Weizhi Meng
Weizhi Meng
Department of Applied Mathematics and Computer Science, Technical University of Denmark
Verified email at my.cityu.edu.hk - Homepage
TitleCited byYear
Surveying the Development of Biometric User Authentication on Mobile Phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials, 2015
1362015
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, LF Kwok
China International Conference on Information Security and Cryptology …, 2012
1112012
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
992018
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
732016
EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism
W Meng, W Li, LF Kwok
Computers & Security 43, 189-204, 2014
482014
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
382017
The practice on using machine learning for network anomaly intrusion detection
YX Meng
2011 International Conference on Machine Learning and Cybernetics 2, 576-581, 2011
372011
Designing click-draw based graphical password scheme for better authentication
Y Meng
2012 IEEE Seventh International Conference on Networking, Architecture, and …, 2012
352012
Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection
Y Meng, LF Kwok
International Conference on Intelligent Systems and Knowledge Engineering …, 2011
352011
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones
Y Meng, DS Wong, LF Kwok
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1680-1687, 2014
332014
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
302017
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection
Y Meng, LF Kwok
Journal of Network and Computer Applications 39, 83-92, 2014
302014
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
282015
Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges
W Li, Y Meng, LF Kwok
2013 Ninth International Conference on Computational Intelligence and …, 2013
272013
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
Y Meng, W Li, LF Kwok
Computer Networks 57 (17), 3630-3640, 2013
272013
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
IEEE Access 6, 7234-7243, 2017
242017
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks
W Li, W Meng, LF Kwok
The IFIP WG 11.11 International Conference on Trust Management, 61-76, 2014
242014
Enhancing false alarm reduction using voted ensemble selection in intrusion detection
Y Meng, LF Kwok
International Journal of Computational Intelligence Systems 6 (4), 626-638, 2013
242013
Charging me and i know your secrets!: Towards juice filming attacks on smartphones
W Meng, WH Lee, SR Murali, SPT Krishnan
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 89-98, 2015
222015
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks
W Li, W Meng
Information & Computer Security 24 (3), 265-276, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20