Publication

Publications-Sorted by Time


Note: Weizhi Meng was previously known as Yuxin Meng.


My publications at Google Scholar and DBLP.

Before you download the papers, please carefully read and comply with relevant copyright of publishers.


Books:

  1. Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger. Deep Biometrics. Springer, 2020. (Access the book)

  2. Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou. Botnets: Architectures, Countermeasures, and Challenges. CRC Press, Taylor & Francis, October 2019. (Access the book)

  3. Weizhi Meng, Xiapu Luo, Steven Furnell and Jianying Zhou. Protecting Mobile Networks and Devices: Challenges and Solutions. CRC Press, Taylor & Francis, November 2016. (Access the book)


Book Covers
  1. Wenjuan Li and Weizhi Meng. Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications (Book), Ali Ismail Awad, Jemal Abawajy (eds), Wiley-IEE, December 2021. (Access the chapter)

  2. Zhi Lin, Weizhi Meng, Wenjuan Li and Duncan S. Wong. Developing Cloud-based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics (Book), Richard Jiang (eds), Springer, July 2019. (Access the chapter)

  3. Weizhi Meng, Jianying Zhou, and Lam-For Kwok. A Review of Intrusion Detection and Prevention on Mobile Devices: The Last Decade. Intrusion Detection and Prevention for Mobile Ecosystems (Book), Georgios Kambourakis, Asaf Shabtai, Konstantinos Kolias, and Dimitrios Damopoulos (eds), CRC Press, Taylor & Francis, July 2017. (Access the chapter)

  4. Lijun Jiang and Weizhi Meng. Smartphone User Authentication Using Touch Dynamics in the Big Data Era: Challenges and Opportunities. Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Book), R. Jiang, S. Al-Madeed, D. Crookes, A. Beghdadi, A. Bouridane (eds), Springer, pp. 163-178, December 2016. (Access the chapter)

  5. Weizhi Meng and Wenjuan Li. A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends. Networking for Big Data (Book), Shui Yu, Xiaodong Lin, Jelena Misic, Xuemin (Sherman) Shen (eds), CRC Press, Taylor & Francis, pp. 195-213, August 2015. (Access the chapter)

  6. Yuxin Meng, Wenjuan Li and Lam-For Kwok. A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends. Case Studies in Secure Computing-Achievements and Trends (Book), Biju Issa, Nauman Israr (eds), CRC Press, Taylor & Francis, pp. 191-208, September 2014. (Access the chapter)

  7. Yuxin Meng, Yang Xiang and Lam-For Kwok. Applications of Machine Learning in Intrusion Detection. The State of the Art in Intrusion Prevention and Detection (Book), Al-Sakib Khan Pathan (eds), CRC Press, Taylor & Francis, pp. 311-332, January 2014. (Access the chapter)

  8. Yuxin Meng and Lam-For Kwok. Enhancing Intrusion Detection Systems Using Intelligent False Alarm Filter: Selecting the Best Machine Learning Algorithm. Architectures and Protocols for Secure Information Technology (Book), Ruiz Martínez, Pereníguez-García and Marín-López (eds), IGI-Global, pp. 214-236, September 2013. (Access the chapter, this chapter was selected for reprint in Artificial Intelligence: Concepts, Methodologies, Tools, and Applications)

  1. Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, and Qiuhua Wang. Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Transactions on Information Forensics & Security, In Press, IEEE. [IF=6.8] (Download the paper)

  2. Zhenyu Jiang, Jiliang Li, Qinnan Hu, Weizhi Meng, Witold Pedrycz, and Zhou Su. Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet of Things Journal, In Press, IEEE. [IF=10.238] (Download the paper)

  3. Jiliang Li, Yuan Su, Rongxing Lu, Zhou Su, Weizhi Meng, and Meng Shen. StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks. IEEE Transactions on Dependable and Secure Computing, In Press, IEEE. [IF=7.3] (Download the paper)

  4. Tian Chen, Yu-an Tan, Thar Baker, Zheng Zhang, Weizhi Meng, and Yuanzhang Li. A Secure Data Transfer Framework through DDR on CPU-FPGA Systems for AI Workloads. Neural Computing and Applications, In Press, Elsevier. [IF=6.0] (Download the paper)

  5. Yixuan Huang, Yining Liu, Jingcheng Song, and Weizhi Meng. A Lightweight and Efficient Raw Data Collection Scheme for IoT Systems. Journal of Information and Intelligence, In Press, Elsevier. (Download the paper)

  6. Yaqin Liu, Wei Liang, Kun Xie, Songyou Xie, Kuan-Ching Li, and Weizhi Meng. LightPay: A Lightweight and Secure Off-chain Multi-path Payment Scheme based on Adapter Signatures. IEEE Transactions on Services Computing, In Press, IEEE. [IF=8.1] (Download the paper)

  7. Palash Ray, Debasis Gir, Weizhi Meng, and Soumyadeep Hore. GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection. Multimedia Tools and Applications, In press, Springer. [IF=3.6] (Download the paper)

  8. -----------------------------------------------------
  9. Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao, and Weizhi Meng. Flash Controller-based Secure Execution Environment for Protecting Code Confidentiality. Journal of Systems Architecture, vol .152, pp. 1-12, Elsevier, July 2024. [IF=4.5] (Download the paper)

  10. Ye Yao, Hui Wang, Chen Wang, Yizhi Ren, and Weizhi Meng. Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Transactions on Information Forensics & Security, vol. 19, pp. 4406-4419, IEEE, 2024. [IF=6.8] (Download the paper)

  11. Yuan Su, Jiliang Li, Jiahui Li, Zhou Su, Weizhi Meng, and Rongxing Lu. Robust and Lightweight Data Aggregation with Histogram Estimation in Edge-Cloud Systems. IEEE Transactions on Network Science and Engineering, vol. 11, no. 3, pp. 2864-2875, IEEE, 2024. [IF=6.6] (Download the paper)

  12. Ye Yao, Junyu Wang, Qi Chang, Yizhi Ren, and Weizhi Meng. High Invisibility Image Steganography with Wavelet Transform and Generative Adversarial Network. Expert Systems With Applications, vol. 249, Part A, 123540, pp. 1-13, Elsevier, September 2024. [IF=8.5] (Download the paper)

  13. Ye Yao, Tingfeng Han, Xudong Gao, Yizhi Ren, and Weizhi Meng. Deep Video Inpainting Detection and Localization based on ConvNeXt Dual-stream Network. Expert Systems With Applications, vol. 247, 123331, pp. 1-10, Elsevier, August 2024. [IF=8.5] (Download the paper)

  14. Brooke Lampe and Weizhi Meng. can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection. Computers & Security, vol. 140, 103777, pp. 1-44, Elsevier, 2024. [IF=5.6] (Download the paper)

  15. Simon Jonker, Malthe Jelstrup, Weizhi Meng, and Brooke Lampe. Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning. ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 20, no. 6, pp. Article No. 154, pp 1–22, ACM, 2024. [IF=5.1] (Download the paper)

  16. Xiaobo Yu, Weizhi Meng, Yining Liu, and Fei Zhou. TridentShell: An Enhanced Covert and Scalable Backdoor Injection Attack on Web Applications. Journal of Network and Computer Applications, vol. 223, pp. 1-12, Elsevier, 2024. [IF=8.7] (Download the paper)

  17. Zhuotao Lian, Qingkui Zeng, Weizheng Wang, Dequan Xu, Weizhi Meng, and Chunhua Su. Traffic Sign Recognition using Optimized Federated Learning in Internet of Vehicles. IEEE Internet of Things Journal, vol. 11, no. 4, pp. 6722-6729, IEEE, 2024. [IF=10.238] (Download the paper)

  18. Gang Shen, Chengliangyi Xia, Yumei Li, Hua Shen, Weizhi Meng, and Mingwu Zhang. Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks. IEEE Internet of Things Journal, vol. 11, no. 4, pp. 6664-6676, IEEE, 2024. [IF=10.238] (Download the paper)

  19. Yuan Chang, Jiliang Li, Ning Lu, Wenbo Shi, Zhou Su, and Weizhi Meng. Practical Privacy-Preserving Scheme with Fault Tolerance for Smart Grids. IEEE Internet of Things Journal, vol. 11, no. 2, pp. 1990-2005, IEEE, 2024. [IF=10.238] (Download the paper)

  20. Meng Li, Mingwei Zhang, Qing Wang, Weizhi Meng, Liehuang Zhu, and Zijian Zhang. Decentralized Threshold Signatures with Dynamically Private Accountability. IEEE Transactions on Information Forensics & Security, vol. 19, pp. 2217-2230, IEEE, 2024. [IF=6.8] (Download the paper)

  21. Yuheng Wang, Jiliang Li, Yuan Su, Zhou Su, Yuyi Wang, Weizhi Meng, Yinghua Shen. Delayed Packing Attack and Countermeasure Against Transaction Information Based Applications. Information Sciences, vol. 652, 119742, pp. 1-15, Elsevier, 2024. [IF=8.1] (Download the paper)

  22. Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, and Weizhi Meng. A Secure and Lightweight Batch Authentication Scheme for Internet of Drones Environment. Vehicular Communications,vol. 44, 100680, pp. 1-11, Elsevier, 2023. [IF=6.7] (Download the paper)

  23. Brooke Lampe and Weizhi Meng. Intrusion Detection in the Automotive Domain: A Comprehensive Review. IEEE Communications Surveys and Tutorials, vol. 25, no. 4, pp. 2356-2426, IEEE, 2023. [IF=35.6] (Download the paper)

  24. Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, and Weizhi Meng. Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. IEEE Transactions on Information Forensics & Security, vol. 18, pp. 5964-5979, IEEE, 2023. [IF=6.8] (Download the paper)

  25. Binjie Liao, Hongyi Chen, Yu Wang, Weizhi Meng, and Jun Zhang. Analysis of Hybrid Attack and Defense based on Block Withholding Strategy. Journal of Information Security and Applications, vo. 78, 103620, pp. 1-10, Elsevier, 2023. [IF=3.872] (Download the paper)

  26. Jiliang Li, Ziyi Zhao, Zhou Su, and Weizhi Meng. Gas-expensive Patterns Detection to Optimize Smart Contracts. Applied Soft Computing, vol. 145, 110542, pp. 1-10, Elsevier, 2023. [IF=8.263] (Download the paper)

  27. Hu Xiong, Hanxiao Wang, Weizhi Meng, and Kuo-Hui Yeh. Attribute-based Data Sharing Scheme with Flexible Search Functionality for Cloud Assisted Autonomous Transportation System. IEEE Transactions on Industrial Informatics, vol. 19, no. 11, pp. 10977-10986, IEEE, 2023. [IF=11.648] (Download the paper)

  28. Wensheng Gan, Kaixia Hu, Gengsen Huang, Wei-Che Chien, Han-Chieh Chao, and Weizhi Meng. Data Analytic for Healthcare Cyber Physical System. IEEE Transactions on Network Science and Engineering, vol. 10, no. 5, pp. 2490-2502, IEEE, 2023. [IF=5.033] (Download the paper)

  29. Chengcheng Zhu, Jiale Zhang, Xiaobing Sun, Bing Chen, and Weizhi Meng. ADFL: Defending Backdoor Attacks in Federated Learning via Adversarial Distillation. Computers & Security, vol. 132, 103366, pp. 1-14, Elsevier, 2023. [IF=5.105] (Download the paper)

  30. Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, and Wenjuan Li. ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12521-12536, IEEE, 2023. [IF=10.238] (Download the paper)

  31. Peng Chen, Jiageng Chen, and Weizhi Meng. MLCT: A Multi-level Contact Tracing Scheme with Strong Privacy. Concurrency and Computation: Practice and Experience, vol. 35, no. 19, pp. 1-17, Wiley, 2023. [IF=2.0] (Download the paper)

  32. Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, and Xi Zheng. GenDroid: A Query-Efficient Black-box Android Adversarial Attack Framework. Computers & Security, vol. 132, 103359, pp. 1-12, Elsevier, 2023. [IF=5.6] (Download the paper)

  33. Wen-Wei Li, Weizhi Meng, Kuo-Hui Yeh, and Shi-Cho Cha. Trusting Computing as a Service for Blockchain Applications. IEEE Internet of Things Journal, vo. 10, no. 13, pp. 11326-11342, IEEE, 2023. [IF=10.238] (Download the paper)

  34. Wei-Yang Chiu, Weizhi Meng, and Chunpeng Ge. NoSneaky: A Blockchain-based Execution Integrity Protection Scheme in Industry 4.0. IEEE Transactions on Industrial Informatics, vo. 19, no. 7, pp. 7957-7965, IEEE, 2023. [IF=11.648] (Download the paper)

  35. Jingkang Yang, Xiaobo Yu, Yining Liu, and Weizhi Meng. Dummy Trajectory Generation Scheme based on Generative Adversarial Networks. Neural Computing and Applications, vol. 35, no. 11, pp. 8453-8469, Springer, 2023. [IF=5.606] (Download the paper)

  36. Rishikesh Sahay, D.A. Sepulveda Estay, Weizhi Meng, Christian D. Jensen, and Michael Bruhn Barfod. A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS. Computers & Security, vol. 128, 103179, pp. 1-18, Elsevier, 2023. [IF=5.105] (Download the paper)

  37. Brooke Lampe and Weizhi Meng. A Survey of Deep Learning-based Intrusion Detection in Automotive Applications. Expert Systems With Applications, vol. 221,119771, pp. 1-23, Elsevier, 2023. [IF=8.665] (Download the paper)

  38. Shi-Cho Cha, Weizhi Meng, Wen-Wei Li, and Kuo-Hui Yeh. A Blockchain-enabled IoT Auditing Management System Complying with ISO/IEC 15408-2. Computers & Industrial Engineering, vol. 178, 109091, pp. 1-11, Elsevier, 2023. [IF=7.18] (Download the paper)

  39. Zengri Zeng, Baokang Zhao, Han-Chieh Chao, Ilsun You, Kuo-Hui Yeh and Weizhi Meng. Towards Intelligent Attack Detection Using DNA Computing. ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 19, no. 3, pp, 1-27, ACM, 2023. [IF=4.094] (Download the paper)

  40. Guangquan Xua, Wenqing Lei, Lixiao Gong, Jian Liub, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, and Shaoying Liu. UAF-GUARD: Defending the Use-After-Free Exploits via Fine-grained Memory Permission Management. Computers & Security, vol. 125, 103048, pp. 1-13, Elsevier, 2023. [IF=5.105] (Download the paper)

  41. Chengyi Qin, Lei Wu, Weizhi Meng, Zihui Xu, Su Li and Hao Wang. A Privacy-preserving Blockchain-based Tracing Model for Virus-infected People in Cloud. Expert Systems With Applications, vol. 211, 118545, pp. 1-15, Elsevier, 2023. [IF=8.665] (Download the paper)

  42. Qian Zhou, Xiaojun Xie, Hua Dai, and Weizhi Meng. A Novel Rough Set-based Approach for Minimum Vertex Cover of Hypergraphs. Neural Computing and Applications, vol. 34, no. 24, pp. 21793-21808, Springer, 2022. [IF=5.606] (Download the paper)

  43. Wenjuan Li and Weizhi Meng. BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Network, vol. 36, no. 4, pp. 120-125, IEEE, 2022. [IF=10.294] (Download the paper)

  44. Su Li, Lei Wu, Weizhi Meng, Zihui Xu, Chengyi Qin, and Hao Wang. DVPPIR: Privacy-preserving Image Retrieval based on DCNN and VHE. Neural Computing and Applications, vol. 34, no. 17, pp. 14355-14371, Springer, 2022. [IF=5.606] (Download the paper)

  45. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Communications Surveys and Tutorials, vol. 24, no. 1, pp. 280-305, IEEE, 2022. [IF=25.249] (Download the paper)

  46. Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, and Chunhua Su. BlockCSDN: Towards Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. IEICE Transactions on Information and Systems, vol. E105.D, no. 2, pp. 272-279, IEICE, 2022. [IF=0.845] (Download the paper)

  47. Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han. An Empirical Study of Supervised Email Classification in Internet of Things: Practical Performance and Key Influencing Factors. International Journal of Intelligent Systems, vol. 37, no. 1, pp. 287-304, Wiley, 2022. [IF=8.709] (Download the paper)

  48. Zhanwen Chen, Jiageng Chen, and Weizhi Meng. Threshold Identity Authentication Signature: Impersonation Prevention in Social Network Services. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-9, Wiley, 2022. [IF=1.536] (Download the paper)

  49. Jun Zhang, Houda Labiod, and Weizhi Meng. For a Few Diversities More: a voting-attack-immune voting scheme for Social Question and Answer Websites. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-15, Wiley, 2022. [IF=1.536] (Download the paper)

  50. Wei-Yang Chiu, Weizhi Meng, and Christian D. Jensen. My Data, My Control: A Secure Data Sharing and Access Scheme over Blockchain. Journal of Information Security and Applications, vo. 63, 103020, pp. 1-11, Elsevier, 2021. [IF=3.872] (Download the paper)

  51. Weizhi Meng, Yong Cai, Laurence T. Yang, and Wei-Yang Chiu. Hybrid Emotion-aware Monitoring System based on Brainwaves for Internet of Medical Things. IEEE Internet of Things Journal, vol. 8, no. 21, pp. 16014-16022, IEEE, 2021. [IF=9.515] (Download the paper)

  52. Liang Liu, Yiting Wang, Weizhi Meng, Zhe Xu, Wenzhao Gao, and Zuchao Ma. Towards Efficient and Energy-aware Query Processing for Industrial Internet of Things. Peer-to-Peer Networking and Applications, vol. 14, pp. 3895–3914, Springer, 2021. [IF=2.793] (Download the paper)

  53. Deina Kellezi, Christian Boegelund, and Weizhi Meng. Securing Open Banking with Model-View-Controller Architecture and OWASP. Wireless Communications and Mobile Computing, vol. 2021, Article ID 8028073, pp. 1-13, Hindawi, 2021. [IF=2.336] (Download the paper)

  54. Wei-Yang Chiu and Weizhi Meng. EdgeTC - A PBFT Blockchain-based ETC Scheme for Smart Cities. Peer-to-Peer Networking and Applications, vol. 14, pp. 2874–2886, Springer, 2021. [IF=2.793] (Download the paper)

  55. Pengli Nie, Guangquan Xu, Litao Jiao, Shaoying Liu, Jian Liu, Weizhi Meng, Xiaochun Cheng, and Xi Zheng. Sparse Trust Data Mining. IEEE Transactions on Information Forensics & Security, vol. 16, pp. 4559-4573, IEEE, 2021. [IF=7.178] (Download the paper)

  56. Zhaoman Liu, Lei Wu, Weizhi Meng, Hao Wang and Wei Wang. Accurate Range Query with Privacy Preservation for Outsourced Location-Based Service in IoT. IEEE Internet of Things Journal, vol. 8, no. 18, pp. 14322-14337, IEEE, 2021. [IF=9.515] (Download the paper)

  57. Yiming Xiao, Liang Liu, Zuchao Ma, Zijie Wang and Weizhi Meng. Defending Co-Resident Attack using Reputation-based Virtual Machine Deployment Policy in Cloud Computing. Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, pp. 1-17, Wiley, 2021. [IF=1.594] (Download the paper)

  58. Andrea Casanova, Lucia Cascone, Aniello Castiglione, Weizhi Meng, and Chiara Pero. User Recognition based on Periocular Biometrics and Touch Dynamics. Pattern Recognition Letters, vol. 148, pp. 114-120, Elsevier, 2021. [IF=3.255] (Download the paper)

  59. Yanxi Huang, Fangzhou Zhu, Liang Liu, Weizhi Meng, Simin Hu, Renjun Ye, and Ting Lv. WNV-Detector: Automated and Scalable Detection of Wireless Network Vulnerabilities. EURASIP Journal on Wireless Communications and Networking, No. 85, pp. 1-21, Springer, 2021. [IF=1.408] (Download the paper)

  60. Wenjuan Li, Weizhi Meng, and Steven Furnell. Exploring Touch-based Behavioral Authentication on Smartphone Email Applications in IoT-enabled Smart Cities. Pattern Recognition Letters, vol. 144, pp. 35-41, Elsevier, 2021. [IF=3.255] (Download the paper)

  61. Weizhi Meng, Wenjuan Li, and Jianying Zhou. Enhancing the Security of Blockchain-based Software Defined Networking through Trust-based Traffic Fusion and Filtration. Information Fusion, vol. 70, pp. 60-71, Elsevier, 2021. [IF=13.669] (Download the paper)

  62. Zhiping Jin, Zhibiao Liang, Yu Wang, and Weizhi Meng. Mobile Network Traffic Pattern Classification with Incomplete a Priori Information. Computer Communications, vol. 166, pp. 262-270, Elsevier, 2021. [IF=2.816] (Download the paper)

  63. Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, and Zehong Cao. HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM. ACM Transactions on Data Science, vol. 4, no. 1, pp. 25:1-25:18, ACM, 2020. (Download the paper)

  64. Liming Fang, Bo Zhao, Yang Li, Zhe Liu, Chunpeng Ge, and Weizhi Meng. Countermeasure Based on Smart Contracts and AI Against DoS/DDoS Attack in 5G Circumstances. IEEE Network, vol. 34, no. 6, pp. 54-61, IEEE, 2020. [IF=8.808] (Download the paper)

  65. Weizhi Meng, Wenjuan Li, Steven Tug, and Jiao Tan. Towards Blockchain-enabled Single Character Frequency-Based Exclusive Signature Matching in IoT-assisted Smart Cities. Journal of Parallel and Distributed Computing, vol. 144, pp. 268-277, Elsevier, 2020. [IF=2.296] (Download the paper)

  66. Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, and Robert H. Deng. Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 307-321, IEEE, 2020. [IF=6.013] (Download the paper)

  67. Xiaodi Wang, Weizhi Meng, and Yining Liu. A Lightweight Privacy Preserving Data Aggregation Protocol Against Internal Attacks in Smart Grid. Journal of Information Security and Applications, vol. 55, 102628, Elsevier, 2020. [IF=2.327] (Download the paper)

  68. Weizhi Meng, Wenjuan Li, and Liqiu Zhu. Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1377-1386, IEEE, 2020. [IF=2.784] (Download the paper)

  69. Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, and Bingqing Ren. Analysis of Differential Distribution of Lightweight Block Cipher based on Parallel Processing on GPU. Journal of Information Security and Applications, vol. 55, 102565, pp. 1-10, Elsevier, 2020. [IF=2.327] (Download the paper)

  70. Wenjuan Li, Jiao Tan, Weizhi Meng, and Yu Wang. A Swipe-based Unlocking Mechanism with Supervised Learning on Smartphones: Design and Evaluation. Journal of Network and Computer Applications, vol. 165, 102687, pp. 1-8, Elsevier, 2020. [IF=5.570] (Download the paper)

  71. Zuchao Ma, Liang Liu, and Weizhi Meng. Towards Multiple-Mix-Attack Detection via Consensus-based Trust Management in IoT Networks. Computers & Security, vol. 96, 101898, pp. 1-21, Elsevier, 2020. [IF=3.579] (Download the paper)

  72. Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, and Tanveer M. THP: An SDN-based Authentication Scheme Resistant to Multiple Attacks in IoT. IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5745-5759, IEEE, 2020. [IF=9.936] (Download the paper)

  73. Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li. Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security, vol. 19, no. 3, pp. 279-290, Springer, 2020. [IF=1.822] (Download the paper)

  74. Wenjuan Li, Weizhi Meng, and Man Ho Au. Enhancing Collaborative Intrusion Detection via Disagreement-based Semi-Supervised Learning in IoT environments. Journal of Network and Computer Applications, vol. 161, 102631, pp. 1-9, Elsevier, 2020. [IF=5.273] (Download the paper)

  75. Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au. Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, vol. 108, pp. 1258–1266, Elsevier, 2020. [IF=5.768] (Download the paper)

  76. Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au. Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, Vol. E103–D, No. 2, pp. 196-203, IEICE, 2020. [IF=0.576] (Download the paper)

  77. Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, and Lianyong Qi. Secure Information Transmissions in Wireless-powered Cognitive Radio Networks for Internet of Medical Things. Security and Communication Networks, Volume 2020, Article ID 7542726, pp. 1-10, Hindwa, 2020. [IF=1.376] (Download the paper)

  78. Donghai Tian, Wenjie Wang, Weizhi Meng, Xiaoqi Jia, Runze Zhao, and Rui Ma. MSYM: A Multichannel Communication System for Android Devices. Computer Networks, vol. 168, pp. 1-13, Elsevier, 2020. [IF=3.030] (Download the paper)

  79. Irfan Mehmood, Amin Ullah, Khan Muhammad, Der-Jiunn Deng, Weizhi Meng, Fadi Al-Turjman, Muhammad Sajjad, and Victor Hugo C. de Albuquerque. Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories. IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9246-9255, IEEE, 2019. [IF=9.515] (Download the paper)

  80. Weizhi Meng, Lijun Jiang, Kim-Kwang Raymond Choo, Yu Wang, and Chong Jiang. Towards Detection of Juice Filming Charging Attacks via Supervised CPU Usage Analysis on Smartphones. Computers and Electrical Engineering, vol. 78, pp. 230-241, Elsevier, 2019. [IF=2.189] (Download the paper)

  81. Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. Adaptive Machine Learning-based Alarm Reduction via Edge Computing for Distributed Intrusion Detection Systems. Concurrency and Computation: Practice and Experience, vol. 31, no. 19, pp. 1-12, Wiley, 2019. [IF=1.167] (Download the paper) (Top Downloaded Paper 2018-2019)

  82. Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li. Enhancing the Security of FinTech Applications with Map-Based Graphical Password Authentication. Future Generation Computer Systems, vol. 101, pp. 1018-1027, Elsevier, 2019. [IF=5.768] (Download the paper)

  83. Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, and Weizhi Meng. Attribute-Based Information Flow Control. The Computer Journal, vol. 62, no. 8, pp. 1214-1231, Oxford University Press, 2019. [IF=0.98, CCF B] (Download the paper)

  84. Liang Liu, Zuchao Ma, and Weizhi Meng. Detection of Multiple-Mix-Attack Malicious Nodes Using Perceptron-based Trust in IoT Networks. Future Generation Computer Systems, vol. 101, pp. 865-879, Elsevier, 2019. [IF=5.768] (Download the paper)

  85. Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, and Chunhua Su. Y-DWMS: A Digital Watermark Management System Based On Smart Contract. Sensors, vol. 19, no. 14, pp. 1-17, MDPI, 2019. [IF=3.031] (Download the paper)

  86. Lihong Tang, Wanlun Ma, Marthie Grobler, Weizhi Meng, Yu Wang, and Sheng Wen. Faces are Protected as Privacy: An Automatic Tagging Framework against Unpermitted Photo Sharing in Social Media. IEEE Access, IEEE, vol. 7, no. 1, pp. 75556-75567, 2019. [IF=4.098] (Download the paper)

  87. Rishikesh Sahay, Weizhi Meng, D.A. Sepulveda Estay, Christian D. Jensen, and Michael Bruhn Barfod. CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships. Future Generation Computer Systems, vol. 100, pp. 736-750, Elsevier, 2019. [IF=5.768] (Download the paper)

  88. Liang Liu, Jingxiu Yang, and Weizhi Meng. Detecting Malicious Nodes via Gradient Descent and Support Vector Machine in Internet of Things. Computers and Electrical Engineering, vol. 77, pp. 339-353, Elsevier, 2019. [IF=2.189] (Download the paper)

  89. Saurabh Singh, In-Ho Ra, Weizhi Meng, Maninder Kaur, and Gi Hwan Cho. SH-BlockCC: A Secure and Efficient IoT Smart Home Architecture based on Cloud Computing and Blockchain Technology. International Journal of Distributed Sensor Networks, vol. 15, no 4, pp. 1-18, SAGE, 2019. [IF=1.614] (Download the paper or the draft)

  90. Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang. Designing Collaborative Blockchained Signature-based Intrusion Detection in IoT environments. Future Generation Computer Systems, vol. 96, pp. 481-489, Elsevier, 2019. [IF=5.768] (Download the paper or the draft)

  91. Rishikesh Sahay, Weizhi Meng, and Christian D. Jensen. The Application of Software Defined Networking on Securing Computer Networks: A Survey. Journal of Network and Computer Applications, vol. 131, pp. 89-108, Elsevier, 2019. [IF=5.273] (Download the paper or the draft)

  92. Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, vol. 128, pp. 56-63, Elsevier, 2019. [IF=5.273] (Download the paper or the draft)

  93. Weizhi Meng, Wenjuan Li, and Duncan S. Wong. Enhancing Touch Behavioral Authentication via Cost-based Intelligent Mechanism on Smartphones. Multimedia Tools and Applications, vol. 77, no. 23, pp. 30167-30185, Springer, 2018. [IF=1.541] (Download the paper or the draft)

  94. Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, and Yang Xiang. A fog-based privacy-preserving approach for distributed signature-based intrusion detection. Journal of Parallel and Distributed Computing, vol. 122, pp. 26-35, Elsevier, December 2018. [IF=1.815] (Download the paper or the draft)

  95. Weizhi Meng. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling. IEEE Computer, vol. 51, no. 7, pp. 36-43, IEEE, July 2018. [IF=1.940] (Download the paper or the draft)

  96. Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, and Yang Xiang. JFCGuard: Detecting Juice Filming Charging Attack via Processor Usage Analysis on Smartphones. Computers & Security, vol. 76, pp. 252-264, Elsevier, 2018. [IF=2.862] (Download the paper or the draft)

  97. Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, and Yang Xiang. TouchWB: Touch Behavioral User Authentication Based on Web Browsing on Smartphones. Journal of Network and Computer Applications, vol. 117, pp. 1-9, Elsevier, 2018. [IF=3.991] (Download the paper or the draft)

  98. Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, and Christian W. Probst. Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Transactions on Network and Service Management, vol. 15, no. 2, pp. 761-773, IEEE, 2018. [IF=3.286] (Download the paper or the draft)

  99. Weizhi Meng, Elmar Wolfgang Tischhauser, Qingju Wang, Yu Wang, and Jinguang Han. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access, vol. 6, no. 1, pp. 10179-10188, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  100. Wenjuan Li, Weizhi Meng, Chunhua Su, and Lam For Kwok. False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access, vol. 6, no. 1, pp. 6530-6539, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  101. Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou, and Rongxing Lu. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access, vol. 6, no. 1, pp. 7234-7243, IEEE, 2018. [IF=3.557] (Download the paper or the draft)

  102. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Investigating the Influence of Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. Future Internet [Invited Feature Article], Special Issue on Security and Privacy in Wireless and Mobile Networks, vol. 10, no. 1, pp. 1-16, 2018. (Download the paper or the draft)




  103. Wenjuan Li, Weizhi Meng, Lam-For Kwok, and Horace Ho Shing Ip. Developing Advanced Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. Cluster Computing, vol. 21, no. 1, pp. 299-310, Springer, 2018. [IF=2.040] (Download the paper or the draft)

  104. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective and Robust List-based Packet Filter for Signature-based Network Intrusion Detection: An Engineering Approach. HKIE Transactions, vol. 24, no. 4, pp. 204-215, Taylor & Francis, 2017. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017 and published in this Special Issue) (Download the paper)

  105. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective Trust-based Packet Filtering in Collaborative Network Environments. IEEE Transactions on Network and Service Management, vol. 14, no. 1, pp. 233-245, IEEE, 2017. [IF=3.134] (Download the paper or the draft)

  106. Weizhi Meng, Wenjuan Li, Lam-For Kwok, and Kim-Kwang Raymond Choo. Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security, vol. 65, pp. 213-229, Elsevier, 2017. [IF=2.849] (Download the paper or the draft)

  107. Weizhi Meng, Wenjuan Li, Yang Xiang, and Kim-Kwang Raymond Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017. [IF=3.5] (Download the paper or the draft)

  108. Wenjuan Li, Weizhi Meng, Lam-For Kwok, and Horace Ho Shing Ip. Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model. Journal of Network and Computer Applications, vol. 77, pp. 135-145, Elsevier, 2017. [IF=3.5] (Download the paper or the draft)

  109. Wenjuan Li, Weizhi Meng, Xiapu Luo, and Lam-For Kwok. MVPSys: Towards Practical Multi-View Based False Alarm Reduction System in Network Intrusion Detection. Computers & Security, vol. 60, pp. 177-192, Elsevier, 2016. [IF=1.64] (Download the paper or the draft)

  110. Weizhi Meng, Wang Hao Lee, S.R. Murali, and S.P.T. Krishnan. JuiceCaster: Towards Automatic Juice Filming Attacks on Smartphones. Journal of Network and Computer Applications, vol. 68, pp. 201-212, Elsevier, 2016. [IF=2.331] (Download the paper or the draft)

  111. Wenjuan Li, Weizhi Meng, and Lam-For Kwok. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network and Computer Applications, vol. 68, pp. 126-139, Elsevier, 2016. [IF=2.331] (Download the paper or the draft)

  112. Weizhi Meng. Evaluating the Effect of Multi-Touch Behaviours on Android Unlock Patterns. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 277-287, Emerald, 2016. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  113. Wenjuan Li and Weizhi Meng. Enhancing Collaborative Intrusion Detection Networks Using Intrusion Sensitivity in Detecting Pollution Attacks. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 265-276, Emerald, 2016. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  114. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection. Security and Communication Networks, vol. 8, no, 18, pp. 3883-3895, Wiley, 2015. [IF=0.72] (Download the paper or the draft)

  115. Weizhi Meng, Duncan S. Wong, Steven Furnell, and Jianying Zhou. Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1268-1293, 2015. [IF=6.49] (Download the paper or the draft)

  116. Weizhi Meng and Lam-For Kwok. Enhancing the Performance of Signature-based Network Intrusion Detection Systems: An Engineering Approach. HKIE Transactions, vol. 21, no. 4, pp. 209-222, Taylor & Francis, December 2014. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014 and published in this Special Issue) (Download the paper)

  117. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. Computers & Security, vol. 43, pp. 189-204, Elsevier, June 2014. [IF=1.172] (Download the paper or the draft)

  118. Weizhi Meng, Duncan S. Wong, and Lam-For Kwok. The Effect of Adaptive Mechanism on Behavioural Biometric Based Mobile Phone Authentication. Information Management and Computer Security, vol. 22, no. 2, pp. 155-166, Emerald, 2014. (This paper received one of the best papers in Kaspersky Conference and published in this special issue) (Download the paper)

  119. Yuxin Meng and Lam-For Kwok. Adaptive Blacklist-based Packet Filter with A Statistic-based Approach in Network Intrusion Detection. Journal of Network and Computer Applications, vol. 39, pp. 83-92, Elsevier, 2014. [IF=1.772] (Download the paper or the draft))

  120. Yuxin Meng and Lam-For Kwok. Adaptive Non-Critical Alarm Reduction Using Hash-based Contextual Signatures in Intrusion Detection. Computer Communications, vol. 38, pp. 50-59, Elsevier, 2014. [IF=1.695] (Download the paper or the draft)

  121. Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection. Computer Networks, vol. 57, no. 17, pp. 3630-3640, Elsevier, 2013. [IF=1.282] (Download the paper)

  122. Yuxin Meng and Lam-For Kwok. Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection. International Journal of Computational Intelligence Systems, vol. 6, no. 4, pp. 626-638, Taylor & Francis, May 2013. [IF: 0.451] (Download the paper)

    2024

  1. Banghong Qin, Jianwei Liu, Xinxin Xing, Weizhi Meng, and Yizhong Liu. Mitigating Centralization in Access Control System With Blockchain and Distributed Storage. The 7th IEEE International Conference on Blockchain (Blockchain), In Press, IEEE, 2024. (Download the paper)

  2. Yingli Duan, Weizhi Meng, Wei-Yang Chiu, and Yu Wang. DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices. The 38th ACM SIGCOMM Conference, In Press, ACM, 2024. (Download the paper)

  3. Wenyi Liu, Zheng Zhang, Xu Qiao, Yuanzhang Li, Yu-an Tan, and Weizhi Meng. A Software Integrity Authentication Protocol for Zero Trust Architecture. ACM SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications (ZTA-NextGen), with ACM SIGCOMM, In Press, ACM, 2024. (Download the paper)

  4. Yimeng Li, Xuejiao Liu, Xueshuang Xiang, Yu-an Tan, and Weizhi Meng. Incremental Learning Strategy Based on Multi-dimensional Knowledge Distillation for One-stage Object Detection. The 22nd IEEE International Conference on Industrial Informatics (INDIN), IEEE, 2024. (Download the paper)

  5. Zhu Cui, Weizhi Meng, and Yining Liu. Advertising Diversion App using Clipboard Content Recognition. The 7th International Conference on Frontiers in Cyber Security (FCS) , Springer, 2024. (Download the paper)

  6. Siyu Li, Yining Liu, Fei Zhou, Yanze Kang and Weizhi Meng. AggNoteBot: A Robust Botnet Building using Aggressive Cloud Notes. The 29th Australasian Conference on Information Security and Privacy (ACISP) , Springer, 2024. (Download the paper)

  7. Brooke Kidmose and Weizhi Meng. can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets. The 8th European Interdisciplinary Cybersecurity Conference (EICC), pp. 19-28, ACM, 2024. (Download the paper)

  8. Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao and Weizhi Meng. FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT. The 7th International Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IoT), with IEEE PerCom, pp. 88-93, IEEE, 2024. (Best Paper Runnerup Award) (Download the paper)

  9. 2023

  10. Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, and Wenjuan Li. The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. The 21st IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA), pp. 286-293, IEEE, 2023. (Download the paper)

  11. Vince Biro, Wei-Yang Chiu, and Weizhi Meng. Securing IoT Firmware Dispatch System With Blockchain. The 6th IEEE International Conference on Blockchain (IEEE Blockchain 2023), pp. 229-238, IEEE, 2023. (Outstanding Paper Award) (Download the paper)

  12. Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, and Brooke Lampe. Delay-Masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. The 29th IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS 2023), pp. 2135-2142, IEEE, 2023. (Download the paper)

  13. Mads Solberg Collingwood Pyke, Weizhi Meng, and Brooke Lampe. Security on top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering. The 5th International Conference on Machine Learning for Cyber Security (ML4CS 2023), pp. 145-162, Springer, 2023. (Best Paper Award) (Download the paper)

  14. Jiaxuan Wu, Wei-Yang Chiu and Weizhi Meng. KEP: Keystroke Evoked Potential for EEG-based User Authentication. The International Conference on Artificial Intelligence Security and Privacy (AIS&P 2023), pp. 513-530, Springer, 2023. (Download the paper)

  15. Razy Youhana Adam and Weizhi Meng. Securing 5G Positioning via Zero Trust Architecture. The International Conference on Artificial Intelligence Security and Privacy (AIS&P 2023), pp. 563-578, Springer, 2023. (Download the paper)

  16. Brooke Lampe and Weizhi Meng. can-logic: Automotive Intrusion Detection via Temporal Logic. The 13th International Conference on the Internet of Things (IOT), pp. 113-120, ACM, 2023. (Download the paper)

  17. Gergely Tusko, Weizhi Meng, and Brooke Lampe. Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023), pp. 1196-1205, IEEE, 2023. (Download the paper)

  18. Grzegorz Jacek Kot, Weizhi Meng, and Brooke Lampe. Securing Offshore Installations Against Automatic Identification System Spoofing. The 2023 IEEE Global Communications Conference (IEEE GLOBECOM 2023), pp. 4473-4478, IEEE, 2023. (Download the paper)

  19. Brooke Lampe and Weizhi Meng. can-train-and-test: A New CAN Intrusion Detection Dataset. The 98th IEEE Vehicular Technology Conference (VTC2023-Fall), pp. 1-7, IEEE, 2023. (Download the paper)

  20. Johan Hagelskjar Sjursen, Weizhi Meng and Wei-Yang Chiu. Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. The 25th International Conference on Information and Communications Security (ICICS 2023), pp. 627-644, Springer, 2023. (Download the paper)

  21. Weizhi Meng and Wei-Yang Chiu. DataVaults: A Secure, Distributed and Privacy Preserving Personal Data Management Platform. The 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023), pp. 997-1000, IEEE, 2023. (Download the paper)

  22. Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng, and Brooke Lampe. BlockPAT: A Blockchain-enabled Second-hand Physical Asset Tokenization Management System. The 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023), pp. 1041-1042, IEEE, 2023. (Download the paper)

  23. Wei-Yang Chiu, Weizhi Meng, and Brooke Lampe. No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices. The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2023) - Disrupt Track, pp. 137-141, IEEE, 2023. (Download the paper)

  24. Alexandru Rusescu, Brooke Lampe, and Weizhi Meng. Protecting User Privacy in Online Settings via Supervised Learning. The 16th International Conference on Advances in Computer-Human Interactions (ACHI 2023), pp. 228-234, IARIA, 2023. (Download the paper)

  25. Katherine Cardoso Petulante Fernandes, Simon Lucas Jonker, Weizhi Meng, and Brooke Lampe. ScrapeIOC: Designing a Web-scraping Tool for Malware Detection based on Indicators of Compromise. The IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom 2023), pp. 124-128, IEEE, 2023. (Download the paper)

  26. Ensar Seker and Weizhi Meng. XVRS: Extended Vulnerability Risk Scoring based on Threat Intelligence. The IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom 2023), pp. 516-523, IEEE, 2023. (Download the paper)

  27. Johan Hagelskjar Sjursen, Weizhi Meng, and Wei-Yang Chiu. A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2023), pp. 1-3, IEEE, 2023. (Download the paper)

  28. Kamal Raj Sharma, Wei-Yang Chiu, and Weizhi Meng. Security Analysis on Social Media Networks via STRIDE Model. The 19th International Conference on Networking and Services (ICNS 2023), pp. 28-33, IARIA, 2023. (Download the paper)

  29. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. The 10th International Conference on Computing, Networking and Communications (ICNC 2023), pp. 336-342, IEEE, 2023. (Download the paper)

  30. 2022

  31. Bingkun Wu, Weizhi Meng, and Wei-Yang Chiu. Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. The 38th Annual Computer Security Applications Conference (ACSAC 2022), pp. 799-812, ACM, 2022. (Download the paper)

  32. Yang Hong, Lisong Wang, Weizhi Meng, and Chunpeng Ge. A Privacy-Preserving Distributed Machine Learning Protocol based on Homomorphic Hash Authentication. The 16th International Conference on Network and System Security (NSS 2022), pp. 374-386, Springer, 2022. (Download the paper)

  33. Jonathan Kvist Brittain, Wei-Yang Chiu, and Weizhi Meng. Towards A Scalable and Privacy-Preserving Blockchain-based European Parking System. The 28th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2022), pp. 322-329, IEEE, 2022. (Download the paper)

  34. August Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu, and Weizhi Meng. Designing Enhanced Robust 6G Connection Strategy with Blockchain. The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), pp. 57-74, Springer, 2022. (Download the paper)

  35. Bodi, Wei-Yang Chiu, and Weizhi Meng. Towards Blockchain-enabled Intrusion Detection for Vehicular Navigation Map System. The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), pp. 3-20, Springer, 2022. (Download the paper)

  36. Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, and Limin Fang. FolketID: A Decentralized Blockchain-based NemID Alternative against DDoS Attacks. The 16th International Conference on Provable and Practical Security (ProvSec 2022), pp. 210-227, Springer, 2022. (Best Paper Award) (Download the paper)

  37. Jiaxin Deng, Simin Chen, Jiageng Chen, and Weizhi Meng. A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. The Third International Conference on Emerging Information Security and Applications (EISA 2022), pp. 87–107, Springer, 2022. (Download the paper)

  38. Brooke Lampe and Weizhi Meng. IDS for CAN: A Practical Intrusion Detection System for CAN Bus Security. The 2022 IEEE Global Communications Conference (IEEE GLOBECOM 2022), pp. 1782-1787, IEEE, 2022. (Download the paper)

  39. Andrei Nicolae Calugar, Weizhi Meng, and Haijun Zhang. Towards Artificial Neural Network Based Intrusion Detection with Enhanced Hyperparameter Tuning. The 2022 IEEE Global Communications Conference (IEEE GLOBECOM 2022), pp. 2627-2632, IEEE, 2022. (Download the paper)

  40. Xingguo Sun, Weizhi Meng, Wei-Yang Chiu, and Brooke Lampe. TDL-IDS: Towards A Transfer Deep Learning based Intrusion Detection System. The 2022 IEEE Global Communications Conference (IEEE GLOBECOM 2022), pp. 2603-2608, IEEE, 2022. (Download the paper)

  41. Wei-Yang Chiu and Weizhi Meng. BlockFW - Towards Blockchain-based Rule-Sharing Firewall. The 16th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022), pp. 70-75, IARIA 2022. (Download the paper)

  42. Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu and Weizhi Meng. A Practical Blockchain-based Maintenance Record System for Better Aircraft Security. The 4th International Conference on Science of Cyber Security (SciSec 2022), pp. 51-67, Springer, 2022. (Best Paper Award) (Download the paper)

  43. Yanze Kang, Xiaobo Yu, Weizhi Meng and Yining Liu. BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain. The 4th International Conference on Science of Cyber Security (SciSec 2022), pp. 21-35, Springer, 2022. (Download the paper)

  44. Wei-Yang Chiu and Weizhi Meng. DevLeChain - An Open Blockchain Development Platform for Decentralized Applications. The 5th IEEE International Conference on Blockchain (IEEE Blockchain 2022), pp. 167-176, IEEE, 2022. (Download the paper)

  45. Zhengzhong Sun, Wei-Yang Chiu, and Weizhi Meng. Mosaic - A Blockchain Consensus Algorithm Based on Random Number Generation. The 5th IEEE International Conference on Blockchain (IEEE Blockchain 2022), pp. 105-114, IEEE, 2022. (Download the paper)

  46. Jacob Krabbe Pedersen, Mikkel Bøchman, and Weizhi Meng. Security Analysis in Satellite Communication based on Geostationary Orbit. The 19th Annual International Conference on Privacy, Security and Trust (PST 2022), pp. 1-10, IEEE, 2022. (Download the paper)

  47. Yiming Sun, Weizhi Meng, and Wenjuan Li. Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. The 19th Annual International Conference on Privacy, Security and Trust (PST 2022), pp. 1-5, IEEE, 2022. (Download the paper)

  48. Zhen Liu, Yining Liu, and Weizhi Meng. Lightweight and Practical Privacy-Preserving Image Masking in Smart Community. The 24th International Conference on Information and Communications Security (ICICS 2022), pp. 221-239, Springer, 2022. (Best Student Paper Award) (Download the paper)

  49. Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu, and Weizhi Meng. AirChain - Towards Blockchain-based Aircraft Maintenance Record System. The 2022 IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC 2022), pp. 1-3, IEEE, 2022. (Download the paper)

  50. Qi Yuan, Lujiao Shao, Xinyu Zhang, Xinrui Yu, Huiyue Sun, Jianghong Ma, Weizhi Meng, Xiao-Zhi Gao, and Haijun Zhang. A Collaborators Recommendation Method based on Multi-Feature Fusion. The Third International Conference on Neural Computing for Advanced Applications (NCAA 2022), Springer, 2022. (Download the paper)

  51. Jiaqi Chen, Lujiao Shao, Haibin Zhou, Jianghong Ma, Weizhi Meng, Zenghui Wang and Haijun Zhang. Extracting Key Information from Shopping Receipts by Using Bayesian Deep Learning via Multi-modal Features. The Third International Conference on Neural Computing for Advanced Applications (NCAA 2022), Springer, 2022. (Download the paper)

  52. 2021

  53. Kiruthiga Subramanian and Weizhi Meng. Threat Hunting Using Elastic Stack: An Evaluation. The 15th IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE SOLI 2021), pp. 1-6, IEEE, 2021. (Download the paper)

  54. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. The 18th International Conference on Privacy, Security, and Trust (PST 2021), pp. 1-9, IEEE, 2021. (Download the paper)

  55. Li Wang, Weizhi Meng and Wenjuan Li. Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. The 17th International Conference on Mobility, Sensing and Networking (MSN 2021), pp. 486-493, IEEE, 2021. (Download the paper)

  56. Mohamad Muwfak Hlal and Weizhi Meng. BALSAPro: Towards A Security Protocol for Bluetooth Low Energy. The 17th International Conference on Mobility, Sensing and Networking (MSN 2021), pp. 97-104, IEEE, 2021. (Download the paper)

  57. Jixin Zhang, Jiageng Chen, and Weizhi Meng. Efficient Attribute-Based Signature for Monotone Predicates. The 15th International Conference on Provable and Practical Security (ProvSec 2021), pp. 346-362, Springer, 2021. (Download the paper)

  58. Xiaobo Yu, Weizhi Meng, Lei Zhao, and Yining Liu. TridentShell: A Covert and Scalable Backdoor Injection Attack on Web Applications. The 24th Information Security Conference (ISC 2021), pp. 177-194, Springer, 2021. (Download the paper)

  59. Mohamad Suhel Dalati, Weizhi Meng, and Wei-Yang Chiu. NGS: Mitigating DDoS Attacks using SDN-based Network Gate Shield. The 2021 IEEE Global Communications Conference (GLOBECOM 2021), pp. 1-6, IEEE, 2021. (Download the paper)

  60. Wenjuan Li, Weizhi Meng, and Laurence Yang. Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2021), pp. 122-129, IEEE, 2021. (Download the paper)

  61. Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu, and Chunpeng Ge. ActAnyware - Blockchain-based Software Licensing Scheme. The 3rd International Conference on Blockchain and Trustworthy Systems (BlockSys 2021), pp. 559-573, Springer, 2021. (Best Paper Award) (Download the paper)

  62. Zihao Li and Weizhi Meng. Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacks. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2021), pp. 186-197, Springer, 2021. (Download the paper)

  63. Wenjuan Li, Weizhi Meng, Yu Wang, and Jin Li. Enhancing Blackslist-based Packet Filtration using Blockchain in Wireless Sensor Networks. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2021), pp. 624-635, Springer, 2021. (Download the paper)

  64. Wei-Yang Chiu and Weizhi Meng. Mind the Scraps: Attacking Blockchain based on Selfdestruct. The 26th Australasian Conference on Information Security and Privacy (ACISP 2021), pp. 451-469, Springer, 2021. (Download the paper)

  65. Wei-Yang Chiu and Weizhi Meng. Towards Decentralized Bicycle Insurance System Based on Blockchain. The 36th ACM/SIGAPP Symposium on Applied Computing (ACM SAC 2021), pp. 249-256, ACM, 2021. (Download the paper)

  66. Wenjuan Li, Weizhi Meng, Javier Parra Arnau, and Kim-Kwang Raymond Choo. Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. The 4th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2021), pp. 1-8, IEEE, 2021. (Best Paper Award) (Download the paper)

  67. Wei-Yang Chiu, Weizhi Meng, and Christian Damsgaard Jensen. ChainPKI - Towards EThash-based Decentralized PKI with Privacy Enhancement. The 4th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2021), pp. 1-8, IEEE, 2021. (Download the paper)

  68. 2020

  69. Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, and Renjun Ye. SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), pp. 1194-1199, IEEE, 2020. (Download the paper)

  70. Wenjuan Li, Weizhi Meng, and Hui Zhu. Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), pp. 1179-1186, IEEE, 2020. (Download the paper)

  71. Wei-Yang Chiu, Weizhi Meng and Wenjuan Li. I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-based Authentication. The 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020), pp. 251-265, Springer, 2020. (Best Student Paper Award) (Download the paper)

  72. Wei-Yang Chiu, Weizhi Meng and Christian D. Jensen. NoPKI - A Point-to-Point Trusted Third Party Service based on Blockchain Consensus Algorithm. The 3rd International Conference on Frontiers in Cyber Security (FCS 2020), pp. 197-214, Springer, 2020. (Best Paper Award) (Download the paper)

  73. Zuchao Ma, Liang Liu and Weizhi Meng. ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks. The 23rd Information Security Conference (ISC 2020), pp. 255-273, Springer, 2020. (AR=23%) (Best Paper Award) (Download the paper)

  74. Andreas Heidelbach Engly, Anton Ruby Larsen, and Weizhi Meng. Evaluation of Anomaly-based Intrusion Detection with Combined Imbalance Correction and Feature Selection. The 14th International Conference on Network and System Security (NSS 2020), pp. 277-291, Springer, 2020. (Download the paper)

  75. Zhanwen Chen, Jiageng Chen and Weizhi Meng. A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing. The 18th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2020), pp. 569-576, IEEE, 2020. (Best Video Presentation Award) (Download the paper)

  76. Zuchao Ma, Liang Liu and Weizhi Meng. DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-based Trust in IoT Networks. The 25th Australasian Conference on Information Security and Privacy (ACISP 2020), pp. 247–267, Springer, 2020. (AR=20%) (Best Student Paper Award) (Download the paper)

  77. 2019

  78. Deina Kellezi, Christian Boegelund and Weizhi Meng. Towards Secure Open Banking Architecture: An Evaluation with OWASP. The 13th International Conference on Network and System Security (NSS 2019), pp. 185-198, December 2019. (Download the paper)

  79. Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo and Weizhi Meng. Provably Secure Group Authentication in the Asynchronous Communication Model. The 22nd International Conference on Information and Communications Security (ICICS 2019), pp. 324-340, Springer, December 2019. (Download the paper)

  80. Hao Jiang, Weizhi Meng, Chunhua Su and Kim-Kwang Raymond Choo. CAVAEva: An Engineering Platform for Evaluating Commercial Anti-Virus Applications on Smartphones. The 15th International Conference on Information Security and Cryptology (Inscrypt 2019), pp. 208-224, Springer, December 2019. (Best Student Paper Award) (Download the paper)

  81. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), pp. 453-463, November 2019. (Download the paper)

  82. Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li. SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS 2019), pp, 140-153, September 2019. (Download the paper)

  83. Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su. Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 24th European Symposium on Research in Computer Security (ESORICS 2019), pp. 493-511, September 2019. (Download the paper)

  84. Constantinos Pouyioukka, Thanassis Giannetsos, and Weizhi Meng. CrowdLED: Towards Crowd-Empowered & Privacy-Preserving Data Sharing using Smart Contracts. The 13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019), pp. 147-161, July 2019. (Download the paper)

  85. Yan Li, Zilong Wang, Yingjiu Li, Robert Deng, Binbin Chen, Weizhi Meng, and Hui Li. A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. The 14th ACM Asia Conference on Information, Computer and Communications Security (AsiaCCS 2019), pp. 241-246, July 2019. (Download the paper)

  86. Jun Zhang, Houda Labiod, and Weizhi Meng. A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites. The 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2019), pp. 1-5, June 2019. (Download the paper)

  87. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou. SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications. The 34th IFIP International Conference on Information Security and Privacy Protection (IFIP SEC 2019), pp. 180-193, June 2019. (Download the paper)

  88. 2018

  89. Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, and Kouichi Sakurai. Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 101-114, 2018. (Download the paper)

  90. David Madsen, Wenjuan Li, Weizhi Meng and Yu Wang. Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. The 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2018), pp. 481-494, 2018. (Download the paper)

  91. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li. Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification. The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), pp. 313-328, 2018. (Download the paper)

  92. Weizhi Meng and Zhe Liu. TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones. The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), pp. 373-390, 2018. (Best Paper Award) (Download the paper)

  93. Rishikesh Sahay, D.A Sepúlveda-Estay, Weizhi Meng, Christian D. Jensen, and Michael Bruhn Barfod. CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems. The 1st International Conference on Science of Cyber Security (SciSec 2018), pp. 191-198, August 2018. (Download the paper)

  94. Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, and Sherman S. M. Chow. Position Paper on Blockchain Technology: Smart Contract and Applications. The 12th International Conference on Network and System Security (NSS 2018), pp. 474-483, August 2018. (Download the paper)

  95. Francisco-Javier Rodrigo-Gines, Javier Parra-Arnau, Weizhi Meng, and Yu Wang. PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. The 12th International Conference on Network and System Security (NSS 2018), pp. 304-318, August 2018. (Download the paper)

  96. Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, and Christian D. Jensen. Analyzing the Communication Security between Smartphones and IoT based on CORAS. The 12th International Conference on Network and System Security (NSS 2018), pp. 251-265, August 2018. (Download the paper)

  97. Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, and Jinguang Han. CPMap: Design of Click-Points Map-based Graphical Password Authentication. The 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC 2018), pp. 18-32, September 2018. (Download the paper)

  98. Steven Tug, Weizhi Meng, and Yu Wang. CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection. The 1st IEEE International Conference on Blockchain (IEEE Blockchain 2018), pp. 1228-1235, 2018. (Download the paper)

  99. Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018), pp. 1208-1213, 2018. (Download the paper)

  100. Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst. Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. The 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 759-767, July 2018. (Download the paper or the draft)

  101. 2017

  102. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. The 2017 IEEE Global Communications Conference (GLOBECOM 2017), pp. 1-6, December 2017. (Download the paper or the draft)

  103. Weizhi Meng, Wang Hao Lee, Zhe Liu, Chunhua Su and Yan Li. Evaluating the Impact of Juice Filming Charging Attack in Practical Environments. The 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), pp. 327-338, 2017. (Download the paper or the draft)

  104. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. The 20th Information Security Conference (ISC 2017), pp. 291-308, 2017. (Download the paper)

  105. Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au. Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling. The 9th International Symposium on Cyberspace Safety and Security (CSS 2017), pp. 163-175, 2017. (Download the paper)

  106. Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng and Jin Li. A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing. The 9th International Symposium on Cyberspace Safety and Security (CSS 2017), pp. 267-279, 2017. (Download the paper)

  107. Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su and Jin Li. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. The 11th International Conference on Network and System Security (NSS 2017), pp. 99-213, 2017. (Download the paper)

  108. Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou. A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. The 15th International Conference on Applied Cryptography and Network Security (ACNS 2017), pp. 145-162, 2017.(Download the paper)

  109. Weizhi Meng, Wang Hao Lee, Man Ho Au and Zhe Liu. Exploring Effect of Location Number on Map-Based Graphical Password Authentication. The 22nd Australasian Conference on Information Security and Privacy (ACISP 2017), vol 2, pp. 301-313, July 2017. (Download the paper)

