Awards selected

  • Faculty Excellence Award in Research and Creative Endeavors, EIT College of UA Little Rock 2017
  • Best Poster Award, 2016 IEEE Conference on Communications and Network Security 2016
  • NIH mHealth Summer Training Institute (mHTI) Scholarship, NIH 2015

Grants selected

Software Release

  • AE-LDA: Discovering Drug-related Adverse Events from Tweets Using Topic Models.
  • Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises.

Publications

Refereed Journal Papers

  1. Yue Zhao, Kenji Yoshigoe, Jiang Bian, Mengjun Xie, Zhe Xue, and Yong Feng, A Distributed Graph-Parallel Computing System with Lightweight Communication Overhead, in IEEE Transactions on Big Data, volume 2, issue 3, pp. 204-218. doi: 10.1109/TBDATA.2016.2532907, 2016.
  2. Jiang Bian, Kenji Yoshigoe, Amanda Hicks, Jiawei Yuan, Zhe He, Mengjun Xie, Yi Guo, Mattia Prosperi, Ramzi Salloum, François Modave, Mining Twitter to Assess the Public Perception of the "Internet of Things", in PLoS ONE, volume 11, issue 7, e0158450, doi:10.1371/journal.pone.0158450, 2016.
  3. Jiang Bian, Mengjun Xie, Teresa J. Hudson, Hari Eswaran, Mathias Brochhausen, Josh Hanna, and William R. Hogan, CollaborationViz: Interactive visual exploration of biomedical research collaboration networks, in PLoS ONE, volume 9, issue 11, e111928, doi: 10.1371/journal.pone.0111928, 2014.
  4. Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Sujian Zhou, Remzi Seker, and Jiang Bian, Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks, in Journal of Cyber Security and Mobility, volume 3, issue 3, pp. 289-316, doi: 10.13052/jcsm2245-1439.333, 2014.
  5. Jiang Bian, Mengjun Xie, William Hogan, Laura Huchins, Umit Topaloglu, Cheryl Lane, Jennifer Holland, and Thomas Wells, CLARA: An Integrated Clinical Research Administration System, in Journal of the American Medical Informatics Association (JAMIA), volume 21, issue e2, pp. e369-373, doi:10.1136/amiajnl-2013-002616, PMID: 24778201, 2014.
  6. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, Hari Eswaran, and William Hogan, Social Network Analysis of Biomedical Research Collaboration Networks in a CTSA Institution, in Journal of Biomedical Informatics (JBI), doi: 10.1016/j.jbi.2014.01.015, PMID: 24560679, Feb., 2014.
  7. Yue Zhao, Kenji Yoshigoe, and Mengjun Xie, Pre-execution Data Prefetching with I/O Scheduling, in The Journal of Supercomputing, Springer, pp. 1-20, December, 2013.
  8. Zhenyu Wu, Mengjun Xie, and Haining Wang, On Energy Security of Server Systems, in IEEE Transactions on Dependable and Secure Computing (TDSC), volume 9, issue 6, pp. 865–876, 2012.
  9. Mengjun Xie, Zhenyu Wu, and Haining Wang, Secure Instant Messaging in Enterprise-like Networks, in International Journal of Computer and Telecommunications Networking (Computer Networks), volume 56, issue 1, pp. 448–461, 2012.
  10. Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang, Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification, in IEEE/ACM Transactions on Networking (TON), volume 19, issue 5, pp. 1557–1571, 2011.
  11. Zhenyu Wu, Mengjun Xie, and Haining Wang, Design and Implementation of a Fast Dynamic Packet Filter, in IEEE/ACM Transactions on Networking (TON), volume 19, issue 5, pp. 1405–1419, 2011.
  12. Chuan Yue, Mengjun Xie, and Haining Wang, An Automatic HTTP Cookie Management System, in International Journal of Computer and Telecommunications Networking (Computer Networks), volume 54, issue 13, article 7, pp. 2182–2198, 2010.
  13. Mengjun Xie, Heng Yin, and Haining Wang, Thwarting E-mail Spam Laundering, in ACM Transactions on Information and System Security (TISSEC), volume 12, issue 2, article 13, pp. 1–32, 2008. This is the extended version of CCS'06 paper invited for publication in ACM TISSEC.

Refereed Conference Papers

  1. Yanyan Li, Mengjun Xie, and Jiang Bian, SegAuth: A Segment-based Approach to Behavioral Biometric Authentication, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 15--23, Philadelphia, PA, USA, 2016.
  2. Yanyan Li and Mengjun Xie, Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises, in The 17th ACM Annual Conference on IT Education (SIGITE'16), pp. 20--25, Boston, MA, USA, 2016.
  3. Grady Xiao, Mariofanna Milanova, and Mengjun Xie, Secure Behavioral Biometric Authentication with Leap Motion, in Proceedings of the 4th IEEE International Symposium on Digital Forensics and Security (ISDFS'16), pp. 112-118, Little Rock, AR, USA, 2016.
  4. Yanyan Li, Junshuang Yang, and Mengjun Xie, Dylan Carlson, Han Gil Jang, and Jiang Bian, Comparison of PIN- and Pattern-based Behavioral Biometric Authentication on Mobile Devices, in Proceedings of the IEEE Military Communications Conference 2015 (Milcom'15), pp. 1317--1322, Tampa, Florida, USA, 2015.
  5. Amanda Hicks, William R. Hogan, Michael Rutherford, Bradley Malin, Mengjun Xie, Christiane Fellbaum, Zhijun Yin, Daniel Fabbri, Josh Hanna, and Jiang Bian, Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms, in Proceedings of the American Medical Informatics Association (AMIA) 2015 Annual Symposium, pp. 1--10, San Francisco, CA, USA, 2015.
  6. Mengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, and Jiang Bian, CamAuth: Securing Web Authentication with Camera, in Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering (HASE'15), pp. 232--239, Daytona Beach, Florida, USA, 2015.
  7. Jingmin Shi, Chao Peng, Qin Zhu, Pengfei Duan, Yu Bao, and Mengjun Xie, There is a Will, There is a Way: A New Mechanism for Traffic Control based on VTL and VANET, in Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering (HASE'15), pp. 240--246, Daytona Beach, Florida, USA, 2015.
  8. Yanyan Li, Mengjun Xie, and Jiang Bian, USign--A Security Enhanced Electronic Consent Model, in Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC'14), pp. 4487--4490, Chicago, IL, USA, 2014.
  9. Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Suijian Zhou, Remzi Seker, and Jiang Bian, LightGraph: Lighten Communication in Distributed Graph-Parallel Processing, in Proceedings of the 3rd IEEE International Congress on Big Data (BigData Congress'14), pp. 717--724, Anchorage, Alaska, USA, 2014.
  10. Mengjun Xie, Liang Hao, Kenji Yoshigoe, and Jiang Bian, CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones, in Proceedings of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm'13), LNICST 127, pp. 35–52, Sydney, Australia, 2013.
  11. Yue Zhao, Kenji Yoshigoe, and Mengjun Xie, Pre-execution Data Prefetching with Interthread I/O Scheduling, in Proceedings of the 2013 International Supercomputing Conference (ISC'13), pp. 395--407, LNCS, volume 7905, 2013.
  12. Jiang Bian, Remzi Seker, and Mengjun Xie, A Secure Communication Framework for Large-scale Unmanned Aircraft Systems, in Proceedings of the 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS'13) , Herndon, VA, USA, 2013
  13. Jiang Bian, Mengjun Xie, and Umit Topaloglu, A Probabilistic Model of Functional Brain Connectivity Network for Discovering Novel Biomarkers, in Proceedings of the AMIA Summit on Translational Bioinformatics 2013, pp. 21--25, PMCID: PMC3814494, San Francisco, CA, USA, 2013.
  14. Mengjun Xie, Indra Widjaja, and Haining Wang, Enhancing Cache Robustness for Content-Centric Networking, in Proceedings of the 31th IEEE Conference on Computer Communications (INFOCOM'12), pp. 2426--2434, Orlando, FL, USA, 2012.
  15. Douglas Serfass and Mengjun Xie, Secure Intelligence Gathering Using Smartphones, in Proceedings of the 2012 IEEE SoutheastCon, Orlando, FL, USA, 2012.
  16. Jiang Bian, Josh M. Cisler, Mengjun Xie, George A. James, Remzi Seker, and Clinton D. Kilts, A Methodology for Empirical Analysis of Brain Connectivity through Graph Mining, in Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC'11) - Cybernetics Track, pp. 2963--2969, Anchorage, AL, USA, 2011.
  17. Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, and Haining Wang, Mimimorphism: A New Approach to Binary Code Obfuscation, in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pp. 536--546, Chicago, IL, USA, 2010.
  18. Mengjun Xie and Haining Wang, A Collaboration-based Autonomous Reputation System for Email Services, in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM'10), San Diego, CA, USA, 2010.
  19. Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang, Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), pp. 256--268, Chicago, IL, USA, 2009.
  20. Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang, Measurement and Classification of Humans and Bots in Internet Chat, in Proceedings of the 17th USENIX Security Symposium (Security'08), pp. 155--169, San Jose, CA, USA, 2008.
  21. Zhenyu Wu, Mengjun Xie, and Haining Wang, Swift: A Fast Dynamic Packet Filter, in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), pp. 279--292, San Francisco, CA, USA, 2008.
  22. Mengjun Xie, Zhenyu Wu, and Haining Wang, HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-like Networks, in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC'07), pp. 64--73, Miami Beach, FL, USA, 2007.
  23. Chuan Yue, Mengjun Xie, and Haining Wang, Automatic Cookie Usage Setting with CookiePicker, in Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), pp. 460--470, Edinburgh, UK, 2007.
  24. Mengjun Xie, Heng Yin, and Haining Wang, An Effective Defense Against Email Spam Laundering, in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), pp. 179--190, Alexandria, VA, USA, 2006.
  25. Mengjun Xie, Keywan Tabatabai, and Haining Wang, Identifying Low-Profile Web Server's IP Fingerprint, in Proceedings of the 3rd International Conference on the Quantitative Evaluation of Systems (QEST'06), pp. 365--374, Riverside, California, USA, 2006.

