Mengyuan Zhang
Orcid: 0000-0001-7457-5198Affiliations:
- The Hong Kong Polytechnic University, Kowloon, Hong Kong
- Concordia University, Montreal, Quebec, Canada (former)
According to our database1,
Mengyuan Zhang
authored at least 29 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions.
Comput. Secur., 2024
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
2022
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems.
IEEE Trans. Dependable Secur. Comput., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security.
IEEE Trans. Inf. Forensics Secur., 2019
Monitoring and Improving Managed Security Services inside a Security Operation Center.
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016
2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014