


default search action
Mengyuan Zhang 0001
Person information
- affiliation: The Hong Kong Polytechnic University, Kowloon, Hong Kong
- affiliation (former): Concordia University, Montreal, Quebec, Canada
Other persons with the same name
- Mengyuan Zhang — disambiguation page
- Mengyuan Zhang 0002 — Clemson University, SC, USA
- Mengyuan Zhang 0003
— Beihang University, China (and 2 more)
- Mengyuan Zhang 0004
— University of California at Berkeley, Berkeley, CA, USA
- Mengyuan Zhang 0005 — Chongqing Foreign Language School, China
- Mengyuan Zhang 0006 — Xidian University, Xi'an, China
- Mengyuan Zhang 0007 — China University of Mining and Technology, Beijing, China
- Mengyuan Zhang 0008 — Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, China
- Mengyuan Zhang 0009 — Changsha University of Science & Technology, School of Physics & Electronic Science, China
- Mengyuan Zhang 0010
— Central China Normal University, China
- Mengyuan Zhang 0011 — Harbin University of Science and Technology, College of Science, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Junjian Ye
, Xavier de Carné de Carnavalet, Lianying Zhao
, Mengyuan Zhang, Lifa Wu
, Wei Zhang
:
Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond. IEEE Internet Things J. 12(2): 1182-1199 (2025) - 2024
- [j9]Junjian Ye
, Xincheng Fei, Xavier de Carné de Carnavalet
, Lianying Zhao
, Lifa Wu, Mengyuan Zhang:
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions. Comput. Secur. 144: 103971 (2024) - [j8]Momen Oqaily
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Yosr Jarraya
, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2799-2817 (2024) - [j7]Sudershan Lakshmanan Thirunavukkarasu
, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya
, Makan Pourzandi
, Lingyu Wang
:
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV). IEEE Trans. Dependable Secur. Comput. 21(4): 2964-2981 (2024) - [c18]Junjian Ye
, Xavier de Carné de Carnavalet
, Lianying Zhao
, Mengyuan Zhang
, Lifa Wu
, Wei Zhang
:
Exposed by Default: A Security Analysis of Home Router Default Settings. AsiaCCS 2024 - [c17]Onur Duman
, Mengyuan Zhang
, Lingyu Wang
, Mourad Debbabi
:
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. DIMVA 2024: 483-502 - 2023
- [c16]Siqi Zhang, Minjie Cai, Mengyuan Zhang, Lianying Zhao
, Xavier de Carné de Carnavalet:
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD. CloudCom 2023: 185-192 - [c15]Siqi Zhang, Mengyuan Zhang, Lianying Zhao
:
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation. DBSec 2023: 386-403 - 2022
- [j6]Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [c14]Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang:
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). NDSS 2022 - [i2]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi
, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - 2021
- [j5]Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j4]Gagandeep Singh Chawla, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [c13]Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang
, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment. ACSAC 2021: 837-848 - [c12]Lianying Zhao
, Muhammad Shafayat Oshman, Mengyuan Zhang, Fereydoun Farrahi Moghaddam, Shubham Chander, Makan Pourzandi:
Towards 5G-ready Security Metrics. ICC 2021: 1-6 - 2020
- [c11]Meisam Mohammady, Shangyu Xie, Yuan Hong
, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c10]Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c9]Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph. CloudCom 2020: 41-48 - [c8]Azadeh Tabiban
, Yosr Jarraya, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i1]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [j3]Mina Khalili, Mengyuan Zhang
, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Trans. Security Safety 5(18): e1 (2019) - [j2]Mengyuan Zhang
, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. IEEE Trans. Inf. Forensics Secur. 14(9): 2315-2330 (2019) - [c7]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang
, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c6]Mengyuan Zhang
, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c5]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - 2018
- [c4]Lingyu Wang, Mengyuan Zhang
, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. From Database to Cyber Security 2018: 450-469 - [c3]Taous Madi, Mengyuan Zhang
, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - 2017
- [c2]Onur Duman
, Mengyuan Zhang
, Lingyu Wang, Mourad Debbabi
:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - 2016
- [j1]Mengyuan Zhang
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - 2014
- [c1]Lingyu Wang, Mengyuan Zhang
, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint