default search action
Wenjia Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Sidong Xian, Wenjia Li, Renping Liu, Longjun Yin:
Pythagorean Z-linguistic VIKOR method based on modified value function under Pythagorean Z-linguistic environment and its application on smart healthcare. Comput. Appl. Math. 43(4): 173 (2024) - [j36]Weilin Chen, Xiaogang Ma, Zhe Wang, Wenjia Li, Chao Fan, Jiyin Zhang, Xiang Que, Chenhao Li:
Exploring neuro-symbolic AI applications in geoscience: implications and future directions for mineral prediction. Earth Sci. Informatics 17(3): 1819-1835 (2024) - [j35]Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. J. Comput. Secur. 32(3): 291-317 (2024) - 2023
- [j34]Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. ACM Comput. Surv. 55(2): 20:1-20:36 (2023) - 2022
- [j33]Neha Bala, Aemun Ahmar, Wenjia Li, Fernanda Tovar, Arpit Battu, Prachi Bambarkar:
DroidEnemy: Battling adversarial example attacks for Android malware detection. Digit. Commun. Networks 8(6): 1040-1047 (2022) - [j32]Hao Liu, Qinjun Qiu, Liang Wu, Wenjia Li, Bin Wang, Yuan Zhou:
Few-shot learning for name entity recognition in geological text based on GeoBERT. Earth Sci. Informatics 15(2): 979-991 (2022) - [j31]Qiao Hu, Jingyi Zhang, Gerhard P. Hancke, Yupeng Hu, Wenjia Li, Hongbo Jiang, Zheng Qin:
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices. IEEE Internet Things J. 9(2): 1326-1338 (2022) - [j30]Xueqing Huang, Nirwan Ansari, Siqi Huang, Wenjia Li:
Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction. IEEE Open J. Commun. Soc. 3: 379-390 (2022) - [j29]Linjun Wu, Yupeng Hu, Kehuan Zhang, Wenjia Li, Xiaolin Xu, Wanli Chang:
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4433-4444 (2022) - [c46]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - 2021
- [j28]Can Zhuang, Wenjia Li, Zhong Xie, Liang Wu:
A multi-granularity knowledge association model of geological text based on hypernetwork. Earth Sci. Informatics 14(1): 227-246 (2021) - [j27]Chenyue Zhang, Wenjia Li, Yuansheng Luo, Yupeng Hu:
AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology. IEEE Internet Things J. 8(5): 3157-3169 (2021) - [j26]Yupeng Hu, Yonghe Liu, Wenjia Li, Keqin Li, Kenli Li, Nong Xiao, Zheng Qin:
Unequal Failure Protection Coding Technique for Distributed Cloud Storage Systems. IEEE Trans. Cloud Comput. 9(1): 386-400 (2021) - [c45]Mubashar Mustafa, Feng Zeng, Hussain Ghulam, Wenjia Li:
Discovering Coherent Topics from Urdu Text. ATAIT 2021: 68-80 - [c44]Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long:
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. UbiSec 2021: 255-267 - [c43]Wenjia Li, Juecong Cai, Zi Wang, Sihua Cheng:
A Robust Malware Detection Approach for Android System Based on Ensemble Learning. UbiSec 2021: 309-321 - [c42]Feng Zeng, Chengsheng Liu, Junzhe Tangjiang, Wenjia Li:
Deep Learning-Based Task Offloading for Vehicular Edge Computing. WASA (3) 2021: 291-298 - 2020
- [j25]Qing Yang, Tigang Jiang, Wenjia Li, Guangchi Liu, Danda B. Rawat, Jun Wu:
Editorial: Multimedia and Social Data Processing in Vehicular Networks. Mob. Networks Appl. 25(2): 620-622 (2020) - [j24]Yuansheng Luo, Wenjia Li, Shi Qiu:
Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services. Sensors 20(1): 122 (2020) - [j23]Feng Zeng, Lan Yao, Baoling Wu, Wenjia Li, Lin Meng:
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks. Softw. Pract. Exp. 50(11): 2031-2045 (2020) - [i1]Yupeng Hu, Zhe Jin, Wenjia Li, Yang Xiang, Jiliang Zhang:
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android. CoRR abs/2006.12831 (2020)
2010 – 2019
- 2019
- [j22]Shunfang Wang, Wenjia Li, Yu Fei, Zicheng Cao, Dongshu Xu, Huanyu Guo:
An Improved Process for Generating Uniform PSSMs and Its Application in Protein Subcellular Localization via Various Global Dimension Reduction Techniques. IEEE Access 7: 42384-42395 (2019) - [j21]Feng Zeng, Nan Zhao, Wenjia Li:
Joint interference optimization and user satisfaction improvement for multicast routing and channel assignment in wireless mesh networks. Clust. Comput. 22(6): 15059-15072 (2019) - [j20]Lei Chen, Guofei Gu, Wenjia Li, Rami J. Haddad:
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud". Digit. Commun. Networks 5(4): 203-204 (2019) - [j19]Qinjun Qiu, Zhong Xie, Liang Wu, Liufeng Tao, Wenjia Li:
BiLSTM-CRF for geological named entity recognition from the geoscience literature. Earth Sci. Informatics 12(4): 565-579 (2019) - [j18]Wenjia Li, Liang Wu, Zhong Xie, Liufeng Tao, Kuanmao Zou, Fengdan Li, Jinli Miao:
Ontology-based question understanding with the constraint of Spatio-temporal geological knowledge. Earth Sci. Informatics 12(4): 599-613 (2019) - [j17]Qinjun Qiu, Zhong Xie, Liang Wu, Wenjia Li:
Geoscience keyphrase extraction algorithm using enhanced word embedding. Expert Syst. Appl. 125: 157-169 (2019) - [j16]Feng Zeng, Yongzheng Ren, Xiaoheng Deng, Wenjia Li:
Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks. Sensors 19(1): 32 (2019) - [j15]Wei Wei, Shuai Liu, Wenjia Li, Ding-Zhu Du:
Corrections to "Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes". IEEE Trans. Comput. Soc. Syst. 6(1): 189 (2019) - [c41]Wenjia Li, Neha Bala, Aemun Ahmar, Fernanda Tovar, Arpit Battu, Prachi Bambarkar:
A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks. CIC 2019: 360-365 - [c40]Yamin Wang, Zhiying Cao, Xiuguo Zhang, Huijie Zhou, Wenjia Li:
Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing Environment. ICPADS 2019: 963-966 - [c39]Wenjia Li, Xiuguo Zhang, Zhiying Cao, Yisong Zheng, Yamin Wang:
An Efficient Mobile Server Task Scheduling Algorithm in D2D Environment. ICPADS 2019: 971-974 - [p1]Yupeng Hu, Linjun Wu, Wenjia Li, Keqin Li, Yonghe Liu, Zheng Qin:
Toward Complex Search for Encrypted Mobile Cloud Data via Index Blind Storage. Smart Data 2019: 41-62 - 2018
- [j14]Kai Ma, Liang Wu, Liufeng Tao, Wenjia Li, Zhong Xie:
Matching Descriptions to Spatial Entities Using a Siamese Hierarchical Attention Network. IEEE Access 6: 28064-28072 (2018) - [j13]Qinjun Qiu, Zhong Xie, Liang Wu, Wenjia Li:
DGeoSegmenter: A dictionary-based Chinese word segmenter for the geoscience domain. Comput. Geosci. 121: 1-11 (2018) - [j12]Wenjia Li, Houbing Song, Feng Zeng:
Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities. IEEE Internet Things J. 5(2): 716-723 (2018) - [j11]Dafang Zhang, Guojun Wang, Xin Wang, Zhengyu Li, Wenjia Li:
Cyberspace Security for Future Internet. Secur. Commun. Networks 2018: 5313980:1 (2018) - [j10]Wei Wei, Shuai Liu, Wenjia Li, Ding-Zhu Du:
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes. IEEE Trans. Comput. Soc. Syst. 5(3): 736-747 (2018) - [c38]Yongzheng Ren, Feng Zeng, Wenjia Li, Lin Meng:
A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks. ICCCN 2018: 1-6 - [c37]Wenjia Li, Zi Wang, Juecong Cai, Sihua Cheng:
