Home > Research > Researchers > Professor Weizhi Meng > Publications

Professor Weizhi Meng

Professor in Security and Protection Science

  1. Published

    SecureComm: A Secure Data Transfer Framework for Neural Network Inference on CPU-FPGA Heterogeneous Edge Devices

    Chen, T., Tan, Y.-A., Li, C., Zhang, Z., Meng, W. & Li, Y., 31/12/2024, In: IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 14, 4, p. 811-812 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Blockchain-Driven Distributed Edge Intelligence for Enhanced Internet-of-Vehicles

    Chen, X., Meng, W. & Huang, H., 1/03/2025, In: IEEE Internet of Things Journal. 12, 5, p. 4773-4782 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    NoSneaky: A Blockchain-Based Execution Integrity Protection Scheme in Industry 4.0

    Chiu, W.-Y., Meng, W. & Ge, C., 1/07/2023, In: IEEE Transactions on Industrial Informatics. 19, 7, p. 7957 - 7965

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile Devices

    Duan, Y., Meng, W., Chiu, W.-Y. & Wang, Y., 4/08/2024, ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos. ACM Press, p. 101-103

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Blockchain-based privacy-preserving public key searchable encryption with strong traceability

    Han, Y., Han, J., Meng, W., Lai, J. & Wu, G., 31/10/2024, In: Journal of Systems Architecture. 155, 103264.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection

    Jiang, Z., Li, J., Hu, Q., Meng, W., Pedrycz, W. & Su, Z., 15/08/2024, In: IEEE Internet of Things Journal. 11, 16, p. 26955-26969 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning

    Jonker, S., Jelstrup, M., Meng, W. & Lampe, B., 30/06/2024, In: ACM Transactions on Multimedia Computing, Communications, and Applications. 20, 6, 22 p., 154.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels

    Kong, Z., Song, J., Yang, S., Gan, L., Meng, W., Huang, T. & Chen, S., 7/11/2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 10130-10140 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Intrusion Detection in the Automotive Domain: A Comprehensive Review

    Lampe, B. & Meng, W., 31/10/2023, In: IEEE Communications Surveys & Tutorials. 25, 4, p. 2356-2426 71 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    StealthPath: Privacy-preserving Path Validation in the Data Plane of Path-Aware Networks

    Li, J., Su, Y., Lu, R., Su, Z., Meng, W. & Shen, M., 28/02/2025, In: IEEE Transactions on Dependable and Secure Computing. 22, 1, p. 192-204 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Decentralized Threshold Signatures With Dynamically Private Accountability

    Li, M., Ding, H., Wang, Q., Zhang, M., Meng, W., Zhu, L., Zhang, Z. & Lin, X., 31/12/2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 2217-2230 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Delayed packing attack and countermeasure against transaction information based applications

    Li, J., Wang, Y., Su, Y., Su, Z., Wang, Y., Meng, W. & Shen, Y., 31/01/2024, In: Information Sciences. 652, 119742.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Interpretable adversarial example detection via high-level concept activation vector

    Li, J., Tan, Y.-A., Liu, X., Meng, W. & Li, Y., 31/03/2025, In: Computers and Security. 150, 104218.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. E-pub ahead of print

    Concealed Backdoor Attack on Diffusion Models for Smart Devices with Non-standard Gaussian Distribution Noise

    Li, J., Tan, Y.-A., Fan, S., Li, F., Liu, X., Liu, R., Li, Y. & Meng, W., 11/12/2024, (E-pub ahead of print) In: IEEE Transactions on Consumer Electronics.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    FeatureBA: Hard label black box attack based on internal layer features of surrogate model

    Li, J., Tan, Y.-A., Liu, R., Meng, W. & Li, Y., 1/06/2025, In: Expert Systems with Applications. 276, 127082.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Traffic Sign Recognition Using Optimized Federated Learning in Internet of Vehicles

    Lian, Z., Zeng, Q., Wang, W., Xu, D., Meng, W. & Su, C., 15/02/2024, In: IEEE Internet of Things Journal. 11, 4, p. 6722-6729 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Privacy-Enhanced Federated WiFi Sensing for Health Monitoring in the Internet of Things

    Lian, Z., Zeng, Q., Liu, Z., Wang, H., Ma, C., Meng, W., Su, C. & Sakuraiz, K., 1/02/2025, In: IEEE Internet of Things Journal. 12, 3, p. 2994-3002 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    LightPay: A Lightweight and Secure Off-Chain Multi-Path Payment Scheme Based on Adapter Signatures

    Liu, Y., Liang, W., Xie, K., Xie, S., Li, K. & Meng, W., 31/07/2024, In: IEEE Transactions on Services Computing. 17, 4, p. 1622-1635 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks

    Ma, Z., Liu, L., Meng, W., Luo, X., Wang, L. & Li, W., 15/07/2023, In: IEEE Internet of Things Journal. 10, 14, p. 12521-12536 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    BANN-TMGuard: Toward Touch-Movement-Based Screen Unlock Patterns via Blockchain-Enabled Artificial Neural Networks on IoT Devices

    Meng, W., Li, W. & Calugar, A. N., 15/01/2025, In: IEEE Internet of Things Journal. 12, 2, p. 1856-1866 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Security, Privacy, and Trust Management on Decentralized Systems and Networks

    Meng, W., Katsikas, S., Chen, J. & Chen, C., 31/12/2024, In: International Journal of Network Management. 34, 6, e2311.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  22. E-pub ahead of print

    Blockchain-empowered Keyword Searchable Provable Data Possession for Large Similar Data

    Miao, Y., Gai, K., Yu, J., Tan, Y., Zhu, L. & Meng, W., 31/12/2025, In: IEEE Transactions on Information Forensics and Security. 20, p. 1374-1389 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems

    Su, Y., Li, J., Li, J., Su, Z., Meng, W., Yin, H. & Lu, R., 31/05/2024, In: IEEE Transactions on Network Science and Engineering. 11, 3, p. 2864-2875 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks

    Wang, Z., Li, J., Wang, Y., Su, Z., Yu, S. & Meng, W., 31/12/2023, In: IEEE Transactions on Information Forensics and Security. 18, p. 5964-5979 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection

    Wang, K., Yao, Y., Shen, Y., Xiao, F., Ren, Y. & Meng, W., 31/05/2025, In: IEEE Transactions on Dependable and Secure Computing. 22, 3, p. 2996-3010 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer

    Yao, Y., Wang, C., Wang, H., Wang, K., Ren, Y. & Meng, W., 31/12/2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 4406-4419 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage

    Yin, W., Yuan, L., Ren, Y., Meng, W., Wang, D. & Wang, Q., 31/12/2024, In: IEEE Transactions on Information Forensics and Security. 19, p. 6665-6678 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Towards Intelligent Attack Detection Using DNA Computing

    Zeng, Z., Zhao, B., Chao, H.-C., You, I., Yeh, K.-H. & Meng, W., 31/10/2023, In: ACM Transactions on Multimedia Computing, Communications, and Applications. 19, 3s, p. 1-27 27 p., 126.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Flash controller-based secure execution environment for protecting code confidentiality

    Zhang, Z., Xue, J., Chen, T., Zhao, Y. & Meng, W., 31/07/2024, In: Journal of Systems Architecture. 152, 103172.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare

    Zhang, X., Wu, L., Xu, L., Liu, Z., Su, Y., Wang, H. & Meng, W., 31/03/2025, In: Journal of Information Security and Applications. 89, 103977.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top