Meng Shen
Orcid: 0000-0002-1867-0972Affiliations:
- Beijing Institute of Technology, School of Cyberspace Science and Technology, China
- Shandong University, Jinan, China (former)
- Tsinghua University, Beijing, China (PhD 2014)
According to our database1,
Meng Shen
authored at least 126 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., October, 2024
IEEE Netw., July, 2024
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag., April, 2024
Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary.
IEEE Internet Things J., February, 2024
Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Affect. Comput., 2024
CoRR, 2024
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024
Freshness-aware Block Propagation Optimization in 6G-based Web 3.0: An Evolutionary Game Approach.
CoRR, 2024
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
2023
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur., December, 2023
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features.
Inf. Sci., October, 2023
IEEE Internet Things J., August, 2023
IEEE/ACM Trans. Netw., April, 2023
IEEE/ACM Trans. Netw., February, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Advanced Parallel Processing Technologies, 2023
2022
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things.
IEEE Wirel. Commun., 2022
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach.
IEEE Internet Things J., 2022
CoRR, 2022
FewFine: Few-shot Malware Traffic Classification Via Transfer Learning based on Fine-tuning Strategy.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning.
Proceedings of the IEEE INFOCOM 2022, 2022
Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic.
Proceedings of the Data Science, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
2021
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Internet Things J., 2021
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Int. J. Intell. Syst., 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Threat Prediction of Abnormal Transaction Behavior Based on Graph Convolutional Network in Blockchain Digital Currency.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020
Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Minimizing Tardiness for Data-Intensive Applications in Heterogeneous Systems: A Matching Theory Perspective.
IEEE Trans. Parallel Distributed Syst., 2020
Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020
IEEE J. Sel. Areas Commun., 2020
Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020
J. Comput. Sci. Technol., 2020
Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020
Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020
Incentive mechanisms for mobile data offloading through operator-owned WiFi access points.
Comput. Networks, 2020
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020
Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis.
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019
IEEE Internet Things J., 2019
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019
VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Comput. Networks, 2019
Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks.
CCF Trans. Netw., 2019
Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018
Online and automatic identification and mining of encryption network behavior in big data environment.
J. Intell. Fuzzy Syst., 2018
J. Comput. Sci. Technol., 2018
When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018
A measurement study on multi-path TCP with multiple cellular carriers on high speed rails.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
2017
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
IEEE Trans. Parallel Distributed Syst., 2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
J. Comput. Sci. Technol., 2015
Expert Syst. Appl., 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015
Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015
Fault-tolerant topology for energy-harvesting heterogeneous wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
2012
Proceedings of the NETWORKING 2012, 2012
2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011