Miss LI Wenjuan (李文娟)

Research Output

  1. 2019
  2. Published

    Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems

    Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. & Xue, H., 10 Oct 2019, In : Concurrency Computation. 31, 19, e5101.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 4
    Check@CityULib
  3. Published

    SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones

    Li, W., Tan, J., Meng, W., Wang, Y. & Li, J., Sep 2019, Machine Learning for Cyber Security: Proceedings. Chen, X., Huang, X. & Zhang, J. (eds.). Springer Nature Switzerland AG, p. 140-153 (Lecture Notes in Computer Science; vol. 11806 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Check@CityULib
  4. E-pub ahead of print

    Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

    Meng, W., Li, W., Yang, L. T. & Li, P., 8 Aug 2019, In : International Journal of Information Security.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Check@CityULib
  5. Published

    Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis

    Li, W. & Kwok, L. F., Aug 2019, In : Journal of Information Security and Applications. 47, p. 1-7

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 2
    Check@CityULib
  6. E-pub ahead of print

    Enhancing the security of FinTech applications with map-based graphical password authentication

    Meng, W., Zhu, L., Li, W., Han, J. & Li, Y., 18 Jul 2019, In : Future Generation Computer Systems. 101, p. 1018-1027

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Check@CityULib
  7. E-pub ahead of print

    Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks

    Meng, W., Li, W. & Zhu, L., 10 Jul 2019, In : IEEE Transactions on Engineering Management.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Check@CityULib
  8. Published

    Designing collaborative blockchained signature-based intrusion detection in IoT environments

    Li, W., Tug, S., Meng, W. & Wang, Y., Jul 2019, In : Future Generation Computer Systems. 96, p. 481-489

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 3
    Check@CityULib
  9. Published

    SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications

    Meng, W., Li, W., Jiang, L. & Zhou, J., Jun 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer, