default search action
Meng Shen 0001
Person information
- affiliation: Beijing Institute of Technology, School of Cyberspace Science and Technology, China
- affiliation (former): Shandong University, Jinan, China
- affiliation (PhD 2014): Tsinghua University, Beijing, China
Other persons with the same name
- Meng Shen — disambiguation page
- Meng Shen 0002 — Nanyang Technological University, Singapore (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu:
Security and Privacy in Web 3.0. Springer 2024, ISBN 978-981-97-5751-0, pp. 1-157 - [j60]Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman) Shen:
Artificial Intelligence for Web 3.0: A Comprehensive Survey. ACM Comput. Surv. 56(10): 247 (2024) - [j59]Jianjin Zhao, Qi Li, Jintao Sun, Mianxiong Dong, Kaoru Ota, Meng Shen:
Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary. IEEE Internet Things J. 11(3): 5129-5142 (2024) - [j58]Meng Shen, Jing Wang, Hongyang Du, Dusit Niyato, Xiangyun Tang, Jiawen Kang, Yaoling Ding, Liehuang Zhu:
Secure Semantic Communications: Challenges, Approaches, and Opportunities. IEEE Netw. 38(4): 197-206 (2024) - [j57]Xiangyun Tang, Dongliang Liao, Meng Shen, Liehuang Zhu, Shen Huang, Gongfu Li, Hong Man, Jin Xu:
Confidence-Aware Sentiment Quantification via Sentiment Perturbation Modeling. IEEE Trans. Affect. Comput. 15(2): 736-750 (2024) - [j56]Meng Shen, Changyue Li, Hao Yu, Qi Li, Liehuang Zhu, Ke Xu:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 1740-1753 (2024) - [j55]Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, Jiankun Hu:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. IEEE Trans. Inf. Forensics Secur. 19: 616-631 (2024) - [j54]Meng Shen, Jing Wang, Jie Zhang, Qinglin Zhao, Bohan Peng, Tong Wu, Liehuang Zhu, Ke Xu:
Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning. IEEE Trans. Netw. Sci. Eng. 11(3): 3105-3119 (2024) - [j53]Jianjin Zhao, Qi Li, Yueping Hong, Meng Shen:
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning. IEEE Trans. Netw. Serv. Manag. 21(2): 2460-2476 (2024) - [c54]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. CCS 2024: 3659-3673 - [c53]Xiangdong Kong, Jizhe Jia, Jinhe Wu, Meng Shen, Liehuang Zhu:
Towards Lightweight User Identification of Anonymous Cryptocurrency Wallet via Encrypted Traffic Correlation. ICPADS 2024: 186-193 - [c52]Yi Zhao, Liang Lv, Yusen Li, Meng Shen, Liehuang Zhu, Ke Xu:
Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers. IWQoS 2024: 1-10 - [c51]Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. SP 2024: 3238-3256 - [c50]Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu:
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. USENIX Security Symposium 2024 - [i22]Jinbo Wen, Jiawen Kang, Zehui Xiong, Hongyang Du, Zhaohui Yang, Dusit Niyato, Meng Shen, Yutao Jiao, Yang Zhang:
Freshness-aware Block Propagation Optimization in 6G-based Web 3.0: An Evolutionary Game Approach. CoRR abs/2403.12807 (2024) - [i21]Bin Wang, Tianjian Liu, Wenqi Wang, Yuan Weng, Chao Li, Guangquan Xu, Meng Shen, Sencun Zhu, Wei Wang:
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems. CoRR abs/2405.13380 (2024) - [i20]Chao Li, Runhua Xu, Balaji Palanisamy, Li Duan, Meng Shen, Jiqiang Liu, Wei Wang:
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident. CoRR abs/2407.17825 (2024) - [i19]Meng Shen, Yuzhi Liu, Qinglin Zhao, Wei Wang, Wei Ou, Wenbao Han, Liehuang Zhu:
EVeCA: Efficient and Verifiable On-Chain Data Query Framework Using Challenge-Based Authentication. CoRR abs/2410.23546 (2024) - [i18]Zheng Che, Meng Shen, Zhehui Tan, Hanbiao Du, Liehuang Zhu, Wei Wang, Ting Chen, Qinglin Zhao, Yong Xie:
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning. CoRR abs/2410.23563 (2024) - 2023
- [j52]Meng Shen, Ke Ye, Xingtong Liu, Liehuang Zhu, Jiawen Kang, Shui Yu, Qi Li, Ke Xu:
