default search action
Feng Cheng 0002
Person information
- affiliation: Hasso Plattner Institute, Potsdam
Other persons with the same name
- Feng Cheng — disambiguation page
- Feng Cheng 0001 — Wuhan University, School of Electronic Information, Radio Detection Research Center, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Pejman Najafi, Wenzel Pünter, Feng Cheng, Christoph Meinel:
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation. Comput. Secur. 136: 103519 (2024) - [j13]Pejman Najafi, Feng Cheng, Christoph Meinel:
HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity. Comput. Secur. 146: 104040 (2024) - [i2]Farzad Nourmohammadzadeh Motlagh, Mehrdad Hajizadeh, Mehryar Majd, Pejman Najafi, Feng Cheng, Christoph Meinel:
Large Language Models in Cybersecurity: State-of-the-Art. CoRR abs/2402.00891 (2024) - 2023
- [j12]Junjie Peng, Ting Wu, Wenqiang Zhang, Feng Cheng, Shuhua Tan, Fen Yi, Yansong Huang:
A fine-grained modal label-based multi-stage network for multimodal sentiment analysis. Expert Syst. Appl. 221: 119721 (2023) - [j11]Gan Chen, Junjie Peng, Wenqiang Zhang, Kanrun Huang, Feng Cheng, Haochen Yuan, Yansong Huang:
A Region Group Adaptive Attention Model For Subtle Expression Recognition. IEEE Trans. Affect. Comput. 14(2): 1613-1626 (2023) - [j10]Qianqian Xu, Junjie Peng, Cangzhi Zheng, Shuhua Tan, Fen Yi, Feng Cheng:
Short Text Classification of Chinese with Label Information Assisting. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(4): 119:1-119:19 (2023) - [c76]Farzad Nourmohammadzadeh Motlagh, Seyed Ali Alhosseini, Feng Cheng, Christoph Meinel:
An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing Platforms. ICMLT 2023: 264-268 - 2022
- [c75]Mehryar Majd, Pejman Najafi, Seyed Ali Alhosseini, Feng Cheng, Christoph Meinel:
A Comprehensive Review of Anomaly Detection in Web Logs. BDCAT 2022: 158-165 - 2021
- [j9]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
Continuous auditing and threat detection in multi-cloud infrastructure. Comput. Secur. 102: 102124 (2021) - [c74]Muhammad I. H. Sukmana, Justus Cöster, Wenzel Pünter, Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
A Feasibility Study of Log-Based Monitoring for Multi-cloud Storage Systems. AINA (2) 2021: 458-471 - [c73]Daniel Köhler, Eric Klieme, Matthias Kreuseler, Feng Cheng, Christoph Meinel:
Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. CSP 2021: 22-31 - [c72]Pejman Najafi, Daniel Köhler, Feng Cheng, Christoph Meinel:
NLP-based Entity Behavior Analytics for Malware Detection. IPCCC 2021: 1-5 - [c71]Pejman Najafi, Feng Cheng, Christoph Meinel:
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management. SecureComm (1) 2021: 25-43 - 2020
- [j8]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure. IEEE Access 8: 123044-123060 (2020) - [c70]Muhammad Ihsan Haikal Sukmana, Kennedy Aondona Torkura, Sezi Dwi Sagarianti Prasetyo, Feng Cheng, Christoph Meinel:
A Brokerage Approach for Secure Multi-Cloud Storage Resource Management. SecureComm (2) 2020: 102-119
2010 – 2019
- 2019
- [c69]Pejman Najafi, Alexander Mühle, Wenzel Pünter, Feng Cheng, Christoph Meinel:
MalRank: a measure of maliciousness in SIEM-based knowledge graphs. ACSAC 2019: 417-429 - [c68]Muhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Ankit Chauhan, Feng Cheng, Christoph Meinel:
Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution. AINA 2019: 1240-1253 - [c67]Muhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Feng Cheng, Christoph Meinel:
Unified Cloud Access Control Model for Cloud Storage Broker. ICOIN 2019: 60-65 - [c66]Muhammad Ihsan Haikal Sukmana, Marvin Petzolt, Kennedy Aondona Torkura, Hendrik Graupner, Feng Cheng, Christoph Meinel:
Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker System. ISPA/BDCloud/SocialCom/SustainCom 2019: 847-856 - [c65]Chris Pelchen, David Jaeger, Feng Cheng, Christoph Meinel:
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm. ISPEC 2019: 464-475 - [c64]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems. NCA 2019: 1-5 - [c63]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
Security Chaos Engineering for Cloud Services: Work In Progress. NCA 2019: 1-3 - 2018
- [j7]Junjie Peng, Danxu Liu, Yingtao Wang, Ying Zeng, Feng Cheng, Wenqiang Zhang:
Weight-based strategy for an I/O-intensive application at a cloud data center. Concurr. Comput. Pract. Exp. 30(19) (2018) - [j6]David Jaeger, Hendrik Graupner, Chris Pelchen, Feng Cheng, Christoph Meinel:
Fast Automated Processing and Evaluation of Identity Leaks. Int. J. Parallel Program. 46(2): 441-470 (2018) - [c62]Kennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Anne V. D. M. Kayem, Feng Cheng, Hendrik Graupner, Christoph Meinel:
Securing Cloud Storage Brokerage Systems Through Threat Models. AINA 2018: 759-768 - [c61]David Jaeger, Feng Cheng, Christoph Meinel:
Accelerating Event Processing for Security Analytics on a Distributed In-Memory Platform. DASC/PiCom/DataCom/CyberSciTech 2018: 634-643 - [c60]Junjie Peng, Yingtao Wang, Gan Chen, Lujin You, Feng Cheng, Weiqiang Lv:
A Virtual Machine Dynamic Adjustment Strategy Based on Load Forecasting. ICA3PP (2) 2018: 538-550 - [c59]Muhammad I. H. Sukmana, Kennedy A. Torkura, Feng Cheng, Christoph Meinel, Hendrik Graupner:
Unified logging system for monitoring multiple cloud storage providers in cloud storage broker. ICOIN 2018: 44-49 - [c58]Kennedy A. Torkura, Muhammad I. H. Sukmana, Tim Strauss, Hendrik Graupner, Feng Cheng, Christoph Meinel:
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. NCA 2018: 1-10 - [c57]Kennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Feng Cheng, Christoph Meinel, Hendrik Graupner:
A threat modeling approach for cloud storage brokerage and file sharing systems. NOMS 2018: 1-5 - [c56]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era. SecureComm (1) 2018: 471-490 - 2017
- [j5]Andrey Sapegin, David Jaeger, Feng Cheng, Christoph Meinel:
Towards a system for complex analysis of security events in large-scale networks. Comput. Secur. 67: 16-34 (2017) - [j4]Andrey Sapegin, Marian Gawron, David Jaeger, Feng Cheng, Christoph Meinel:
Evaluation of in-memory storage engine for machine learning analysis of security events. Concurr. Comput. Pract. Exp. 29(2) (2017) - [j3]Amir Azodi, Feng Cheng, Christoph Meinel:
Event Driven Network Topology Discovery and Inventory Listing Using REAMS. Wirel. Pers. Commun. 94(3): 415-430 (2017) - [c55]Marian Gawron, Feng Cheng, Christoph Meinel:
Automatic Vulnerability Classification Using Machine Learning. CRiSIS 2017: 3-17 - [c54]Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Identifying Suspicious User Behavior with Neural Networks. CSCloud 2017: 255-263 - [c53]Martin Ussath, Feng Cheng, Christoph Meinel:
Enhanced Sinkhole System: Collecting System Details to Support Investigations. MSPN 2017: 18-33 - [c52]Pejman Najafi, Andrey Sapegin, Feng Cheng, Christoph Meinel:
Guilt-by-Association: Detecting Malicious Entities via Graph Mining. SecureComm 2017: 88-107 - [c51]Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications. SmartCloud 2017: 90-97 - 2016
- [c50]Amir Azodi, Feng Cheng, Christoph Meinel:
Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts. AINA 2016: 1064-1071 - [c49]Hendrik Graupner, David Jaeger, Feng Cheng, Christoph Meinel:
Automated parsing and interpretation of identity leaks. Conf. Computing Frontiers 2016: 127-134 - [c48]Martin Ussath, David Jaeger, Feng Cheng, Christoph Meinel:
Advanced persistent threats: Behind the scenes. CISS 2016: 181-186 - [c47]Martin Ussath, Feng Cheng, Christoph Meinel:
Event attribute tainting: A new approach for attack tracing and event correlation. NOMS 2016: 509-515 - [c46]Martin Ussath, Feng Cheng, Christoph Meinel:
Insights into Encrypted Network Connections: Analyzing Remote Desktop Protocol Traffic. PDP 2016: 585-589 - [c45]Martin Ussath, Feng Cheng, Christoph Meinel:
Automatic multi-step signature derivation from taint graphs. SSCI 2016: 1-8 - 2015
- [c44]Marian Gawron, Feng Cheng, Christoph Meinel:
Automatic detection of vulnerabilities for advanced security analytics. APNOMS 2015: 471-474 - [c43]David Jaeger, Martin Ussath, Feng Cheng, Christoph Meinel:
Multi-step Attack Pattern Detection on Normalized Event Logs. CSCloud 2015: 390-398 - [c42]Feng Cheng, Andrey Sapegin, Marian Gawron, Christoph Meinel:
Analyzing Boundary Device Logs on the In-memory Platform. HPCC/CSS/ICESS 2015: 1367-1372 - [c41]Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
A proposed framework for proactive vulnerability assessments in cloud deployments. ICITST 2015: 51-57 - [c40]Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
Application of quantitative security metrics in cloud computing. ICITST 2015: 256-262 - [c39]David Jaeger, Andrey Sapegin, Martin Ussath, Feng Cheng, Christoph Meinel:
Parallel and distributed normalization of security events for instant attack analysis. IPCCC 2015: 1-8 - [c38]Andrey Sapegin, Marian Gawron, David Jaeger, Feng Cheng, Christoph Meinel:
High-Speed Security Analytics Powered by In-Memory Machine Learning Engine. ISPDC 2015: 74-81 - [c37]Amir Azodi, Marian Gawron, Andrey Sapegin, Feng Cheng, Christoph Meinel:
Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes. MSPN 2015: 28-40 - [c36]Andrey Sapegin, Aragats Amirkhanyan, Marian Gawron, Feng Cheng, Christoph Meinel:
Poisson-Based Anomaly Detection for Identifying Malicious User Behaviour. MSPN 2015: 134-150 - [c35]Martin Ussath, Feng Cheng, Christoph Meinel:
Concept for a security investigation framework. NTMS 2015: 1-5 - [c34]Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, Christoph Meinel:
Simulation user behavior on a security testbed using user behavior states graph. SIN 2015: 217-223 - [c33]Marian Gawron, Aragats Amirkhanyan, Feng Cheng, Christoph Meinel:
Automatic vulnerability detection for weakness visualization and advisory creation. SIN 2015: 229-236 - [c32]David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel:
Normalizing Security Events with a Hierarchical Knowledge Base. WISTP 2015: 237-248 - 2014
- [c31]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines. ICITCS 2014: 1-4 - [c30]David Jaeger, Hendrik Graupner, Andrey Sapegin, Feng Cheng, Christoph Meinel:
Gathering and Analyzing Identity Leaks for Security Awareness. PASSWORDS 2014: 102-115 - 2013
- [j2]Sebastian Roschke, Feng Cheng, Christoph Meinel:
High-quality attack graph-based IDS correlation. Log. J. IGPL 21(4): 571-591 (2013) - [c29]Andrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng, Christoph Meinel:
Hierarchical object log format for normalisation of security events. IAS 2013: 25-30 - [c28]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
Pushing the Limits in Event Normalisation to Improve Attack Detection in IDS/SIEM Systems. CBD 2013: 69-76 - [c27]Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems. DASC 2013: 118-123 - [c26]Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Multi-core Supported High Performance Security Analytics. DASC 2013: 621-626 - [c25]Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Security Event Correlation Supported by Multi-Core Architecture. ICITCS 2013: 1-5 - [c24]Andrey Sapegin, Feng Cheng, Christoph Meinel:
Catch the Spike: On the Locality of Individual BGP Update Bursts. MSN 2013: 78-83 - 2012
- [j1]Sebastian Roschke, Feng Cheng, Christoph Meinel:
