Search filters

List of works by Weizhi Meng

A Software Integrity Authentication Protocol for Zero Trust Architecture

scientific article published on 01 August 2024

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices

scientific article published in 2021

EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

scientific article published in 2014

Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer

scientific article published in January 2024

Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration

scientific article published on 28 December 2020

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

scientific article published in 2018

MVPSys : Toward practical multi-view based false alarm reduction system in network intrusion detection

scientific article published in 2016

My data, my control: A secure data sharing and access scheme over blockchain

scientific article published on 25 October 2021

NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0

scientific article published in 2023

Sparse Trust Data Mining

scientific article published in 2021

Surveying the Development of Biometric User Authentication on Mobile Phones

article

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

article

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

scientific article published in 2017

Towards multiple-mix-attack detection via consensus-based trust management in IoT networks

scientific article published in 2020

Trusting Computing as a Service for Blockchain Applications

scientific article published in 2023

When Intrusion Detection Meets Blockchain Technology: A Review

scientific article published in 2018

Y-DWMS: A Digital Watermark Management System Based on Smart Contracts

scientific article published on 12 July 2019

can-logic: Automotive Intrusion Detection via Temporal Logic

scientific article published on 22 March 2024

can-sleuth: Investigating and Evaluating Automotive Intrusion Detection Datasets

scientific article published on 04 June 2024