What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Weizhi Meng
Google Scholar
52
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Interpretable adversarial example detection via high-level concept activation vector.
Jiaxing Li
Yu-An Tan
Xinyu Liu
Weizhi Meng
Yuanzhang Li
2025
journals/istr
Equipment failure data trends focused privacy preserving scheme for Machine-as-a-Service.
Zhengjun Jing
Yongkang Zhu
Quanyu Zhao
Yuanjian Zhou
Chunsheng Gu
Weizhi Meng
2025
journals/istr
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare.
Xinzhe Zhang
Lei Wu
Lijuan Xu
Zhien Liu
Ye Su
Hao Wang
Weizhi Meng
2025
journals/tifs
Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data.
Ying Miao
Keke Gai
Jing Yu
Yu-an Tan
Liehuang Zhu
Weizhi Meng
2025
journals/tifs
Enhancing EEG-Based Authentication With Transformer in Internet of Things.
Chunxue Li
Weizhi Meng
Wenjuan Li
2025
journals/tifs
ECGSH: An Efficient Certificateless Group Signcryption-Based Homomorphic in Industrial IoT.
Bei Gong
Mowei Gong
Zhe Li
Haotian Zhu
Weizhi Meng
Chong Guo
2025
journals/tifs
FlashAttest: Self-Attestation for Low-End Internet of Things via Flash Devices.
Zheng Zhang
Jingfeng Xue
Weizhi Meng
Xu Qiao
Yuanzhang Li
Yu-an Tan
2025
journals/tifs
FedAMM: Federated Learning Against Majority Malicious Clients Using Robust Aggregation.
Keke Gai
Dongjue Wang
Jing Yu
Liehuang Zhu
Weizhi Meng
2025
conf/icics
Actions Speak Louder Than Words: Evidence-Based Trust Level Evaluation in Multi-agent Systems.
Nikolaos Fotos
Koffi Ismael Ouattara
Dimitrios S. Karas
Ioannis Krontiris
Weizhi Meng
Thanassis Giannetsos
2024
journals/compsec
can-train-and-test: A curated CAN dataset for automotive intrusion detection.
Brooke Lampe
Weizhi Meng
2024
journals/tifs
Decentralized Threshold Signatures With Dynamically Private Accountability.
Meng Li
Hanni Ding
Qing Wang
Mingwei Zhang
Weizhi Meng
Liehuang Zhu
Zijian Zhang
Xiaodong Lin
2024
journals/tifs
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer.
Ye Yao
Chen Wang
Hui Wang
Ke Wang
Yizhi Ren
Weizhi Meng
2024
journals/tifs
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage.
Weifeng Yin
Lifeng Yuan
Yizhi Ren
Weizhi Meng
Dong Wang
Qiuhua Wang
2024
journals/tifs
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels.
Zhengmin Kong
Jing Song
Shaoshi Yang
Li Gan
Weizhi Meng
Tao Huang
Sheng Chen
2024
conf/acisp
AggNoteBot: A Robust Botnet Building Using Aggressive Cloud Notes.
Siyu Li
Yi-Ning Liu
Fei Zhou
Yanze Kang
Weizhi Meng
2023
journals/compsec
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Guangquan Xu
Wenqing Lei
Lixiao Gong
Jian Liu
Hongpeng Bai
Kai Chen
Ran Wang
Wei Wang
Kaitai Liang
Weizhe Wang
Weizhi Meng
Shaoying Liu
2023
journals/compsec
GenDroid: A query-efficient black-box android adversarial attack framework.
Guangquan Xu
Hongfei Shao
Jingyi Cui
Hongpeng Bai
Jiliang Li
Guangdong Bai
Shaoying Liu
Weizhi Meng
Xi Zheng
2023
journals/compsec
ADFL: Defending backdoor attacks in federated learning via adversarial distillation.
Chengcheng Zhu
Jiale Zhang
Xiaobing Sun
Bing Chen
Weizhi Meng
2023
journals/compsec
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS.
Rishikesh Sahay
Daniel A. Sepulveda Estay
Weizhi Meng
Christian Damsgaard Jensen
Michael Bruhn Barfod
2023
journals/istr
Analysis of hybrid attack and defense based on block withholding strategy.
Binjie Liao
Hongyi Chen
Yu Wang
Weizhi Meng
Jun Zhang
2023
journals/tifs
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
Zixuan Wang
Jiliang Li
Yuntao Wang
Zhou Su
Shui Yu
Weizhi Meng
2023
conf/icics
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Johan Hagelskjar Sjursen
Weizhi Meng
Wei-Yang Chiu
2023
conf/icbc2
A Closer Look at Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Johan Hagelskjar Sjursen
Weizhi Meng
Wei-Yang Chiu
2023
conf/dsn
No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices.