An Android Malware Detection Approach Using Weight-Adjusted Deep Learning. ICNC 2018: 437-441 - [c36]Hussain Ghulam, Feng Zeng, Wenjia Li, Yutong Xiao:
Deep Learning-Based Sentiment Analysis for Roman Urdu Text. IIKI 2018: 131-135 - [c35]Can Liu, Feng Zeng, Wenjia Li:
Synergistic Based Social Incentive Mechanism in Mobile Crowdsensing. WASA 2018: 767-772 - 2017
- [j9]Nan Ma, Patrick Wang, Qin He, Wenjia Li, Ying Zheng, Zhang Huan:
Prediction of Television Audience Rating Based on Fuzzy Cognitive Maps with Forward Stepwise Regression. Int. J. Pattern Recognit. Artif. Intell. 31(7): 1750020:1-1750020:13 (2017) - [j8]Lei Chen, Wenjia Li, Rami J. Haddad:
Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics. Inf. 8(3): 99 (2017) - [j7]Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. KSII Trans. Internet Inf. Syst. 11(6): 3230-3253 (2017) - [j6]Xin Wang, Dafang Zhang, Xin Su, Wenjia Li:
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. Secur. Commun. Networks 2017: 6451260:1-6451260:14 (2017) - [j5]Feng Zeng, Nan Zhao, Wenjia Li:
Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks. Sensors 17(5): 1109 (2017) - [c34]Baoling Wu, Feng Zeng, Wenjia Li:
A Dynamic Human Contacts Prediction Method in Mobile Social Networks. IIKI 2017: 123-127 - [c33]Nan Zhao, Feng Zeng, Wenjia Li:
A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks. IIKI 2017: 175-177 - [c32]Yupeng Hu, Wenjia Li, Mengyi Ma, Na Cao, Yonghe Liu, Zheng Qin, Jia Wang:
Toward Complex Search for Encrypted Cloud Data via Blind Index Storage. ISPA/IUCC 2017: 1-8 - [c31]Xuejing Zhao, Yehua Wei, Wenjia Li:
The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm. ISPA/IUCC 2017: 444-448 - [c30]Yueyue Dou, Feng Zeng, Wenjia Li:
Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks. WASA 2017: 60-70 - 2016
- [j4]Wenjia Li, Houbing Song:
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 17(4): 960-969 (2016) - [c29]Yupeng Hu, Yonghe Liu, Wenjia Li, Nong Xiao, Zheng Qin, Shu Yin:
Unequal Failure Protection Coding Technology for Cloud Storage Systems. CLUSTER 2016: 231-240 - [c28]Angela Burton, Tapan Parikh, Shannon Mascarenhas, Jue Zhang, Jonathan Voris, N. Sertac Artan, Wenjia Li:
Driver identification and authentication with active behavior modeling. CNSM 2016: 388-393 - [c27]Wenjia Li, Xianshu Zhu:
BAN-trust: An attack-resilient malicious node detection scheme for body area networks. ICNC 2016: 1-5 - [c26]Weimin Chen, Zhigang Chen, Wenjia Li, Feng Zeng:
An Enhanced Community-Based Routing with Ferry in Opportunistic Networks. IIKI 2016: 340-344 - [c25]Feng Zeng, Nan Zhao, Wenjia Li:
A Novel Social-Based Clustering and Routing Scheme in Mobile Opportunistic Networks. IIKI 2016: 345-350 - [c24]Zi Wang, Juecong Cai, Sihua Cheng, Wenjia Li:
DroidDeepLearner: Identifying Android malware using deep learning. Sarnoff Symposium 2016: 160-165 - [c23]Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao:
A Deep Learning Approach to Android Malware Feature Learning and Detection. Trustcom/BigDataSE/ISPA 2016: 244-251 - [c22]Feng Zeng, Nan Zhao, Zhigang Chen, Hui Liu, Wenjia Li:
Channel Assignment with User Coverage Priority and Interference Optimization for Multicast Routing in Wireless Mesh Networks. WASA 2016: 560-570 - 2015
- [j3]Xin Su, Dafang Zhang, Wenjia Li, Xiaofei Wang:
