• Richard Petersens Plads, 322, 230

    2800 Kgs. Lyngby

    Denmark

20162022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Journal article
2020

Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges and Opportunities

Choo, K-K. R., Yan, Z. & Meng, W., 2020, (Accepted/In press) In : IEEE Transactions on Industrial Informatics. PP, 99, p. 1-1 1 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Meng, W., Li, W., Wang, Y. & Au, M. H., 2020, (Accepted/In press) In : Future Generation Computer Systems. 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

Meng, W., Li, W. & Zhu, L., 1 Jan 2020, (Accepted/In press) In : IEEE Transactions on Engineering Management. 10 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Exploring CyberShip vulnerabilities through a Systems theoretic process approach

Sepúlveda Estay, D. A., Sahay, R., Meng, W., Jensen, C. D. & Barfod, M. B., 2020, (Accepted/In press) In : International Journal of Reliability, Quality & Safety Engineering.

Research output: Contribution to journalJournal articleResearchpeer-review

MSYM: A multichannel communication system for android devices

Wang, W., Tian, D., Meng, W., Jia, X., Zhao, R. & Ma, R., 26 Feb 2020, In : Computer Networks. 168, 107024.

Research output: Contribution to journalJournal articleResearchpeer-review

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

Tang, K., Tang, W., Luo, E., Tan, Z., Meng, W. & Qi, L., 1 Jan 2020, In : Security and Communication Networks. 2020, 10 p., 7542726.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions

Wenjuan, LI., Weizhi, M., Zhiqiang, L. & Man-Ho, A., 2020, In : Ieice Transactions on Information and Systems. E103.D, 2, p. 196-203

Research output: Contribution to journalJournal articleResearchpeer-review

2019

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 2019, In : Concurrency and Computation: Practice & Experience. 31, 19, 12 p., e5101.

Research output: Contribution to journalJournal articleResearchpeer-review

Attribute-Based Information Flow Control

Han, J., Bei, M., Chen, L., Xiang, Y., Cao, J., Guo, F. & Meng, W., 2019, In : Computer Journal. 62, 8, p. 1214-1231 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships

Sahay, R., Meng, W., Sepúlveda Estay, D. A., Jensen, C. D. & Barfod, M. B., 2019, In : Elsevier. 100, p. 736-750

Research output: Contribution to journalJournal articleResearchpeer-review

Designing collaborative blockchained signature-based intrusion detection in IoT environments

Li, W., Tug, S., Meng, W. & Wang, Y., 1 Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

Research output: Contribution to journalJournal articleResearchpeer-review

Design of multi-view based email classification for IoT systems via semi-supervised learning

Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

Research output: Contribution to journalJournal articleResearchpeer-review

Detecting malicious nodes via gradient descent and support vector machine in Internet of Things

Liu, L., Yang, J. & Meng, W., 1 Jul 2019, In : Computers and Electrical Engineering. 77, p. 339-353

Research output: Contribution to journalJournal articleResearchpeer-review

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

Liu, L., Ma, Z. & Meng, W., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 865-879

Research output: Contribution to journalJournal articleResearchpeer-review

Efficient Image Recognition and Retrieval on IoT-Assisted Energy-Constrained Platforms from Big Data Repositories

Mehmood, I., Ullah, A., Muhammad, K., Deng, D-J., Meng, W., Al-Turjman, F., Sajjad, M. & de Albuquerque, V. H. C., 2019, In : Ieee Internet of Things Journal. 6, 6, p. 9246-9255 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
142 Downloads (Pure)

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

Meng, W., Li, W., Yang, L. T. & Li, P., 1 Jan 2019, In : International Journal of Information Security. 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing the security of FinTech applications with map-based graphical password authentication

Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 1 Dec 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

Research output: Contribution to journalJournal articleResearchpeer-review

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media

Tang, L., Ma, W., Grobler, M., Meng, W., Wang, Y. & Wen, S., 1 Jan 2019, In : IEEE Access. 7, p. 75556-75567 8731971.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
80 Downloads (Pure)

