Searched for: author%3A%22Li%2C+Meng%22
(1 - 15 of 15)
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Jiang, Chuanning (author), An, Xizhong (author), Li, Meng (author), Wu, Yuhang (author), Gou, Dazhao (author), Wu, Yongli (author)
Mixing structures and characteristics are crucial to the mixing quality of spherical/cylindrical binary granular systems like the biomass-coal mixtures which can affect energy release and carbon emissions. In this work, the mixing of binary spheres/cylinders in a rotating drum was numerically reproduced by using discrete element method (DEM)....
journal article 2023
document
Diab Montero, H.A. (author), Li, Meng (author), van Dinther, Ylona (author), Vossepoel, F.C. (author)
Our ability to forecast earthquakes and slow slip events is hampered by limited information on the current state of stress on faults. Ensemble data assimilation methods permit estimating the state by combining physics-based models and observations, while considering their uncertainties. We use an ensemble Kalman filter (EnKF) to estimate...
journal article 2023
document
Dix, Barbara (author), Li, Meng (author), Roosenbrand, E.J. (author), Francoeur, Colby (author), Brown, Steven S. (author), Gilman, Jessica B. (author), Hanisco, Thomas F. (author), Veefkind, j. Pepijn (author), Levelt, Pieternel Felicitas (author)
We analyzed observational and model data to study the sources of formaldehyde over oil and gas production regions and to investigate how these observations may be used to constrain oil and gas volatile organic compound (VOC) emissions. The analysis of aircraft and satellite data consistently found that formaldehyde over oil and gas production...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Kumar, Neeraj (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Current connected and autonomous vehicles will contribute to various and green vehicular services. However, sharing personal data with untrustworthy Navigation Service Providers (NSPs) raises serious location concerns. To address this issue, many Location Privacy-Preserving Mechanisms (LPPMs) have been proposed. In addition, several...
journal article 2022
document
Dix, Barbara (author), Francoeur, Colby (author), Li, Meng (author), Serrano Calvo, R. (author), Levelt, Pieternel Felicitas (author), Veefkind, j. Pepijn (author), McDonald, Brian C. (author), De Gouw, Joost (author)
The production of crude oil and natural gas is associated with emissions of air pollutants, such as nitrogen oxides (NOx = NO + NO2) and volatile organic compounds, which are precursors for the formation of ground-level ozone. Knowledge of these emissions is critical to the understanding and mitigation of local air quality. NOx emissions from...
journal article 2022
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous...
journal article 2022
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author), Alazab, Mamoun (author)
Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and their anonymous requests (credentials). Besides this attack,...
journal article 2022
document
Li, Meng (author), Gao, Jianbo (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Ride-Hailing Service (RHS) has drawn plenty of attention as it provides transportation convenience for riders and financial incentives for drivers. Despite these benefits, riders risk the exposure of sensitive location data during ride requesting to an untrusted Ride-Hailing Service Provider (RHSP). Our motivation arises from repetitive...
journal article 2022
document
Li, Meng (author), Gao, Jianbo (author), Zhang, Zijian (author), Fu, Chaoping (author), Lal, C. (author), Conti, M. (author)
Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the query ability. However, no prior work has considered the user...
conference paper 2022
document
Li, Meng (author), Zhang, Mingwei (author), Gao, Jianbo (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current location. It is well-acknowledged that location privacy is vital to users and several prominent...
conference paper 2022
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author)
Vehicular networks allow billions of vehicular users to be connected to report and exchange real-time data for offering various services, such as navigation, ride-hailing, smart parking, traffic monitoring, and vehicular digital forensics. Fifth generation (5G) is a new radio access technology with greater coverage, accessibility, and higher...
journal article 2021
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing reputation systems cannot defend the centralized server against arbitrarily tampering with the supplier’s reputation. Furthermore, they do not offer reputation access across platforms. Rates are faced with privacy...
journal article 2021
document
Chen, Yifei (author), Li, Meng (author), Zheng, Shuli (author), Lal, C. (author), Conti, M. (author)
Ride-Hailing Service (RHS) has motivated the rise of innovative transportation services. It enables riders to hail a cab or private vehicle at the roadside by sending a ride request to the Ride-Hailing Service Provider (RHSP). Such a request collects rider’s real-time locations, which incur serious privacy concerns for riders. While there are...
conference paper 2021
Searched for: author%3A%22Li%2C+Meng%22
(1 - 15 of 15)