default search action
Wei Meng 0001
Person information
- affiliation: The Chinese University of Hong Kong
- affiliation (PhD 2017): Georgia Institute of Technology, Atlanta, GA, USA
Other persons with the same name
- Wei Meng — disambiguation page
- Wei Meng 0002 — Guangdong University of Technology, School of Automation, China (and 2 more)
- Wei Meng 0003 — University of Leeds, School of Electronic and Electrical Engineering, UK (and 2 more)
- Wei Meng 0004 — Chongqing Technology and Business University, Department of Electronic Commerce, National Research Base of Intelligent Manufacturing Service, China (and 1 more)
- Wei Meng 0005 (aka: Meng Wei 0005) — Chang'an University, Xian, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Binghui Xie, Yongqiang Chen, Jiaqi Wang, Kaiwen Zhou, Bo Han, Wei Meng, James Cheng:
Enhancing Evolving Domain Generalization through Dynamic Latent Representations. AAAI 2024: 16040-16048 - [c40]Changhua Luo, Penghui Li, Wei Meng, Chao Zhang:
Test Suites Guided Vulnerability Validation for Node.js Applications. CCS 2024: 570-584 - [c39]Binghui Xie, Yatao Bian, Kaiwen Zhou, Yongqiang Chen, Peilin Zhao, Bo Han, Wei Meng, James Cheng:
Enhancing Neural Subset Selection: Integrating Background Information into Set Representations. ICLR 2024 - [c38]Changhua Luo, Wei Meng, Shuai Wang:
Strengthening Supply Chain Security with Fine-grained Safe Patch Identification. ICSE 2024: 89:1-89:12 - [c37]Mingxue Zhang, Wei Meng, You Zhou, Kui Ren:
CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web. ICSE 2024: 174:1-174:12 - [c36]Penghui Li, Wei Meng, Mingxue Zhang, Chenlin Wang, Changhua Luo:
Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis. SP 2024: 222-238 - [c35]Penghui Li, Wei Meng, Chao Zhang:
SDFuzz: Target States Driven Directed Fuzzing. USENIX Security Symposium 2024 - [c34]Xinzhe Wang, Zeyang Zhuang, Wei Meng, James Cheng:
Detecting and Understanding Self-Deleting JavaScript Code. WWW 2024: 1768-1778 - [i4]Binghui Xie, Yongqiang Chen, Jiaqi Wang, Kaiwen Zhou, Bo Han, Wei Meng, James Cheng:
Enhancing Evolving Domain Generalization through Dynamic Latent Representations. CoRR abs/2401.08464 (2024) - [i3]Binghui Xie, Yatao Bian, Kaiwen Zhou, Yongqiang Chen, Peilin Zhao, Bo Han, Wei Meng, James Cheng:
Enhancing Neural Subset Selection: Integrating Background Information into Set Representations. CoRR abs/2402.03139 (2024) - 2023
- [j2]Zeyang Zhuang, Penghui Li, Pingchuan Ma, Wei Meng, Shuai Wang:
Testing Graph Database Systems via Graph-Aware Metamorphic Relations. Proc. VLDB Endow. 17(4): 836-848 (2023) - [c33]Yinxi Liu, Wei Meng:
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. CCS 2023: 1242-1256 - [c32]Zilun Wang, Wei Meng, Michael R. Lyu:
Fine-Grained Data-Centric Content Protection Policy for Web Applications. CCS 2023: 2845-2859 - [c31]Zhibo Liu, Dongwei Xiao, Zongjie Li, Shuai Wang, Wei Meng:
Exploring Missed Optimizations in WebAssembly Optimizers. ISSTA 2023: 436-448 - [c30]Changhua Luo, Wei Meng, Penghui Li:
SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration. SP 2023: 2693-2707 - 2022
- [c29]Yinxi Liu, Wei Meng:
Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities. CCS 2022: 2071-2084 - [c28]Changhua Luo, Penghui Li, Wei Meng:
TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. CCS 2022: 2175-2188 - [c27]Penghui Li, Wei Meng, Kangjie Lu:
SEDiff: scope-aware differential fuzzing to test internal function models in symbolic execution. ESEC/SIGSOFT FSE 2022: 57-69 - [i2]Binghui Xie, Chenhan Jin, Kaiwen Zhou, James Cheng, Wei Meng:
An Adaptive Incremental Gradient Method With Support for Non-Euclidean Norms. CoRR abs/2205.02273 (2022) - 2021
- [c26]Penghui Li, Yinxi Liu, Wei Meng:
