• Richard Petersens Plads, 322, 230

    2800 Kgs. Lyngby

    Denmark

20162022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges and Opportunities

Choo, K-K. R., Yan, Z. & Meng, W., 2020, (Accepted/In press) In : IEEE Transactions on Industrial Informatics. PP, 99, p. 1-1 1 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2020, (Accepted/In press) In : Future Generation Computer Systems. 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2020, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Exploring CyberShip vulnerabilities through a Systems theoretic process approach

Sepúlveda Estay, D. A., Sahay, R., Meng, W., Jensen, C. D. & Barfod, M. B., 2020, (Accepted/In press) In : International Journal of Reliability, Quality & Safety Engineering.

Research output: Contribution to journalJournal articleResearchpeer-review

MSYM: A multichannel communication system for android devices

Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R. & Ma, R., 26 Feb 2020, In : Computer Networks. 168, 107024.

Research output: Contribution to journalJournal articleResearchpeer-review

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W. & Qi, L., 1 Jan 2020, In : Security and Communication Networks. 2020, 10 p., 7542726.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions

Wenjuan, LI., Weizhi, M., Zhiqiang, L. & Man-Ho, A., 2020, In : Ieice Transactions on Information and Systems. E103.D, 2, p. 196-203

Research output: Contribution to journalJournal articleResearchpeer-review

2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, In : Concurrency and Computation: Practice & Experience. 31, 19, 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Attribute-Based Information Flow Control

Han, J., Bei, M., Chen, L., Xiang, Y., Cao, J., Guo, F. & Meng, W., 2019, In : Computer Journal. 62, 8, p. 1214-1231 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

CrowdLED: Towards crowd-empowered and privacy-preserving data sharing using smart contracts

Pouyioukka, C., Giannetsos, T. & Meng, W., 1 Jan 2019, Proceedings of 13th IFIP WG 11.11 International Conference Trust Management XIII. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 147-161 15 p. (IFIP Advances in Information and Communication Technology, Vol. 563 IFIP).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Future Generation Computer Systems. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers and Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, In : Ieee Internet of Things Journal. 6, 6, p. 9246-9255 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
142 Downloads (Pure)

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection

Li, W., Meng, W. & Kwok, L. F., 2019, Information Security Practice and Experience. Springer, p. 453-63 (Lecture Notes in Computer Science, Vol. 11879).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
80 Downloads (Pure)

Machine Learning for Wireless Multimedia Data Security

Pan, Z., Yang, C-N., Sheng, V. S., Xiong, N. & Meng, W., 2019, In : Security and Communication Networks. 2019, 3 p., 7682306.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
37 Downloads (Pure)

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Meng, W., Li, W., Jiang, L., Choo, K-K. R. & Su, C., 2019, European Symposium on Research in Computer Security. Springer, p. 493-511 (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Security, privacy, and trust on internet of things

Kolias, C., Meng, W., Kambourakis, G. & Chen, J., 1 Jan 2019, In : Wireless Communications and Mobile Computing. 2019, 4 p., 6452157.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
164 Downloads (Pure)

Security and Privacy in Social Networks and Big Data

Meng, W. (ed.) & Furnell, S. (ed.), 2019, Springer. (Communications in Computer and Information Science, Vol. 1095).

Research output: Book/ReportBook

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

Singh, S., Ra, I-H., Meng, W., Kaur, M. & Cho, G. H., 2019, In : International Journal of Distributed Sensor Networks. 15, 4, 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
179 Downloads (Pure)

SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

Meng, W., Li, W., Jiang, L. & Zhou, J., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer, p. 180-193 14 p. (IFIP Advances in Information and Communication Technology, Vol. 562).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones

Li, W., Tan, J., Meng, W., Wang, Y. & Li, J., 1 Jan 2019, Proceedings of 2nd International Conference on Machine Learning for Cyber Security. Chen, X., Huang, X. & Zhang, J. (eds.). Springer, p. 140-153 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11806 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The application of Software Defined Networking on securing computer networks: A survey

Sahay, R., Meng, W. & Jensen, C. D., 1 Apr 2019, In : Journal of Network and Computer Applications. 131, p. 89-108

Research output: Contribution to journalReviewResearchpeer-review

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones

Meng, W., Jiang, L., Choo, K. K. R., Wang, Y. & Jiang, C., 1 Sep 2019, In : Computers and Electrical Engineering. 78, p. 230-241

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Secure Open Banking Architecture: An Evaluation with OWASP

Kellezi, D., Boegelund, C. & Meng, W., 1 Jan 2019, Network and System Security. Liu, J. K. & Huang, X. (eds.). Springer, p. 185-198 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11928 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Y-DWMS - A digital watermark management system based on smart contracts

Zhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L. & Su, C., 2 Jul 2019, In : Sensors (Switzerland). 19, 14, 17 p., 3091.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
51 Downloads (Pure)
2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Wang, Y., Meng, W., Li, W., Li, J., Liu, W-X. & Xiang, Y., 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

Research output: Contribution to journalJournal articleResearchpeer-review

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, M. H., Azad, N. A., Meng, W. & Jensen, C. D., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection

Tug, S., Meng, W. & Wang, Y., 1 Jul 2018, Proceedings of the IEEE 2018 International Congress on Cybermatics. IEEE, p. 1228-1235 8726642

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, R., Sepúlveda Estay, D. A., Meng, W., Jensen, C. D. & Barfod, M. B., 2018, International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
46 Downloads (Pure)

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2018, In : Cluster Computing: The Journal of Networks, Software Tools and Applications. 21, 1, p. 299-310 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Editorial of special issue on mobile networks and devices security, privacy and trust

Meng, W., Liu, Z., Castiglione, A. & Au, M. H., 2018, In : Journal of Information Security and Applications. 41, p. 170-171

Research output: Contribution to journalEditorialResearchpeer-review

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., 2018, Information Security and Privacy. Springer, Vol. 10946. p. 759-767 (Lecture Notes in Computer Science, Vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones

Meng, W., Li, W. & Wong, D. S., 2018, In : Multimedia Tools and Applications. 77, 23, p. 30167-30185

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

Madsen, D., Li, W., Meng, W. & Wang, Y., 1 Jan 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Springer, p. 481-494 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11337).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

Meng, W., Lee, W., Liu, Z., Su, C. & Li, Y., 2018, Information Security and Cryptology. Springer, Vol. 10779. p. 327-338

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks

Li, W., Meng, W., Wang, Y., Kwok, L. F. & Lu, R., 5 Sep 2018, Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 1208-1213 8456036

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling

Meng, W., 2018, In : Computer. 51, 7, p. 36-43

Research output: Contribution to journalJournal articleResearchpeer-review

Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W. & Kwok, L. F., 2018, In : Future Internet. 10, 1, 16 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
120 Downloads (Pure)

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J. & Xiang, Y., 2018, In : Computers & Security. 76, p. 252-264 13 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
20 Downloads (Pure)

Position paper on blockchain technology: Smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, p. 474-483 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PrivacySearch - An end-user and query generalization tool for privacy enhancement in web search

Rodrigo-Ginés, F. J., Parra-Arnau, J., Meng, W. & Wang, Y., 1 Jan 2018, Network and System Security. Au, M. H., Luo, X., Li, J., Kluczniak, K., Yiu, S. M., Wang, C. & Castiglione, A. (eds.). Springer, p. 304-318 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review