Weizhi Meng
Orcid: 0000-0003-4384-5786Affiliations:
- Technical University of Denmark, Lyngby, Denmark
- Institute for Infocomm Research, Singapore (2014 - 2016)
- City University of Hong Kong, Hong Kong (PhD 2013)
According to our database1,
Weizhi Meng
authored at least 275 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on orbit.dtu.dk
-
on d-nb.info
On csauthors.net:
Bibliography
2024
ACM Trans. Multim. Comput. Commun. Appl., June, 2024
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024
Guest Editorial of the Special Section on Generative Artificial Intelligence With Applications on Consumer Electronics.
IEEE Trans. Consumer Electron., May, 2024
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications.
J. Netw. Comput. Appl., March, 2024
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024
Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks.
IEEE Internet Things J., February, 2024
IEEE Internet Things J., February, 2024
Delayed packing attack and countermeasure against transaction information based applications.
Inf. Sci., January, 2024
IEEE Internet Things J., January, 2024
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels.
IEEE Trans. Inf. Forensics Secur., 2024
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
Multim. Tools Appl., 2024
Flash controller-based secure execution environment for protecting code confidentiality.
J. Syst. Archit., 2024
Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection.
IEEE Internet Things J., 2024
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2024
High invisibility image steganography with wavelet transform and generative adversarial network.
Expert Syst. Appl., 2024
Deep video inpainting detection and localization based on ConvNeXt dual-stream network.
Expert Syst. Appl., 2024
Comput. Secur., 2024
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Mitigating Centralization in Access Control System with Blockchain and Distributed Storage.
Proceedings of the IEEE International Conference on Blockchain, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
A secure and lightweight batch authentication scheme for Internet of Drones environment.
Veh. Commun., December, 2023
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023
J. Inf. Secur. Appl., November, 2023
Comput. Secur., September, 2023
Comput. Secur., September, 2023
Appl. Soft Comput., September, 2023
IEEE Trans. Ind. Informatics, July, 2023
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023
IEEE Internet Things J., July, 2023
Expert Syst. Appl., July, 2023
Comput. Secur., May, 2023
Neural Comput. Appl., April, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
IEEE Trans. Netw. Sci. Eng., 2023
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Int. J. Netw. Manag., 2023
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud.
Expert Syst. Appl., 2023
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023
Concurr. Comput. Pract. Exp., 2023
IEEE Commun. Surv. Tutorials, 2023
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023
Comput. Ind. Eng., 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the 13th International Conference on the Internet of Things, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
BlockPAT: A Blockchain-Enabled Second-Hand Physical Asset Tokenization Management System.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
DataVaults: A Secure, Distributed and Privacy Preserving Personal Data Management Platform.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the IEEE International Conference on Blockchain, 2023
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
IEEE Netw., 2022
Neural Comput. Appl., 2022
Neural Comput. Appl., 2022
Mob. Networks Appl., 2022
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022
Threshold identity authentication signature: Impersonation prevention in social network services.
Concurr. Comput. Pract. Exp., 2022
For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites.
Concurr. Comput. Pract. Exp., 2022
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the Provable and Practical Security, 2022
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Neural Computing for Advanced Applications, 2022
Extracting Key Information from Shopping Receipts by Using Bayesian Deep Learning via Multi-modal Features.
Proceedings of the Neural Computing for Advanced Applications, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Towards Artificial Neural Network Based Intrusion Detection with Enhanced Hyperparameter Tuning.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Emerging Information Security and Applications, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021
Pattern Recognit. Lett., 2021
Towards efficient and energy-aware query processing for industrial internet of things.
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
Overview of the 2021 Edition of the Workshop on Very Large Internet of Things (VLIoT 2021).
Open J. Internet Things, 2021
J. Inf. Secur. Appl., 2021
Hybrid Emotion-Aware Monitoring System Based on Brainwaves for Internet of Medical Things.
IEEE Internet Things J., 2021
Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT.
IEEE Internet Things J., 2021
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions.
Int. J. Netw. Manag., 2021
Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750].
Future Gener. Comput. Syst., 2021
Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing.
Trans. Emerg. Telecommun. Technol., 2021
EURASIP J. Wirel. Commun. Netw., 2021
Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021
Comput. Commun., 2021
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020
Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks.
IEEE Trans. Engineering Management, 2020
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
Secur. Commun. Networks, 2020
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020
Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities.
J. Parallel Distributed Comput., 2020
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid.
J. Inf. Secur. Appl., 2020
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
J. Inf. Secur. Appl., 2020
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
Int. J. Inf. Sec., 2020
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Comput. Secur., 2020
Comput. Networks, 2020
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020
IEEE Access, 2020
SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
Proceedings of the 19th IEEE International Conference on Trust, 2020
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection.
Proceedings of the Network and System Security - 14th International Conference, 2020
ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks.
Proceedings of the Information Security - 23rd International Conference, 2020
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing.
Proceedings of the IEEE Intl Conf on Dependable, 2020
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
Proceedings of the Deep Biometrics, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Sensors, 2019
Secur. Commun. Networks, 2019
The application of Software Defined Networking on securing computer networks: A survey.
J. Netw. Comput. Appl., 2019
Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019
Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms From Big Data Repositories.
IEEE Internet Things J., 2019
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology.
Int. J. Distributed Sens. Networks, 2019
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships.
Future Gener. Comput. Syst., 2019
Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Future Gener. Comput. Syst., 2019
Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019
Detecting malicious nodes via gradient descent and support vector machine in Internet of Things.
Comput. Electr. Eng., 2019
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019
CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
Multim. Tools Appl., 2018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018
<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018
Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling.
Computer, 2018
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Proceedings of the Information Security Practice and Experience, 2018
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
J. Netw. Comput. Appl., 2016
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016
Inf. Comput. Secur., 2016
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks.
Inf. Comput. Secur., 2016
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015
IEEE Commun. Surv. Tutorials, 2015
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory.
Proceedings of the Network and System Security - 9th International Conference, 2015
An empirical study on email classification using supervised machine learning in real environments.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection.
J. Netw. Comput. Appl., 2014
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication.
Inf. Manag. Comput. Secur., 2014
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014
Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection.
Comput. Commun., 2014
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.
Proceedings of the Symposium on Applied Computing, 2014
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection.
Int. J. Comput. Intell. Syst., 2013
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2013
Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012
Evaluating the effect of user guidelines on creating click-draw based graphical passwords.
Proceedings of the Research in Applied Computation Symposium, 2012
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011