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 791-824 (2023) - [j51]Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu, Yuling Liu:
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. Cybersecur. 6(1): 46 (2023) - [j50]Meng Shen, Aijing Gu, Jiawen Kang, Xiangyun Tang, Xiaodong Lin, Liehuang Zhu, Dusit Niyato:
Blockchains for Artificial Intelligence of Things: A Comprehensive Survey. IEEE Internet Things J. 10(16): 14483-14506 (2023) - [j49]Yueping Hong, Qi Li, Yanqing Yang, Meng Shen:
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features. Inf. Sci. 644: 119229 (2023) - [j48]Xiangyun Tang, Meng Shen, Qi Li, Liehuang Zhu, Tengfei Xue, Qiang Qu:
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations. IEEE Trans. Dependable Secur. Comput. 20(6): 5005-5023 (2023) - [j47]Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu:
CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection. IEEE Trans. Inf. Forensics Secur. 18: 5011-5025 (2023) - [j46]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Frequency Domain Feature Based Robust Malicious Traffic Detection. IEEE/ACM Trans. Netw. 31(1): 452-467 (2023) - [j45]Xinle Du, Ke Xu, Lei Xu, Kai Zheng, Meng Shen, Bo Wu, Tong Li:
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers. IEEE/ACM Trans. Netw. 31(2): 526-541 (2023) - [c49]Che Zheng, Meng Shen, Junxian Duan, Liehuang Zhu:
From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. APPT 2023: 390-416 - [c48]Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu:
Subverting Website Fingerprinting Defenses with Robust Traffic Representation. USENIX Security Symposium 2023: 607-624 - [i17]Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu:
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection. CoRR abs/2307.09002 (2023) - [i16]Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin Shen:
Artificial Intelligence for Web 3.0: A Comprehensive Survey. CoRR abs/2309.09972 (2023) - 2022
- [j44]Xu Chen, Wei Feng, Yantian Luo, Meng Shen, Ning Ge, Xianbin Wang:
Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach. IEEE Internet Things J. 9(1): 117-128 (2022) - [j43]Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, Qi Xuan:
Behavior-Aware Account De-Anonymization on Ethereum Interaction Graph. IEEE Trans. Inf. Forensics Secur. 17: 3433-3448 (2022) - [j42]Meng Shen, Hao Lu, Fei Wang, Huisen Liu, Liehuang Zhu:
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles. IEEE Trans. Veh. Technol. 71(11): 12250-12263 (2022) - [j41]Xiangyun Tang, Liehuang Zhu, Meng Shen, Jialiang Peng, Jiawen Kang, Dusit Niyato, Ahmed A. Abd El-Latif:
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things. IEEE Wirel. Commun. 29(3): 14-22 (2022) - [c47]Ke Ye, Meng Shen, Zhenbo Gao, Liehuang Zhu:
Real-Time Detection of Cryptocurrency Mining Behavior. BlockSys 2022: 278-291 - [c46]Xiangdong Kong, Meng Shen, Zheng Che, Congcong Yu, Liehuang Zhu:
Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor. BlockSys 2022: 292-305 - [c45]Rui Wang, Xiangyun Tang, Meng Shen, Liehuang Zhu:
Privacy-preserving Training Algorithm for Naive Bayes Classifiers. ICC 2022: 5639-5644 - [c44]Congcong Yu, Chengpu Jiang, Chen Yang, Meng Shen, Liehuang Zhu, Zheng Che:
Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes. ICDCS Workshops 2022: 7-12 - [c43]Chengpu Jiang, Zhenbo Gao, Meng Shen:
Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic. ICPCSEE (2) 2022: 33-46 - [c42]Hanbiao Du, Meng Shen, Rungeng Sun, Jizhe Jia, Liehuang Zhu, Yanlong Zhai:
Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning. INFOCOM Workshops 2022: 1-6 - [c41]Jinbo Wen, Xiaojun Liu, Zehui Xiong, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang, He Li:
Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G. TrustCom 2022: 369-374 - [c40]Xingtong Liu, Meng Shen, Laizhong Cui, Ke Ye, Jizhe Jia, Guangchun Yue:
