• Richard Petersens Plads, 322, 230

    2800 Kgs. Lyngby

    Denmark

20162020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation

Li, W., Tan, J., Meng, W. & Wang, Y., 1 Sep 2020, In : Journal of Network and Computer Applications. 165, 8 p., 102687.

Research output: Contribution to journalJournal articleResearchpeer-review

Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges and Opportunities

Choo, K-K. R., Yan, Z. & Meng, W., 2020, In : IEEE Transactions on Industrial Informatics. 16, 6, p. 4119 - 4121

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
99 Downloads (Pure)

CAVAEva: an engineering platform for evaluating commercial anti-malware applications on smartphones

Jiang, H., Meng, W., Su, C., Choo, K-K. R., Liu, Z. & Yung, M. (ed.), 2020, Information Security and Cryptology. Springer, p. 208-24 (Lecture Notes in Computer Science, Vol. 12020).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2020, In : Future Generation Computer Systems. 108, p. 1258-1266

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
33 Downloads (Pure)

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

Li, W., Meng, W. & Au, M. H., 1 Jul 2020, In : Journal of Network and Computer Applications. 161, 9 p., 102631.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2020, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Exploring CyberShip vulnerabilities through a Systems theoretic process approach

Sepúlveda Estay, D. A., Sahay, R., Meng, W., Jensen, C. D. & Barfod, M. B., 2020, (Accepted/In press) In : International Journal of Reliability, Quality & Safety Engineering.

Research output: Contribution to journalJournal articleResearchpeer-review

For a few diversities more: A voting-attack-immune voting scheme for social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 2020, (Accepted/In press) In : Concurrency Computation. 15 p., e5791.

Research output: Contribution to journalJournal articleResearchpeer-review

MSYM: A multichannel communication system for android devices

Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R. & Ma, R., 26 Feb 2020, In : Computer Networks. 168, 107024.

Research output: Contribution to journalJournal articleResearchpeer-review

Provably Secure Group Authentication in the Asynchronous Communication Model

Xia, Z., Harn, L., Yang, B., Zhang, M., Mu, Y., Susilo, W. & Meng, W., 1 Jan 2020, Information and Communications Security - Revised Selected Papers. Zhou, J., Luo, X., Shen, Q. & Xu, Z. (eds.). Springer, p. 324-340 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11999 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W. & Qi, L., 1 Jan 2020, In : Security and Communication Networks. 2020, 10 p., 7542726.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
47 Downloads (Pure)

Special issue on blockchain and communication networks

Wu, Y., Meng, W., Yan, Z. & Varadharajan, V., 2020, In : Digital Communications and Networks. 6, 2, p. 145-146

Research output: Contribution to journalEditorialResearch

Open Access
File
6 Downloads (Pure)

Threshold identity authentication signature: Impersonation prevention in social network services

Chen, Z., Chen, J. & Meng, W., 2020, (Accepted/In press) In : Concurrency and Computation: Practice & Experience. 9 p., e5787.

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions

Wenjuan, LI., Weizhi, M., Zhiqiang, L. & Man-Ho, A., 2020, In : Ieice Transactions on Information and Systems. E103.D, 2, p. 196-203

Research output: Contribution to journalJournal articleResearchpeer-review

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities

Meng, W., Li, W., Tug, S. & Tan, J., Oct 2020, In : Journal of Parallel and Distributed Computing. 144, p. 268-277

Research output: Contribution to journalJournal articleResearchpeer-review

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks

Ma, Z., Liu, L. & Meng, W., Sep 2020, In : Computers and Security. 96, 21 p., 101898.

Research output: Contribution to journalJournal articleResearchpeer-review

2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, In : Concurrency and Computation: Practice & Experience. 31, 19, 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Attribute-Based Information Flow Control

Han, J., Bei, M., Chen, L., Xiang, Y., Cao, J., Guo, F. & Meng, W., 2019, In : Computer Journal. 62, 8, p. 1214-1231 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

CrowdLED: Towards crowd-empowered and privacy-preserving data sharing using smart contracts

Pouyioukka, C., Giannetsos, T. & Meng, W., 1 Jan 2019, Proceedings of 13th IFIP WG 11.11 International Conference Trust Management XIII. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 147-161 15 p. (IFIP Advances in Information and Communication Technology, Vol. 563 IFIP).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
14 Downloads (Pure)

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Future Generation Computer Systems. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

File
6 Downloads (Pure)

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers & Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, In : IEEE Internet of Things Journal. 6, 6, p. 9246-9255 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
210 Downloads (Pure)

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection

Li, W., Meng, W. & Kwok, L. F., 2019, Information Security Practice and Experience. Springer, p. 453-63 (Lecture Notes in Computer Science, Vol. 11879).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
133 Downloads (Pure)

Machine Learning for Wireless Multimedia Data Security

Pan, Z., Yang, C-N., Sheng, V. S., Xiong, N. & Meng, W., 2019, In : Security and Communication Networks. 2019, 3 p., 7682306.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
78 Downloads (Pure)

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Meng, W., Li, W., Jiang, L., Choo, K-K. R. & Su, C., 2019, European Symposium on Research in Computer Security. Springer, p. 493-511 (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Security, privacy, and trust on internet of things

Kolias, C., Meng, W., Kambourakis, G. & Chen, J., 1 Jan 2019, In : Wireless Communications and Mobile Computing. 2019, 4 p., 6452157.

Research output: Contribution to journalEditorialResearchpeer-review

Open Access
File
217 Downloads (Pure)

Security and Privacy in Social Networks and Big Data

Meng, W. (ed.) & Furnell, S. (ed.), 2019, Springer. (Communications in Computer and Information Science, Vol. 1095).

Research output: Book/ReportBookCommunication

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

Singh, S., Ra, I-H., Meng, W., Kaur, M. & Cho, G. H., 2019, In : International Journal of Distributed Sensor Networks. 15, 4, 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
332 Downloads (Pure)

SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

Meng, W., Li, W., Jiang, L. & Zhou, J., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer, p. 180-193 14 p. (IFIP Advances in Information and Communication Technology, Vol. 562).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones

Li, W., Tan, J., Meng, W., Wang, Y. & Li, J., 1 Jan 2019, Proceedings of 2nd International Conference on Machine Learning for Cyber Security. Chen, X., Huang, X. & Zhang, J. (eds.). Springer, p. 140-153 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11806 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

The application of Software Defined Networking on securing computer networks: A survey

Sahay, R., Meng, W. & Jensen, C. D., 1 Apr 2019, In : Journal of Network and Computer Applications. 131, p. 89-108

Research output: Contribution to journalReviewResearchpeer-review

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones

Meng, W., Jiang, L., Choo, K. K. R., Wang, Y. & Jiang, C., 1 Sep 2019, In : Computers & Electrical Engineering. 78, p. 230-241

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Secure Open Banking Architecture: An Evaluation with OWASP

Kellezi, D., Boegelund, C. & Meng, W., 1 Jan 2019, Network and System Security. Liu, J. K. & Huang, X. (eds.). Springer, p. 185-198 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11928 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Y-DWMS - A digital watermark management system based on smart contracts

Zhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L. & Su, C., 2 Jul 2019, In : Sensors (Switzerland). 19, 14, 17 p., 3091.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
107 Downloads (Pure)
2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Wang, Y., Meng, W., Li, W., Li, J., Liu, W-X. & Xiang, Y., 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
2 Downloads (Pure)

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, M. H., Azad, N. A., Meng, W. & Jensen, C. D., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection

Tug, S., Meng, W. & Wang, Y., 1 Jul 2018, Proceedings of the IEEE 2018 International Congress on Cybermatics. IEEE, p. 1228-1235 8726642

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, R., Sepúlveda Estay, D. A., Meng, W., Jensen, C. D. & Barfod, M. B., 2018, International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
133 Downloads (Pure)

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2018, In : Cluster Computing: The Journal of Networks, Software Tools and Applications. 21, 1, p. 299-310 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Editorial of special issue on mobile networks and devices security, privacy and trust

Meng, W., Liu, Z., Castiglione, A. & Au, M. H., 2018, In : Journal of Information Security and Applications. 41, p. 170-171

Research output: Contribution to journalEditorialResearchpeer-review

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., 2018, Information Security and Privacy. Springer, Vol. 10946. p. 759-767 (Lecture Notes in Computer Science, Vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review