Mengyuan Zhang

Orcid: 0000-0001-7457-5198

Affiliations:
  • The Hong Kong Polytechnic University, Kowloon, Hong Kong
  • Concordia University, Montreal, Quebec, Canada (former)


According to our database1, Mengyuan Zhang authored at least 29 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024

iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions.
Comput. Secur., 2024

SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

Exposed by Default: A Security Analysis of Home Router Default Settings.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

The Flaw Within: Identifying CVSS Score Discrepancies in the NVD.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems.
IEEE Trans. Dependable Secur. Comput., 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021

Towards 5G-ready Security Metrics.
Proceedings of the ICC 2021, 2021

DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security.
IEEE Trans. Inf. Forensics Secur., 2019

Monitoring and Improving Managed Security Services inside a Security Operation Center.
EAI Endorsed Trans. Security Safety, 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

CASFinder: Detecting Common Attack Surface.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.
Proceedings of the From Database to Cyber Security, 2018

2017
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014


  Loading...