Research Output

2020

A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks

Haider, S., Akhunzada, A., Mustafa, I., Patel, T. B., Fernandez, A., Choo, K. K. R. & Iqbal, J., 1 Jan 2020, In : IEEE Access. 8, p. 53972-53983 9016053.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
35 Downloads (Pure)

A Dynamic DL-driven architecture to Combat Sophisticated Android Malware

Bibi, I., Akhunzada, A., Malik, J., Iqbal, J., Musaddiq, A. & Kim, S. W., 2020, (Accepted/In press) In : IEEE Access. PP, 99, 13 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
4 Downloads (Pure)

A game theoretic analysis of resource mining in blockchain

Singh, R., Dwivedi, A. D., Srivastava, G., Wiszniewska-Matyszkiel, A. & Cheng, X., 1 Jan 2020, In : Cluster Computing. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
42 Downloads (Pure)

A structured review of cyber-resilience assessment frameworks

Sepúlveda Estay, D. A., Sahay, R., Barfod, M. B. & Jensen, C. D., 2020, (Accepted/In press) In : Future Generation Computer Systems - The International Journal of eScience. 30 p.

Research output: Contribution to journalJournal articleResearchpeer-review

A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation

Li, W., Tan, J., Meng, W. & Wang, Y., 1 Sep 2020, In : Journal of Network and Computer Applications. 165, 8 p., 102687.

Research output: Contribution to journalJournal articleResearchpeer-review

Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges and Opportunities

Choo, K-K. R., Yan, Z. & Meng, W., 2020, In : IEEE Transactions on Industrial Informatics. 16, 6, p. 4119 - 4121

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
99 Downloads (Pure)

CAVAEva: an engineering platform for evaluating commercial anti-malware applications on smartphones

Jiang, H., Meng, W., Su, C., Choo, K-K. R., Liu, Z. & Yung, M. (ed.), 2020, Information Security and Cryptology. Springer, p. 208-24 (Lecture Notes in Computer Science, Vol. 12020).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2020, In : Future Generation Computer Systems. 108, p. 1258-1266

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
32 Downloads (Pure)

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

Li, W., Meng, W. & Au, M. H., 1 Jul 2020, In : Journal of Network and Computer Applications. 161, 9 p., 102631.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2020, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Exploring CyberShip vulnerabilities through a Systems theoretic process approach

Sepúlveda Estay, D. A., Sahay, R., Meng, W., Jensen, C. D. & Barfod, M. B., 2020, (Accepted/In press) In : International Journal of Reliability, Quality & Safety Engineering.

Research output: Contribution to journalJournal articleResearchpeer-review

For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 2020, (Accepted/In press) In : Concurrency Computation. 15 p., e5791.

Research output: Contribution to journalJournal articleResearchpeer-review

Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN

Malik, J., Akhunzada, A., Bibi, I., Imran, M., Musaddiq, A. & Kim, S. W., 2020, (Accepted/In press) In : IEEE Access. 4, 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
3 Downloads (Pure)

Internet of things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention

Singh, R., Dwivedi, A. D. & Srivastava, G., 2020, In : Sensors (Switzerland). 20, 14, 23 p., 3951.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

MSYM: A multichannel communication system for android devices

Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R. & Ma, R., 26 Feb 2020, In : Computer Networks. 168, 107024.

Research output: Contribution to journalJournal articleResearchpeer-review

On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability

Hodžić, S., Knudsen Ramkilde, L. & Kidmose, A. B., 2020, Post-Quantum Cryptography. Springer, p. 461-480 (Lecture Notes in Computer Science, Vol. 12100).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Orchestrating SDN Control Plane towards Enhanced IoT Security

Hasan, T., Akhunzada, A., Giannetsos, A. & Malik, J., 2020, (Accepted/In press) Proceedings of 2020 IEEE Conference on Network Softwarization. IEEE, 8 p.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
10 Downloads (Pure)

Privacy-preserving measures in smart city video surveillance systems

Sultan, S. & Jensen, C. D., 1 Jan 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SciTePress, p. 506-514

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Provably Secure Group Authentication in the Asynchronous Communication Model

Xia, Z., Harn, L., Yang, B., Zhang, M., Mu, Y., Susilo, W. & Meng, W., 1 Jan 2020, Information and Communications Security - Revised Selected Papers. Zhou, J., Luo, X., Shen, Q. & Xu, Z. (eds.). Springer, p. 324-340 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11999 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

QoS-aware service provisioning in fog computing

Murtaza, F., Akhunzada, A., Islam, S. U., Boudjadar, J. & Buyya, R., 1 Sep 2020, In : Journal of Network and Computer Applications. 165, 102674.

Research output: Contribution to journalJournal articleResearchpeer-review

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W. & Qi, L., 1 Jan 2020, In : Security and Communication Networks. 2020, 10 p., 7542726.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
47 Downloads (Pure)

Security Analysis of Lightweight IoT Cipher: Chaskey

Dwivedi, A. D., 2020, In : Cryptography. 4, 3, 10 p., 22.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Special issue on blockchain and communication networks

Wu, Y., Meng, W., Yan, Z. & Varadharajan, V., 2020, In : Digital Communications and Networks. 6, 2, p. 145-146

Research output: Contribution to journalEditorialResearch

Open Access
File
5 Downloads (Pure)

Threshold identity authentication signature: Impersonation prevention in social network services

Chen, Z., Chen, J. & Meng, W., 2020, (Accepted/In press) In : Concurrency and Computation: Practice & Experience. 9 p., e5787.

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions

Wenjuan, LI., Weizhi, M., Zhiqiang, L. & Man-Ho, A., 2020, In : Ieice Transactions on Information and Systems. E103.D, 2, p. 196-203

Research output: Contribution to journalJournal articleResearchpeer-review

2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, In : Concurrency and Computation: Practice & Experience. 31, 19, 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Attend, copy, parse end-to-end information extraction from documents

Palm, R. B., Laws, F. & Winther, O., 2019, Proceedings of 2019 International Conference on Document Analysis and Recognition . IEEE, p. 329-336 8977951

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Attribute-Based Information Flow Control

Han, J., Bei, M., Chen, L., Xiang, Y., Cao, J., Guo, F. & Meng, W., 2019, In : Computer Journal. 62, 8, p. 1214-1231 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Compact circuits for combined AES encryption/decryption

Banik, S., Bogdanov, A. & Regazzoni, F., 2019, In : Journal of Cryptographic Engineering. 9, 1, p. 69-83

Research output: Contribution to journalJournal articleResearchpeer-review

CrowdLED: Towards crowd-empowered and privacy-preserving data sharing using smart contracts

Pouyioukka, C., Giannetsos, T. & Meng, W., 1 Jan 2019, Proceedings of 13th IFIP WG 11.11 International Conference Trust Management XIII. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 147-161 15 p. (IFIP Advances in Information and Communication Technology, Vol. 563 IFIP).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
7 Downloads (Pure)

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Future Generation Computer Systems. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

File
6 Downloads (Pure)

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers & Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, In : IEEE Internet of Things Journal. 6, 6, p. 9246-9255 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
209 Downloads (Pure)

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典T., 樋渡 玄良H. & ボグダノフ アンドレイ, A., 14 Feb 2019, IPC No. G09C 1/ 00 A I, Patent No. WO2019031025, 28 May 2018, Priority date 10 Aug 2017, Priority No. JP20170156144

Research output: Patent

Open Access
File
27 Downloads (Pure)

Encryption device, encryption method, decryption device, and decryption method

五十部 孝典T. & ボグダノフ アンドレイ, A., 14 Feb 2019, IPC No. G09C 1/ 00 A I, Patent No. WO2019031026, Priority date 10 Aug 2017, Priority No. JP20170156143

Research output: Patent

Open Access
File
27 Downloads (Pure)

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection

Li, W., Meng, W. & Kwok, L. F., 2019, Information Security Practice and Experience. Springer, p. 453-63 (Lecture Notes in Computer Science, Vol. 11879).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
133 Downloads (Pure)

Finding Integral Distinguishers with Ease

Eskandari, Z., Kidmose, A. B., Kölbl, S. & Tiessen, T., 1 Jan 2019, Selected Areas in Cryptography – SAC 2018 . Cid, C. & Jacobson, M. J. (eds.). Springer, p. 115-138 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11349 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages

Andreeva, E., Lallemand, V., Purnal, A., Reyhanitabar, R. & Vizar, D., 2019, Proceedings of 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Springer, p. 153-182 (Lecture Notes in Computer Science, Vol. 11922).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
109 Downloads (Pure)

Håndbog i smart city sikkerhed. Et dialogværktøj til kommuner og virksomheder

Gottlieb Danneskiold-Samsøe, M. (ed.), Sørensen, J., Jensen, C. D. (ed.), Afzal-Houshmand, S. (ed.), Andersen, M. (ed.) & Skött, A. P. (ed.), 2019, Smart City Cybersecurity Lab. 50 p.

Research output: Book/ReportReportCommunication

Open Access
File
29 Downloads (Pure)

Higher-Order DCA against Standard Side-Channel Countermeasures

Bogdanov, A., Rivain, M., Vejre, P. S. & Wang, J., 1 Jan 2019, Constructive Side-Channel Analysis and Secure Design - Proceedings of 10th International Workshop. Polian, I. & Stöttinger, M. (eds.). Springer, p. 118-141 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11421).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Investigation of effective media applicability for ultrathin multilayer structures

Sukham, J., Takayama, O., Mahmoodi, M., Sychev, S., Bogdanov, A., Tavassoli, S. H., Lavrinenko, A. V. & Malureanu, R., 2019, In : Nanoscale. 11, 26, p. 12582-12588

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
53 Downloads (Pure)