Mengmeng Ge

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic.
Cybersecur., December, 2025

CCLog: Actionable APT forensics via fused log semantics and provenance graph topology.
Comput. Networks, 2025

Eclipse Attacks in Blockchain Networks: Detection, Prevention, and Future Directions.
IEEE Access, 2025

2024
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception.
Comput. Secur., 2024

Study on the pore structure characteristics of maize grain piles and their effects on air flow distribution.
Comput. Electron. Agric., 2024

Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024

2023
Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Joint cognitive optimization of transmit waveform and receive filter against deceptive interference.
Signal Process., 2021

Robot Communication: Network Traffic Classification Based on Deep Neural Network.
Frontiers Neurorobotics, 2021

2020
Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis.
Digit. Signal Process., 2020

Mainlobe Jamming Suppression Via Independent Component Analysis for Polarimetric SIMO Radar.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

2018
An Efficient Security System for Mobile Data Monitoring.
Wirel. Commun. Mob. Comput., 2018

2016
Survey on key revocation mechanisms in wireless sensor networks.
J. Netw. Comput. Appl., 2016

2014
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2008
Application and Practice of System Integration Approach in Intelligent Human Motion Recognition.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...