


default search action
Mengmeng Ge
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Nhung H. Nguyen, Mengmeng Ge, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation. Comput. Secur. 150: 104229 (2025) - [j18]Xiaomin Li
, Qinghe Wang
, Dezhuang Li, Mengmeng Ge
, Xu Jia
, You He
, Huchuan Lu
:
MoBox: Enhancing Video Object Segmentation With Motion-Augmented Box Supervision. IEEE Trans. Circuits Syst. Video Technol. 35(1): 405-417 (2025) - 2024
- [j17]Mengmeng Ge
, Guixiang Chen
, Wenlei Liu, Chaosai Liu, Deqian Zheng:
Study on the pore structure characteristics of maize grain piles and their effects on air flow distribution. Comput. Electron. Agric. 224: 109136 (2024) - [j16]Kok Onn Chee
, Mengmeng Ge, Guangdong Bai
, Dan Dongseong Kim
:
IoTSecSim: A framework for modelling and simulation of security in Internet of things. Comput. Secur. 136: 103534 (2024) - [j15]Zubaida Rehman
, Iqbal Gondal
, Mengmeng Ge, Hai Dong
, Mark A. Gregory
, Zahir Tari
:
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception. Comput. Secur. 139: 103685 (2024) - [c25]Ruitao Feng
, Sen Li
, Sen Chen
, Mengmeng Ge
, Xuewei Li
, Xiaohong Li
:
Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification. LCTES 2024: 95-106 - [c24]Xiaomin Li
, Xu Jia
, Qinghe Wang
, Haiwen Diao
, Mengmeng Ge
, Pengxiang Li
, You He
, Huchuan Lu
:
MoTrans: Customized Motion Transfer with Text-driven Video Diffusion Models. ACM Multimedia 2024: 3421-3430 - [c23]Mengmeng Ge
, Xu Jia
, Takashi Isobe
, Xiaomin Li
, Qinghe Wang
, Jing Mu
, Dong Zhou
, Li Wang
, Huchuan Lu
, Lu Tian
, Ashish Sirasao
, Emad Barsoum
:
Customizing Text-to-Image Generation with Inverted Interaction. ACM Multimedia 2024: 10901-10909 - [i11]Xiaomin Li, Xu Jia, Qinghe Wang, Haiwen Diao, Mengmeng Ge, Pengxiang Li, You He, Huchuan Lu:
MoTrans: Customized Motion Transfer with Text-driven Video Diffusion Models. CoRR abs/2412.01343 (2024) - 2023
- [j14]Naeem Firdous Syed
, Mengmeng Ge, Zubair A. Baig
:
Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks. Comput. Networks 225: 109662 (2023) - [j13]Sinan Tan
, Mengmeng Ge
, Di Guo
, Huaping Liu
, Fuchun Sun
:
Knowledge-Based Embodied Question Answering. IEEE Trans. Pattern Anal. Mach. Intell. 45(10): 11948-11960 (2023) - [c22]Sen Li, Mengmeng Ge
, Ruitao Feng, Xiaohong Li, Kwok-Yan Lam:
Automatic Detection and Analysis towards Malicious Behavior in IoT Malware. ICDM (Workshops) 2023: 1332-1341 - 2022
- [j12]Simon Yusuf Enoch
, Júlio Mendonça
, Jin B. Hong
, Mengmeng Ge, Dong Seong Kim
:
An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm. Comput. Networks 208: 108864 (2022) - [j11]Tan Duy Le
, Mengmeng Ge, Adnan Anwar
, Seng W. Loke
, Razvan Beuran, Robin Doss, Yasuo Tan:
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. Sensors 22(13): 4795 (2022) - [j10]Mengmeng Ge
, Jin-Hee Cho, Dong Seong Kim
, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception. ACM Trans. Internet Techn. 22(1): 24:1-24:31 (2022) - [c21]Mengmeng Ge
, Xiangzhan Yu, Vinay Mysore Sachidananda, Shangqing Liu, Likun Liu:
ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior. ICDM (Workshops) 2022: 593-601 - [c20]Sinan Tan, Mengmeng Ge
, Di Guo, Huaping Liu, Fuchun Sun:
