Homepage

Weizhi Meng Weizhi Meng
Assistant Professor

Department of Applied Mathematics and Computer Science
Technical University of Denmark (DTU)

Office: Room 210, Building 324
Phone: +45 45253068
Email: weme [AT] dtu.dk

Profile

Weizhi Meng is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Kongens Lyngby, Denmark. He received his B.Eng. degree in Computer Science from the Nanjing University of Posts and Telecommunications, China and obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong in 2013. He was known as Yuxin Meng and prior to joining DTU, he worked as a research scientist in Infocomm Security (ICS) Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation.

He won the Outstanding Academic Performance Award during his doctoral study, and is a recipient of the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for Young Engineers/Researchers in both 2014 and 2017, and a co-recipient of the Best Student Paper Award from the 10th International Conference on Network and System Security (NSS) in 2016. His primary research interests are cyber security and intelligent technology in security including intrusion detection, smartphone security, biometric authentication, HCI security, cloud security, trust computation, malware and vulnerability analysis, and IoT security. He also shows a strong interest in applied cryptography. He is a member of ACM and IEEE Computer Society / IEEE Communications Society.


Looking for highly motivated exchange or visiting students/researchers in cyber security. Chinese students via CSC scholarship have a chance to apply for a PhD here, but a beforehand interview will be performed at DTU. Denmark has its unique PhD education mechanism. Interested applicant can find useful info at: DTU Website.

DTU is ranked as one of the foremost technical universities in Europe. More ranking information can check DTU Ranking.



Research Interests

My primary research interest focuses on cyber security, such as intrusion detection, biometric authentication, IoT security, smartphone security, trust computation, malware and vulnerability detection, cloud technology in security, access control, and HCI security. I am also interested in cryptography, especially its use in IoT applications. Further, I am working on the application of intelligent technology in information/cyber security.

Here is the list of my publications.

Some recent projects that I am taking part in and managing are as follows.




News:

  • [August 2017] Our paper about an improved Juice Filming Charging (JFC) attack has been accepted by ISC 2017.
  • [August 2017] I receive The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017.
  • [July 2017] Our paper regarding the suitability of deploying challenge mechanism in MSNs has been accepted by Globecom 2017.

  • [April 2017] Our paper regarding the influence of location number on map-based graphical password authentication has been accepted by ACISP 2017.
  • [April 2017] Our paper about multiple password interference between text and map-Based passwords has been accepted by ACNS 2017.
  • [March 2017] Our paper regarding trust computation for medical smartphone networks has been accepted by IFIPTM 2017.

  • [January 2017] Our paper about the construction of an effective trust-based packet filter in Collaborative Network Environments has been accepted in IEEE Transactions on Network and Service Management.
  • [January 2017] An outstanding reviewer status is awarded by Journal of Computer and System Sciences (JCSS).
  • [November 2016] Our research paper about the impact of multi-touch behaviours on click-draw based graphical passwords has been accepted by Computers & Security. This work attempts to stimulate more research in this direction.

  • [November 2016] Our research paper regarding the detection of insider attacks in medical smartphone networks (MSNs), has been accepted by Journal of Network and Computer Applications.
  • [October 2016] Our research paper regarding the detection of insider attacks using intrusion sensitivity-based trust model in collaborative intrusion detection networks, has been accepted by Journal of Network and Computer Applications.

  • [September 2016] Our paper received the Best Student Paper Award in The 10th International Conference on Network and System Security (NSS-16)!


  • More news can be seen here.

Teaching



Professional Activities

Guest Editors:


Advisory Committee:

  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017, 2018

Conference Organizing Committee:

    -Program Chair
  • IEEE International Conference on Blockchain (Blockchain), 2018

  • -Publication Chair
  • International Conference on Information Security Practice and Experience (ISPEC), 2018

Program Committee Member:

  • Annual Conference on Privacy, Security and Trust (PST), 2018
  • IFIP WG 11.11 International Conference on Trust Management (IFIPTM), 2014, 2015, 2016, 2017, 2018
  • IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2015, 2017, 2018
  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017, 2018
  • Australasian Information Security Conference (AISC), 2017, 2018
  • International Conference on Computer Applications & Information Security (ICCAIS), 2018
  • International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2017
  • Information Security Conference (ISC), 2017
  • International Conference on Network and System Security (NSS), 2017
  • Australasian Conference on Information Security and Privacy (ACISP), 2017
  • IEEE International Conference on Communications (ICC), 2017
  • International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2017
  • International Conference on Green, Pervasive and Cloud Computing (GPC), 2017
  • International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2012, 2013, 2014, 2015, 2016, 2017

Workshop Organizing Chair/Committee:

    -Program Chair
  • International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) Beijing, China, 2018.
  • International Workshop on Securing IoT Networks (SITN) Exeter, UK, 2017.

  • -Organizing Committee
  • Top10Qi Open Forum, World Intelligence Congress (WIC), Macau, December 2012.

Workshop Committee Member:

  • ACM Cyber-Physical System Security Workshop (CPSS), 2016, 2017, 2018.
  • International Symposium on Security and Privacy on Internet of Things (SPIoT), 2017.
  • International Workshop on Security and Privacy in Cyber-Physical Systems (SPCPS), in conjunction with IEEE Conference of Cybernetics (CYBCONF), 2017.
  • Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems (CyberICPS), in conjunction with ESORICS, 2016, 2017.
  • Workshop on the Security of Cyber Physical Systems (WOS-CPS), in conjunction with ESORICS, 2015.
  • International Workshop on Smart Computing Technologies and Applications in Mobile Environments, 2014.
  • Special Track on Dependability in Cloud Computing, Asia-Pacific Services Computing Conference (APSCC), 2014.

Journal Reviewer:


Conference Reviewer:
AsiaCCS 2018, SECURECOMM 2017, NCS 2017, ACNS 2017, IFIP SEC 2017, AsiaCCS 2017, WPES 2016, Securecomm 2016, ESORICS 2016, ISC 2016, AsiaCCS 2016, ISC 2015, ESORICS 2015, CSF 2015, SECRYPT 2015, ACNS 2015, AsiaCCS 2015, ESORICS 2014, ISC 2014, ACISP 2014, CRiSIS 2014, IEEE SERE 2014.



Useful Links








Comments