Wenjia Li

According to our database1, Wenjia Li authored at least 50 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes.
IEEE Trans. Comput. Social Systems, 2018

Cyberspace Security for Future Internet.
Security and Communication Networks, 2018

Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities.
IEEE Internet of Things Journal, 2018

DGeoSegmenter: A dictionary-based Chinese word segmenter for the geoscience domain.
Computers & Geosciences, 2018

Matching Descriptions to Spatial Entities Using a Siamese Hierarchical Attention Network.
IEEE Access, 2018

Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

An Android Malware Detection Approach Using Weight-Adjusted Deep Learning.
Proceedings of the 2018 International Conference on Computing, 2018

A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.
Sensors, 2017

Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Security and Communication Networks, 2017

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
TIIS, 2017

Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Information, 2017

Prediction of Television Audience Rating Based on Fuzzy Cognitive Maps with Forward Stepwise Regression.
IJPRAI, 2017

Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks.
Proceedings of the 2017 International Conference on Identification, 2017

A Dynamic Human Contacts Prediction Method in Mobile Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

2016
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks.
IEEE Trans. Intelligent Transportation Systems, 2016

Channel Assignment with User Coverage Priority and Interference Optimization for Multicast Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidDeepLearner: Identifying Android malware using deep learning.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

A Novel Social-Based Clustering and Routing Scheme in Mobile Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016

An Enhanced Community-Based Routing with Ferry in Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016

BAN-trust: An attack-resilient malicious node detection scheme for body area networks.
Proceedings of the 2016 International Conference on Computing, 2016

Driver identification and authentication with active behavior modeling.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
AndroGenerator: An automated and configurable android app network traffic generation system.
Security and Communication Networks, 2015

SVM-based malware detection for Android applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015

Detecting Malware for Android Platform: An SVM-Based Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Data Center Heat Monitoring Using Wireless Sensor Networks.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed and Parallel Databases, 2013

Trustworthy data management for wireless networks in Cyber-Physical Systems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Finding abnormal data in vehicular cyber physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2012
Security Through Collaboration and Trust in MANETs.
MONET, 2012

2011
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011

SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
Proceedings of the MILCOM 2011, 2011

ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Extracting Information about Security Vulnerabilities from Web Text.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

2010
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2009
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
Proceedings of the MDM 2009, 2009

Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008

2007
A Ubiquitous Context-Aware Environment for Surgical Training.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...