Weizhi Meng

Orcid: 0000-0003-4384-5786

Affiliations:
  • Technical University of Denmark, Lyngby, Denmark
  • Institute for Infocomm Research, Singapore (2014 - 2016)
  • City University of Hong Kong, Hong Kong (PhD 2013)


According to our database1, Weizhi Meng authored at least 275 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024

Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024

Guest Editorial of the Special Section on Generative Artificial Intelligence With Applications on Consumer Electronics.
IEEE Trans. Consumer Electron., May, 2024

TridentShell: An enhanced covert and scalable backdoor injection attack on web applications.
J. Netw. Comput. Appl., March, 2024

Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024

Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks.
IEEE Internet Things J., February, 2024

Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles.
IEEE Internet Things J., February, 2024

Delayed packing attack and countermeasure against transaction information based applications.
Inf. Sci., January, 2024

Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids.
IEEE Internet Things J., January, 2024

Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024

Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage.
IEEE Trans. Inf. Forensics Secur., 2024

Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer.
IEEE Trans. Inf. Forensics Secur., 2024

Decentralized Threshold Signatures With Dynamically Private Accountability.
IEEE Trans. Inf. Forensics Secur., 2024

Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels.
IEEE Trans. Inf. Forensics Secur., 2024

GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
Multim. Tools Appl., 2024

Flash controller-based secure execution environment for protecting code confidentiality.
J. Syst. Archit., 2024

Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection.
IEEE Internet Things J., 2024

Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2024

High invisibility image steganography with wavelet transform and generative adversarial network.
Expert Syst. Appl., 2024

Deep video inpainting detection and localization based on ConvNeXt dual-stream network.
Expert Syst. Appl., 2024

ABC-Channel: An Advanced Blockchain-based Covert Channel.
CoRR, 2024

can-train-and-test: A curated CAN dataset for automotive intrusion detection.
Comput. Secur., 2024

DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

A Comparative Analysis of Phishing Tools: Features and Countermeasures.
Proceedings of the Information Security Practice and Experience, 2024

An eID-Based Privacy-Enhanced Public Transportation Ticket System.
Proceedings of the Information Security Practice and Experience, 2024

can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

Mitigating Centralization in Access Control System with Blockchain and Distributed Storage.
Proceedings of the IEEE International Conference on Blockchain, 2024

AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
A secure and lightweight batch authentication scheme for Internet of Drones environment.
Veh. Commun., December, 2023

Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023

Analysis of hybrid attack and defense based on block withholding strategy.
J. Inf. Secur. Appl., November, 2023

ADFL: Defending backdoor attacks in federated learning via adversarial distillation.
Comput. Secur., September, 2023

GenDroid: A query-efficient black-box android adversarial attack framework.
Comput. Secur., September, 2023

Gas-expensive patterns detection to optimize smart contracts.
Appl. Soft Comput., September, 2023

NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0.
IEEE Trans. Ind. Informatics, July, 2023

ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023

Trusting Computing as a Service for Blockchain Applications.
IEEE Internet Things J., July, 2023

A survey of deep learning-based intrusion detection in automotive applications.
Expert Syst. Appl., July, 2023

A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS.
Comput. Secur., May, 2023

Dummy trajectory generation scheme based on generative adversarial networks.
Neural Comput. Appl., April, 2023

Towards Intelligent Attack Detection Using DNA Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Data Analytic for Healthcare Cyber Physical System.
IEEE Trans. Netw. Sci. Eng., 2023

Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Editorial for special issue on security and trust on networked systems.
Int. J. Netw. Manag., 2023

A privacy-preserving blockchain-based tracing model for virus-infected people in cloud.
Expert Syst. Appl., 2023

Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023

Protecting User Privacy in Online Settings via Supervised Learning.
CoRR, 2023

Security Analysis on Social Media Networks via STRIDE Model.
CoRR, 2023

BlockFW - Towards Blockchain-based Rule-Sharing Firewall.
CoRR, 2023

MLCT: A multi-level contact tracing scheme with strong privacy.
Concurr. Comput. Pract. Exp., 2023

Intrusion Detection in the Automotive Domain: A Comprehensive Review.
IEEE Commun. Surv. Tutorials, 2023

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023

A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2.
Comput. Ind. Eng., 2023

can-train-and-test: A New CAN Intrusion Detection Dataset.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023

XVRS: Extended Vulnerability Risk Scoring based on Threat Intelligence.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

can-logic: Automotive Intrusion Detection via Temporal Logic.
Proceedings of the 13th International Conference on the Internet of Things, 2023

Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

BlockPAT: A Blockchain-Enabled Second-Hand Physical Asset Tokenization Management System.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

DataVaults: A Secure, Distributed and Privacy Preserving Personal Data Management Platform.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Securing Offshore Installations Against Automatic Identification System Spoofing.
Proceedings of the IEEE Global Communications Conference, 2023

No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Securing IoT Firmware Dispatch Systems with Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2023

The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

KEP: Keystroke Evoked Potential for EEG-Based User Authentication.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Securing 5G Positioning via Zero Trust Architecture.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era.
IEEE Netw., 2022

A novel rough set-based approach for minimum vertex cover of hypergraphs.
Neural Comput. Appl., 2022

DVPPIR: privacy-preserving image retrieval based on DCNN and VHE.
Neural Comput. Appl., 2022

Editorial: Security and Privacy Challenges in Internet of Things.
Mob. Networks Appl., 2022

An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022

Information and Future Internet Security, Trust and Privacy.
Future Internet, 2022

Threshold identity authentication signature: Impersonation prevention in social network services.
Concurr. Comput. Pract. Exp., 2022

For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites.
Concurr. Comput. Pract. Exp., 2022

Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022

BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Designing In-Air Hand Gesture-based User Authentication System via Convex Hull.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Security Analysis in Satellite Communication based on Geostationary Orbit.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks.
Proceedings of the Provable and Practical Security, 2022

A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
Proceedings of the Network and System Security - 16th International Conference, 2022

A Collaborators Recommendation Method Based on Multi-feature Fusion.
Proceedings of the Neural Computing for Advanced Applications, 2022

Extracting Key Information from Shopping Receipts by Using Bayesian Deep Learning via Multi-modal Features.
Proceedings of the Neural Computing for Advanced Applications, 2022

Designing Enhanced Robust 6G Connection Strategy with Blockchain.
Proceedings of the Information Security Practice and Experience, 2022

Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System.
Proceedings of the Information Security Practice and Experience, 2022

Towards A Scalable and Privacy-Preserving Blockchain-based European Parking System.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Lightweight and Practical Privacy-Preserving Image Masking in Smart Community.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

AirChain - Towards Blockchain-based Aircraft Maintenance Record System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

TDL-IDS: Towards A Transfer Deep Learning based Intrusion Detection System.
Proceedings of the IEEE Global Communications Conference, 2022

IDS for CAN: A Practical Intrusion Detection System for CAN Bus Security.
Proceedings of the IEEE Global Communications Conference, 2022

Towards Artificial Neural Network Based Intrusion Detection with Enhanced Hyperparameter Tuning.
Proceedings of the IEEE Global Communications Conference, 2022

A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.
Proceedings of the Emerging Information Security and Applications, 2022

Mosaic - A Blockchain Consensus Algorithm Based on Random Number Generation.
Proceedings of the IEEE International Conference on Blockchain, 2022

DevLeChain - An Open Blockchain Development Platform for Decentralized Applications.
Proceedings of the IEEE International Conference on Blockchain, 2022

Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Sparse Trust Data Mining.
IEEE Trans. Inf. Forensics Secur., 2021

Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021

User recognition based on periocular biometrics and touch dynamics.
Pattern Recognit. Lett., 2021

Towards efficient and energy-aware query processing for industrial internet of things.
Peer-to-Peer Netw. Appl., 2021

EdgeTC - a PBFT blockchain-based ETC scheme for smart cities.
Peer-to-Peer Netw. Appl., 2021

Overview of the 2021 Edition of the Workshop on Very Large Internet of Things (VLIoT 2021).
Open J. Internet Things, 2021

My data, my control: A secure data sharing and access scheme over blockchain.
J. Inf. Secur. Appl., 2021

Hybrid Emotion-Aware Monitoring System Based on Brainwaves for Internet of Medical Things.
IEEE Internet Things J., 2021

Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT.
IEEE Internet Things J., 2021

Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021

Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions.
Int. J. Netw. Manag., 2021

Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750].
Future Gener. Comput. Syst., 2021

Defending co-resident attack using reputation-based virtual machine deployment policy in cloud computing.
Trans. Emerg. Telecommun. Technol., 2021

WNV-Detector: automated and scalable detection of wireless network vulnerabilities.
EURASIP J. Wirel. Commun. Netw., 2021

Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021

Mobile network traffic pattern classification with incomplete a priori information.
Comput. Commun., 2021

IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021

Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Threat Hunting Using Elastic Stack: An Evaluation.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