Depth-Aware Vision-and-Language Navigation using Scene Query Attention Network. ICRA 2022: 9390-9396 - [c19]Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu
, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. NSS 2022: 406-425 - [i10]Sinan Tan, Mengmeng Ge, Di Guo, Huaping Liu, Fuchun Sun:
Self-supervised 3D Semantic Representation Learning for Vision-and-Language Navigation. CoRR abs/2201.10788 (2022) - 2021
- [j9]Mengmeng Ge
, Naeem Firdous Syed, Xiping Fu, Zubair A. Baig
, Antonio Robles-Kelly:
Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput. Networks 186: 107784 (2021) - [j8]Mengmeng Ge
, Xiangzhan Yu, Likun Liu:
Robot Communication: Network Traffic Classification Based on Deep Neural Network. Frontiers Neurorobotics 15: 648374 (2021) - [j7]Mengmeng Ge, Xianxiang Yu, Zhengxin Yan, Guolong Cui, Lingjiang Kong:
Joint cognitive optimization of transmit waveform and receive filter against deceptive interference. Signal Process. 185: 108084 (2021) - [c18]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le
, Faheem Ullah, Shang Gao, Xuequan Lu
, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. PRDC 2021: 47-56 - [i9]Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim:
Model-based Cybersecurity Analysis: Past Work and Future Directions. CoRR abs/2105.08459 (2021) - [i8]Xuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu
, Muhammad Ali Babar:
Automated Security Assessment for the Internet of Things. CoRR abs/2109.04029 (2021) - [i7]Sinan Tan, Mengmeng Ge, Di Guo, Huaping Liu, Fuchun Sun:
Knowledge-based Embodied Question Answering. CoRR abs/2109.07872 (2021) - 2020
- [j6]Mengmeng Ge, Guolong Cui, Xianxiang Yu, Lingjiang Kong:
Mainlobe jamming suppression with polarimetric multi-channel radar via independent component analysis. Digit. Signal Process. 106: 102806 (2020) - [c17]Weilun Liu, Mengmeng Ge, Dong Seong Kim
:
Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks. CCGRID 2020: 767-774 - [c16]Dong Seong Kim
, Kok Onn Chee
, Mengmeng Ge:
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things. DSN (Supplements) 2020: 57-58 - [c15]Mengmeng Ge, Guolong Cui, Zhenghong Zhang, Lin Zhou, Xianxiang Yu, Feng Yang, Lingjiang Kong:
Mainlobe Jamming Suppression Via Independent Component Analysis for Polarimetric SIMO Radar. SAM 2020: 1-5 - [c14]Tan Duy Le
, Mengmeng Ge, Phan The Duy, Hien Do Hoang, Adnan Anwar
, Seng W. Loke, Razvan Beuran, Yasuo Tan:
CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study. SGIoT 2020: 116-134 - [i6]Mengmeng Ge, Jin-Hee Cho, Dong Seong Kim, Gaurav Dixit, Ing-Ray Chen:
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception. CoRR abs/2005.04220 (2020) - [i5]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim:
Composite Metrics for Network Security Analysis. CoRR abs/2007.03486 (2020) - [i4]Mengmeng Ge, Naeem Firdous Syed, Xiping Fu, Zubair A. Baig, Antonio Robles-Kelly:
Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things. CoRR abs/2007.09342 (2020)
2010 – 2019
- 2019
- [c13]Simon Yusuf Enoch
, Jin B. Hong
, Mengmeng Ge, Khaled M. Khan
, Dong Seong Kim
:
Multi-Objective Security Hardening Optimisation for Dynamic Networks. ICC 2019: 1-7 - [c12]Mengmeng Ge, Xiping Fu, Naeem Firdous Syed
, Zubair A. Baig
, Gideon Teo, Antonio Robles-Kelly:
Deep Learning-Based Intrusion Detection for IoT Networks. PRDC 2019: 256-265 - [i3]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim:
Optimal Deployments of Defense Mechanisms for the Internet of Things. CoRR abs/1908.00324 (2019) - [i2]Mengmeng Ge, Jin-Hee Cho, Bilal Ishfaq, Dong Seong Kim:
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things. CoRR abs/1908.00327 (2019) - 2018
- [j5]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
A systematic evaluation of cybersecurity metrics for dynamic networks. Comput. Networks 144: 216-229 (2018) - [j4]Mengmeng Ge, Jin B. Hong
, Simon Yusuf Enoch
, Dong Seong Kim
:
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities. Future Gener. Comput. Syst. 78: 568-582 (2018) - [j3]Likun Liu, Hongli Zhang, Xiangzhan Yu
, Yi Xin
, Muhammad Shafiq
, Mengmeng Ge
:
An Efficient Security System for Mobile Data Monitoring. Wirel. Commun. Mob. Comput. 2018: 9809345:1-9809345:10 (2018) - [c11]Simon Yusuf Enoch
, Jin B. Hong
, Mengmeng Ge, Hani Alzaid, Dong Seong Kim
:
Automated security investment analysis of dynamic networks. ACSW 2018: 6:1-6:10 - [c10]Amelia Samandari, Mengmeng Ge, Jin Bum Hong
, Dong Seong Kim
:
Evaluating the Security of IoT Networks with Mobile Devices. PRDC 2018: 171-180 - [c9]Mengmeng Ge, Jin-Hee Cho, Charles A. Kamhoua, Dong Seong Kim
:
Optimal Deployments of Defense Mechanisms for the Internet of Things. SIoT 2018: 8-17 - 2017
- [j2]Mengmeng Ge, Jin B. Hong
, Walter Guttmann, Dong Seong Kim
:
A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83: 12-27 (2017) - [c8]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim
:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. DSN Workshops 2017: 53-60 - [c7]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
Evaluating the Effectiveness of Security Metrics for Dynamic Networks. TrustCom/BigDataSE/ICESS 2017: 277-284 - [c6]Mengmeng Ge, Jin B. Hong
, Hani Alzaid, Dong Seong Kim
:
Security Modeling and Analysis of Cross-Protocol IoT Devices. TrustCom/BigDataSE/ICESS 2017: 1043-1048 - [i1]Mengmeng Ge, Huy Kang Kim, Dong Seong Kim:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. CoRR abs/1705.00128 (2017) - 2016
- [j1]Mengmeng Ge, Kim-Kwang Raymond Choo
, Huai Wu, Yong Yu
:
Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63: 24-38 (2016) - [c5]Simon Yusuf Enoch
, Mengmeng Ge, Jin B. Hong
, Huy Kang Kim, Paul Kim, Dong Seong Kim
:
Security Modelling and Analysis of Dynamic Enterprise Networks. CIT 2016: 249-256 - 2015
- [c4]Mengmeng Ge, Dong Seong Kim
:
A Framework for Modeling and Assessing Security of the Internet of Things. ICPADS 2015: 776-781 - 2014
- [c3]Mengmeng Ge, Kim-Kwang Raymond Choo:
A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. NSS 2014: 462-475 - 2013
- [c2]Theodoros Spyridopoulos, George C. Oikonomou
, Theo Tryfonas
, Mengmeng Ge:
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. SEC 2013: 28-41
2000 – 2009
- 2008
- [c1]Haining Wang, Huifeng Xue, Mengmeng Ge:
Application and Practice of System Integration Approach in Intelligent Human Motion Recognition. CSSE (1) 2008: 156-159
Coauthor Index
aka: Dan Dongseong Kim

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint