• Richard Petersens Plads, 322, 230

    2800 Kgs. Lyngby

    Denmark

20162022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article in proceedings
2019

A closer look tells more: A facial distortion based liveness detection for face authentication

Li, Y., Wang, Z., Li, Y., Deng, R., Chen, B., Meng, W. & Li, H., 2 Jul 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-246

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A fistful of votes: Understanding the voting system in social question and answer websites

Zhang, J., Labiod, H. & Meng, W., 1 Jun 2019, Proceedings of 10th IFIP International Conference on New Technologies, Mobility and Security. IEEE, 5 p. 8763775

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work

Anada, H., Matsushima, T., Su, C., Meng, W., Kawamoto, J., Bag, S. & Sakurai, K., 2019, Information Security and Cryptology. Inscrypt 2018. Springer, Vol. 11449. p. 101-114 (Lecture Notes in Computer Science, Vol. 11449).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CrowdLED: Towards crowd-empowered and privacy-preserving data sharing using smart contracts

Pouyioukka, C., Giannetsos, T. & Meng, W., 1 Jan 2019, Proceedings of 13th IFIP WG 11.11 International Conference Trust Management XIII. Meng, W., Jensen, C. D., Cofta, P. & Grandison, T. (eds.). Springer, p. 147-161 15 p. (IFIP Advances in Information and Communication Technology, Vol. 563 IFIP).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection

Li, W., Meng, W. & Kwok, L. F., 2019, Information Security Practice and Experience. Springer, p. 453-63 (Lecture Notes in Computer Science, Vol. 11879).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Meng, W., Li, W., Jiang, L., Choo, K-K. R. & Su, C., 2019, European Symposium on Research in Computer Security. Springer, p. 493-511 (Lecture Notes in Computer Science, Vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

Meng, W., Li, W., Jiang, L. & Zhou, J., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer, p. 180-193 14 p. (IFIP Advances in Information and Communication Technology, Vol. 562).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones

Li, W., Tan, J., Meng, W., Wang, Y. & Li, J., 1 Jan 2019, Proceedings of 2nd International Conference on Machine Learning for Cyber Security. Chen, X., Huang, X. & Zhang, J. (eds.). Springer, p. 140-153 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11806 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards Secure Open Banking Architecture: An Evaluation with OWASP

Kellezi, D., Boegelund, C. & Meng, W., 1 Jan 2019, Network and System Security. Liu, J. K. & Huang, X. (eds.). Springer, p. 185-198 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11928 LNCS).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2018

Analyzing the communication security between smartphones and IoT based on CORAS

Bhuyan, M. H., Azad, N. A., Meng, W. & Jensen, C. D., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, Vol. 11058. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection

Tug, S., Meng, W. & Wang, Y., 1 Jul 2018, Proceedings of the IEEE 2018 International Congress on Cybermatics. IEEE, p. 1228-1235 8726642

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

CyberShip: An SDN-based Autonomic Attack Mitigation Framework for Ship Systems

Sahay, R., Sepúlveda Estay, D. A., Meng, W., Jensen, C. D. & Barfod, M. B., 2018, International Conference on Science of Cyber Security. Springer, p. 191-198 (Lecture Notes in Computer Science, Vol. 11287).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
46 Downloads (Pure)

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., 2018, Information Security and Privacy. Springer, Vol. 10946. p. 759-767 (Lecture Notes in Computer Science, Vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

Madsen, D., Li, W., Meng, W. & Wang, Y., 1 Jan 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Springer, p. 481-494 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11337).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

Meng, W., Lee, W., Liu, Z., Su, C. & Li, Y., 2018, Information Security and Cryptology. Springer, Vol. 10779. p. 327-338

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks

Li, W., Meng, W., Wang, Y., Kwok, L. F. & Lu, R., 5 Sep 2018, Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. IEEE, p. 1208-1213 8456036

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Position paper on blockchain technology: Smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Proceedings of 12th International Conference on Network and System Security. Springer, p. 474-483 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

PrivacySearch - An end-user and query generalization tool for privacy enhancement in web search

Rodrigo-Ginés, F. J., Parra-Arnau, J., Meng, W. & Wang, Y., 1 Jan 2018, Network and System Security. Au, M. H., Luo, X., Li, J., Kluczniak, K., Yiu, S. M., Wang, C. & Castiglione, A. (eds.). Springer, p. 304-318 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11058).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones

Meng, W. & Liu, Z., 2018, Information Security Practice and Experience. Springer, p. 373-390 (Lecture Notes in Computer Science, Vol. 11125).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification

Li, W., Meng, W., Wang, Y., Han, J. & Li, J., 2018, Information Security Practice and Experience. p. 313-328 (Lecture Notes in Computer Science, Vol. 11125).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

Meng, W., Li, W., Lee, W., Jiang, L. & Zhou, J., 2017, Applied Cryptography and Network Security. Springer, Vol. 10355. p. 145-162 (Lecture Notes in Computer Science, Vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

Wang, Y., Xie, L., Li, W., Meng, W. & Li, J., 2017, Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings. 1 ed. Springer, Vol. 10581. p. 267-279 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Evaluating challenge-based trust mechanism in medical smartphone networks: an empirical study

Meng, W., Fei, F., Li, W. & Au, M. H., 2017, Proceedings of 2017 IEEE Global Communications Conference . IEEE, p. 6 pp. 6 p. (Globecom 2017 - 2017 Ieee Global Communications Conference).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Exploring Effect of Location Number on Map-Based Graphical Password Authentication

Meng, W., Lee, W., Au, M. H. & Liu, Z., 2017, Information Security and Privacy. Springer, Vol. 10343. p. 301-313 (Lecture Notes in Computer Science, Vol. 10343).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Open Access
File
111 Downloads (Pure)

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

Jiang, L., Meng, W., Wang, M. Y., Su, C. & Li, J., 2017, Network and System Security 2017. Springer, Vol. 10394. p. 199-213 (Lecture Notes in Computer Science, Vol. 10394).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

Meng, W., Fei, F., Li, W. & Au, M. H., 2017, Information Security. Springer, Vol. 10599. p. 291-308 18 p. (Lecture Notes in Computer Science, Vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Li, W., Meng, W. & Kwok, L-F., 2017, Green, Pervasive, and Cloud Computing . Springer, Vol. 10232. p. 402-415 (Lecture Notes in Computer Science, Vol. 10232).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling

Meng, W. & Au, M. H., 2017, IFIPTM 2017: Trust Management XI. Springer, p. 152–159 (IFIP Advances in Information and Communication Technology, Vol. 505).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2016

PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks

Li, W., Meng, W., Kwok, L-F. & Ip, H. S., 2016, Proceedings of the 10th International Conference on Network and System Security (NSS 2016). Springer, p. 433-449 (Lecture Notes in Computer Science, Vol. 9955).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review