ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks W Li, H Song IEEE transactions on intelligent transportation systems 17 (4), 960-969, 2015 | 577 | 2015 |
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach W Li, A Joshi, T Finin 2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010 | 241 | 2010 |
Policy-based secure and trustworthy sensing for internet of things in smart cities W Li, H Song, F Zeng IEEE Internet of Things Journal 5 (2), 716-723, 2017 | 217 | 2017 |
Security issues in mobile ad-hoc networks: a survey OO Obi The 17 th White House Papers Graduate Research In Informatics at Sussex, 2004 | 175 | 2004 |
Extracting information about security vulnerabilities from web text V Mulwad, W Li, A Joshi, T Finin, K Viswanathan 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 172 | 2011 |
A deep learning approach to android malware feature learning and detection X Su, D Zhang, W Li, K Zhao 2016 IEEE Trustcom/BigDataSE/ISPA, 244-251, 2016 | 134 | 2016 |
Artificial intelligence security: Threats and countermeasures Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 119 | 2021 |
Cost-effective edge server placement in wireless metropolitan area networks F Zeng, Y Ren, X Deng, W Li Sensors 19 (1), 32, 2018 | 107 | 2018 |
Detecting malware for android platform: An svm-based approach W Li, J Ge, G Dai 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 99 | 2015 |
AIT: An AI-enabled trust management system for vehicular networks using blockchain technology C Zhang, W Li, Y Luo, Y Hu IEEE Internet of Things Journal 8 (5), 3157-3169, 2020 | 96 | 2020 |
Deep learning-based sentiment analysis for roman urdu text H Ghulam, F Zeng, W Li, Y Xiao Procedia computer science 147, 131-135, 2019 | 96 | 2019 |
Fest: A feature extraction and selection tool for Android malware detection K Zhao, D Zhang, X Su, W Li 2015 IEEE symposium on computers and communication (ISCC), 714-720, 2015 | 86 | 2015 |
Security through collaboration and trust in MANETs W Li, J Parker, A Joshi Mobile Networks and Applications 17, 342-352, 2012 | 86 | 2012 |
DroidDeepLearner: Identifying Android malware using deep learning Z Wang, J Cai, S Cheng, W Li 2016 IEEE 37th Sarnoff symposium, 160-165, 2016 | 84 | 2016 |
Human activities have reduced plant diversity in eastern China over the last two millennia X Cao, F Tian, U Herzschuh, J Ni, Q Xu, W Li, Y Zhang, M Luo, F Chen Global Change Biology 28 (16), 4962-4976, 2022 | 80 | 2022 |
Fractal intelligent privacy protection in online social network using attribute-based encryption schemes W Wei, S Liu, W Li, D Du IEEE Transactions on Computational Social Systems 5 (3), 736-747, 2018 | 78 | 2018 |
四环素类抗生素降解途径及其主要降解产物研究进展 李伟明, 鲍艳宇, 周启星 应用生态学报 23 (08), 2300, 2012 | 71 | 2012 |
An android malware detection approach using weight-adjusted deep learning W Li, Z Wang, J Cai, S Cheng 2018 international conference on computing, networking and communications …, 2018 | 69 | 2018 |
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies W Li, A Joshi, T Finin Distributed and Parallel Databases 31, 353-376, 2013 | 63 | 2013 |
Outlier detection in ad hoc networks using dempster-shafer theory W Li, A Joshi 2009 Tenth International Conference on Mobile Data Management: Systems …, 2009 | 62 | 2009 |