Wei Meng

Orcid: 0000-0001-8260-3304

Affiliations:
  • The Chinese University of Hong Kong
  • Georgia Institute of Technology, Atlanta, GA, USA (PhD 2017)


According to our database1, Wei Meng authored at least 37 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Testing Graph Database Systems via Graph-Aware Metamorphic Relations.
Proc. VLDB Endow., December, 2023

SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Exploring Missed Optimizations in WebAssembly Optimizers.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Fine-Grained Data-Centric Content Protection Policy for Web Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

DSFuzz: Detecting Deep State Bugs with Dependent State Exploration.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution.
Proceedings of the WWW '21: The Web Conference 2021, 2021

LChecker: Detecting Loose Comparison Bugs in PHP.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

JSISOLATE: lightweight in-browser JavaScript isolation.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Understanding and Detecting Performance Bugs in Markdown Compilers.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
MineThrottle: Defending against Wasm In-Browser Cryptojacking.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Detecting and understanding JavaScript global identifier conflicts on the web.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
Revisiting Mobile Advertising Threats with MAdLife.
Proceedings of the World Wide Web Conference, 2019

All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Proceedings of the 28th USENIX Security Symposium, 2019

Poster: Finding JavaScript Name Conflicts on the Web.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Detecting WebAssembly-based Cryptocurrency Mining.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Identifying and mitigating threats from embedding third-party content.
PhD thesis, 2017

2016
TrackMeOrNot: Enabling Flexible Control on Web Tracking.
Proceedings of the 25th International Conference on World Wide Web, 2016

The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

2014
Exposing Inconsistent Web Search Results with Bobble.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
GPU-accelerated name lookup with component encoding.
Comput. Networks, 2013

Take This Personally: Pollution Attacks on Personalized Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Wire Speed Name Lookup: A GPU-based Approach.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

2012
LAP: Lightweight Anonymity and Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Scalable Name Lookup in NDN Using Effective Name Component Encoding.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

GreenVLAN: An energy-efficient approach for VLAN design.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

ALFE: A replacement policy to cache elephant flows in the presence of mice flooding.
Proceedings of IEEE International Conference on Communications, 2012

Greening the Internet Using Multi-frequency Scaling Scheme.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
An Efficient and Integrated Algorithm for Video Enhancement in Challenging Lighting Conditions
CoRR, 2011

Fast efficient algorithm for enhancement of low lighting video.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Parallel Name Lookup for Named Data Networking.
Proceedings of the Global Communications Conference, 2011


  Loading...