Wenjia Li

Orcid: 0000-0001-6059-6422

According to our database1, Wenjia Li authored at least 82 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Artificial Intelligence Security: Threats and Countermeasures.
ACM Comput. Surv., 2023

2022
DroidEnemy: Battling adversarial example attacks for Android malware detection.
Digit. Commun. Networks, December, 2022

FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction.
IEEE Open J. Commun. Soc., 2022

Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

Few-shot learning for name entity recognition in geological text based on GeoBERT.
Earth Sci. Informatics, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems.
IEEE Trans. Cloud Comput., 2021

AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology.
IEEE Internet Things J., 2021

A multi-granularity knowledge association model of geological text based on hypernetwork.
Earth Sci. Informatics, 2021

Deep Learning-Based Task Offloading for Vehicular Edge Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021

A Robust Malware Detection Approach for Android System Based on Ensemble Learning.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Discovering Coherent Topics from Urdu Text.
Proceedings of the 2021 International Symposium on Advanced Technologies and Applications in the Internet of Things, 2021

2020
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks.
Softw. Pract. Exp., 2020

Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services.
Sensors, 2020

Editorial: Multimedia and Social Data Processing in Vehicular Networks.
Mob. Networks Appl., 2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020

2019
Corrections to "Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes".
IEEE Trans. Comput. Soc. Syst., 2019

Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks.
Sensors, 2019

Geoscience keyphrase extraction algorithm using enhanced word embedding.
Expert Syst. Appl., 2019

BiLSTM-CRF for geological named entity recognition from the geoscience literature.
Earth Sci. Informatics, 2019

Ontology-based question understanding with the constraint of Spatio-temporal geological knowledge.
Earth Sci. Informatics, 2019

Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019

Joint interference optimization and user satisfaction improvement for multicast routing and channel assignment in wireless mesh networks.
Clust. Comput., 2019

An Improved Process for Generating Uniform PSSMs and Its Application in Protein Subcellular Localization via Various Global Dimension Reduction Techniques.
IEEE Access, 2019

Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing Environment.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

An Efficient Mobile Server Task Scheduling Algorithm in D2D Environment.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes.
IEEE Trans. Comput. Soc. Syst., 2018

Cyberspace Security for Future Internet.
Secur. Commun. Networks, 2018

Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities.
IEEE Internet Things J., 2018

DGeoSegmenter: A dictionary-based Chinese word segmenter for the geoscience domain.
Comput. Geosci., 2018

Matching Descriptions to Spatial Entities Using a Siamese Hierarchical Attention Network.
IEEE Access, 2018

Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Deep Learning-Based Sentiment Analysis for Roman Urdu Text.
Proceedings of the 2018 International Conference on Identification, 2018

An Android Malware Detection Approach Using Weight-Adjusted Deep Learning.
Proceedings of the 2018 International Conference on Computing, 2018

A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.
Sensors, 2017

Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Secur. Commun. Networks, 2017

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst., 2017

Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Inf., 2017

Prediction of Television Audience Rating Based on Fuzzy Cognitive Maps with Forward Stepwise Regression.
Int. J. Pattern Recognit. Artif. Intell., 2017

Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Toward Complex Search for Encrypted Cloud Data via Blind Index Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks.
Proceedings of the 2017 International Conference on Identification, 2017

A Dynamic Human Contacts Prediction Method in Mobile Social Networks.
Proceedings of the 2017 International Conference on Identification, 2017

2016
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016

Channel Assignment with User Coverage Priority and Interference Optimization for Multicast Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidDeepLearner: Identifying Android malware using deep learning.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

A Novel Social-Based Clustering and Routing Scheme in Mobile Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016

An Enhanced Community-Based Routing with Ferry in Opportunistic Networks.
Proceedings of the International Conference on Identification, 2016

BAN-trust: An attack-resilient malicious node detection scheme for body area networks.
Proceedings of the 2016 International Conference on Computing, 2016

Driver identification and authentication with active behavior modeling.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Unequal Failure Protection Coding Technology for Cloud Storage Systems.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
AndroGenerator: An automated and configurable android app network traffic generation system.
Secur. Commun. Networks, 2015

SVM-based malware detection for Android applications.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015

Detecting Malware for Android Platform: An SVM-Based Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Data Center Heat Monitoring Using Wireless Sensor Networks.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed Parallel Databases, 2013

Trustworthy data management for wireless networks in Cyber-Physical Systems.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Finding abnormal data in vehicular cyber physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2012
Security Through Collaboration and Trust in MANETs.
Mob. Networks Appl., 2012

Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

2011
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011

SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
Proceedings of the MILCOM 2011, 2011

ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Extracting Information about Security Vulnerabilities from Web Text.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

2010
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2009
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
Proceedings of the MDM 2009, 2009

Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008

2007
A Ubiquitous Context-Aware Environment for Surgical Training.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...