Follow
Meng Luo
Meng Luo
ZJU-100 Young Professor, Zhejiang University
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
Faketagger: Robust safeguards against deepfake dissemination via provenance tracking
R Wang, F Juefei-Xu, M Luo, Y Liu, L Wang
Proceedings of the 29th ACM International Conference on Multimedia, 3546-3555, 2021
452021
Hindsight: Understanding the evolution of ui vulnerabilities in mobile browsers
M Luo, O Starov, N Honarmand, N Nikiforakis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
452017
Time does not heal all wounds: A longitudinal analysis of security-mechanism support in mobile browsers
M Luo, P Laperdrix, N Honarmand, N Nikiforakis
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
362019
位置大数据的价值提取与协同挖掘方法
郭迟, 刘经南, 方媛, 罗梦, 崔竞松
软件学报 25 (4), 713-730, 2014
252014
Consensus-clustering-based automatic distribution matching for cross-domain image steganalysis
J Jia, M Luo, S Ma, L Wang, Y Liu
IEEE Transactions on Knowledge and Data Engineering 35 (6), 5665-5679, 2022
102022
Where are you taking me? understanding abusive traffic distribution systems
J Szurdi, M Luo, B Kondracki, N Nikiforakis, N Christin
Proceedings of the Web Conference 2021, 3613-3624, 2021
82021
Need for mobile speed: A historical analysis of mobile web performance
J Nejati, M Luo, N Nikiforakis, A Balasubramanian
TMA, 2020
82020
Multiperspective progressive structure adaptation for JPEG steganography detection across domains
J Jia, M Luo, J Liu, W Ren, L Wang
IEEE Transactions on Neural Networks and Learning Systems 33 (8), 3660-3674, 2021
72021
Partial knowledge transfer in visual recognition systems via joint loss-aware consistency learning
J Jia, M Luo, S Ma, L Wang
IEEE Transactions on Industrial Informatics 18 (11), 7463-7474, 2022
42022
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers
M Luo, B Feng, L Lu, E Kirda, K Ren
IEEE Transactions on Dependable and Secure Computing, 2023
32023
Active or inactive: infer private user information in location-based social network
G Chi, L Meng, L Xuan, C Jingsong
International Journal of Embedded Systems 8 (2-3), 185-195, 2016
32016
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis
B Feng, M Luo, C Liu, L Lu, E Kirda
IEEE Transactions on Dependable and Secure Computing, 2023
12023
Evaluating Mobile-Browser Security with Dynamic Analysis Techniques
M Luo
State University of New York at Stony Brook, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–13