Weizhi Meng
Danmarks Tekniske Universitet
H-index: 42
Europe-Denmark
Top articles of Weizhi Meng
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices | IEEE Transactions on Consumer Electronics | Weizhi Meng Rongxing Lu Jun Zhang Pierangela Samarati | 2024/2 |
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer | IEEE Transactions on Information Forensics and Security | Ye Yao Chen Wang Hui Wang Ke Wang Yizhi Ren | 2024/3/19 |
Robust and Lightweight Data Aggregation with Histogram Estimation in Edge-Cloud Systems | IEEE Transactions on Network Science and Engineering | Yuan Su Jiliang Li Jiahui Li Zhou Su Weizhi Meng | 2024/1/11 |
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT | Zheng Zhang Jingfeng Xue Thar Baker Tian Chen Yuhang Zhao | 2024/3/11 | |
Emerging Information Security and Applications: 4th International Conference, EISA 2023, Hangzhou, China, December 6–7, 2023, Proceedings | Jun Shao Sokratis K Katsikas Weizhi Meng | 2024/1/3 | |
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications | Journal of Network and Computer Applications | Xiaobo Yu Weizhi Meng Yining Liu Fei Zhou | 2024/3/1 |
Deep video inpainting detection and localization based on ConvNeXt dual-stream network | Expert Systems with Applications | Ye Yao Tingfeng Han Xudong Gao Yizhi Ren Weizhi Meng | 2024/8/1 |
Computer Security. ESORICS 2023 International Workshops | Sokratis Katsikas | 2023/9/25 | |
High invisibility image steganography with wavelet transform and generative adversarial network | Expert Systems with Applications | Ye Yao Junyu Wang Qi Chang Yizhi Ren Weizhi Meng | 2024/2/24 |
StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks | IEEE Transactions on Dependable and Secure Computing | Jiliang Li Yuan Su Rongxing Lu Zhou Su Weizhi Meng | 2024/4/22 |
Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning | ACM Transactions on Multimedia Computing, Communications and Applications | Simon Jonker Malthe Jelstrup Weizhi Meng Brooke Lampe | 2024 |
can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection | Computers & Security | Brooke Lampe Weizhi Meng | 2024/2/23 |
A Lightweight and Efficient Raw Data Collection Scheme for IoT Systems | Journal of Information and Intelligence | Yixuan Huang Yining Liu Jingcheng Song Weizhi Meng | 2024/4/4 |
A secure and lightweight batch authentication scheme for Internet of Drones environment | Vehicular Communications | Yuanyuan Zhang Lingzhe Meng Mingwu Zhang Weizhi Meng | 2023/12/1 |
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection | Multimedia Tools and Applications | Palash Ray Debasis Giri Weizhi Meng Soumyadeep Hore | 2023/12/12 |
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability | arXiv preprint arXiv:2312.16954 | Yue Han Jinguang Han Weizhi Meng Jianchang Lai Ge Wu | 2023/12/28 |
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud | Expert Systems with Applications | Chengyi Qin Lei Wu Weizhi Meng Zihui Xu Su Li | 2023/1/1 |
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids | IEEE Internet of Things Journal | Yuan Chang Jiliang Li Ning Lu Wenbo Shi Zhou Su | 2023/8/8 |
Editorial for special issue on security and trust on networked systems | Weizhi Meng Sokratis K Katsikas Jiageng Chen Chao Chen | 2023/5 | |
Attribute-based data sharing scheme with flexible search functionality for cloud-assisted autonomous transportation system | IEEE Transactions on Industrial Informatics | Hu Xiong Hanxiao Wang Weizhi Meng Kuo-Hui Yeh | 2023/2/6 |