2023

Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw., February, 2023

CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.
IEEE Trans. Inf. Forensics Secur., 2023

PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations.
IEEE Trans. Dependable Secur. Comput., 2023

Artificial Intelligence for Web 3.0: A Comprehensive Survey.
CoRR, 2023

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Proceedings of the 32nd USENIX Security Symposium, 2023

From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis.
Proceedings of the Advanced Parallel Processing Technologies, 2023

2022
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things.
IEEE Wirel. Commun., 2022

Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles.
IEEE Trans. Veh. Technol., 2022

Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph.
IEEE Trans. Inf. Forensics Secur., 2022

Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach.
IEEE Internet Things J., 2022

TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum.
CoRR, 2022

FewFine: Few-shot Malware Traffic Classification Via Transfer Learning based on Fine-tuning Strategy.
Proceedings of the IEEE Smartworld, 2022

Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G.
Proceedings of the IEEE International Conference on Trust, 2022

Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic.
Proceedings of the Data Science, 2022

Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Privacy-preserving Training Algorithm for Naive Bayes Classifiers.
Proceedings of the IEEE International Conference on Communications, 2022

Real-Time Detection of Cryptocurrency Mining Behavior.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios.
IEEE Internet Things J., 2021

Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021

IriTrack: Face Presentation Attack Detection Using Iris Tracking.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Opponent portrait for multiagent reinforcement learning in competitive environment.
Int. J. Intell. Syst., 2021

Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Threat Prediction of Abnormal Transaction Behavior Based on Graph Convolutional Network in Blockchain Digital Currency.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Fully Exploiting Cascade Graphs for Real-time Forwarding Prediction.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020

Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Minimizing Tardiness for Data-Intensive Applications in Heterogeneous Systems: A Matching Theory Perspective.
IEEE Trans. Parallel Distributed Syst., 2020

ABQ: Active Buffer Queueing in Datacenters.
IEEE Netw., 2020

ID-Based SDN for the Internet of Things.
IEEE Netw., 2020

Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020

Data Security and Privacy in Bitcoin System: A Survey.
J. Comput. Sci. Technol., 2020

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020

Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020

Robust Attacks on Deep Learning Face Recognition in the Physical World.
CoRR, 2020

Privacy-Preserving Machine Learning Training in Aggregation Scenarios.
CoRR, 2020

Bluetooth-based COVID-19 Proximity Tracing Proposals: An Overview.
CoRR, 2020

Incentive mechanisms for mobile data offloading through operator-owned WiFi access points.
Comput. Networks, 2020

Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020

Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis.
Proceedings of the Security and Privacy in Digital Economy, 2020

I Know If the Journey Changes: Flexible Source and Path Validation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Survey on Cyberspace Search Engines.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Blockchain: Empowering Secure Data Sharing
Springer, ISBN: 978-981-15-5938-9, 2020

2019
Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid.
IEEE Trans. Ind. Informatics, 2019

Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019

Machine-Learning-Based Positioning: A Survey and Future Directions.
IEEE Netw., 2019

Cloudlet Placement and Task Allocation in Mobile Edge Computing.
IEEE Internet Things J., 2019

Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019

VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

RFL: Robust fault localization on unreliable communication channels.
Comput. Networks, 2019

Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks.
CCF Trans. Netw., 2019

Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019

Webpage Fingerprinting using Only Packet Length Information.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Machine Learning Classification on Traffic of Secondary Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018

Blockchain-Based Data Preservation System for Medical Data.
J. Medical Syst., 2018

Online and automatic identification and mining of encryption network behavior in big data environment.
J. Intell. Fuzzy Syst., 2018

Scalable and Privacy-Preserving Data Sharing Based on Blockchain.
J. Comput. Sci. Technol., 2018

When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018

Research on the Security of Blockchain Data: A Survey.
CoRR, 2018

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018

A measurement study on multi-path TCP with multiple cellular carriers on high speed rails.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

2017
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Inf. Forensics Secur., 2017

Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

MINOS: regulating router dataplane actions in dynamic runtime environments.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Achieving Optimal Traffic Engineering Using a Generalized Routing Framework.
IEEE Trans. Parallel Distributed Syst., 2016

Certificate-aware encrypted traffic classification using Second-Order Markov Chain.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
A Family of Stable Multipath Dual Congestion Control Algorithms.
J. Comput. Sci. Technol., 2015

A neuro-fuzzy approach to self-management of virtual network resources.
Expert Syst. Appl., 2015

Latency-aware routing with bandwidth assignment for Software Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Towards shorter task completion time in datacenter networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Self-adaptive anonymous communication scheme under SDN architecture.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Fault-tolerant topology for energy-harvesting heterogeneous wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

A Markov Chain Prediction Model for Routing in Delay Tolerant Networks.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices.
IEEE Trans. Parallel Distributed Syst., 2014

Towards efficient virtual network embedding across multiple network domains.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Online combinatorial double auction for mobile cloud computing markets.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2012
Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF.
Proceedings of the NETWORKING 2012, 2012

2011
A Large Family of Multi-path Dual Congestion Control Algorithms
CoRR, 2011

A model approach to estimate Peer-to-Peer traffic matrices.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011


  Loading...