An alert correlation platform for memory-supported techniques. Concurr. Comput. Pract. Exp. 24(10): 1123-1136 (2012) - 2011
- [c23]Sebastian Roschke, Feng Cheng, Christoph Meinel:
A New Alert Correlation Algorithm Based on Attack Graph. CISIS 2011: 58-67 - [c22]Feng Cheng, Sebastian Roschke, Christoph Meinel:
An Integrated Network Scanning Tool for Attack Graph Construction. GPC 2011: 138-147 - [c21]Ahmad AlSa'deh, Feng Cheng, Christoph Meinel:
CS-CGA: Compact and more Secure CGA. ICON 2011: 299-304 - [c20]Sebastian Roschke, Feng Cheng, Christoph Meinel:
BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes. Integrated Network Management 2011: 399-406 - [c19]Ahmad AlSa'deh, Feng Cheng, Sebastian Roschke, Christoph Meinel:
IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and Security. NTMS 2011: 1-6 - 2010
- [b1]Feng Cheng:
Physical separation technology and its Lock-Keeper implementation. University of Potsdam, 2010, pp. 1-114 - [c18]Sebastian Roschke, Feng Cheng, Christoph Meinel:
Using vulnerability information and attack graphs for intrusion detection. IAS 2010: 68-73 - [c17]Feng Cheng, Thanh-Dien Tran, Sebastian Roschke, Christoph Meinel:
A Specialized Tool for Simulating Lock-Keeper Data Transfer. AINA 2010: 182-189 - [c16]Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel:
Secure Communication Using Identity Based Encryption. Communications and Multimedia Security 2010: 256-267 - [c15]Sebastian Roschke, Feng Cheng, Christoph Meinel:
A Flexible and Efficient Alert Correlation Platform for Distributed IDS. NSS 2010: 24-31
2000 – 2009
- 2009
- [c14]Sebastian Roschke, Feng Cheng, Christoph Meinel:
An Extensible and Virtualization-Compatible IDS Management Architecture. IAS 2009: 130-134 - [c13]Feng Cheng, Sebastian Roschke, Robert Schuppenies, Christoph Meinel:
Remodeling Vulnerability Information. Inscrypt 2009: 324-336 - [c12]Sebastian Roschke, Feng Cheng, Christoph Meinel:
Intrusion Detection in the Cloud. DASC 2009: 729-734 - [c11]Feng Cheng, Sebastian Roschke, Christoph Meinel:
Implementing IDS Management on Lock-Keeper. ISPEC 2009: 360-371 - [c10]Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel:
Towards Unifying Vulnerability Information for Attack Graph Construction. ISC 2009: 218-233 - [c9]Sebastian Roschke, Feng Cheng, Thanh-Dien Tran, Christoph Meinel:
A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification. NPC 2009: 190-196 - 2008
- [c8]Ge Zhang, Feng Cheng, Christoph Meinel:
SIMPA: A SIP-Based Mobile Payment Architecture. ACIS-ICIS 2008: 287-292 - [c7]Ge Zhang, Feng Cheng, Christoph Meinel:
Towards Secure Mobile Payment Based on SIP. ECBS 2008: 96-104 - [c6]Feng Cheng, Christoph Meinel:
Strong Authentication over Lock-Keeper. SOFSEM 2008: 572-584 - 2007
- [c5]Feng Cheng, Michael Menzel, Christoph Meinel:
A Secure Web Services Providing Framework Based on Lock-Keeper. APNOMS 2007: 375-384 - [c4]Feng Cheng, Christian Wolter, Christoph Meinel:
A Simple, Smart and Extensible Framework for Network Security Measurement. Inscrypt 2007: 517-531 - 2006
- [c3]Feng Cheng, Christoph Meinel:
Lock-Keeper: A New Implementation of Physical Separation Technology. ISSE 2006: 275-286 - [c2]Feng Cheng, Christoph Meinel:
Deployment of Virtual Machines in Lock-Keeper. WISA 2006: 147-159 - 2003
- [c1]Feng Cheng, Paul Ferring, Christoph Meinel, Gerhard Müllenheim, Jochen Bern:
The DualGate Lock-Keeper: A Highly Efficient, Flexible and Applicable Network Security Solution. SNPD 2003: 152-159 - [i1]Feng Cheng, Paul Ferring, Christoph Meinel:
Lock-Keeper Technology - A New Network Security Solution. Universität Trier, Mathematik/Informatik, Forschungsbericht 03-05 (2003)
Coauthor Index
aka: Muhammad Ihsan Haikal Sukmana
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint