Weizhi Meng
Weizhi Meng
Department of Applied Mathematics and Computer Science, Technical University of Denmark
Verified email at my.cityu.edu.hk - Homepage
Title
Cited by
Cited by
Year
Surveying the Development of Biometric User Authentication on Mobile Phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials, 2015
1792015
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
1782018
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, LF Kwok
China International Conference on Information Security and Cryptology …, 2012
1302012
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
972016
EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism
W Meng, W Li, LF Kwok
Computers & Security 43, 189-204, 2014
572014
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
452017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
442017
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones
Y Meng, DS Wong, LF Kwok
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1680-1687, 2014
442014
Designing click-draw based graphical password scheme for better authentication
Y Meng
2012 IEEE Seventh International Conference on Networking, Architecture, and …, 2012
432012
The practice on using machine learning for network anomaly intrusion detection
YX Meng
2011 International Conference on Machine Learning and Cybernetics 2, 576-581, 2011
432011
Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection
Y Meng, LF Kwok
International Conference on Intelligent Systems and Knowledge Engineering …, 2011
392011
Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges
W Li, Y Meng, LF Kwok
2013 Ninth International Conference on Computational Intelligence and …, 2013
372013
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
362015
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
IEEE Access 6, 7234-7243, 2017
332017
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection
Y Meng, LF Kwok
Journal of Network and Computer Applications 39, 83-92, 2014
332014
Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
W Meng, KKR Choo, S Furnell, AV Vasilakos, CW Probst
IEEE Transactions on Network and Service Management 15 (2), 761-773, 2018
322018
Enhancing false alarm reduction using voted ensemble selection in intrusion detection
Y Meng, LF Kwok
International Journal of Computational Intelligence Systems 6 (4), 626-638, 2013
312013
Intrusion detection in the era of IoT: Building trust via traffic filtering and sampling
W Meng
Computer 51 (7), 36-43, 2018
302018
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
Y Meng, W Li, LF Kwok
Computer Networks 57 (17), 3630-3640, 2013
302013
Charging me and I know your secrets! Towards juice filming attacks on smartphones
W Meng, WH Lee, SR Murali, SPT Krishnan
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 89-98, 2015
292015
The system can't perform the operation now. Try again later.
Articles 1–20