Other Refereed Publications

  1. Jonathan Ming and Mengjun Xie, Remote Live Forensics for Android Devices, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 437--438, Philadelphia, PA, USA, 2016.
  2. Diana Anguiano, Ghouri Mohammad Saaduddin, Yanyan Li, and Mengjun Xie, Comparison between Fingerprint and Behavioral Biometric Authentication using 2D and 3D Gestures, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 435--436, Philadelphia, PA, USA, 2016.
  3. Antwane Lewis, Yanyan Li, and Mengjun Xie, Real Time Motion-Based Authentication for Smartwatch, in 2016 IEEE Conference on Communications and Network Security (CNS'16), pp. 478--479, Philadelphia, PA, USA, 2016. (Best Poster Award)
  4. Samiuddin Mohammed and Mengjun Xie, A Measurement Study on Media Streaming over Wi-Fi in Named Data Networking, in Proceedings of the IEEE MASS 2015 Workshop on Content Centric Networking, pp. 543--548, Dallas, TX, USA, 2015.
  5. Junshuang Yang, Yanyan Li, and Mengjun Xie, MotionAuth: Motion-based Authentication for Wrist Worn Smart Devices, in Proceedings of the IEEE PERCOM 2015 Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices, pp. 550--555, St. Louis, MO, USA, 2015.
  6. Han Gil Jang, Dylan Carlson, and Mengjun Xie, Enhancing Mobile Device Authentication with Behavioral Biometrics, in The 4th Research Experiences for Undergraduates Symposium, Arlington, VA, USA, 2014.
  7. Han Gil Jang, Dylan Carlson, and Mengjun Xie, Enhancing Mobile Device Authentication with Behavioral Biometrics, in Grace Hopper Conference REU Site Poster Session, Phoenix, AZ, USA, 2014.
  8. Mengjun Xie, Umit Topaloglu, Thomas Powell, Chao Peng, and Jiang Bian, SIM: A Smartphone-based Identity Management Framework and Its application to Arkansas Trauma Image Repository, in Proceedings of the 2013 International Workshop on Biomedical and Health Informatics, pp. 53--60, Shanghai, China, 2013.
  9. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, and William Hogan, Understanding Biomedical Research Collaborations through Social Network Analysis: A Case Study, in Proceedings of the 2013 International Symposium on Network Analysis and Mining for Health Informatics, Biomedicine and Bioinformatics, pp. 9--16, Shanghai, China, 2013.
  10. Jiang Bian, Mengjun Xie, Umit Topaloglu, Teresa Hudson, and William Hogan, Interactive Visualization for Understanding and Analyzing Biomedical Research Collaboration Networks – a Pilot Study, in Proceedings of the 2013 Workshop on Visual Analytics in Healthcare (Poster Session), Washington, DC, USA, 2013.
  11. Mengjun Xie, Jiang Bian, and Umit Topaloglu, Topic Modeling for Discovering Drug-related Adverse Events from Social Media, in Proceedings of the AMIA Summit on Translational Bioinformatics 2013 (Poster).
  12. Zhenyu Wu, Mengjun Xie, and Haining Wang, Energy Attack on Server Systems, in Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), pp. 1--9, San Francisco, CA, USA, 2011.

NEXUS Lab Logo
Cyber Security Club Logo
UA Littl Rock Logo