AndroGenerator: An automated and configurable android app network traffic generation system. Secur. Commun. Networks 8(18): 4273-4288 (2015) - [c21]Wenjia Li, Jigang Ge, Guqian Dai:
Detecting Malware for Android Platform: An SVM-Based Approach. CSCloud 2015: 464-469 - [c20]Yehua Wei, Tun Chen, Wenjia Li:
An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks. IIKI 2015: 158-162 - [c19]Kai Zhao, Dafang Zhang, Xin Su, Wenjia Li:
Fest: A feature extraction and selection tool for Android malware detection. ISCC 2015: 714-720 - [c18]Xin Su, Dafang Zhang, Wenjia Li, Wenwei Li:
Android app recommendation approach based on network traffic measurement and analysis. ISCC 2015: 988-994 - [c17]Wenjia Li, Anupam Joshi, Tim Finin:
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [c16]Guqian Dai, Jigang Ge, Minghang Cai, Daoqian Xu, Wenjia Li:
SVM-based malware detection for Android applications. WISEC 2015: 33:1-33:2 - 2014
- [c15]Bradford W. Bazemore, Wenjia Li:
Data Center Heat Monitoring Using Wireless Sensor Networks. ACM Southeast Regional Conference 2014: 59: 1-59: 4 - [c14]Wenjia Li, Xianshu Zhu:
Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare. MASS 2014: 515-516 - 2013
- [j2]Wenjia Li, Anupam Joshi, Tim Finin:
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies. Distributed Parallel Databases 31(2): 353-376 (2013) - [c13]Wenjia Li, Lindah Kotut:
Finding abnormal data in vehicular cyber physical systems. ICCPS 2013: 259 - [c12]Wenjia Li, Lindah Kotut:
Trustworthy data management for wireless networks in Cyber-Physical Systems. IPCCC 2013: 1-2 - 2012
- [j1]Wenjia Li, James Parker, Anupam Joshi:
Security Through Collaboration and Trust in MANETs. Mob. Networks Appl. 17(3): 342-352 (2012) - [c11]Bastian Mohr, Wenjia Li, Stefan Heinen:
Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems. MWSCAS 2012: 650-653 - 2011
- [c10]Varish Mulwad, Wenjia Li, Anupam Joshi, Tim Finin, Krishnamurthy Viswanathan:
Extracting Information about Security Vulnerabilities from Web Text. Web Intelligence/IAT Workshops 2011: 257-260 - [c9]Wenjia Li, Anupam Joshi, Tim Finin:
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine. Mobile Data Management (1) 2011: 291-292 - [c8]Wenjia Li, Anupam Joshi, Tim Finin:
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks. MILCOM 2011: 1102-1107 - [c7]Wenjia Li, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi, Tim Finin:
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies. POLICY 2011: 171-172 - 2010
- [c6]Wenjia Li, Anupam Joshi, Tim Finin:
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach. Mobile Data Management 2010: 85-94
2000 – 2009
- 2009
- [c5]Wenjia Li, Anupam Joshi, Tim Finin:
Policy-Based Malicious Peer Detection in Ad Hoc Networks. CSE (3) 2009: 76-82 - [c4]Wenjia Li, Anupam Joshi:
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory. Mobile Data Management 2009: 112-121 - 2008
- [c3]Wenjia Li, James Parker, Anupam Joshi:
Security through Collaboration in MANETs. CollaborateCom 2008: 696-714 - 2007
- [c2]Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang:
A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. ATC 2007: 499-508 - [c1]Patricia Ordóñez, Palanivel A. Kodeswaran, Vlad Korolev, Wenjia Li, Onkar Walavalkar, Ben Elgamil, Anupam Joshi, Tim Finin, Yelena Yesha, I. George:
A Ubiquitous Context-Aware Environment for Surgical Training. MobiQuitous 2007: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint