default search action
Mengqi Zhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j6]Mengqi Zhan, Yang Li, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. IEEE Trans. Inf. Forensics Secur. 19: 764-776 (2024) - 2023
- [j5]Mengqi Zhan, Yang Li, Guangxi Yu, Yan Zhang, Bo Li, Weiping Wang:
GuardBox: A High-Performance Middlebox Providing Confidentiality and Integrity for Packets. IEEE Trans. Inf. Forensics Secur. 18: 2413-2426 (2023) - [j4]Mengqi Zhan, Yang Li, Yongchun Zhu, Guangxi Yu, Yan Zhang, Bo Li, Weiping Wang:
Website-Aware Protocol Confusion Network for Emergent HTTP/3 Website Fingerprinting. IEEE Trans. Inf. Forensics Secur. 18: 2427-2439 (2023) - [j3]Mengqi Zhan, Yang Li, Huiran Yang, Guangxi Yu, Bo Li, Weiping Wang:
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers. IEEE Trans. Serv. Comput. 16(3): 1686-1697 (2023) - 2022
- [j2]Mengqi Zhan, Yang Li, Guangxi Yu, Bo Li, Weiping Wang:
Detecting DNS over HTTPS based data exfiltration. Comput. Networks 209: 108919 (2022) - 2020
- [j1]Mengqi Zhan, Yang Li, Xinghua Yang, Wenjing Cui, Yulin Fan:
NSAPs: A novel scheme for network security state assessment and attack prediction. Comput. Secur. 99: 102031 (2020)
Conference and Workshop Papers
- 2024
- [c5]Zeqing Yan, Guangxi Yu, Mengqi Zhan, Yan Zhang, Jiaxi Hu:
5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust. CSCWD 2024: 1597-1602 - 2023
- [c4]Mengqi Zhan, Yang Li, Huajun Cui, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method. MILCOM 2023: 391-396 - 2022
- [c3]Jiaqi Kang, Huiran Yang, Yan Zhang, Yueyue Dai, Mengqi Zhan, Weiping Wang:
ActDetector: A Sequence-based Framework for Network Attack Activity Detection. ISCC 2022: 1-7 - 2020
- [c2]Yulin Fan, Yang Li, Mengqi Zhan, Huajun Cui, Yan Zhang:
IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G IoT. BigDataSE 2020: 88-95 - 2019
- [c1]Wenjing Cui, Yang Li, Yan Zhang, Chang Liu, Mengqi Zhan:
An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data Networking. TrustCom/BigDataSE 2019: 176-183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint