Wenjuan Li
Orcid: 0000-0003-3745-5669Affiliations:
- City University of Hong Kong, Hong Kong, SAR, China
According to our database1,
Wenjuan Li
authored at least 112 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Neural Comput. Appl., July, 2024
IEEE Trans. Consumer Electron., February, 2024
J. Inf. Secur. Appl., 2024
Proceedings of the Information Security Practice and Experience, 2024
2023
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems.
Int. J. Inf. Sec., October, 2023
A blockchain-assisted security management framework for collaborative intrusion detection in smart cities.
Comput. Electr. Eng., October, 2023
Neural Comput. Appl., August, 2023
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023
2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.
J. Inf. Secur. Appl., May, 2023
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Netw., 2022
Mob. Networks Appl., 2022
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
Int. J. Intell. Syst., 2022
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach.
Concurr. Comput. Pract. Exp., 2022
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection.
Concurr. Comput. Pract. Exp., 2022
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Commun. Surv. Tutorials, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the Provable and Practical Security, 2022
EnergyCIDN: Enhanced Energy-Aware Challenge-Based Collaborative Intrusion Detection in Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation.
Proceedings of the Emerging Information Security and Applications, 2022
2021
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021
J. Inf. Secur. Appl., 2021
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration.
Inf. Fusion, 2021
Int. J. Netw. Manag., 2021
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021
Int. J. Intell. Syst., 2021
Digit. Commun. Networks, 2021
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks.
IEEE Trans. Engineering Management, 2020
Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities.
J. Parallel Distributed Comput., 2020
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
Int. J. Inf. Sec., 2020
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
Proceedings of the 19th IEEE International Conference on Trust, 2020
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Deep Biometrics, 2020
2019
Design of multi-view based email classification for IoT systems via semi-supervised learning.
J. Netw. Comput. Appl., 2019
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis.
J. Inf. Secur. Appl., 2019
Enhancing the security of FinTech applications with map-based graphical password authentication.
Future Gener. Comput. Syst., 2019
Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019
PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2019
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
Multim. Tools Appl., 2018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Future Internet, 2018
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks.
Clust. Comput., 2018
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems.
IEEE Access, 2018
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments.
IEEE Trans. Netw. Serv. Manag., 2017
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model.
J. Netw. Comput. Appl., 2017
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017
Proceedings of the Information Security - 20th International Conference, 2017
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures.
J. Netw. Comput. Appl., 2016
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks.
Inf. Comput. Secur., 2016
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Network and System Security - 10th International Conference, 2016
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
Secur. Commun. Networks, 2015
An empirical study on email classification using supervised machine learning in real environments.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism.
Comput. Secur., 2014
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Proceedings of the Information Security - 17th International Conference, 2014
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Enhancing email classification using data reduction and disagreement-based semi-supervised learning.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection.
Comput. Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013
Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2012
Evaluating the effect of user guidelines on creating click-draw based graphical passwords.
Proceedings of the Research in Applied Computation Symposium, 2012
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012