Meng, Weizhi
515  Ergebnisse:
Personensuche X
?
1

KEP: Keystroke Evoked Potential for EEG-Based User Authenti..:

, In: Artificial Intelligence Security and Privacy; Lecture Notes in Computer Science,
Wu, Jiaxuan ; Chiu, Wei-Yang ; Meng, Weizhi - p. 513-530 , 2024
 
?
2

Emerging Information Security and Applications: 4th Interna.. 

Communications in Computer and Information Science, 2004
Shao, Jun ; Katsikas, Sokratis K ; Meng, Weizhi - 1st ed. 2024 . , 2024
 
?
 
?
4

FMC-CEE: A Collaborative Execution Environment with Flash M..:

, In: 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops),
Zhang, Zheng ; Xue, Jingfeng ; Baker, Thar... - p. 88-93 , 2024
 
?
6

High invisibility image steganography with wavelet transfor..:

Yao, Ye ; Wang, Junyu ; Chang, Qi..
Expert Systems with Applications.  249 (2024)  - p. 123540 , 2024
 
?
7

Security on Top of Security: Detecting Malicious Firewall P..:

, In: Machine Learning for Cyber Security; Lecture Notes in Computer Science,
 
?
 
?
9

Traceable and Privacy-Preserving Authentication Scheme for ..:

Shen, Gang ; Xia, Chengliangyi ; Li, Yumei...
IEEE Internet of Things Journal.  11 (2024)  4 - p. 6664-6676 , 2024
 
?
10

Practical Privacy-Preserving Scheme With Fault Tolerance fo..:

Chang, Yuan ; Li, Jiliang ; Lu, Ning...
IEEE Internet of Things Journal.  11 (2024)  2 - p. 1990-2005 , 2024
 
?
11

TridentShell: An enhanced covert and scalable backdoor inje..:

Yu, Xiaobo ; Meng, Weizhi ; Liu, Yining.
Journal of Network and Computer Applications.  223 (2024)  - p. 103823 , 2024
 
?
15

Decentralized Threshold Signatures With Dynamically Private..:

Li, Meng ; Ding, Hanni ; Wang, Qing...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 2217-2230 , 2024
 
1-15