Maggie

Dr. Zhang received her B.E. and M.E. in Information Security from Nanjing University of Posts and Telecommunications. She obtained her Ph.D. in Information and Systems Engineering from Concordia University in Montreal, under the supervision of Prof. Lingyu Wang. She then worked as an Experienced Researcher at Ericsson Research, and is currently a Research Assistant Professor in the Department of Computing at the Hong Kong Polytechnic University.

Her research interests include cloud computing/5G security and privacy, security metrics, software security, attack surface, and applied machine learning in security. She has published book chapters and several research papers in top-tier peer-reviewed international journals and conferences such as TIFS, TDSC, CCS, ESORICS.

Publications

DBLP profile ORCID
  1. Gagandeep Singh Chawla, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, "VMGuard: State-based Proactive Verification of Virtual Network Isolation with Application to NFV," IEEE Transactions on Dependable and Secure Computing (TDSC, to appear).
  2. Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal Atallah, Bernard Lebel, "Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems," IEEE Transactions on Dependable and Secure Computing (TDSC, to appear).
  3. Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi, "NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack," in Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science (CloudCom '20), Bangkok, Thailand, Dec. 14-17, 2020.
  4. Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, "R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions," in Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), Orlando, USA, Nov. 9-13, 2020.
  5. Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, "Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack," in Proceedings of the 8th IEEE Conference on Communications and Network Security (CNS '20), Avignon, France, June 29-July 1, 2020.
  6. Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, "Modeling NFV Deployment to Identify the Cross-level Inconsistency Vulnerabilities", in Proceedings of the 11th IEEE International Conference on Cloud Computing Technology and Science (CloudCom '19), Sydney, Australia, Dec. 11-13, 2019.
  7. Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, "iCAT: An Interactive Customizable Anonymization Tool," in Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS '19), Luxembourg, Sep. 23-27, 2019.
  8. Mengyuan Zhang, Xavier de Carné de Carnavalet, Lingyu Wang, Ahmed Ragab, "Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security," IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 9, Sep. 2019, pages 2315-2330.
  9. Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia and Anoop Singhal, "CASFinder: Detecting Common Attack Surface," in Proceedings of the 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec '19), Charleston, SC, USA, July 15-17, 2019 (Best Paper Award).
  10. Mina Khalili, Mengyuan Zhang, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor, "Monitoring and Improving Managed Security Services inside a Security Operation Center," EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 18, Jan. 2019.
  11. Taous Madi, Mengyuan Zhang, Yosr Jarrayay, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, "QuantiC: Distance Metrics for Evaluating Multi-tenancy Threats in Public Cloud," in Proceedings of the 10th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom '18), Nicosia, Cyprus, Dec. 10-13, 2018.
  12. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 1, Dec. 2018, pages 310-324.
  13. Lingyu Wang, Mengyuan Zhang, Anoop Singhal, "Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks," in From Database to Cyber Security (Book Chapter), In: Samarati P., Ray I. (eds), Springer, 2018.
  14. Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, "Measuring the Security Posture of IEC 61850 Substations with Redundancy Against Zero Day Attacks," in Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm '17), Dresden, Germany, Oct. 23-26, 2017.
  15. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese. "Network Diversity: A Security Metric for Evaluating the Resilience of Networks against Zero-Day Attacks," IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, no. 5, 2016, Jan. 2016, pages 1071-1086.
  16. Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese. "Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks," in Proceedings of the European Symposium on Research in Computer Security (ESORICS '14), Wroclaw, Poland. Sep. 7-11, 2014.
  17. Wei Zhang, Mengyuan Zhang, and Ruchuan Wang, "A Security Label Algorithm Based on Browser Object's Multiple Attributes," Journal of Computer Research and Development, ISSN 1000-1239/ CN 11-1777/TP, 2012, pages 39-45.
  18. Wei Zhang, Kuan Fan, Mengyuan Zhang, Ruchuan Wang. "An Application Layer DDoS Attack Detection Method Based on D-S Evidence," Journal of Jiangsu University of Science and Technology (Natural Science Edition), ISTIC 26.3 (2012).
  19. Kangkang Li, Mengyuan Zhang, Wei Sun, Qiang Ye and Cong Ye. "Research on Radio Access Network Resource Allocation Scheme," in Proceedings of the IEEE International Conference on Computer and Information Science, Safety Engineering (CAISSE '12), Wuhan, China. June 15-17, 2012.
  20. Li Kangkang, Xie Yang, Zhang Mengyuan, Ye Qiang, Pan Su. "Network Resource Allocation Algorithm Optimization Based on User's Satisfactory Level," in Proceedings of the IET International Workshop on Wireless Communications and Network Technologies (IET-WCNT '12), Xiamen, China. March 24-26, 2012.
  21. Wei Zhang, Mengyuan Zhang, Yiyang Liu, Ruchuan Wang. "A New Time-Memory-Resource Trade-Off Method for Password Recovery," in Proceedings of the International Conference on Communications and Intelligence Information Security (ICCIIS '10), Guangxi Nanning, China. October 13-14, 2010.