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology

Singh, S., Ra, I-H., Meng, W., Kaur, M. & Cho, G. H., 2019, In : International Journal of Distributed Sensor Networks. 15, 4, 18 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
179 Downloads (Pure)

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones

Meng, W., Jiang, L., Choo, K. K. R., Wang, Y. & Jiang, C., 1 Sep 2019, In : Computers and Electrical Engineering. 78, p. 230-241

Research output: Contribution to journalJournal articleResearchpeer-review

Y-DWMS - A digital watermark management system based on smart contracts

Zhao, B., Fang, L., Zhang, H., Ge, C., Meng, W., Liu, L. & Su, C., 2 Jul 2019, In : Sensors (Switzerland). 19, 14, 17 p., 3091.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
51 Downloads (Pure)
2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection

Wang, Y., Meng, W., Li, W., Li, J., Liu, W-X. & Xiang, Y., 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

Research output: Contribution to journalJournal articleResearchpeer-review

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2018, In : Cluster Computing: The Journal of Networks, Software Tools and Applications. 21, 1, p. 299-310 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones

Meng, W., Li, W. & Wong, D. S., 2018, In : Multimedia Tools and Applications. 77, 23, p. 30167-30185

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling

Meng, W., 2018, In : Computer. 51, 7, p. 36-43

Research output: Contribution to journalJournal articleResearchpeer-review

Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

Li, W., Meng, W. & Kwok, L. F., 2018, In : Future Internet. 10, 1, 16 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
120 Downloads (Pure)

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

Meng, W., Jiang, L., Wang, Y., Li, J., Zhang, J. & Xiang, Y., 2018, In : Computers & Security. 76, p. 252-264 13 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
20 Downloads (Pure)

TouchWB : Touch behavioral user authentication based on web browsing on smartphones

Meng, W., Wang, Y., Wong, D. S., Wen, S. & Xiang, Y., 2018, In : Journal of Network and Computer Applications. 117, p. 1-9 9 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

Meng, W., Choo, K-K. R., Furnell, S., Vasilakos, A. V. & Probst, C. W., 2018, In : IEEE Transactions on Network and Service Management. 15, 2, p. 761-773

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
48 Downloads (Pure)

Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems

Li, W., Meng, W., Su, C. & Kwok, L. F., 2018, In : IEEE Access. 6, p. 6530-6539

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
166 Downloads (Pure)

When Intrusion Detection Meets Blockchain Technology: A Review

Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y. & Han, J., 2018, In : IEEE Access. 6, p. 10179 - 10188

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
1766 Downloads (Pure)
2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

Meng, W., Li, W., Xiang, Y. & Choo, K. K. R., 2017, In : Journal of Network and Computer Applications. 78, p. 162-169

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

Li, W., Meng, W., Kwok, L-F. & IP, H. H. S., 2017, In : Journal of Network and Computer Applications. 77, p. 135-145 11 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

Meng, W., Li, W., Su, C., Zhou, J. & Lu, R., 2017, In : IEEE Access. 6, p. 7234 - 7243

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
285 Downloads (Pure)

Towards effective and robust list-based packet filter for signature-based network intrusion detection: an engineering approach

Meng, W., Li, W. & Kwok, L. F., 2017, In : Transactions - Hong Kong Institution of Engineers. 24, 4, p. 204-215 12 p.

Research output: Contribution to journalJournal articleResearchpeer-review

Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

Meng, W., Li, W. & Kwok, L-F., 2017, In : IEEE Transactions on Network and Service Management. 14, 1, p. 233 - 245

Research output: Contribution to journalJournal articleResearchpeer-review

Open Access
File
42 Downloads (Pure)

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

Meng, W., Li, W., Kwok, L. F. & Choo, K. K. R., 2017, In : Computers & Security. 65, p. 213-229

Research output: Contribution to journalJournal articleResearchpeer-review