Feng Cheng

ORCID: 0000-0001-5880-8131
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Software System Performance and Reliability
  • Information and Cyber Security
  • Network Packet Processing and Optimization
  • Internet Traffic Analysis and Secure E-voting
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Database Systems and Queries
  • VLSI and FPGA Design Techniques
  • Cloud Computing and Resource Management
  • Data Quality and Management
  • Traumatic Brain Injury and Neurovascular Disturbances
  • Mobile Agent-Based Network Management
  • 3D IC and TSV technologies
  • S100 Proteins and Annexins
  • Fish biology, ecology, and behavior
  • Neurosurgical Procedures and Complications
  • Parallel Computing and Optimization Techniques
  • Spam and Phishing Detection
  • Anomaly Detection Techniques and Applications
  • Graph Theory and Algorithms
  • Data Mining Algorithms and Applications
  • Advanced Authentication Protocols Security
  • VLSI and Analog Circuit Testing
  • Complex Network Analysis Techniques

University of Potsdam
2008-2023

Yancheng Institute of Technology
2023

Hasso Plattner Institute
2010-2022

City University of Hong Kong
2022

National University of Singapore
2022

University of South Florida
2021

State University of New York at Potsdam
2018

Suzhou Kowloon Hospital
2018

Soochow University
2018

Jiangsu University
2014-2018

The use of FPGAs for efficient graph processing has attracted significant interest. Recent memory subsystem upgrades including the introduction HBM in promise to further alleviate bottlenecks. However, modern multi-channel requires much more pipelines fully utilize its bandwidth potential. Due insufficient resource efficiency, existing designs do not scale well, resulting underutilization facilities even when all other resources are consumed. In this paper, we propose ReGraph <sup...

10.1109/micro56248.2022.00092 article EN 2022-10-01

Microservice Architectures (MSA) structure applications as a collection of loosely coupled services that implement business capabilities. The key advantages MSA include inherent support for continuous deployment large complex applications, agility and enhanced productivity. However, studies indicate most are homogeneous, introduce shared vulnerabilites, thus vulnerable to multi-step attacks, which economics-of-scale incentives attackers. In this paper, we address the issue vulnerabilities in...

10.1109/bdcloud.2018.00137 article EN 2018-12-01

In this paper, we formulate threat detection in SIEM environments as a large-scale graph inference problem. We introduce SIEM-based knowledge which models global associations among entities observed proxy and DNS logs, enriched with related open source intelligence (OSINT) cyber (CTI). Next, propose MalRank, graph-based algorithm designed to infer node maliciousness score based on its other presented the graph, e.g., shared IP ranges or name servers.

10.1145/3359789.3359791 article EN 2019-11-22

Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. The problem of false-positive alerts is a popular existing most IDS approaches. solution to address this correlation clustering alerts. To meet the practical requirements, process needs be finished as soon possible, which challenging task amount produced large scale deployments distributed significantly high. We identify data storage processing...

10.1109/nss.2010.26 article EN 2010-09-01

FPGA has been an emerging computing infrastructure in datacenters benefiting from fine-grained parallelism, energy efficiency, and reconfigurability. Meanwhile, graph processing attracted tremendous interest data analytics, its performance is increasing demand with the rapid growth of data. Many works have proposed to tackle challenges designing efficient FPGA-based accelerators for processing. However, largely overlooked programmability still requires hardware design expertise sizable...

10.1145/3517141 article EN ACM Transactions on Reconfigurable Technology and Systems 2022-03-05

Teleost fishes comprise more than half of the vertebrate species. Within teleosts, most phylogenies consider split between Osteoglossomorpha and Euteleosteomorpha/Otomorpha as basal, preceded only by derivation primitive group Elopomorpha. While are generally species poor, taxon contains African weakly electric fish (Mormyroidei), which have radiated into numerous mormyrids, genus Campylomormyrus is mostly endemic to Congo Basin. serves a model understand mechanisms adaptive radiation...

10.1186/s12864-023-09196-6 article EN cc-by BMC Genomics 2023-03-20

Intrusion Detection Systems are widely deployed in computer networks. As modern attacks getting more sophisticated and the number of sensors network nodes grow, problem false positives alert analysis becomes difficult to solve. Alert correlation was proposed analyse alerts decrease positives. Knowledge about target system or environment is usually necessary for efficient correlation. For representing information as well potential exploits, existing vulnerabilities their Attack Graph (AG)...

10.1093/jigpal/jzs034 article EN Logic Journal of IGPL 2012-07-30

The current state of affairs regarding the way events are logged by IT systems is source many problems for developers Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) systems. These stand in development more accurate security solutions that draw their results from data included within logs they process. This mainly caused a lack standards can encapsulate all coherent way. As result, correlating between produced different use log formats has been difficult...

10.1109/cbd.2013.27 article EN International Conference on Advanced Cloud and Big Data 2013-12-01

Objective: The impact of hypertonic saline (HTS) on control increased intracranial pressure (ICP) in head-injured patients undergoing decompressive craniectomy (DC) is yet to be established. current retrospective study was carried out compare the effect HTS versus mannitol lowering ICP burdens these patients. Methods: We reviewed data TBI admitted between January 1, 2012, and August 31, 2017. Patients after DC who received only 1 type hyperosmotic agent, 3% or 20% mannitol, were included....

10.3389/fneur.2018.00631 article EN cc-by Frontiers in Neurology 2018-07-31

Nowadays, we have a lot of data produced by social media services, but more and often these contain information about location that gives us the wide range possibilities to analyze them. Since can be interested not only in content, also where this content was produced. For good analyzing geo-spatial data, need find best approaches for geo clustering. And approach means real-time clustering massive geodata with high accuracy. In paper, present new online maps, such as Google Maps,...

10.1109/innovations.2015.7381559 article EN 2015-11-01

In recent years, many mobile payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance adoption of MP technologies is to deploy an effective system. So far, there no such standardised scalable platform. Most current are circumscribed by its network infrastructures. Fortunately, the fast advancement 3G technology equips next generation phone more benefits. Following this direction, we propose SIMPA - A SIP-based Mobile Payment Architecture...

10.1109/icis.2008.80 article EN 2008-05-01

Intrusion Detection Systems (IDS) have been used widely to detect malicious behavior in network communication and hosts. IDS management is an important capability for distributed solutions, which makes it possible integrate handle different types of sensors or collect synthesize alerts generated from multiple hosts located the environment. Sophisticated attacks are difficult make necessary data sources detection correlation. Attack graph (AG) as effective method model, analyze, evaluate...

10.1109/isias.2010.5604041 article EN 2010-08-01

Mobile payment has some unique advantages over more traditional methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing solutions rely heavily on underlying communication infrastructures, which are platform-dependent have no unified implementation criteria. This limitation is reducing, however, through the rapid spread of Voice IP (VoIP) telephony service its integration with phones. The Session Initiation Protocol (SIP) currently standard signalling...

10.1109/ecbs.2008.21 article EN 2008-03-01

Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. False-positive alerts are a popular problem most IDS approaches. The solution to address this is enhance the detection process by correlation clustering of alerts. To meet practical requirements, needs be finished fast, which challenging task as amount large-scale deployments significantly high. We identifytextitdata storage processing algorithms...

10.1002/cpe.1750 article EN Concurrency and Computation Practice and Experience 2011-05-02

An increasing number of attacks use advanced tactics, techniques and methods to compromise target systems environments. Such multi-step are often able bypass existing prevention detection systems, such as Intrusion Detection Systems (IDSs), firewalls anti-virus solutions. These security either an anomaly-based or a signature-based approach. For that utilize approach, it is relevant precise signatures identify attacks. The creation complex time consuming, especially for In this paper, we...

10.1109/ssci.2016.7850076 article EN 2021 IEEE Symposium Series on Computational Intelligence (SSCI) 2016-12-01

Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor analyzing logs they produce. In this paper, we propose method visualizing attacks aggregating, normalizing alerts raised SIEM-based IDS (SIDS) as well NIDS real-time. We present results our proposed visualization...

10.1109/aina.2016.129 article EN 2016-03-01
Coming Soon ...