Wenting Li

Orcid: 0000-0002-2613-8257

Affiliations:
  • Peking University, School of Computer Science, Beijing, China
  • Peking University, School of Software and Microelectronics, Beijing, China (PhD 2021)


According to our database1, Wenting Li authored at least 19 papers between 2015 and 2023.

Collaborative distances:

Timeline

2015
2016
2017
2018
2019
2020
2021
2022
2023
0
1
2
3
4
5
6
1
1
1
4
2
2
4
1
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023

An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Improved Wordpcfg for Passwords with Maximum Probability Segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2023

2021
Practical Threshold Multi-Factor Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Incrementally Updateable Honey Password Vaults.
Proceedings of the 30th USENIX Security Symposium, 2021

Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2021

2019
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction.
Future Gener. Comput. Syst., 2019

Probability Model Transforming Encoders Against Encoding Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Password Expiration Strategy: A Perspective of Ecological Memory.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Breaking Three Remote user Authentication Systems for Mobile Devices.
J. Signal Process. Syst., 2018

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018

2017
Breaking Two Remote User Authentication Systems for Mobile Devices.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015


  Loading...