Wenjia Li
Orcid: 0000-0001-6059-6422
According to our database1,
Wenjia Li
authored at least 86 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Exploring neuro-symbolic AI applications in geoscience: implications and future directions for mineral prediction.
Earth Sci. Informatics, June, 2024
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android.
J. Comput. Secur., 2024
Pythagorean Z-linguistic VIKOR method based on modified value function under Pythagorean Z-linguistic environment and its application on smart healthcare.
Comput. Appl. Math., 2024
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
2023
ACM Comput. Surv., 2023
2022
Digit. Commun. Networks, December, 2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
IEEE Open J. Commun. Soc., 2022
Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022
Earth Sci. Informatics, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
IEEE Trans. Cloud Comput., 2021
AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology.
IEEE Internet Things J., 2021
A multi-granularity knowledge association model of geological text based on hypernetwork.
Earth Sci. Informatics, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the 2021 International Symposium on Advanced Technologies and Applications in the Internet of Things, 2021
2020
Dynamic human contact prediction based on naive Bayes algorithm in mobile social networks.
Softw. Pract. Exp., 2020
Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services.
Sensors, 2020
Mob. Networks Appl., 2020
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android.
CoRR, 2020
2019
Corrections to "Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes".
IEEE Trans. Comput. Soc. Syst., 2019
Sensors, 2019
Expert Syst. Appl., 2019
Earth Sci. Informatics, 2019
Ontology-based question understanding with the constraint of Spatio-temporal geological knowledge.
Earth Sci. Informatics, 2019
Editorial: special issue on "The security, privacy, and digital forensics of mobile networks and mobile cloud".
Digit. Commun. Networks, 2019
Joint interference optimization and user satisfaction improvement for multicast routing and channel assignment in wireless mesh networks.
Clust. Comput., 2019
An Improved Process for Generating Uniform PSSMs and Its Application in Protein Subcellular Localization via Various Global Dimension Reduction Techniques.
IEEE Access, 2019
Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing Environment.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019
A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019
2018
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes.
IEEE Trans. Comput. Soc. Syst., 2018
IEEE Internet Things J., 2018
Comput. Geosci., 2018
Matching Descriptions to Spatial Entities Using a Siamese Hierarchical Attention Network.
IEEE Access, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 International Conference on Identification, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks.
Sensors, 2017
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Secur. Commun. Networks, 2017
KSII Trans. Internet Inf. Syst., 2017
Special Issue on Mobile Systems, Mobile Networks, and Mobile Cloud: Security, Privacy, and Digital Forensics.
Inf., 2017
Prediction of Television Audience Rating Based on Fuzzy Cognitive Maps with Forward Stepwise Regression.
Int. J. Pattern Recognit. Artif. Intell., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
A Message Matching Routing Algorithm Based on Node Sociality in Opportunistic Networks.
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the 2017 International Conference on Identification, 2017
2016
ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016
Channel Assignment with User Coverage Priority and Interference Optimization for Multicast Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
Proceedings of the International Conference on Identification, 2016
Proceedings of the International Conference on Identification, 2016
BAN-trust: An attack-resilient malicious node detection scheme for body area networks.
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 12th International Conference on Network and Service Management, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
AndroGenerator: An automated and configurable android app network traffic generation system.
Secur. Commun. Networks, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks.
Proceedings of the International Conference on Identification, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed Parallel Databases, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
2012
Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012
2011
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011
Proceedings of the MILCOM 2011, 2011
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011
2010
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
2009
Proceedings of the MDM 2009, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the Collaborative Computing: Networking, 2008
2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007