Mengyun Tang

ORCID: 0000-0003-1210-2779
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Advanced Steganography and Watermarking Techniques
  • Wireless Communication Networks Research
  • Tensor decomposition and applications
  • Spam and Phishing Detection
  • Adversarial Robustness in Machine Learning
  • Sparse and Compressive Sensing Techniques
  • Topic Modeling
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Financial Markets and Investment Strategies
  • Educational Reforms and Innovations
  • Psychedelics and Drug Studies
  • Privacy-Preserving Technologies in Data
  • Complex Systems and Time Series Analysis
  • Data Quality and Management
  • Indoor and Outdoor Localization Technologies
  • Advanced Adaptive Filtering Techniques
  • Blind Source Separation Techniques
  • Biometric Identification and Security
  • Bacillus and Francisella bacterial research
  • Handwritten Text Recognition Techniques
  • Corporate Finance and Governance

Xidian University
2016-2018

Institute of Software
2016-2018

Tencent (China)
2018

PLA Army Engineering University
2015-2016

Hunan Normal University
2013

The ability of hackers to infiltrate computer systems using attack programs and bots led the development Captchas or Completely Automated Public Turing Tests Tell Computers Humans Apart. text Captcha is most popular scheme given its ease construction user friendliness. However, next generation programmers has decreased expected security these mechanisms, leaving websites open attack. Text are still widely used, because it believed that speeds slow, typically two five seconds per image, this...

10.1109/tifs.2018.2821096 article EN IEEE Transactions on Information Forensics and Security 2018-03-29

Text-based Captchas have been widely deployed across the Internet to defend against undesirable or malicious bot programs.Many attacks proposed; these fine prior art advanced scientific understanding of Captcha robustness, but most them a limited applicability.In this paper, we report simple, low-cost powerful attack that effectively breaks wide range text with distinct design features, including those by Google, Microsoft, Yahoo!, Amazon and other giants.For all schemes, our achieved...

10.14722/ndss.2016.23154 article EN 2016-01-01

Captcha is a security mechanism designed to differentiate between computers and humans, used defend against malicious bot programs. Text-based Captchas are the most widely deployed differentiation mechanism, almost all text-based single layered. Numerous successful attacks on single-layer by Google, Yahoo!, Amazon have been reported. In 2015, Microsoft new two-layer scheme. This appears be first application of Captchas. It is, therefore, natural ask fundamental question: as secure its...

10.1109/tifs.2017.2682704 article EN IEEE Transactions on Information Forensics and Security 2017-03-16

Spectrum data, which are usually characterized by many dimensions, such as location, frequency, time, and signal strength, present formidable challenges in terms of acquisition, processing, visualization. In practice, a portion spectrum data entries may be unavailable due to the interference during acquisition process or compression sensing process. Nevertheless, completion work multi-dimensional has drawn few attention researchers working field. this paper, we first put forward concept...

10.1109/access.2016.2627243 article EN cc-by-nc-nd IEEE Access 2016-01-01

Spectrum data, which is usually characterized by many dimensions, such as location, frequency, time and signal strength, presents formidable challenges in terms of acquisition, processing visualization. In practice, a portion spectrum data entries may be unavailable due to the interference during acquisition process or compression sensing process. However, completion work multi-dimensional has drawn few attention. this paper, we first put forward concept tensor depict then invoke recent...

10.1109/wcsp.2016.7752600 article EN 2016-10-01

This paper presents an efficient method to construct white space database for devices communicate in TV (TVWS). The goal is build a TVWS which senses the spectrum signal strength from (WSDs). Considering incompleteness of measurement data, we formulate problem spatial inference as matrix completion and propose data recovery by combining fixed point continuation algorithm (FPCA) with popular k-nearest neighbor (KNN) algorithm. Simulation results show that proposed approach has better...

10.1109/pccc.2015.7410268 article EN 2015-12-01

Text retrieval has been widely-used in many online applications to help users find relevant information from a text collection. In this paper, we study new attack scenario against evaluate its robustness adversarial attacks under the black-box setting, which attackers want their own texts always get high relevance scores with different users' input queries and thus be retrieved frequently can receive large amounts of impressions for profits. Considering that most current methods only simply...

10.18653/v1/2022.repl4nlp-1.20 article EN cc-by 2022-01-01

Evaluating Large Language Models (LLMs) is crucial for understanding their capabilities and limitations across various applications, including natural language processing code generation. Existing benchmarks like MMLU, C-Eval, HumanEval assess general LLM performance but lack focus on specific expert domains such as cybersecurity. Previous attempts to create cybersecurity datasets have faced limitations, insufficient data volume a reliance multiple-choice questions (MCQs). To address these...

10.48550/arxiv.2412.20787 preprint EN arXiv (Cornell University) 2024-12-30

Text-based Captchas are now most widely used security technology for differentiating between computers and humans. Hollow have emerged as one of the latest designs, they been deployed by more major companies. Besides Yahoo!, Tencent, Sina, China Mobile Baidu, some other websites, especially higher requirement shopping websites also using this scheme. A main feature such schemes is to use contour lines form connected hollow characters with aim improving usability simultaneously. It hard...

10.3966/160792642018081904011 article EN 網際網路技術學刊 2018-07-01
Coming Soon ...