Wei-Yang Chiu
Weizhi Meng
Brooke Lampe
2022
conf/provsec
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks.
Wei-Yang Chiu
Weizhi Meng
Wenjuan Li
Liming Fang
2022
conf/icics
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community.
Zhen Liu
Yining Liu
Weizhi Meng
2022
conf/icbc2
AirChain - Towards Blockchain-based Aircraft Maintenance Record System.
Wictor Lang Jensen
Sille Jessing
Wei-Yang Chiu
Weizhi Meng
2022
conf/acsac
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface.
Bingkun Wu
Weizhi Meng
Wei-Yang Chiu
2021
journals/istr
My data, my control: A secure data sharing and access scheme over blockchain.
Wei-Yang Chiu
Weizhi Meng
Christian Damsgaard Jensen
2021
journals/tifs
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
Yan Li
Yao Cheng
Weizhi Meng
Yingjiu Li
Robert H. Deng
2021
journals/tifs
Sparse Trust Data Mining.
Pengli Nie
Guangquan Xu
Litao Jiao
Shaoying Liu
Jian Liu
Weizhi Meng
Hongyue Wu
Meiqi Feng
Weizhe Wang
Zhengjun Jing
Xi Zheng
2021
conf/acisp
Mind the Scraps: Attacking Blockchain Based on Selfdestruct.
Wei-Yang Chiu
Weizhi Meng
2021
conf/provsec
Efficient Attribute-Based Signature for Monotone Predicates.
Jixin Zhang
Jiageng Chen
Weizhi Meng
2020
journals/compsec
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks.
Zuchao Ma
Liang Liu
Weizhi Meng
2020
journals/istr
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
Zhanwen Chen
Jiageng Chen
Weizhi Meng
Je Sen Teh
Pei Li
Bingqing Ren
2020
journals/istr
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid.
Xiao-di Wang
Weizhi Meng
Yi-Ning Liu
2020
conf/acisp
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Zuchao Ma
Liang Liu
Weizhi Meng
2019
conf/ccs
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Yan Li
Zilong Wang
Yingjiu Li
Robert H. Deng
Binbin Chen
Weizhi Meng
Hui Li
2019
conf/sec
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Weizhi Meng
Wenjuan Li
Lijun Jiang
Jianying Zhou
2019
conf/esorics
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Weizhi Meng
Wenjuan Li
Lijun Jiang
Kim-Kwang Raymond Choo
Chunhua Su
2019
conf/icics
Provably Secure Group Authentication in the Asynchronous Communication Model.
Zhe Xia
Lein Harn
Bo Yang
Mingwu Zhang
Yi Mu
Willy Susilo
Weizhi Meng
2018
journals/compsec
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Weizhi Meng
Lijun Jiang
Yu Wang
Jin Li
Jun Zhang
Yang Xiang
2018
conf/sec
CPMap: Design of Click-Points Map-Based Graphical Password Authentication.
Weizhi Meng
Fei Fei
Lijun Jiang
Zhe Liu
Chunhua Su
Jinguang Han
2018
conf/acisp
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Weizhi Meng
Yu Wang
Wenjuan Li
Zhe Liu
Jin Li
Christian W. Probst
2017
journals/compsec
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Weizhi Meng
Wenjuan Li
Lam-for Kwok
Kim-Kwang Raymond Choo
2017
conf/acisp
Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Weizhi Meng
Lee Wang Hao
Man Ho Au
Zhe Liu
2017
conf/acns
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Weizhi Meng
Wenjuan Li
Lee Wang Hao
Lijun Jiang
Jianying Zhou
2017
conf/icisc
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments.
Weizhi Meng
Lee Wang Hao
Zhe Liu
Chunhua Su
Yan Li
2016
journals/compsec
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Wenjuan Li
Weizhi Meng
Xiapu Luo
Lam-for Kwok
2016
conf/acns
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Weizhi Meng
Wenjuan Li
Duncan S. Wong
Jianying Zhou
2015
conf/ccs
Charging Me and I Know Your Secrets!: Towards Juice Filming Attacks on Smartphones.
Weizhi Meng
Lee Wang Hao
Murali Srirangam Ramanujam
S. P. T. Krishnan
2014
journals/compsec
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Weizhi Meng
Wenjuan Li
Lam-for Kwok
Coauthors
Bei Gong
(1)
Binbin Chen
(1)
Bing Chen
(1)
Bingkun Wu
(1)
Bingqing Ren
(1)
Binjie Liao
(1)
Bo Yang
(1)
Brooke Lampe
(2)
Chen Wang
(1)
Chengcheng Zhu
(1)
Chong Guo
(1)
Christian Damsgaard Jensen
(2)
Christian W. Probst
(1)
Chunhua Su
(3)
Chunsheng Gu
(1)
Chunxue Li
(1)
Daniel A. Sepulveda Estay
(1)
Dimitrios S. Karas
(1)
Dong Wang
(1)
Dongjue Wang
(1)
Duncan S. Wong
(1)
Fei Fei
(1)
Fei Zhou
(1)
Guangdong Bai
(1)
Guangquan Xu
(3)
Hanni Ding
(1)
Hao Wang
(1)
Haotian Zhu
(1)
Hongfei Shao
(1)
Hongpeng Bai
(2)
Hongyi Chen
(1)
Hongyue Wu
(1)
Hui Li
(1)
Hui Wang
(1)
Ioannis Krontiris
(1)
Je Sen Teh
(1)
Jiageng Chen
(2)
Jiale Zhang
(1)
Jian Liu
(2)
Jianying Zhou
(3)
Jiaxing Li
(1)
Jiliang Li
(2)
Jin Li
(2)
Jing Song
(1)
Jing Yu
(2)
Jingfeng Xue
(1)
Jinguang Han
(1)
Jingyi Cui
(1)
Jixin Zhang
(1)
Johan Hagelskjar Sjursen
(2)
Jun Zhang
(2)
Kai Chen
(1)
Kaitai Liang
(1)
Ke Wang
(1)
Keke Gai
(2)
Kim-Kwang Raymond Choo
(2)
Koffi Ismael Ouattara
(1)
Lam-for Kwok
(3)
Lee Wang Hao
(4)
Lei Wu
(1)
Lein Harn
(1)
Li Gan
(1)
Liang Liu
(2)
Liehuang Zhu
(3)
Lifeng Yuan
(1)
Lijuan Xu
(1)
Lijun Jiang
(5)
Liming Fang
(1)
Litao Jiao
(1)
Lixiao Gong
(1)
Man Ho Au
(1)
Meiqi Feng
(1)
Meng Li
(1)
Michael Bruhn Barfod
(1)
Mingwei Zhang
(1)
Mingwu Zhang
(1)
Mowei Gong
(1)
Murali Srirangam Ramanujam
(1)
Nikolaos Fotos
(1)
Pei Li
(1)
Pengli Nie
(1)
Qing Wang
(1)
Qiuhua Wang
(1)
Quanyu Zhao
(1)
Ran Wang
(1)
Rishikesh Sahay
(1)
Robert H. Deng
(2)
S. P. T. Krishnan
(1)
Shaoshi Yang
(1)
Shaoying Liu
(3)
Sheng Chen
(1)
Shui Yu
(1)
Sille Jessing
(1)
Siyu Li
(1)
Tao Huang
(1)
Thanassis Giannetsos
(1)
Wei Wang
(1)
Wei-Yang Chiu
(8)
Weifeng Yin
(1)
Weizhe Wang
(2)
Weizhi Meng
(52)
Wenjuan Li
(10)
Wenqing Lei
(1)
Wictor Lang Jensen
(1)
Willy Susilo
(1)
Xi Zheng
(2)
Xiao-di Wang
(1)
Xiaobing Sun
(1)
Xiaodong Lin
(1)
Xiapu Luo
(1)
Xinyu Liu
(1)
Xinzhe Zhang
(1)
Xu Qiao
(1)
Yan Li
(3)
Yang Xiang
(1)
Yanze Kang
(1)
Yao Cheng
(1)
Ye Su
(1)
Ye Yao
(1)
Yi Mu
(1)
Yi-Ning Liu
(2)
Ying Miao
(1)
Yingjiu Li
(2)
Yining Liu
(1)
Yizhi Ren
(2)
Yongkang Zhu
(1)
Yu Wang
(3)
Yu-An Tan
(2)
Yu-an Tan
(1)
Yuanjian Zhou
(1)
Yuanzhang Li
(1)
Yuanzhang Li
(1)
Yuntao Wang
(1)
Zhanwen Chen
(1)
Zhe Li
(1)
Zhe Liu
(4)
Zhe Xia
(1)
Zhen Liu
(1)
Zheng Zhang
(1)
Zhengjun Jing
(2)
Zhengmin Kong
(1)
Zhien Liu
(1)
Zhou Su
(1)
Zijian Zhang
(1)
Zilong Wang
(1)
Zixuan Wang
(1)
Zuchao Ma
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to