Wenjuan Li

Orcid: 0000-0003-3745-5669

Affiliations:
  • City University of Hong Kong, Hong Kong, SAR, China


According to our database1, Wenjuan Li authored at least 105 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A blockchain-assisted security management framework for collaborative intrusion detection in smart cities.
Comput. Electr. Eng., October, 2023

ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023

Design of double-cross-based smartphone unlock mechanism.
Comput. Secur., June, 2023

2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.
J. Inf. Secur. Appl., May, 2023

TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era.
IEEE Netw., 2022

DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones.
Mob. Networks Appl., 2022

Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022

An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022

Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach.
Concurr. Comput. Pract. Exp., 2022

Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022

Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022

Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Designing In-Air Hand Gesture-based User Authentication System via Convex Hull.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks.
Proceedings of the Provable and Practical Security, 2022

EnergyCIDN: Enhanced Energy-Aware Challenge-Based Collaborative Intrusion Detection in Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021

RON-enhanced blockchain propagation mechanism for edge-enabled smart cities.
J. Inf. Secur. Appl., 2021

Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021

A fog-based collaborative intrusion detection framework for smart grid.
Int. J. Netw. Manag., 2021

Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021

Enhancing intrusion detection with feature selection and neural network.
Int. J. Intell. Syst., 2021

A blockchain-empowered AAA scheme in the large-scale HetNet.
Digit. Commun. Networks, 2021

Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021

Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling.
Proceedings of the 20th IEEE International Conference on Trust, 2021

LibBlock - Towards Decentralized Library System based on Blockchain and IPFS.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks.
IEEE Trans. Engineering Management, 2020

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities.
J. Parallel Distributed Comput., 2020

A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020

Toward supervised shape-based behavioral authentication on smartphones.
J. Inf. Secur. Appl., 2020

Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
Int. J. Inf. Sec., 2020

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020

Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020

A Blockchain-based Trusted Service Mechanism for Crowdsourcing System.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
Proceedings of the 19th IEEE International Conference on Trust, 2020

I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Designing Double-Click-Based Unlocking Mechanism on Smartphones.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
Proceedings of the Network and System Security - 14th International Conference, 2020

Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones.
Proceedings of the Deep Biometrics, 2020

2019
Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis.
J. Inf. Secur. Appl., 2019

Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019

Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019

PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019

Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
Multim. Tools Appl., 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018

Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018

Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016

Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks.
Inf. Comput. Secur., 2016

MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016

Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016

Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

On Multiple Password Interference of Touch Screen Patterns and Text Passwords.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015

An empirical study on email classification using supervised machine learning in real environments.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014

Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013

Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012

Evaluating the effect of user guidelines on creating click-draw based graphical passwords.
Proceedings of the Research in Applied Computation Symposium, 2012

Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.
Proceedings of the Information and Communications Security - 14th International Conference, 2012


  Loading...