Follow
Wenjia Li, Ph.D., SMIEEE, EAI Fellow
Wenjia Li, Ph.D., SMIEEE, EAI Fellow
Associated Professor of Computer Science, New York Institute of Technology
Verified email at nyit.edu - Homepage
Title
Cited by
Cited by
Year
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
W Li, H Song
IEEE Transactions on Intelligent Transportation Systems 17 (4), 960-969, 2016
5402016
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach
W Li, A Joshi, T Finin
2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010
2382010
Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities
W Li, H Song, Z Feng
IEEE Internet of Things Journal, 1-1, 2017
2062017
Security Issues in Mobile Ad Hoc Network
W Li, A Joshi
Department of Computer Science and Electrical Engineering, University of …, 2007
177*2007
Extracting information about security vulnerabilities from web text
V Mulwad, W Li, A Joshi, T Finin, K Viswanathan
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
1562011
A Deep Learning Approach to Android Malware Feature Learning and Detection
X Su, D Zhang, W Li, K Zhao
15th IEEE International Conference on Trust, Security and Privacy in …, 2016
1182016
Detecting Malware for Android Platform: An SVM based Approach
W Li, J Ge, G Dai
2nd IEEE International Conference on Cyber Security and Cloud Computing …, 2015
932015
Cost-effective edge server placement in wireless metropolitan area networks
F Zeng, Y Ren, X Deng, W Li
Sensors 19 (1), 32, 2018
922018
Security through collaboration and trust in MANETs
W Li, J Parker, A Joshi
Mobile Networks and Applications 17, 342-352, 2012
852012
Deep learning-based sentiment analysis for roman urdu text
H Ghulam, F Zeng, W Li, Y Xiao
Procedia computer science 147, 131-135, 2019
842019
Fest: A Feature Extraction and Selection Tool for Android Malware Detection
K Zhao, D Zhang, X Su, W Li
20th IEEE Symposium on Computers and Communication (IEEE ISCC 2015), 714-720, 2015
832015
DroidDeepLearner: Identifying Android Malware Using Deep Learning
Z Wang, S Cheng, J Cai, W Li
37th IEEE Sarnoff Symposium, 160-165, 2016
772016
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes
W Wei, S Liu, W Li, D Du
IEEE Transactions on Computational Social Systems 5 (3), 736-747, 2018
752018
AIT: An AI-enabled Trust Management System for Vehicular Networks Using Blockchain Technology
C Zhang, W Li, Y Luo, Y Hu
IEEE Internet of Things Journal 8 (5), 3157 - 3169, 2020
702020
Artificial intelligence security: Threats and countermeasures
Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
682021
An Android Malware Detection Approach Using Weight-Adjusted Deep Learning
W Li, Z Wang, J Cai, S Cheng
IEEE International Conference on Computing, Networking and Communications …, 2018
672018
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies
W Li, A Joshi, T Finin
Distributed and Parallel Databases 31, 353-376, 2013
622013
Outlier detection in ad hoc networks using dempster-shafer theory
W Li, A Joshi
Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09 …, 2009
622009
Driver identification and authentication with active behavior modeling
A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li
2016 12th International Conference on Network and Service Management (CNSM …, 2016
532016
Mlifdect: Android Malware Detection based on Parallel Machine Learning and Information Fusion
X Wang, D Zhang, X Su, W Li
SECURITY AND COMMUNICATION NETWORKS, 2017
412017
The system can't perform the operation now. Try again later.
Articles 1–20