Calculated based on number of publications stored in Pure and citations from Scopus
20122024

Research activity per year

Filter
Chapters

Search results

  • 2024

    PassFile: Graphical password authentication based on file browsing records

    FU, H. C., LI, W. & WANG, Y., 2024, Machine learning for cyber security: Proceedings of 5th International Conference, ML4CS 2023. KIM, D. D. & CHEN, C. (eds.). Singapore: Springer, p. 28-43

    Research output: Chapter in Book/Report/Conference proceedingChapters

  • Tackling Non-IID for federated learning with components alignment

    XUE, B., ZHANG, J., CHEN, B. & LI, W., 2024, Machine Learning for Cyber SeMachine learning for cyber security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, proceedingscurity - 5th International Conference, ML4CS 2023, Proceedings. KIM, D. D. & CHEN, C. (eds.). Singapore: Springer, p. 131-144

    Research output: Chapter in Book/Report/Conference proceedingChapters

  • 2023

    A graphical password scheme based on rounded image selection

    QIN, X. & LI, W., 2023, Science of cyber security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, proceedings. YUNG, M., CHEN, C. & MENG, W. (eds.). Cham: Springer, p. 97-114

    Research output: Chapter in Book/Report/Conference proceedingChapters

  • EnergyCIDN: Enhanced energy-aware challenge-based collaborative intrusion detection in internet of things

    LI, W., ROSENBERG, P., GLISBY, M. & HAN, M., 2023, Algorithms and architectures for parallel processing: 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10–12, 2022, proceedings. MENG, W., LU, R., MIN, G. & VAIDYA, J. (eds.). Cham: Springer, p. 293-312

    Research output: Chapter in Book/Report/Conference proceedingChapters

    1 Citation (Scopus)
  • The instruction separation framework against Man-At-The-End attacks: Protect what is mattered on-the-fly

    WU, J., CHIU, W.-Y., LIU, P., MENG, W. & LI, W., 2023, Proceedings of 2023 IEEE International Conference on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking, ISPA/BDCloud/SocialCom/SustainCom 2023. Danvers, MA: IEEE, p. 286-293

    Research output: Chapter in Book/Report/Conference proceedingChapters

  • TPMWallet: Towards blockchain hardware wallet using Trusted Platform Module in IoT

    CHIU, W.-Y., MENG, W. & LI, W., 2023, Proceedings of 2023 International Conference on Computing, Networking and Communications, ICNC 2023. USA: IEEE, p. 336-342

    Research output: Chapter in Book/Report/Conference proceedingChapters

    6 Citations (Scopus)
  • 2022

    ALGANs: Enhancing membership inference attacks in federated learning with GANs and active learning

    XIE, Y., CHEN, B., ZHANG, J. & LI, W., 2022, Proceedings of 2022 IEEE International Symposium on Product Compliance Engineering - Asia, ISPCE-ASIA 2022. USA: IEEE

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • Collaborative intrusion detection in the era of IoT: Recent advances and challenges

    LI, W. & MENG, W., 2022, Security and privacy in the internet of things: Architectures, techniques, and applications. AWAD, A. I. & ABAWAJY, J. (eds.). New Jersey: Wiley, p. 123-149

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • Designing in-air hand gesture-based user authentication system via convex hull

    SUN, Y., MENG, W. & LI, W., 2022, Proceedings of 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022. USA: IEEE

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • Double-X: Towards double-cross-based unlock mechanism on smartphones

    LI, W., TAN, J. & ZHU, N., 2022, ICT systems security and privacy protection: 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, proceedings. MENG, W., FISCHER-HÜBNER, S. & JENSEN, C. D. (eds.). Cham: Springer, p. 412-428

    Research output: Chapter in Book/Report/Conference proceedingChapters

    8 Citations (Scopus)
  • FolketID: A decentralized blockchain-based NemID alternative against DDoS attacks

    CHIU, W.-Y., MENG, W., LI, W. & FANG, L., 2022, Provable and practical security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, proceedings. GE, C. & GUO, F. (eds.). Cham: Springer, p. 210-227

    Research output: Chapter in Book/Report/Conference proceedingChapters

    5 Citations (Scopus)
  • HBMD-FL: Heterogeneous federated learning algorithm based on blockchain and model distillation

    LI, Y., ZHANG, J., ZHU, J. & LI, W., 2022, Emerging information security and applications: Third International Conference, EISA 2022, Wuhan, China, October 29–30, 2022, proceedings. CHEN, J., HE, D. & LU, R. (eds.). Cham: Springer, p. 145-159

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • ZoomPass: A zoom-based android unlock scheme on smart devices