Understanding and Detecting Performance Bugs in Markdown Compilers. ASE 2021: 892-904 - [c25]Mingxue Zhang, Wei Meng:
JSISOLATE: lightweight in-browser JavaScript isolation. ESEC/SIGSOFT FSE 2021: 193-204 - [c24]Yinxi Liu, Mingxue Zhang, Wei Meng:
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities. SP 2021: 1468-1484 - [c23]Penghui Li, Wei Meng, Kangjie Lu, Changhua Luo:
On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution. WWW 2021: 58-69 - [c22]Penghui Li, Wei Meng:
LChecker: Detecting Loose Comparison Bugs in PHP. WWW 2021: 2721-2732 - 2020
- [c21]Mingxue Zhang, Wei Meng:
Detecting and understanding JavaScript global identifier conflicts on the web. ESEC/SIGSOFT FSE 2020: 38-49 - [c20]Weikang Bian, Wei Meng, Mingxue Zhang:
MineThrottle: Defending against Wasm In-Browser Cryptojacking. WWW 2020: 3112-3118
2010 – 2019
- 2019
- [c19]Mingxue Zhang, Wei Meng, Yi Wang:
Poster: Finding JavaScript Name Conflicts on the Web. CCS 2019: 2609-2611 - [c18]Weikang Bian, Wei Meng, Yi Wang:
Poster: Detecting WebAssembly-based Cryptocurrency Mining. CCS 2019: 2685-2687 - [c17]Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. USENIX Security Symposium 2019: 941-957 - [c16]Gong Chen, Wei Meng, John A. Copeland:
Revisiting Mobile Advertising Threats with MAdLife. WWW 2019: 207-217 - 2018
- [c15]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - 2017
- [b1]Wei Meng:
Identifying and mitigating threats from embedding third-party content. Georgia Institute of Technology, Atlanta, GA, USA, 2017 - 2016
- [c14]Wei Meng, Ren Ding, Simon P. Chung, Steven Han, Wenke Lee:
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. NDSS 2016 - [c13]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - 2015
- [c12]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [c11]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c10]Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. PAM 2014: 131-140 - 2013
- [j1]Yi Wang, Huichen Dai, Ting Zhang, Wei Meng, Jindou Fan, Bin Liu:
GPU-accelerated name lookup with component encoding. Comput. Networks 57(16): 3165-3177 (2013) - [c9]Yi Wang, Yuan Zu, Ting Zhang, Kunyang Peng, Qunfeng Dong, Bin Liu, Wei Meng, Huichen Dai, Xin Tian, Zhonghu Xu, Hao Wu, Di Yang:
Wire Speed Name Lookup: A GPU-based Approach. NSDI 2013: 199-212 - [c8]Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. USENIX Security Symposium 2013: 671-686 - 2012
- [c7]Wei Meng, Yi Wang, Chengchen Hu, Keqiang He, Jun Li, Bin Liu:
Greening the Internet Using Multi-frequency Scaling Scheme. AINA 2012: 928-935 - [c6]Tian Pan, Xiaoyu Guo, Chenhui Zhang, Wei Meng, Bin Liu:
ALFE: A replacement policy to cache elephant flows in the presence of mice flooding. ICC 2012: 2961-2965 - [c5]Keqiang He, Yi Wang, Xiaofei Wang, Wei Meng, Bin Liu:
GreenVLAN: An energy-efficient approach for VLAN design. ICNC 2012: 522-526 - [c4]Yi Wang, Keqiang He, Huichen Dai, Wei Meng, Junchen Jiang, Bin Liu, Yan Chen:
Scalable Name Lookup in NDN Using Effective Name Component Encoding. ICDCS 2012: 688-697 - [c3]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. IEEE Symposium on Security and Privacy 2012: 506-520 - 2011
- [c2]Yi Wang, Huichen Dai, Junchen Jiang, Keqiang He, Wei Meng, Bin Liu:
Parallel Name Lookup for Named Data Networking. GLOBECOM 2011: 1-5 - [c1]Xuan Dong, Guan Wang, Yi Pang, Weixin Li, Jiangtao Wen, Wei Meng, Yao Lu:
Fast efficient algorithm for enhancement of low lighting video. ICME 2011: 1-6 - [i1]Xuan Dong, Jiangtao Wen, Weixin Li, Yi Pang, Guan Wang, Yao Lu, Wei Meng:
An Efficient and Integrated Algorithm for Video Enhancement in Challenging Lighting Conditions. CoRR abs/1102.3328 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint