ติดตาม
Wenjia Li
Wenjia Li
Assistant Professor of Computer Science, Georgia Southern University
ยืนยันอีเมลแล้วที่ georgiasouthern.edu
ชื่อ
อ้างโดย
อ้างโดย
ปี
ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
W Li, H Song
IEEE transactions on intelligent transportation systems 17 (4), 960-969, 2015
5772015
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach
W Li, A Joshi, T Finin
2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010
2412010
Policy-based secure and trustworthy sensing for internet of things in smart cities
W Li, H Song, F Zeng
IEEE Internet of Things Journal 5 (2), 716-723, 2017
2172017
Security issues in mobile ad-hoc networks: a survey
OO Obi
The 17 th White House Papers Graduate Research In Informatics at Sussex, 2004
1752004
Extracting information about security vulnerabilities from web text
V Mulwad, W Li, A Joshi, T Finin, K Viswanathan
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
1722011
A deep learning approach to android malware feature learning and detection
X Su, D Zhang, W Li, K Zhao
2016 IEEE Trustcom/BigDataSE/ISPA, 244-251, 2016
1342016
Artificial intelligence security: Threats and countermeasures
Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
1192021
Cost-effective edge server placement in wireless metropolitan area networks
F Zeng, Y Ren, X Deng, W Li
Sensors 19 (1), 32, 2018
1072018
Detecting malware for android platform: An svm-based approach
W Li, J Ge, G Dai
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
992015
AIT: An AI-enabled trust management system for vehicular networks using blockchain technology
C Zhang, W Li, Y Luo, Y Hu
IEEE Internet of Things Journal 8 (5), 3157-3169, 2020
962020
Deep learning-based sentiment analysis for roman urdu text
H Ghulam, F Zeng, W Li, Y Xiao
Procedia computer science 147, 131-135, 2019
962019
Fest: A feature extraction and selection tool for Android malware detection
K Zhao, D Zhang, X Su, W Li
2015 IEEE symposium on computers and communication (ISCC), 714-720, 2015
862015
Security through collaboration and trust in MANETs
W Li, J Parker, A Joshi
Mobile Networks and Applications 17, 342-352, 2012
862012
DroidDeepLearner: Identifying Android malware using deep learning
Z Wang, J Cai, S Cheng, W Li
2016 IEEE 37th Sarnoff symposium, 160-165, 2016
842016
Human activities have reduced plant diversity in eastern China over the last two millennia
X Cao, F Tian, U Herzschuh, J Ni, Q Xu, W Li, Y Zhang, M Luo, F Chen
Global Change Biology 28 (16), 4962-4976, 2022
802022
Fractal intelligent privacy protection in online social network using attribute-based encryption schemes
W Wei, S Liu, W Li, D Du
IEEE Transactions on Computational Social Systems 5 (3), 736-747, 2018
782018
四环素类抗生素降解途径及其主要降解产物研究进展
李伟明, 鲍艳宇, 周启星
应用生态学报 23 (08), 2300, 2012
712012
An android malware detection approach using weight-adjusted deep learning
W Li, Z Wang, J Cai, S Cheng
2018 international conference on computing, networking and communications …, 2018
692018
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies
W Li, A Joshi, T Finin
Distributed and Parallel Databases 31, 353-376, 2013
632013
Outlier detection in ad hoc networks using dempster-shafer theory
W Li, A Joshi
2009 Tenth International Conference on Mobile Data Management: Systems …, 2009
622009
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20