FewFine: Few-shot Malware Traffic Classification Via Transfer Learning based on Fine-tuning Strategy. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 425-432 - [i15]Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, Qi Xuan:
Behavior-aware Account De-anonymization on Ethereum Interaction Graph. CoRR abs/2203.09360 (2022) - [i14]Jinhuan Wang, Pengtao Chen, Xinyao Xu, Jiajing Wu, Meng Shen, Qi Xuan, Xiaoniu Yang:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum. CoRR abs/2208.12938 (2022) - 2021
- [j40]Yuxi Ma, Meng Shen, Yuhang Zhao, Zhao Li, Xiaoyao Tong, Quanxin Zhang, Zhi Wang:
Opponent portrait for multiagent reinforcement learning in competitive environment. Int. J. Intell. Syst. 36(12): 7461-7474 (2021) - [j39]Meng Shen, Yaqian Wei, Zelin Liao, Liehuang Zhu:
IriTrack: Face Presentation Attack Detection Using Iris Tracking. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(2): 78:1-78:21 (2021) - [j38]Meng Shen, Huan Wang, Bin Zhang, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing. IEEE Internet Things J. 8(4): 2265-2275 (2021) - [j37]Liehuang Zhu, Xiangyun Tang, Meng Shen, Feng Gao, Jie Zhang, Xiaojiang Du:
Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios. IEEE Internet Things J. 8(15): 12106-12118 (2021) - [j36]Meng Shen, Yiting Liu, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic. IEEE Trans. Inf. Forensics Secur. 16: 2046-2059 (2021) - [j35]Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du:
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 2367-2380 (2021) - [j34]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 4063-4077 (2021) - [c39]Xiangyun Tang, Dongliang Liao, Weijie Huang, Jin Xu, Liehuang Zhu, Meng Shen:
Fully Exploiting Cascade Graphs for Real-time Forwarding Prediction. AAAI 2021: 582-590 - [c38]Meng Shen, Anqi Sang, Pengyu Duan, Hao Yu, Liehuang Zhu:
Threat Prediction of Abnormal Transaction Behavior Based on Graph Convolutional Network in Blockchain Digital Currency. BlockSys 2021: 201-213 - [c37]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CCS 2021: 3431-3446 - [c36]Xinle Du, Tong Li, Lei Xu, Kai Zheng, Meng Shen, Bo Wu, Ke Xu:
R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers. ICNP 2021: 1-12 - [c35]Meng Shen, Zhenbo Gao, Liehuang Zhu, Ke Xu:
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning. IWQoS 2021: 1-10 - [c34]Meng Shen, Minghui Wang, Ke Xu, Liehuang Zhu:
Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs. IWQoS 2021: 1-10 - [i13]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CoRR abs/2106.14707 (2021) - 2020
- [b1]Meng Shen, Liehuang Zhu, Ke Xu:
Blockchain: Empowering Secure Data Sharing. Springer 2020, ISBN 978-981-15-5938-9, pp. 1-130 - [j33]Baokun Zheng, Liehuang Zhu, Meng Shen, Xiaojiang Du, Mohsen Guizani:
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. Sci. China Inf. Sci. 63(3) (2020) - [j32]Yi Zhao, Ke Xu, Yifeng Zhong, Xiangyang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li:
Incentive mechanisms for mobile data offloading through operator-owned WiFi access points. Comput. Networks 174: 107226 (2020) - [j31]Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109: 621-632 (2020) - [j30]Meng Shen, Ke Xu, Xiaojiang Du, Martin J. Reed, Md. Zakirul Alam Bhuiyan, Lan Zhang, Rashid Mijumbi:
Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities. IEEE Internet Things J. 7(5): 3897-3900 (2020) - [j29]Liehuang Zhu, Baokun Zheng, Meng Shen, Feng Gao, Hongyu Li, Kexin Shi:
Data Security and Privacy in Bitcoin System: A Survey. J. Comput. Sci. Technol. 35(4): 843-862 (2020) - [j28]Meng Shen, Huisen Liu, Liehuang Zhu, Ke Xu, Hongbo Yu, Xiaojiang Du, Mohsen Guizani:
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE J. Sel. Areas Commun. 38(5): 942-954 (2020) - [j27]Meng Shen, Junxian Duan, Liehuang Zhu, Jie Zhang, Xiaojiang Du, Mohsen Guizani:
Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds. IEEE J. Sel. Areas Commun. 38(6): 1229-1241 (2020) - [j26]Lei Xu, Ke Xu, Tong Li, Kai Zheng, Meng Shen, Xiaojiang Du, Xinle Du:
ABQ: Active Buffer Queueing in Datacenters. IEEE Netw. 34(2): 232-237 (2020) - [j25]Meng Shen, Yiting Liu, Liehuang Zhu, Ke Xu, Xiaojiang Du, Nadra Guizani:
Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach. IEEE Netw. 34(4): 20-27 (2020) - [j24]Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu:
ID-Based SDN for the Internet of Things. IEEE Netw. 34(4): 76-83 (2020) - [j23]Ke Xu, Liang Lv, Tong Li, Meng Shen, Haiyang Wang, Kun Yang:
Minimizing Tardiness for Data-Intensive Applications in Heterogeneous Systems: A Matching Theory Perspective. IEEE Trans. Parallel Distributed Syst. 31(1): 144-158 (2020) - [j22]Meng Shen, Jie Zhang, Liehuang Zhu, Ke Xu, Xiangyun Tang:
Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5773-5783 (2020) - [j21]Yanlong Zhai, Tianhong Bao, Liehuang Zhu, Meng Shen, Xiaojiang Du, Mohsen Guizani:
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling. IEEE Wirel. Commun. 27(1): 84-91 (2020) - [c33]Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, Lihuang Zhu:
A Survey on Cyberspace Search Engines. CNCERT 2020: 206-214 - [c32]Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu:
Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering. INFOCOM 2020: 2223-2232 - [c31]Meng Shen, Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, Xiaojiang Du:
DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning. IWQoS 2020: 1-10 - [c30]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6 - [c29]Meng Shen, Junxian Duan, Ning Shang, Liehuang Zhu:
Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis. SPDE 2020: 661-675 - [i12]Meng Shen, Yaqian Wei, Tong Li:
Bluetooth-based COVID-19 Proximity Tracing Proposals: An Overview. CoRR abs/2008.12469 (2020) - [i11]Liehuang Zhu, Xiangyun Tang, Meng Shen, Jie Zhang, Xiaojiang Du:
Privacy-Preserving Machine Learning Training in Aggregation Scenarios. CoRR abs/2009.09691 (2020) - [i10]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Robust Attacks on Deep Learning Face Recognition in the Physical World. CoRR abs/2011.13526 (2020)
2010 – 2019
- 2019
- [j20]Qi Tan, Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Meng Shen:
Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks. CCF Trans. Netw. 2(3-4): 188-206 (2019) - [j19]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j18]Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, Xiaojiang Du:
VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 103:1-103:19 (2019) - [j17]Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu:
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT. IEEE Internet Things J. 6(2): 1998-2008 (2019) - [j16]Song Yang, Fan Li, Meng Shen, Xu Chen, Xiaoming Fu, Yu Wang:
Cloudlet Placement and Task Allocation in Mobile Edge Computing. IEEE Internet Things J. 6(3): 5853-5863 (2019) - [j15]Meng Shen, Xiangyun Tang, Liehuang Zhu, Xiaojiang Du, Mohsen Guizani:
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE Internet Things J. 6(5): 7702-7712 (2019) - [j14]Ziwei Li, Ke Xu, Haiyang Wang, Yi Zhao, Xiaoliang Wang, Meng Shen:
Machine-Learning-Based Positioning: A Survey and Future Directions. IEEE Netw. 33(3): 96-101 (2019) - [j13]Meng Shen, Yawen Deng, Liehuang Zhu, Xiaojiang Du, Nadra Guizani:
Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach. IEEE Netw. 33(5): 27-33 (2019) - [j12]Keke Gai, Yulu Wu, Liehuang Zhu, Meikang Qiu, Meng Shen:
Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid. IEEE Trans. Ind. Informatics 15(6): 3548-3558 (2019) - [c28]Liehuang Zhu, Hui Dong, Meng Shen, Keke Gai:
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing. BigDataSecurity/HPSC/IDS 2019: 113-118 - [c27]Meng Shen, Siqi Chen, Liehuang Zhu, Renyi Xiao, Ke Xu, Xiaojiang Du:
Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries. GLOBECOM 2019: 1-6 - [c26]Meng Shen, Jinpeng Zhang, Siqi Chen, Yiting Liu, Liehuang Zhu:
Machine Learning Classification on Traffic of Secondary Encryption. GLOBECOM 2019: 1-6 - [c25]Meng Shen, Yiting Liu, Siqi Chen, Liehuang Zhu, Yuchao Zhang:
Webpage Fingerprinting using Only Packet Length Information. ICC 2019: 1-6 - [c24]Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu:
Encrypted traffic classification of decentralized applications on ethereum using feature fusion. IWQoS 2019: 18:1-18:10 - 2018
- [j11]Baokun Zheng, Liehuang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yandong Li, Jing Yang:
Scalable and Privacy-Preserving Data Sharing Based on Blockchain. J. Comput. Sci. Technol. 33(3): 557-567 (2018) - [j10]Hejun Zhu, Liehuang Zhu, Meng Shen, Salabat Khan:
Online and automatic identification and mining of encryption network behavior in big data environment. J. Intell. Fuzzy Syst. 34(2): 1111-1119 (2018) - [j9]Hongyu Li, Liehuang Zhu, Meng Shen, Feng Gao, Xiaoling Tao, Sheng Liu:
Blockchain-Based Data Preservation System for Medical Data. J. Medical Syst. 42(8): 141:1-141:13 (2018) - [j8]Liehuang Zhu, Xiangyun Tang, Meng Shen, Xiaojiang Du, Mohsen Guizani:
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks. IEEE J. Sel. Areas Commun. 36(3): 628-643 (2018) - [j7]Feng Gao, Liehuang Zhu, Meng Shen, Kashif Sharif, Zhiguo Wan, Kui Ren:
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks. IEEE Netw. 32(6): 184-192 (2018) - [j6]Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. IEEE Trans. Inf. Forensics Secur. 13(4): 940-953 (2018) - [c23]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c22]Li Li, Ke Xu, Tong Li, Kai Zheng, Chunyi Peng, Dan Wang, Xiangxiang Wang, Meng Shen, Rashid Mijumbi:
A measurement study on multi-path TCP with multiple cellular carriers on high speed rails. SIGCOMM 2018: 161-175 - [i9]Liehuang Zhu, Xiangyun Tang, Meng Shen, Xiaojiang Du, Mohsen Guizani:
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks. CoRR abs/1809.07046 (2018) - [i8]Meng Shen, Baoli Ma, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection. CoRR abs/1809.07912 (2018) - [i7]Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu:
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT. CoRR abs/1809.07914 (2018) - [i6]Meng Shen, Guohua Cheng, Liehuang Zhu, Xiaojiang Du, Jiankun Hu:
Content-Based Multi-Source Encrypted Image Retrieval in Clouds with Privacy Preservation. CoRR abs/1809.08433 (2018) - [i5]Meng Shen, Zelin Liao, Liehuang Zhu, Rashid Mijumbi, Xiaojiang Du, Jiankun Hu:
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks. CoRR abs/1810.03323 (2018) - [i4]Liehuang Zhu, Baokun Zheng, Meng Shen, Shui Yu, Feng Gao, Hongyu Li, Kexin Shi, Keke Gai:
Research on the Security of Blockchain Data: A Survey. CoRR abs/1812.02009 (2018) - [i3]Xiangyun Tang, Liehuang Zhu, Meng Shen, Xiaojiang Du:
When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection. CoRR abs/1812.02292 (2018) - 2017
- [j5]Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang:
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams. IEEE Trans. Inf. Forensics Secur. 12(8): 1830-1843 (2017) - [c21]Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen:
MINOS: regulating router dataplane actions in dynamic runtime environments. ACM TUR-C 2017: 40:1-40:10 - [c20]Baokun Zheng, Liehuang Zhu, Meng Shen, Xiaojiang Du, Jing Yang, Feng Gao, Yandong Li, Chuan Zhang, Sheng Liu, Shu Yin:
Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering. MONAMI 2017: 313-323 - [c19]Yandong Li, Liehuang Zhu, Meng Shen, Feng Gao, Baokun Zheng, Xiaojiang Du, Sheng Liu, Shu Yin:
