BIFF: A blockchain-based IoT forensics framework with identity privacy DP Le, H Meng, L Su, SL Yeo, V Thing TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018 | 93 | 2018 |
A Survey of Android Exploits in the Wild H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang Computers & Security 76, 71-91, 2018 | 54 | 2018 |
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective MH Meng, G Bai, SG Teo, Z Hou, Y Xiao, Y Lin, JS Dong IEEE Transactions on Dependable and Secure Computing, 2022 | 48 | 2022 |
A blockchain aided metric for predictive delivery performance in supply chain management MH Meng, Y Qian 2018 IEEE International Conference on Service Operations and Logistics, and …, 2018 | 35 | 2018 |
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers. MH Meng, Q Zhang, G Xia, Y Zheng, Y Zhang, G Bai, Z Liu, SG Teo, ... NDSS, 2023 | 13 | 2023 |
The Blockchain Application in Supply Chain Management: Opportunities, Challenges and Outlook MH Meng, Y Qian The 3rd Symposium on Distributed Ledger Technology (SDLT), 2018 | 13 | 2018 |
Progressive control flow obfuscation for android applications L Zhang, H Meng, VLL Thing TENCON 2018-2018 IEEE Region 10 Conference, 1075-1079, 2018 | 7 | 2018 |
On the quality of privacy policy documents of virtual personal assistant applications C Yan, F Xie, MH Meng, Y Zhang, G Bai Proceedings on Privacy Enhancing Technologies, 2024 | 5 | 2024 |
Enhancing Federated Learning Robustness Using Data-Agnostic Model Pruning MH Meng, SG Teo, G Bai, K Wang, JS Dong Pacific-Asia Conference on Knowledge Discovery and Data Mining, 441-453, 2023 | 4 | 2023 |
Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph X Feng, Y Zhang, MH Meng, Y Li, CE Joe, Z Wang, G Bai ISA transactions 141, 10-19, 2023 | 3 | 2023 |
Supervised Robustness-preserving Data-free Neural Network Pruning MH Meng, G Bai, SG Teo, JS Dong The International Conference on Engineering of Complex Computer Systems (ICECCS), 2023 | 3 | 2023 |
Detecting contradictions from coap rfc based on knowledge graph X Feng, Y Zhang, MH Meng, SG Teo International Conference on Network and System Security, 170-189, 2022 | 3 | 2022 |
Investigating Documented Privacy Changes in Android OS C Yan, MH Meng, F Xie, G Bai Proceedings of the ACM on Software Engineering 1 (FSE), 2701-2724, 2024 | 2 | 2024 |
Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience Y Zhang, R Sun, L Shen, G Bai, M Xue, MH Meng, X Li, R Ko, S Nepal Proceedings of the ACM on Web Conference 2024, 2986-2997, 2024 | 2 | 2024 |
Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA App F Xie, C Yan, MH Meng, S Teng, Y Zhang, G Bai Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 2 | 2024 |
Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security C Yan, R Ren, MH Meng, L Wan, TY Ooi, G Bai arXiv preprint arXiv:2408.14357, 2024 | 1 | 2024 |
Glitchprober: Advancing effective detection and mitigation of glitch tokens in large language models Z Zhang, W Bai, Y Li, MH Meng, K Wang, L Shi, L Li, J Wang, H Wang arXiv preprint arXiv:2408.04905, 2024 | 1 | 2024 |
Formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models Z Ma, X Feng, Z Wang, S Liu, M Ma, H Guan, MH Meng International Conference on Formal Engineering Methods, 100-117, 2023 | 1 | 2023 |
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation L Su, Y Cheng, H Meng, V Thing, Z Wang, L Kong, L Cheng Smart Blockchain: Second International Conference, SmartBlock 2019 …, 2019 | 1 | 2019 |
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications MH Meng, G Bai, JK Liu, X Luo, Y Wang International Conference on Information Security and Cryptology (Inscrypt …, 2018 | 1 | 2018 |