Weizhi Meng

According to our database1, Weizhi Meng authored at least 94 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Security, Privacy, and Trust on Internet of Things.
Wireless Communications and Mobile Computing, 2019

Machine Learning for Wireless Multimedia Data Security.
Security and Communication Networks, 2019

The application of Software Defined Networking on securing computer networks: A survey.
J. Network and Computer Applications, 2019

Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Network and Computer Applications, 2019

SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology.
IJDSN, 2019

Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Generation Comp. Syst., 2019

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Network and Service Management, 2018

Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
Multimedia Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distrib. Comput., 2018

TouchWB: Touch behavioral user authentication based on web browsing on smartphones.
J. Network and Computer Applications, 2018

Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018

Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling.
IEEE Computer, 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Computers & Security, 2018

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Cluster Computing, 2018

When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems.
Proceedings of the Science of Cyber Security - First International Conference, 2018

PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Proceedings of the Network and System Security - 12th International Conference, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Analyzing the Communication Security Between Smartphones and IoT Based on CORAS.
Proceedings of the Network and System Security - 12th International Conference, 2018

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones.
Proceedings of the Information Security Practice and Experience, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Network and Service Management, 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Network and Computer Applications, 2017

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Network and Computer Applications, 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Computers & Security, 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017

Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
JuiceCaster: Towards automatic juice filming attacks on smartphones.
J. Network and Computer Applications, 2016

A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Network and Computer Applications, 2016

Evaluating the effect of multi-touch behaviours on Android unlock patterns.
Inf. & Comput. Security, 2016

Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks.
Inf. & Comput. Security, 2016

MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Computers & Security, 2016

Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

On Multiple Password Interference of Touch Screen Patterns and Text Passwords.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Security and Communication Networks, 2015

Surveying the Development of Biometric User Authentication on Mobile Phones.
IEEE Communications Surveys and Tutorials, 2015

RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory.
Proceedings of the Network and System Security - 9th International Conference, 2015

An empirical study on email classification using supervised machine learning in real environments.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Charging Me and I Know Your Secrets!: Towards Juice Filming Attacks on Smartphones.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection.
J. Network and Computer Applications, 2014

The effect of adaptive mechanism on behavioural biometric based mobile phone authentication.
Inf. Manag. Comput. Security, 2014

EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Computers & Security, 2014

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection.
Computer Communications, 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones.
Proceedings of the Symposium on Applied Computing, 2014

An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014

Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection.
Int. J. Comput. Intell. Syst., 2013

Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Computer Networks, 2013

Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2013

Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012

Evaluating the effect of user guidelines on creating click-draw based graphical passwords.
Proceedings of the Research in Applied Computation Symposium, 2012

Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection.
Proceedings of the Network and System Security - 6th International Conference, 2012

Designing Click-Draw Based Graphical Password Scheme for Better Authentication.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011


  Loading...