Fast Efficient Algorithm for Enhancement of Low Lighting Video X Dong, G Wang, Y Pang, W Li, J Wen, W Meng, Y Lu 2011 IEEE International Conference on Multimedia and Expo, 1-6, 2011 | 743 | 2011 |
Scalable Name Lookup in NDN Using Effective Name Component Encoding Y Wang, K He, H Dai, W Meng, J Jiang, B Liu, Y Chen 2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012 | 190 | 2012 |
Wire Speed Name Lookup: A GPU-based Approach Y Wang, Y Zu, T Zhang, K Peng, Q Dong, B Liu, W Meng, H Dai, X Tian, ... 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2013 | 146 | 2013 |
Understanding Malvertising Through Ad-Injecting Browser Extensions X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee 24th International Conference on World Wide Web, 1286-1295, 2015 | 128 | 2015 |
LAP: Lightweight Anonymity and Privacy HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng 2012 IEEE Symposium on Security and Privacy (SP), 506-520, 2012 | 108 | 2012 |
The Price of Free: Privacy Leakage in Personalized Mobile In-App Ads W Meng, R Ding, SP Chung, S Han, W Lee NDSS Symposium 2016, 2016 | 101 | 2016 |
Take This Personally: Pollution Attacks on Personalized Services X Xing, W Meng, D Doozan, AC Snoeren, N Feamster, W Lee 22nd USENIX Security Symposium (USENIX Security 13), 671-686, 2013 | 75 | 2013 |
Exposing Inconsistent Web Search Results with Bobble X Xing, W Meng, D Doozan, N Feamster, W Lee, AC Snoeren International Conference on Passive and Active Network Measurement, 131-140, 2014 | 70 | 2014 |
Parallel Name Lookup for Named Data Networking Y Wang, H Dai, J Jiang, K He, W Meng, B Liu 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 53 | 2011 |
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising W Meng, X Xing, A Sheth, U Weinsberg, W Lee 2014 ACM SIGSAC Conference on Computer and Communications Security, 129-140, 2014 | 41 | 2014 |
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee 27th USENIX Security Symposium (USENIX Security 18), 393-410, 2018 | 37 | 2018 |
MineThrottle: Defending against Wasm In-Browser Cryptojacking W Bian, W Meng, M Zhang The Web Conference 2020, 3112-3118, 2020 | 35 | 2020 |
Revisiting Mobile Advertising Threats with MAdLife G Chen, W Meng, J Copeland The Web Conference 2019, 207-217, 2019 | 31 | 2019 |
All Your Clicks Belong to Me: Investigating Click Interception on the Web M Zhang, W Meng, S Lee, B Lee, X Xing 28th USENIX Security Symposium (USENIX Security 19), 2019 | 30 | 2019 |
TrackMeOrNot: Enabling Flexible Control on Web Tracking W Meng, B Lee, X Xing, W Lee 25th International Conference on World Wide Web, 99-109, 2016 | 29 | 2016 |
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities Y Liu, M Zhang, W Meng 2021 IEEE Symposium on Security and Privacy (SP), 1468-1484, 2021 | 27 | 2021 |
SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration C Luo, W Meng, P Li 2023 IEEE Symposium on Security and Privacy (SP), 2693-2707, 2023 | 26 | 2023 |
ALFE: A Replacement Policy to Cache Elephant Flows in the Presence of Mice Flooding T Pan, X Guo, C Zhang, W Meng, B Liu 2012 IEEE International Conference on Communications (ICC), 2961-2965, 2012 | 25 | 2012 |
Greening the Internet Using Multi-Frequency Scaling Scheme W Meng, Y Wang, C Hu, K He, J Li, B Liu 2012 IEEE 26th International Conference on Advanced Information Networking …, 2012 | 23 | 2012 |
GPU-accelerated Name Lookup with Component Encoding Y Wang, H Dai, T Zhang, W Meng, J Fan, B Liu Computer Networks 57 (16), 3165-3177, 2013 | 21 | 2013 |