• Richard Petersens Plads, 322, 230

    2800 Kgs. Lyngby

    Denmark

20162021
If you made any changes in Pure these will be visible here soon.

Research Output 2016 2019

2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems: Adaptive Machine Learning-based Distributed IDS Alarm Reduction via Edge Computing

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, (Accepted/In press) In : Concurrency and Computation: Practice & Experience. 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Elsevier. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2019, (Accepted/In press) In : Future Generation Computer Systems. 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers and Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

104 Downloads (Pure)

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, (Accepted/In press) In : Ieee Internet of Things Journal. PP, 99, 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2019, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

56 Downloads (Pure)

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
22 Downloads (Pure)

Machine Learning for Wireless Multimedia Data Security

Pan, Z., Yang, C-N., Sheng, V. S., Xiong, N. & Meng, W., 2019, In : Security and Communication Networks. 2019, 3 p., 7682306.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Meng, W., Li, W., Jiang, L., Choo, K-K. R. & Su, C., 2019, European Symposium on Research in Computer Security. Springer, p. 493-511 (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

136 Downloads (Pure)

Security, privacy, and trust on internet of things

Kolias, C., Meng, W., Kambourakis, G. & Chen, J., 1 Jan 2019, In : Wireless Communications and Mobile Computing. 2019, 4 p., 6452157.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
105 Downloads (Pure)

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

Singh, S., Ra, I-H., Meng, W., Kaur, M. & Cho, G. H., 2019, In : International Journal of Distributed Sensor Networks. 15, 4, 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

Meng, W., Li, W., Jiang, L. & Zhou, J., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer, p. 180-193 14 p. (IFIP Advances in Information and Communication Technology, Vol. 562).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The application of Software Defined Networking on securing computer networks: A survey

Sahay, R., Meng, W. & Jensen, C. D., 1 Apr 2019, In : Journal of Network and Computer Applications. 131, p. 89-108

Research output: Contribution to journalReviewResearchpeer-review

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones

Meng, W., Jiang, L., Choo, K. K. R., Wang, Y. & Jiang, C., 1 Sep 2019, In : Computers and Electrical Engineering. 78, p. 230-241

Research output: Contribution to journalJournal articleResearchpeer-review

31 Downloads (Pure)

Y-DWMS - A digital watermark management system based on smart contracts

Zhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L. & Su, C., 2 Jul 2019, In : Sensors (Switzerland). 19, 14, 17 p., 3091.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Wang, Y., Meng, W., Li, W., Li, J., Liu, W-X. & Xiang, Y., 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

Research output: Contribution to journalJournal articleResearchpeer-review

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, M. H., Azad, N. A., Meng, W. & Jensen, C. D., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection

Tug, S., Meng, W. & Wang, Y., 1 Jul 2018, Proceedings of the IEEE 2018 International Congress on Cybermatics. IEEE, p. 1228-1235 8726642

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, R., Sepúlveda Estay, D. A., Meng, W., Jensen, C. D. & Barfod, M. B., 2018, International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2018, In : Cluster Computing: The Journal of Networks, Software Tools and Applications. 21, 1, p. 299-310 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Editorial of special issue on mobile networks and devices security, privacy and trust

Meng, W., Liu, Z., Castiglione, A. & Au, M. H., 2018, In : Journal of Information Security and Applications. 41, p. 170-171

Research output: Contribution to journalEditorialResearchpeer-review

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., 2018, Information Security and Privacy. Springer, Vol. 10946. p. 759-767 (Lecture Notes in Computer Science, Vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones

Meng, W., Li, W. & Wong, D. S., 2018, In : Multimedia Tools and Applications. 77, 23, p. 30167-30185

Research output: Contribution to journalJournal articleResearchpeer-review

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

Madsen, D., Li, W., Meng, W. & Wang, Y., 1 Jan 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Springer, p. 481-494 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11337).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

Meng, W., Lee, W., Liu, Z., Su, C. & Li, Y., 2018, Information Security and Cryptology. Springer, Vol. 10779. p. 327-338

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks

Li, W., Meng, W., Wang, Y., Kwok, L. F. & Lu, R., 5 Sep 2018, Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 1208-1213 8456036

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling

Meng, W., 2018, In : Computer. 51, 7, p. 36-43

Research output: Contribution to journalJournal articleResearchpeer-review

100 Downloads (Pure)

Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W. & Kwok, L. F., 2018, In : Future Internet. 10, 1, 16 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J. & Xiang, Y., 2018, In : Computers & Security. 76, p. 252-264 13 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Position paper on blockchain technology: Smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, p. 474-483 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PrivacySearch - An end-user and query generalization tool for privacy enhancement in web search

Rodrigo-Ginés, F. J., Parra-Arnau, J., Meng, W. & Wang, Y., 1 Jan 2018, Network and System Security. Au, M. H., Luo, X., Li, J., Kluczniak, K., Yiu, S. M., Wang, C. & Castiglione, A. (eds.). Springer, p. 304-318 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones

Meng, W. & Liu, Z., 2018, Information Security Practice and Experience. Springer, p. 373-390 (Lecture Notes in Computer Science, Vol. 11125).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TouchWB : Touch behavioral user authentication based on web browsing on smartphones

Meng, W., Wang, Y., Wong, D. S., Wen, S. & Xiang, Y., 2018, In : Journal of Network and Computer Applications. 117, p. 1-9 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

28 Downloads (Pure)

Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

Meng, W., Choo, K-K. R., Furnell, S., Vasilakos, A. V. & Probst, C. W., 2018, In : IEEE Transactions on Network and Service Management. 15, 2, p. 761-773

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
144 Downloads (Pure)

Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems

Li, W., Meng, W., Su, C. & Kwok, L. F., 2018, In : IEEE Access. 6, p. 6530-6539

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification

Li, W., Meng, W., Wang, Y., Han, J. & Li, J., 2018, Information Security Practice and Experience. p. 313-328 (Lecture Notes in Computer Science, Vol. 11125).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

1485 Downloads (Pure)

When Intrusion Detection Meets Blockchain Technology: A Review

Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y. & Han, J., 2018, In : IEEE Access. 6, p. 10179 - 10188

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

Meng, W., Li, W., Xiang, Y. & Choo, K. K. R., 2017, In : Journal of Network and Computer Applications. 78, p. 162-169

Research output: Contribution to journalJournal articleResearchpeer-review

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

Meng, W., Li, W., Lee, W., Jiang, L. & Zhou, J., 2017, Applied Cryptography and Network Security. Springer, Vol. 10355. p. 145-162 (Lecture Notes in Computer Science, Vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

Wang, Y., Xie, L., Li, W., Meng, W. & Li, J., 2017, Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings. 1 ed. Springer, Vol. 10581. p. 267-279 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

Meng, W., Li, W., Wang, Y. & Au, M., 2017, Cyberspace Safety and Security. Springer, p. 163-175 (Cyberspace Safety and Security, Vol. 10581).

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2017, In : Journal of Network and Computer Applications. 77, p. 135-145 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review