Research Output 2012 2019

2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems: Adaptive Machine Learning-based Distributed IDS Alarm Reduction via Edge Computing

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, (Accepted/In press) In : Concurrency and Computation: Practice & Experience. 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Authentication for E-Government in Developing Countries - With special focus on the North Africa Countries

Elaswad, O., 2019, (Submitted) DTU Compute. 130 p. (DTU Compute PHD-2017, Vol. 455).

Research output: Book/ReportPh.D. thesisResearch

Compact circuits for combined AES encryption/decryption

Banik, S., Bogdanov, A. & Regazzoni, F., 2019, In : Journal of Cryptographic Engineering. 9, 1, p. 69-83

Research output: Contribution to journalJournal articleResearchpeer-review

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Elsevier. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2019, (Accepted/In press) In : Future Generation Computer Systems. 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers and Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

104 Downloads (Pure)

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, (Accepted/In press) In : Ieee Internet of Things Journal. PP, 99, 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
7 Downloads (Pure)

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典T. & ボグダノフ アンドレイ, A., 14 Feb 2019, IPC No. G09C 1/ 00 A I, Patent No. WO2019031026, Priority date 10 Aug 2017, Priority No. JP20170156143

Research output: Patent

Open Access
File
7 Downloads (Pure)

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典T., 樋渡 玄良H. & ボグダノフ アンドレイ, A., 14 Feb 2019, IPC No. G09C 1/ 00 A I, Patent No. WO2019031025, 28 May 2018, Priority date 10 Aug 2017, Priority No. JP20170156144

Research output: Patent

Open Access
File

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2019, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

57 Downloads (Pure)

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Finding Integral Distinguishers with Ease

Eskandari, Z., Kidmose, A. B., Kölbl, S. & Tiessen, T., 1 Jan 2019, Selected Areas in Cryptography – SAC 2018 . Cid, C. & Jacobson, M. J. (eds.). Springer, p. 115-138 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11349 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Higher-Order DCA against Standard Side-Channel Countermeasures

Bogdanov, A., Rivain, M., Vejre, P. S. & Wang, J., 1 Jan 2019, Constructive Side-Channel Analysis and Secure Design - Proceedings of 10th International Workshop. Polian, I. & Stöttinger, M. (eds.). Springer, p. 118-141 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11421).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

31 Downloads (Pure)

Investigation of effective media applicability for ultrathin multilayer structures

Sukham, J., Takayama, O., Mahmoodi, M., Sychev, S., Bogdanov, A., Tavassoli, S. H., Lavrinenko, A. V. & Malureanu, R., 2019, In : Nanoscale. 11, 26, p. 12582-12588

Research output: Contribution to journalJournal articleResearchpeer-review

22 Downloads (Pure)

Machine Learning for Wireless Multimedia Data Security

Pan, Z., Yang, C-N., Sheng, V. S., Xiong, N. & Meng, W., 2019, In : Security and Communication Networks. 2019, 3 p., 7682306.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

Ankele, R., Kölbl, S., Cid, C. & Jacobson, M. J. (ed.), 2019, Selected Areas in Cryptography – SAC 2018. Springer, Vol. 11349. p. 163-190 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11349).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Meng, W., Li, W., Jiang, L., Choo, K-K. R. & Su, C., 2019, European Symposium on Research in Computer Security. Springer, p. 493-511 (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems

Dimitriou, T., Giannetsos, T. & Chen, L., 1 Mar 2019, In : Computer Communications. 137, p. 1-14

Research output: Contribution to journalJournal articleResearchpeer-review

64 Downloads (Pure)

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation

Koutroumpouchos, N., Ntantogian, C., Menesidou, S-A., Liang, K., Gouvas, P., Xenakis, C. & Giannetsos, A., 2019, (Accepted/In press) Proceedings of 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures. IEEE, 9 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
12 Downloads (Pure)

Securing V2X Communications for the Future - Can PKI Systems offer the answer?

Giannetsos, T. & Krontiris, I., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. Association for Computing Machinery, 8 p. 3340523. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
136 Downloads (Pure)

Security, privacy, and trust on internet of things

Kolias, C., Meng, W., Kambourakis, G. & Chen, J., 1 Jan 2019, In : Wireless Communications and Mobile Computing. 2019, 4 p., 6452157.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
107 Downloads (Pure)

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

Singh, S., Ra, I-H., Meng, W., Kaur, M. & Cho, G. H., 2019, In : International Journal of Distributed Sensor Networks. 15, 4, 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

Meng, W., Li, W., Jiang, L. & Zhou, J., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer, p. 180-193 14 p. (IFIP Advances in Information and Communication Technology, Vol. 562).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The application of Software Defined Networking on securing computer networks: A survey