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains. MONAMI 2017: 339-352 - 2016
- [j4]Ke Xu, Meng Shen, Hongying Liu, Jiangchuan Liu, Fan Li, Tong Li:
Achieving Optimal Traffic Engineering Using a Generalized Routing Framework. IEEE Trans. Parallel Distributed Syst. 27(1): 51-65 (2016) - [c18]Meng Shen, Liehuang Zhu, Mingwei Wei, Qiongyu Zhang, Mingzhong Wang, Fan Li:
Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks. ICCCN 2016: 1-8 - [c17]Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao:
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios. ICDCS 2016: 629-638 - [c16]Meng Shen, Mingwei Wei, Liehuang Zhu, Mingzhong Wang, Fuliang Li:
Certificate-aware encrypted traffic classification using Second-Order Markov Chain. IWQoS 2016: 1-10 - 2015
- [j3]Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat, Meng Shen, Ke Xu, Kun Yang:
A neuro-fuzzy approach to self-management of virtual network resources. Expert Syst. Appl. 42(3): 1376-1390 (2015) - [j2]Ying Liu, Hongying Liu, Ke Xu, Meng Shen:
A Family of Stable Multipath Dual Congestion Control Algorithms. J. Comput. Sci. Technol. 30(6): 1274-1289 (2015) - [c15]Yudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen:
Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks. BigCom 2015: 179-192 - [c14]Shuai Liu, Fan Li, Qian Zhang, Meng Shen:
A Markov Chain Prediction Model for Routing in Delay Tolerant Networks. BigCom 2015: 479-490 - [c13]Meng Shen, Ke Xu, Fuliang Li, Fan Li, Liehuang Zhu, Lei Guan:
Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks. HPCC/CSS/ICESS 2015: 1-6 - [c12]Zhiyuan Yin, Fan Li, Meng Shen, Yu Wang:
Fault-tolerant topology for energy-harvesting heterogeneous wireless sensor networks. ICC 2015: 6761-6766 - [c11]Meng Shen, Ke Xu, Fan Li, Kun Yang, Liehuang Zhu, Lei Guan:
Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications. ICPP 2015: 929-938 - [c10]Huishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang, Chang Xu, Qiongyu Zhang:
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks. INTRUST 2015: 3-16 - [c9]Tingting Zeng, Meng Shen, Mingzhong Wang, Liehuang Zhu, Fan Li:
Self-adaptive anonymous communication scheme under SDN architecture. IPCCC 2015: 1-8 - [c8]Yuchao Zhang, Ke Xu, Haiyang Wang, Meng Shen:
Towards shorter task completion time in datacenter networks. IPCCC 2015: 1-8 - [c7]Qiongyu Zhang, Liehuang Zhu, Meng Shen, Mingzhong Wang, Fan Li:
Latency-aware routing with bandwidth assignment for Software Defined Networks. IPCCC 2015: 1-2 - 2014
- [j1]Ke Xu, Meng Shen, Yong Cui, Mingjiang Ye, Yifeng Zhong:
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. IEEE Trans. Parallel Distributed Syst. 25(5): 1101-1111 (2014) - [c6]Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu:
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model. IPCCC 2014: 1-8 - [c5]Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen:
Online combinatorial double auction for mobile cloud computing markets. IPCCC 2014: 1-8 - [c4]Meng Shen, Ke Xu, Kun Yang, Hsiao-Hwa Chen:
Towards efficient virtual network embedding across multiple network domains. IWQoS 2014: 61-70 - 2012
- [c3]Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong:
Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF. Networking (1) 2012: 232-246 - 2011
- [c2]Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. ICDCS 2011: 836-846 - [c1]Ke Xu, Meng Shen, Mingjiang Ye:
A model approach to estimate Peer-to-Peer traffic matrices. INFOCOM 2011: 676-684 - [i2]Ying Liu, Hongying Liu, Ke Xu, Meng Shen, Yifeng Zhong:
A Large Family of Multi-path Dual Congestion Control Algorithms. CoRR abs/1104.3636 (2011) - 2010
- [i1]Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. CoRR abs/1011.5015 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint