Wenli Wang

According to our database1, Wenli Wang authored at least 25 papers between 2000 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Privacy-preserving Computational Geometry.
I. J. Network Security, 2019

A Frequency Multiplication Method Based on Extracting Harmonic From Narrow Pulse.
IEEE Access, 2019

An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines.
I. J. Network Security, 2018

Partially Observable Reinforcement Learning for Intelligent Transportation Systems.
CoRR, 2018

A Method for Detecting Flower Collision Based on Spherical Projection.
Proceedings of the Image and Graphics Technologies and Applications, 2018

Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

Hybrid Pre-Log and Post-Log Image Reconstruction for Computed Tomography.
IEEE Trans. Med. Imaging, 2017

Authenticity and Social Media.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Reality Video vs. Video Modeling-A Case Study in Patient Education.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

In Bed with Technology? Peril, Promise, and Prudence.
CAIS, 2015

A Review on Leaf Temperature Sensor: Measurement Methods and Application.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Building a Contemplative IS Workforce through Promoting Mindfulness in IS Design-A Case Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Adaptive Curve Tailoring.
Proceedings of the Information Sciences and Systems 2013, 2013

Where is the Wisdom We Have Lost in Technology?
Proceedings of the 19th Americas Conference on Information Systems, 2013

Management of Change to Ensure IS Success: A Longitudinal Study.
Proceedings of the International Conference on Information Systems, 2011

Monitoring ultradian changes in cardiorespiratory control in obstructive sleep apnea syndrome.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Deterring Adolescent Dependency on Text Messaging: A Conceptual Model and Framework for Behavior Control.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

The Benefits of Unexpected Informal Customer Support from Vendors in Online Communities.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Binary Vickrey auction - A robust and efficient multi-unit sealed-bid online auction protocol against buyer multi-identity bidding.
Decision Support Systems, 2007

Buy-price English auction.
J. Economic Theory, 2006

To the Question "Does IT Matter?" Hollywood Answers "Yes".
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Shill Bidding In Multi-Round Online Auctions.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions.
Int. J. Electronic Commerce, 2001

E-Process Design and Assurance Using Model Checking.
IEEE Computer, 2000

Economic mechanism design for securing online auctions.
Proceedings of the Twenty-First International Conference on Information Systems, 2000