    GLEERUP, T., LI, W., TAN, J. & WANG, Y., 2022, Science of cyber security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, revised selected papers. SU, C., SAKURAI, K. & LIU, F. (eds.). Cham: Springer, p. 245-259

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • 2021

    Designing double-click-based unlocking mechanism on smartphones

    LI, W., TAN, J., ZHU, N. & WANG, Y., 2021, Security, privacy, and anonymity in computation, communication, and storage: SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, proceedings. WANG, G., CHEN, B., LI, W., DI PIETRO, R., YAN, X. & HAN, H. (eds.). Cham: Springer, p. 573-585

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • Enhancing blackslist-based packet filtration using blockchain in wireless sensor networks

    LI, W., MENG, W., WANG, Y. & LI, J., 2021, Wireless algorithms, systems, and applications: 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, proceedings, part II. LIU, Z., WU, F. & DAS, S. K. (eds.). Cham: Springer, p. 624-635

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation

    LI, W., MENG, W., PARRA-ARNAU, J. & CHOO, K.-K. R., 2021, Proceedings of 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. USA: IEEE, 9346232

    Research output: Chapter in Book/Report/Conference proceedingChapters

    9 Citations (Scopus)
  • Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling

    LI, W., MENG, W. & YANG, L. T., 2021, Proceedings of 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021. USA: IEEE, p. 122-129

    Research output: Chapter in Book/Report/Conference proceedingChapters

    8 Citations (Scopus)
  • I can think like you! Towards reaction spoofing attack on brainwave-based authentication

    CHIU, W.-Y., MENG, W. & LI, W., 2021, Security, privacy, and anonymity in computation, communication, and storage: 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, proceedings. WANG, G., CHEN, B., LI, W., DI PIETRO, R., YAN, X. & HAN, H. (eds.). Cham: Springer, p. 251-265

    Research output: Chapter in Book/Report/Conference proceedingChapters

    3 Citations (Scopus)
  • LibBlock: Towards decentralized library system based on blockchain and IPFS

    CHIU, W.-Y., MENG, W. & LI, W., 2021, Proceedings of 2021 18th International Conference on Privacy, Security and Trust, PST 2021. USA: IEEE

    Research output: Chapter in Book/Report/Conference proceedingChapters

    11 Citations (Scopus)
  • Towards DTW-based unlock scheme using handwritten graphics on smartphones

    WANG, L., MENG, W. & LI, W., 2021, Proceedings of 2021 17th International Conference on Mobility, Sensing and Networking, MSN 2021. USA: IEEE, p. 486-493

    Research output: Chapter in Book/Report/Conference proceedingChapters

    7 Citations (Scopus)
  • 2020

    A blockchain-based trusted service mechanism for crowdsourcing system

    TAN, L., XIAO, H., SHANG, X., WANG, Y., DING, F. & LI, W., May 2020, Proceedings of 2020 IEEE 91st Vehicular Technology Conference, VTC Spring 2020. USA: IEEE, 9128425

    Research output: Chapter in Book/Report/Conference proceedingChapters

    11 Citations (Scopus)
  • A framework of blockchain-based collaborative intrusion detection in software defined networking

    LI, W., TAN, J. & WANG, Y., 2020, Network and system security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, proceedings. KUTYŁOWSKI, M., ZHANG, J. & CHEN, C. (eds.). Cham: Springer, p. 261-276

    Research output: Chapter in Book/Report/Conference proceedingChapters

    12 Citations (Scopus)
  • Towards collaborative intrusion detection enhancement against insider attacks with multi-level trust

    LI, W., MENG, W. & ZHU, H., Dec 2020, Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020. USA: IEEE, p. 1179-1186

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • 2019

    Evaluating intrusion sensitivity allocation with support vector machine for collaborative intrusion detection

    LI, W., MENG, W. & KWOK, L. F., 2019, Information security practice and experience: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, proceedings. HENG, S.-H. & LOPEZ, J. (eds.). Cham: Springer, p. 453-463

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • PassGrid: Towards graph-supplemented textual shoulder surfing resistant authentication

    ZHOU, T., LIU, L., WANG, H., LI, W. & JIANG, C., 2019, Security and privacy in social networks and big data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, revised selected papers. MENG, W. & FURNELL, S. (eds.). Singapore: Springer, p. 251-263

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • Practical Bayesian Poisoning Attacks on challenge-based collaborative intrusion detection networks

    MENG, W., LI, W., JIANG, L., CHOO, K.-K. R. & SU, C., 2019, Computer Security – ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, proceedings, part I. SAKO, K., SCHNEIDER, S. & RYAN, P. Y. A. (eds.). Cham: Springer, p. 493-511

    Research output: Chapter in Book/Report/Conference proceedingChapters

    15 Citations (Scopus)
  • SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

    MENG, W., LI, W., JIANG, L. & ZHOU, J., 2019, ICT systems security and privacy protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, proceedings. DHILLON, G., KARLSSON, F., HEDSTRÖM, K. & ZÚQUETE, A. (eds.). Cham: Springer, p. 180-193

    Research output: Chapter in Book/Report/Conference proceedingChapters

    9 Citations (Scopus)
  • SwipeVLock: A supervised unlocking mechanism based on swipe behavior on smartphones

    LI, W., TAN, J., MENG, W., WANG, Y. & LI, J., 2019, Machine learning for cyber security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, proceedings. CHEN, X., HUANG, X. & ZHANG, J. (eds.). Cham: Springer, p. 140-153

    Research output: Chapter in Book/Report/Conference proceedingChapters

    14 Citations (Scopus)
  • Towards blockchained challenge-based collaborative intrusion detection

    LI, W., WANG, Y., LI, J. & AU, M. H., 2019, Applied cryptography and network security workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, proceedings. ZHOU, J., DENG, R., LI, Z., MAJUMDAR, S., MENG, W., WANG, L. & ZHANG, K. (eds.). Cham: Springer, p. 122-139

    Research output: Chapter in Book/Report/Conference proceedingChapters

    15 Citations (Scopus)
  • 2018

    Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing

    MENG, W., WANG, Y., LI, W., LIU, Z., LI, J. & PROBST, C. W., 2018, Information security and privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, proceedings. SUSILO, W. & YANG, G. (eds.). Cham: Springer, p. 759-767

    Research output: Chapter in Book/Report/Conference proceedingChapters

    22 Citations (Scopus)
  • Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA

    MADSEN, D., LI, W., MENG, W. & WANG, Y., 2018, Algorithms and architectures for parallel processing: 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, proceedings, part IV. VAIDYA, J. & LI, J. (eds.). Cham: Springer, p. 481-494

    Research output: Chapter in Book/Report/Conference proceedingChapters

    5 Citations (Scopus)
  • Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks

    LI, W., MENG, W., WANG, Y., KWOK, L. F. & LU, R., Sept 2018, Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. USA: IEEE, p. 1208-1213

    Research output: Chapter in Book/Report/Conference proceedingChapters

    8 Citations (Scopus)
  • Towards securing challenge-based collaborative intrusion detection networks via message verification

    LI, W., MENG, W., WANG, Y., HAN, J. & LI, J., 2018, Information security practice and experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, proceedings. SU, C. & KIKUCHI, H. (eds.). Cham: Springer, p. 313-328

    Research output: Chapter in Book/Report/Conference proceedingChapters

    8 Citations (Scopus)
  • 2017

    A pilot study of multiple password interference between text and map-based passwords

    MENG, W., LI, W., LEE, W. H., JIANG, L. & ZHOU, J., 2017, Applied cryptography and network security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, proceedings. GOLLMANN, D., MIYAJI, A. & KIKUCHI, H. (eds.). Cham: Springer, p. 145-162

    Research output: Chapter in Book/Report/Conference proceedingChapters

    13 Citations (Scopus)
  • A privacy-preserving framework for collaborative intrusion detection networks through fog computing

    WANG, Y., XIE, L., LI, W., MENG, W. & LI, J., 2017, Cyberspace safety and security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, proceedings. WEN, S., WU, W. & CASTIGLIONE, A. (eds.). Cham: Springer, p. 267-279

    Research output: Chapter in Book/Report/Conference proceedingChapters

    15 Citations (Scopus)
  • Detecting malicious nodes in medical smartphone networks through euclidean distance-based behavioral profiling

    MENG, W., LI, W., WANG, Y. & AU, M. H., 2017, Cyberspace safety and security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, proceedings. WEN, S., WU, W. & CASTIGLIONE, A. (eds.). Cham: Springer, p. 163-175

    Research output: Chapter in Book/Report/Conference proceedingChapters

    4 Citations (Scopus)
  • Evaluating challenge-based trust mechanism in medical smartphone networks: An empirical study

    MENG, W., FEI, F., LI, W. & AU, M. H., 2017, Proceedings of 2017 IEEE Global Communications Conference, GLOBECOM 2017. USA: IEEE

    Research output: Chapter in Book/Report/Conference proceedingChapters

    8 Citations (Scopus)
  • Harvesting smartphone privacy through enhanced juice filming charging attacks

    MENG, W., FEI, F., LI, W. & AU, M. H., 2017, Information security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, proceedings. NGUYEN, P. Q. & ZHOU, J. (eds.). Cham: Springer, p. 291-308

    Research output: Chapter in Book/Report/Conference proceedingChapters

    18 Citations (Scopus)
  • SOOA: Exploring special on-off attacks on challenge-based collaborative intrusion detection networks

    LI, W., MENG, W. & KWOK, L.-F., 2017, Green, pervasive, and cloud computing: 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, proceedings. AU, M. H. A., CASTIGLIONE, A., CHOO, K.-K. R., PALMIERI, F. & LI, K.-C. (eds.). Cham: Springer, p. 402-415

    Research output: Chapter in Book/Report/Conference proceedingChapters

    24 Citations (Scopus)
  • 2016

    A review of network intrusion detection in the big data era: Challenges and future trends

    MENG, W. & LI, W., 2016, Networking for big data. YU, S., LIN, X., MIŠIC, J. & SHEN, X. S. (eds.). Boca Raton: CRC Press, p. 195-214

    Research output: Chapter in Book/Report/Conference proceedingChapters

    1 Citation (Scopus)
  • Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice

    MENG, W., LUO, X., LI, W. & LI, Y., 2016, Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. USA: IEEE, p. 1061-1068

    Research output: Chapter in Book/Report/Conference proceedingChapters

    33 Citations (Scopus)
  • On multiple password interference of touch screen patterns and text passwords

    MENG, W., LI, W., JIANG, L. & MENG, L., May 2016, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery, p. 4818-4822

    Research output: Chapter in Book/Report/Conference proceedingChapters

    21 Citations (Scopus)
  • PMFA: Toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks

    LI, W., MENG, W., KWOK, L.-F. & IP, H. H. S., 2016, Network and system security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, proceedings. CHEN, J., PIURI, V., SU, C. & YUNG, M. (eds.). Cham: Springer, p. 433-449

    Research output: Chapter in Book/Report/Conference proceedingChapters

    38 Citations (Scopus)
  • TMGuard: A touch movement-based security mechanism for screen unlock patterns on smartphones

    MENG, W., LI, W., WONG, D. S. & ZHOU, J., 2016, Applied cryptography and network security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. proceedings. MANULIS, M., SADEGHI, A.-R. & SCHNEIDER, S. (eds.). Cham: Springer, p. 629-647

    Research output: Chapter in Book/Report/Conference proceedingChapters

    34 Citations (Scopus)
  • Trust it or not? An empirical study of rating mechanism and its impact on smartphone malware propagation

    LI, W., JIANG, L., MENG, W. & KWOK, L.-F., 2016, Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, proceedings. HABIB, S. M., VASSILEVA, J., MAUW, S. & MÜHLHÄUSER, M. (eds.). Cham: Springer, p. 146-153

    Research output: Chapter in Book/Report/Conference proceedingChapters

    2 Citations (Scopus)
  • 2015

    A case study of intelligent ids false alarm reduction in cloud environments: Challenges and trends

    MENG, Y., LI, W. & KWOK, L. F., 2015, Case studies in secure computing: Achievements and trends. ISSAC, B. & ISRAR, N. (eds.). Boca Raton, FL: CRC Press, p. 189-206

    Research output: Chapter in Book/Report/Conference proceedingChapters

  • An empirical study on email classification using supervised machine learning in real environments

    LI, W. & MENG, W., 2015, Proceedings of 2015 IEEE International Conference on Communications, ICC 2015. USA: IEEE, p. 7438-7443

    Research output: Chapter in Book/Report/Conference proceedingChapters

    14 Citations (Scopus)
  • 2014

    An evaluation of single character frequency-based exclusive signature matching in distinct IDS environments

    MENG, W., LI, W. & KWOK, L.-F., 2014, Information security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, proceedings. CHOW, S. S. M., CAMENISCH, J., HUI, L. C. K. & YIU, S. M. (eds.). Cham: Springer, p. 465-476

    Research output: Chapter in Book/Report/Conference proceedingChapters

    11 Citations (Scopus)
  • Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks

    LI, W., MENG, W. & KWOK, L.-F., 2014, Trust management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, proceedings. ZHOU, J., GAL-OZ, N., ZHANG, J. & GUDES, E. (eds.). Berlin: Springer, p. 61-76

    Research output: Chapter in Book/Report/Conference proceedingChapters

    55 Citations (Scopus)
  • Enhancing email classification using data reduction and disagreement-based semi-supervised learning

    MENG, Y., LI, W. & KWOK, L.-F., 2014, Proceedings of 2014 IEEE International Conference on Communications, ICC 2014. USA: IEEE, p. 622-627

    Research output: Chapter in Book/Report/Conference proceedingChapters

    19 Citations (Scopus)