According to our database1, Wenli Wang authored at least 25 papers between 2000 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Privacy-preserving Computational Geometry.
I. J. Network Security, 2019
A Frequency Multiplication Method Based on Extracting Harmonic From Narrow Pulse.
IEEE Access, 2019
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines.
I. J. Network Security, 2018
Partially Observable Reinforcement Learning for Intelligent Transportation Systems.
A Method for Detecting Flower Collision Based on Spherical Projection.
Proceedings of the Image and Graphics Technologies and Applications, 2018
Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Hybrid Pre-Log and Post-Log Image Reconstruction for Computed Tomography.
IEEE Trans. Med. Imaging, 2017
Authenticity and Social Media.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Reality Video vs. Video Modeling-A Case Study in Patient Education.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
In Bed with Technology? Peril, Promise, and Prudence.
A Review on Leaf Temperature Sensor: Measurement Methods and Application.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015
Building a Contemplative IS Workforce through Promoting Mindfulness in IS Design-A Case Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Adaptive Curve Tailoring.
Proceedings of the Information Sciences and Systems 2013, 2013
Where is the Wisdom We Have Lost in Technology?
Proceedings of the 19th Americas Conference on Information Systems, 2013
Management of Change to Ensure IS Success: A Longitudinal Study.
Proceedings of the International Conference on Information Systems, 2011
Monitoring ultradian changes in cardiorespiratory control in obstructive sleep apnea syndrome.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Deterring Adolescent Dependency on Text Messaging: A Conceptual Model and Framework for Behavior Control.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
The Benefits of Unexpected Informal Customer Support from Vendors in Online Communities.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Binary Vickrey auction - A robust and efficient multi-unit sealed-bid online auction protocol against buyer multi-identity bidding.
Decision Support Systems, 2007
Buy-price English auction.
J. Economic Theory, 2006
To the Question "Does IT Matter?" Hollywood Answers "Yes".
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Shill Bidding In Multi-Round Online Auctions.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002
Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions.
Int. J. Electronic Commerce, 2001
E-Process Design and Assurance Using Model Checking.
IEEE Computer, 2000
Economic mechanism design for securing online auctions.
Proceedings of the Twenty-First International Conference on Information Systems, 2000