Homepage

Weizhi Meng Weizhi Meng
Assistant Professor

Department of Applied Mathematics and Computer Science
Technical University of Denmark (DTU)

Office: Room 210, Building 324
Phone: +45 45253068
Email: weme [AT] dtu.dk

Profile

Weizhi Meng is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Kongens Lyngby, Denmark. He received his B.Eng. degree in Computer Science from the Nanjing University of Posts and Telecommunications, China and obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong in 2013. He was known as Yuxin Meng and prior to joining DTU, he worked as a research scientist in Infocomm Security (ICS) Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation.

He won the Outstanding Academic Performance Award during his doctoral study, and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014 and the Best Student Paper Award from the 10th International Conference on Network and System Security (NSS) in 2016. He is now a member of Association for Computing Machinery (ACM) and IEEE Computer Society / IEEE Communications Society. His primary research interests are cyber security and intelligent technology in security including intrusion detection, mobile security and authentication, HCI security, cloud security, trust computation, web security, malware and vulnerability analysis. He also shows a strong interest in applied cryptography.


Looking for highly motivated exchange or visiting students/researchers in cyber security. Denmark has its unique PhD education mechanism. Interested applicant can find useful info at: DTU Website.

In QS World University Rankings 2016/17, DTU is ranked No. 109 in the world, while its Engineering & Technology ranked No. 2 in the Nordic region, No. 10 in Europe, and No. 46 in the world. More ranking information can check DTU Ranking.



Research Interests

My primary research interest is cyber security, such as intrusion detection, biometric authentication security, web security, trust computation, malware and vulnerability detection, cloud technology in security, access control and HCI security. I am also interested in cryptography, especially its use in network protocols. In addition, I am working on the application of intelligent technology in information/cyber security.

Here is the list of my publications.

Some recent projects that I am taking part in and managing are as follows.




News:

  • [January 2017] An outstanding reviewer status is awarded by Journal of Computer and System Sciences (JCSS).
  • [November 2016] Our research paper about the impact of multi-touch behaviours on click-draw based graphical passwords has been accepted by Computers & Security. This work attempts to stimulate more research in this direction.

  • [November 2016] Our research paper regarding the detection of insider attacks in medical smartphone networks (MSNs), has been accepted by Journal of Network and Computer Applications.
  • [October 2016] Our research paper regarding the detection of insider attacks using intrusion sensitivity-based trust model in collaborative intrusion detection networks, has been accepted by Journal of Network and Computer Applications.

  • [September 2016] Our paper received the Best Student Paper Award in The 10th International Conference on Network and System Security (NSS-16)!
  • [August 2016] I am serving a TPC for CPSS 2017, welcome submissions!.
  • [July 2016] We have papers accepted by TrustCom-16 and NSS-16.

  • [April 2016] Our research paper of MVPSys: multi-view based false alarm filter for intrusion detection, has been accepted by Computers & Security.
  • [April 2016] Our research paper regarding JuiceCast: automatic juice filming attacks (charging threat) on smartphones, has been accepted by Journal of Network and Computer Applications.

  • [April 2016] Our survey paper about the security challenges and countermeasures in OpenFlow-based SDN has been accepted by Journal of Network and Computer Applications.
  • [March 2016] Our paper regarding TMGuard (touch movement-based security mechanism for unlock patterns) has been accepted by ACNS 2016 (AR=19%).
  • [February 2016] An outstanding reviewer status is awarded by Journal of Network and Computer Applications (JNCA) and Computers & Security.


  • More news can be seen here.

Teaching



Professional Activities

Guest Editors:


Advisory Committee:

  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017

Program Committee Member:

  • Information Security Conference (ISC), 2017
  • International Conference on Network and System Security (NSS), 2017
  • Australasian Conference on Information Security and Privacy (ACISP), 2017
  • IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2015, 2017
  • Australasian Information Security Conference (AISC), 2017
  • IEEE International Conference on Communications (ICC), 2017
  • International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2017
  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017
  • International Conference on Green, Pervasive and Cloud Computing (GPC), 2017,
  • IFIP WG 11.11 International Conference on Trust Management (IFIPTM), 2014, 2015, 2016, 2017
  • International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2012, 2013, 2014, 2015, 2016, 2017

Workshop Organizing Chair/Committee:

  • International Workshop on Securing IoT Networks (SITN), Exeter, UK, June 2017.
  • Top10Qi Open Forum, World Intelligence Congress (WIC), Macau, December 2012.

Workshop Committee Member:

  • International Symposium on Security and Privacy on Internet of Things (SPIoT), 2017.
  • International Workshop on Security and Privacy in Cyber-Physical Systems (SPCPS), in conjunction with IEEE Conference of Cybernetics (CYBCONF), 2017.
  • ACM Cyber-Physical System Security Workshop (CPSS), 2016, 2017.
  • Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems (CyberICPS), in conjunction with ESORICS, 2016, 2017.
  • Workshop on the Security of Cyber Physical Systems (WOS-CPS), in conjunction with ESORICS, 2015.
  • International Workshop on Smart Computing Technologies and Applications in Mobile Environments, 2014.
  • Special Track on Dependability in Cloud Computing, Asia-Pacific Services Computing Conference (APSCC), 2014.

Journal Reviewer:


Conference Reviewer:
NCS 2017, ACNS 2017, IFIP SEC 2017, AsiaCCS 2017, WPES 2016, Securecomm 2016, ESORICS 2016, ISC 2016, AsiaCCS 2016, ISC 2015, ESORICS 2015, CSF 2015, SECRYPT 2015, ACNS 2015, AsiaCCS 2015, ESORICS 2014, ISC 2014, ACISP 2014, CRiSIS 2014, IEEE SERE 2014.



Useful Links








子页面 (2): News Security Conference Stat
Comments