  110. Weizhi Meng and Man Ho Au. Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. The 11th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2017), pp. 152-159, June 2017. (Download the paper)

  111. Wenjuan Li, Weizhi Meng, and Lam-For Kwok. SOOA: Exploring Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 402-415, May 2017. (Download the paper)

  112. 2016

  113. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 10th International Conference on Network and System Security (NSS 2016), pp. 433-449, September 2016. (Best Student Paper Award) (Download the paper)

  114. Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 1061-1068, August 2016. (Download the paper)

  115. Wenjuan Li, Lijun Jiang, Weizhi Meng and Lam For Kwok. Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. The 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), pp. 146-153, July 2016. (Download the paper)

  116. Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou. TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), pp. 629-647, June 2016. (AR=35/183=19%) (Download the paper)

  117. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. On Multiple Password Interference of Touch Screen Patterns and Text Passwords. ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818-4822, May 2016. (Download the paper)

  118. Weizhi Meng, Wang Hao Lee and S.P.T Krishnan. A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks. The Singapore Cyber Security R&D Conference (SG-CRC 2016), pp. 99-106, January 2016. (Download the paper)

  119. 2015

  120. Weizhi Meng. RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. The 9th International Conference on Network and System Security (NSS 2015), Springer, pp. 147-161, November 2015. (Download the paper)

  121. Wenjuan Li and Weizhi Meng. An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments. The 2015 IEEE International Conference on Communications (ICC 2015), IEEE, pp. 7438-7443, June 2015. (Download the paper)

  122. Weizhi Meng, Wang Hao Lee, S.R. Murali and S.P.T. Krishnan. Charging Me and I Know Your Secrets! Towards Juice Filming Attacks on Smartphones. ACM Workshop on Cyber-Physical System Security (CPSS 2015), in conjunction with AsiaCCS'15, ACM, pp. 89-98, April 2015. (Download the paper or the draft)


  123. Before 2015

  124. Weizhi Meng, Wenjuan Li and Lam-For Kwok. An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. The 17th International Conference on Information Security (ISC 2014), Springer, pp. 465-476, October 2014. (Download the paper)

  125. Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang. Towards Designing An Email Classification System Using Multi-View Based Semi-Supervised Learning. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), IEEE, pp. 174-181, September 2014. (Download the paper)

  126. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. The 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2014), Springer, pp. 61-76, July 2014. (Download the paper)

  127. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning. The 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, June 2014. (Download the paper)

  128. Yuxin Meng, Duncan S. Wong and Lam-For Kwok. Design of Touch Dynamics based User Authentication with an Adaptive Mechanism on Mobile Phones. The 29th Annual ACM Symposium on Applied Computing: the 13th edition of the Computer Security track (ACM SAC SEC 2014), ACM, pp. 1680-1687, March 2014. (Download the paper or the draft)

  129. Wenjuan Li, Yuxin Meng and Lam-For Kwok. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. The 9th International Conference on Computational Intelligence and Security (CIS 2013), IEEE, pp. 518-522, December 2013. (Download the paper)

  130. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, November 2013. (Download the paper or the draft)

  131. Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang. Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice. The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), IEEE, pp. 181-188, September 2013. (Download the paper)

  132. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive False Alarm Reduction Using Cloud as a Service. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, IEEE, pp. 420-425, August 2013. (Download the paper)

  133. Yuxin Meng and Lam-For Kwok. Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), IEEE, pp. 241-248, July 2013. (Download the paper or the draft)

  134. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones. The 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP Advances in Information and Communication Technology 405, Springer, pp. 55-68, July 2013. (Download the paper)

  135. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. The 7th International Conference on Network and System Security (NSS 2013), Lecture Notes in Computer Science 7873, Springer, pp. 40-53, June 2013. (Download the paper or the draft)

  136. Wenjuan Li and Yuxin Meng. Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. The 10th International Symposium on Neural Networks (ISNN 2013), Lecture Notes in Computer Science 7952, Part II, Springer, pp. 622-629, July 2013. (Download the paper)

  137. Yuxin Meng and Lam-For Kwok. Enhancing False Alarm Reduction Using Pool-based Active Learning in Network Intrusion Detection. The 9th Information Security Practice and Experience Conference (ISPEC 2013), Lecture Notes in Computer Science 7863, Springer, pp. 1-16, May 2013. (Download the paper)

  138. Yuxin Meng, Duncan S. Wong, Roman Schlegel, and Lam-For Kwok. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. The 8th China International Conference on Information Security and Cryptology (INSCRYPT 2012), Lecture Notes in Computer Science 7763, Springer, pp. 331-350, November 2012. (Download the paper or the draft)

  139. Yuxin Meng and Lam-For Kwok. Intrusion Detection using Disagreement-based Semi-Supervised Learning: Detection Enhancement and False Alarm Reduction. The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Lecture Notes in Computer Science 7672, Springer, pp. 483-497, December 2012. (Download the paper)

  140. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Intelligent Alarm Filter Using Knowledge-based Alert Verification in Network Intrusion Detection. The 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 2012), Lecture Notes in Artificial Intelligence 7661, Springer, pp. 115-124, December 2012. (Download the paper or the draft)

  141. Yuxin Meng and Lam-For Kwok. Enhancing List-based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. The 6th International Conference on Network and System Security (NSS 2012), Lecture Notes in Computer Science 7645, Springer, pp. 1-14, November 2012. (Download the paper)

  142. Yuxin Meng and Wenjuan Li. Evaluating the Effect of User Guidelines on Creating Click-Draw based Graphical Passwords. The 2012 ACM Research in Applied Computation Symposium (ACM RACS 2012), ACM, pp. 322-327, October 2012. (Download the paper)

  143. Yuxin Meng and Wenjuan Li. Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. The 14th International Conference on Information and Communications Security (ICICS 2012), Lecture Notes in Computer Science 7618, Springer, pp. 349-356, October 2012. (Download the paper or the draft)

  144. Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach Using Bayesian Inference in Network Intrusion Detection. The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), Lecture Notes in ICST 106, Springer, pp. 203-221, September 2012. (Download the paper or the draft)

  145. Yuxin Meng and Wenjuan Li. Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), IEEE, pp. 223-230, June 2012. (Download the paper or the draft)

  146. Yuxin Meng. Designing Click-Draw Based Graphical Password Scheme for Better Authentication. The 7th IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS 2012), IEEE, pp. 39-48, June 2012. (Download the paper the draft)

  147. Yuxin Meng and Lam-For Kwok. A Case Study: Intelligent False Alarm Reduction using Fuzzy If-Then Rules in Network Intrusion Detection. The 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), IEEE, pp. 505-509, May 2012. (Download the paper or the draft)

  148. Yuxin Meng and Wenjuan Li. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection. The 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), IEEE(IARIA), pp. 75-81, May 2012. (Download the paper- open access)

  149. Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Single Character Frequency-based Exclusive Signature Matching Scheme. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Studies in Computational Intelligence, Springer, pp. 67-80, May 2012. (Selected paper and published in Springer) (Download the paper or the draft)

  150. Yuxin Meng and Lam-For Kwok. Adaptive Context-aware Packet Filter Scheme using Statistic-based Blacklist Generation in Network Intrusion Detection. The 7th International Conference on Information Assurance and Security (IAS 2011), IEEE, pp. 74-79, December 2011. (Download the paper or the draft)

  151. Yuxin Meng and Lam-For Kwok. Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection. The 6th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2011), Advances in Intelligent and Soft Computing, Springer, pp. 573-584, December 2011. (Download the paper or the draft)

  152. Yuxin Meng and Lam-For Kwok. A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. The 7th International Conference on Computational Intelligence and Security (CIS 2011), IEEE, pp. 978-982, December 2011. (Download the paper or the draft)

  153. Yuxin Meng and Lam-For Kwok. A Framework for Protocol Vulnerability Condition Detection. The 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), IEEE(IARIA), pp. 91-96, August 2011. (Download the paper- open access)

  154. Yuxin Meng. The practice on using machine learning for network anomaly intrusion detection. The 2011 International Conference on Machine Learning and Cybernetics (ICMLC 2011), IEEE, pp. 576-581, July 2011. (Download the paper or the draft)

  1. Weizhi Meng. Graphical Authentication. Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung (eds), Springer, 2021. (Access the chapter)

  2. Weizhi Meng. Trust Management for CPS. Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung (eds), Springer, 2021. (Access the chapter)