Mengjun Xie

Orcid: 0000-0001-5089-9614

According to our database1, Mengjun Xie authored at least 58 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Knowledge Graph Question Answering Approach to IoT Forensics.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Flick me once and I know it's you! Flicking-based Implicit Authentication for Smartwatch.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
Correction to: A comprehensive analysis of the impact of online media and newsprint on advertising sales in the information society.
Soft Comput., 2022

A comprehensive analysis of the impact of online media and newsprint on advertising sales in the information society.
Soft Comput., 2022

Secure Decentralized IoT Service Platform Using Consortium Blockchain.
Sensors, 2022

Shifting Trends of COVID-19 Tweet Sentiment with Respect to Voting Preferences in the 2020 Election Year of the United States.
CoRR, 2022

DIP: a log parser based on "disagreement index token" conditions.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022

2021
ReLF: Scalable Remote Live Forensics for Android.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
L-PowerGraph: a lightweight distributed graph-parallel communication mechanism.
J. Supercomput., 2020

Network Intrusion Detection System as a Service in OpenStack Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Developing and Validating a Computable Phenotype for the Identification of Transgender and Gender Nonconforming Individuals and Subgroups.
Proceedings of the AMIA 2020, 2020

2019
Powering Hands-on Cybersecurity Practices with Cloud Computing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Understanding secure and usable gestures for realtime motion based authentication.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
EZSetup: A Novel Tool for Cybersecurity Practices Utilizing Cloud Resources.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

2016
A Distributed Graph-Parallel Computing System with Lightweight Communication Overhead.
IEEE Trans. Big Data, 2016

Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Remote live forensics for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SEGAUTH: A segment-based approach to behavioral biometric authentication.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Real time motion-based authentication for smartwatch.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
MotionAuth: Motion-based authentication for wrist worn smart devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A Measurement Study on Media Streaming over Wi-Fi in Named Data Networking.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

CamAuth: Securing Web Authentication with Camera.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms.
Proceedings of the AMIA 2015, 2015

2014
Pre-execution data prefetching with I/O scheduling.
J. Supercomput., 2014

Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks.
J. Cyber Secur. Mobil., 2014

Social network analysis of biomedical research collaboration networks in a CTSA institution.
J. Biomed. Informatics, 2014

EEP2P: An energy-efficient and economy-efficient P2P network protocol.
Proceedings of the International Green Computing Conference, 2014

USign - A security enhanced electronic consent model.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

LightGraph: Lighten Communication in Distributed Graph-Parallel Processing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Pre-execution Data Prefetching with Inter-thread I/O Scheduling.
Proceedings of the Supercomputing - 28th International Supercomputing Conference, 2013

CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones.
Proceedings of the Security and Privacy in Communication Networks, 2013

Moim: A Multi-GPU MapReduce Framework.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

SIM: A smartphone-based identity management framework and its application to Arkansas trauma image repository.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Understanding biomedicai research collaborations through social network analysis: A case study.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
On Energy Security of Server Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Secure instant messaging in enterprise-like networks.
Comput. Networks, 2012

Enhancing cache robustness for content-centric networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Design and Implementation of a Fast Dynamic Packet Filter.
IEEE/ACM Trans. Netw., 2011

Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011

Energy Attack on Server Systems.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

A methodology for empirical analysis of brain connectivity through graph mining.
Proceedings of the IEEE International Conference on Systems, 2011

2010
An automatic HTTP cookie management system.
Comput. Networks, 2010

A Collaboration-based Autonomous Reputation System for Email Services.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Mimimorphism: a new approach to binary code obfuscation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Battle of Botcraft: fighting bots in online games with human observational proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Thwarting E-mail Spam Laundering.
ACM Trans. Inf. Syst. Secur., 2008

Measurement and Classification of Humans and Bots in Internet Chat.
Proceedings of the 17th USENIX Security Symposium, 2008

Swift: A Fast Dynamic Packet Filter.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

2007
Automatic Cookie Usage Setting with CookiePicker.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Identifying Low-ProfileWeb Server's IP Fingerprint.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

An effective defense against email spam laundering.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Cooperative behavior rule acquisition for multi-agent systems using a genetic algorithm.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006


  Loading...