Sahay, R., Meng, W. & Jensen, C. D., 1 Apr 2019, In : Journal of Network and Computer Applications. 131, p. 89-108

Research output: Contribution to journalReviewResearchpeer-review

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones

Meng, W., Jiang, L., Choo, K. K. R., Wang, Y. & Jiang, C., 1 Sep 2019, In : Computers and Electrical Engineering. 78, p. 230-241

Research output: Contribution to journalJournal articleResearchpeer-review

33 Downloads (Pure)

Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case

Jiang, L., Chen, L., Giannetsos, T., Luo, B., Liang, K. & Han, J., 2019, (Accepted/In press) In : Ieee Internet of Things Journal. PP, 99, 14 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Troika: a ternary cryptographic hash function

Kölbl, S., Tischhauser, E., Derbez, P. & Bogdanov, A., 1 Jan 2019, (Accepted/In press) In : Designs, Codes, and Cryptography.

Research output: Contribution to journalJournal articleResearchpeer-review

Tweakable TWINE: Building a tweakable block cipher on generalized feistel structure

Sakamoto, K., Minematsu, K., Shibata, N., Shigeri, M., Kubo, H., Funabiki, Y., Bogdanov, A., Morioka, S. & Isobe, T., 2019, Advances in Information and Computer Security . Springer, p. 129-145 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11689).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

31 Downloads (Pure)

Y-DWMS - A digital watermark management system based on smart contracts

Zhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L. & Su, C., 2 Jul 2019, In : Sensors (Switzerland). 19, 14, 17 p., 3091.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2018
98 Downloads (Pure)

2π steering of surface plasmon polaritons with silicon nanoantennas: Paper

Sinev, I., Bogdanov, A., Komissarenko, F., Mukhin, I., Samusev, A., Iorsh, I. & Lavrinenko, A., 2018, In : Journal of Physics: Conference Series. 1092, 1, 3 p., 012140 .

Research output: Contribution to journalConference articleResearchpeer-review

Open Access
File

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Wang, Y., Meng, W., Li, W., Li, J., Liu, W-X. & Xiang, Y., 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

Research output: Contribution to journalJournal articleResearchpeer-review

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, M. H., Azad, N. A., Meng, W. & Jensen, C. D., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection

Tug, S., Meng, W. & Wang, Y., 1 Jul 2018, Proceedings of the IEEE 2018 International Congress on Cybermatics. IEEE, p. 1228-1235 8726642

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CodeTrust: Trusting Software Systems

Jensen, C. & Nielsen, M. B., 2018, Trust Management XII . Springer, Vol. 528. p. 58-74 (IFIP Advances in Information and Communication Technology, Vol. 528).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

16 Downloads (Pure)

Correlations Aplenty - Linear Cryptanalysis of Block Ciphers

Vejre, P. S., 2018, Kgs. Lyngby: DTU Compute. 178 p. (DTU Compute PHD-2018, Vol. 497).

Research output: Book/ReportPh.D. thesisResearch

Open Access
File
4 Downloads (Pure)

Cryptanalysis of low-data instances of full LowMCv2

Rechberger, C., Soleimany, H. & Tiessen, T., 1 Jan 2018, In : Iacr Transactions on Symmetric Cryptology. 2018, 3, p. 163-181

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
19 Downloads (Pure)

Cyber-physical architecture assisted by programmable networking

Rubio-Hernan, J., Sahay, R., De Cicco, L. & Garcia-Alfaro, J., 2018, In : Internet Technology Letters. 1, 4, e44.

Research output: Contribution to journalJournal articleResearchpeer-review

File
3 Downloads (Pure)

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, R., Sepúlveda Estay, D. A., Meng, W., Jensen, C. D. & Barfod, M. B., 2018, International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2018, In : Cluster Computing: The Journal of Networks, Software Tools and Applications. 21, 1, p. 299-310 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

119 Downloads (Pure)

Direct imaging of isofrequency contours in all-dielectric optical metasurface

Dmitry, P., Sinev, I., Permyakov, D., Samusev, A., Sychev, S., Bogdanov, A., Lavrinenko, A., Rutckaia, V. & Schilling, J., 2018, In : Journal of Physics: Conference Series. 1092, 1, 5 p., 012116.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Editorial of special issue on mobile networks and devices security, privacy and trust

Meng, W., Liu, Z., Castiglione, A. & Au, M. H., 2018, In : Journal of Information Security and Applications. 41, p. 170-171

Research output: Contribution to journalEditorialResearchpeer-review

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., 2018, Information Security and Privacy. Springer, Vol. 10946. p. 759-767 (Lecture Notes in Computer Science, Vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review