BIFF: A blockchain-based IoT forensics framework with identity privacy DP Le, H Meng, L Su, SL Yeo, V Thing TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018 | 74 | 2018 |
A Survey of Android Exploits in the Wild H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang Computers & Security 76, 71-91, 2018 | 44 | 2018 |
A blockchain aided metric for predictive delivery performance in supply chain management MH Meng, Y Qian 2018 IEEE International Conference on Service Operations and Logistics, and …, 2018 | 31 | 2018 |
The Blockchain Application in Supply Chain Management: Opportunities, Challenges and Outlook MH Meng, Y Qian The 3rd Symposium on Distributed Ledger Technology (SDLT), 2018 | 13 | 2018 |
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective MH Meng, G Bai, SG Teo, Z Hou, Y Xiao, Y Lin, JS Dong IEEE Transactions on Dependable and Secure Computing, 2022 | 10 | 2022 |
Progressive control flow obfuscation for android applications L Zhang, H Meng, VLL Thing TENCON 2018-2018 IEEE Region 10 Conference, 1075-1079, 2018 | 6 | 2018 |
Post-GDPR threat hunting on android phones: dissecting OS-level safeguards of user-unresettable identifiers MH Meng, Q Zhang, G Xia, Y Zheng, Y Zhang, G Bai, Z Liu, SG Teo, ... The Network and Distributed System Security Symposium (NDSS), 2023 | 4 | 2023 |
Supervised Robustness-preserving Data-free Neural Network Pruning MH Meng, G Bai, SG Teo, JS Dong The International Conference on Engineering of Complex Computer Systems (ICECCS), 2023 | 2 | 2023 |
Detecting Contradictions from CoAP RFC Based on Knowledge Graph X Feng, Y Zhang, MH Meng, SG Teo International Conference on Network and System Security, 170-189, 2022 | 2 | 2022 |
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning MH Meng, SG Teo, G Bai, K Wang, JS Dong Pacific-Asia Conference on Knowledge Discovery and Data Mining, 441-453, 2023 | 1 | 2023 |
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation L Su, Y Cheng, H Meng, V Thing, Z Wang, L Kong, L Cheng Smart Blockchain: Second International Conference, SmartBlock 2019 …, 2019 | 1 | 2019 |
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications MH Meng, G Bai, JK Liu, X Luo, Y Wang International Conference on Information Security and Cryptology (Inscrypt …, 2018 | 1 | 2018 |
Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph X Feng, Y Zhang, MH Meng, Y Li, CE Joe, Z Wang, G Bai ISA transactions, 2023 | | 2023 |
Formalizing Robustness against Character-level Perturbations for Neural Network Language Models Z Ma, X Feng, Z Wang, S Liu, M Ma, H Guan, MH Meng | | |