Mark Huasong Meng
Cited by
Cited by
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
A Survey of Android Exploits in the Wild
H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang
Computers & Security 76, 71-91, 2018
A blockchain aided metric for predictive delivery performance in supply chain management
MH Meng, Y Qian
2018 IEEE International Conference on Service Operations and Logistics, and …, 2018
The Blockchain Application in Supply Chain Management: Opportunities, Challenges and Outlook
MH Meng, Y Qian
The 3rd Symposium on Distributed Ledger Technology (SDLT), 2018
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective
MH Meng, G Bai, SG Teo, Z Hou, Y Xiao, Y Lin, JS Dong
IEEE Transactions on Dependable and Secure Computing, 2022
Progressive control flow obfuscation for android applications
L Zhang, H Meng, VLL Thing
TENCON 2018-2018 IEEE Region 10 Conference, 1075-1079, 2018
Post-GDPR threat hunting on android phones: dissecting OS-level safeguards of user-unresettable identifiers
MH Meng, Q Zhang, G Xia, Y Zheng, Y Zhang, G Bai, Z Liu, SG Teo, ...
The Network and Distributed System Security Symposium (NDSS), 2023
Supervised Robustness-preserving Data-free Neural Network Pruning
MH Meng, G Bai, SG Teo, JS Dong
The International Conference on Engineering of Complex Computer Systems (ICECCS), 2023
Detecting Contradictions from CoAP RFC Based on Knowledge Graph
X Feng, Y Zhang, MH Meng, SG Teo
International Conference on Network and System Security, 170-189, 2022
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning
MH Meng, SG Teo, G Bai, K Wang, JS Dong
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 441-453, 2023
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation
L Su, Y Cheng, H Meng, V Thing, Z Wang, L Kong, L Cheng
Smart Blockchain: Second International Conference, SmartBlock 2019 …, 2019
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications
MH Meng, G Bai, JK Liu, X Luo, Y Wang
International Conference on Information Security and Cryptology (Inscrypt …, 2018
Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph
X Feng, Y Zhang, MH Meng, Y Li, CE Joe, Z Wang, G Bai
ISA transactions, 2023
Formalizing Robustness against Character-level Perturbations for Neural Network Language Models
Z Ma, X Feng, Z Wang, S Liu, M Ma, H Guan, MH Meng
The system can't perform the operation now. Try again later.
Articles 1–14