Towards decentralized bicycle insurance system based on blockchain.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

LibBlock - Towards Decentralized Library System based on Blockchain and IPFS.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Efficient Attribute-Based Signature for Monotone Predicates.
Proceedings of the Provable and Practical Security, 2021

Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

BALSAPro: Towards A Security Protocol for Bluetooth Low Energy.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

TridentShell: a Covert and Scalable Backdoor Injection Attack on Web Applications.
Proceedings of the Information Security - 24th International Conference, 2021

NGS: Mitigating DDoS Attacks using SDN-based Network Gate Shield.
Proceedings of the IEEE Global Communications Conference, 2021

ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

ActAnyware - Blockchain-Based Software Licensing Scheme.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Mind the Scraps: Attacking Blockchain Based on Selfdestruct.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks.
IEEE Trans. Engineering Management, 2020

HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
Secur. Commun. Networks, 2020

Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances.
IEEE Netw., 2020

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities.
J. Parallel Distributed Comput., 2020

A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020

Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid.
J. Inf. Secur. Appl., 2020

Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
J. Inf. Secur. Appl., 2020

THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
Int. J. Inf. Sec., 2020

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020

Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020

Editorial: Special issue on blockchain and communication networks.
Digit. Commun. Networks, 2020

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Comput. Secur., 2020

MSYM: A multichannel communication system for android devices.
Comput. Networks, 2020

Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
Proceedings of the 19th IEEE International Conference on Trust, 2020

I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection.
Proceedings of the Network and System Security - 14th International Conference, 2020

ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks.
Proceedings of the Information Security - 23rd International Conference, 2020

NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing.
Proceedings of the IEEE Intl Conf on Dependable, 2020

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones.
Proceedings of the Deep Biometrics, 2020

2019
Security, Privacy, and Trust on Internet of Things.
Wirel. Commun. Mob. Comput., 2019

Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
Sensors, 2019

Machine Learning for Wireless Multimedia Data Security.
Secur. Commun. Networks, 2019

The application of Software Defined Networking on securing computer networks: A survey.
J. Netw. Comput. Appl., 2019

Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms From Big Data Repositories.
IEEE Internet Things J., 2019

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology.
Int. J. Distributed Sens. Networks, 2019

CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships.
Future Gener. Comput. Syst., 2019

Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks.
Future Gener. Comput. Syst., 2019

Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019

Attribute-Based Information Flow Control.
Comput. J., 2019

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things.
Comput. Electr. Eng., 2019

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Towards Secure Open Banking Architecture: An Evaluation with OWASP.
Proceedings of the Network and System Security - 13th International Conference, 2019

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019

CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019

CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
Multim. Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018

<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018

Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling.
Computer, 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018

When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems.
Proceedings of the Science of Cyber Security - First International Conference, 2018

PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Proceedings of the Network and System Security - 12th International Conference, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Analyzing the Communication Security Between Smartphones and IoT Based on CORAS.
Proceedings of the Network and System Security - 12th International Conference, 2018

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Proceedings of the Information Security Practice and Experience, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017

Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
JuiceCaster: Towards automatic juice filming attacks on smartphones.
J. Netw. Comput. Appl., 2016

A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016

Evaluating the effect of multi-touch behaviours on Android unlock patterns.
Inf. Comput. Secur., 2016

Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks.
Inf. Comput. Secur., 2016

MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016

Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

On Multiple Password Interference of Touch Screen Patterns and Text Passwords.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015

Surveying the Development of Biometric User Authentication on Mobile Phones.
IEEE Commun. Surv. Tutorials, 2015

RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory.
Proceedings of the Network and System Security - 9th International Conference, 2015

An empirical study on email classification using supervised machine learning in real environments.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Charging Me and I Know Your Secrets!: Towards Juice Filming Attacks on Smartphones.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection.
J. Netw. Comput. Appl., 2014

The effect of adaptive mechanism on behavioural biometric based mobile phone authentication.
Inf. Manag. Comput. Secur., 2014

EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection.
Comput. Commun., 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.
Proceedings of the Symposium on Applied Computing, 2014

An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014

Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection.
Int. J. Comput. Intell. Syst., 2013

Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013

Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2013

Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012

Evaluating the effect of user guidelines on creating click-draw based graphical passwords.
Proceedings of the Research in Applied Computation Symposium, 2012

Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Proceedings of the Network and System Security - 6th International Conference, 2012

Designing Click-Draw Based Graphical Password Scheme for Better Authentication.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
The practice on using machine learning for network anomaly intrusion detection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011


  Loading...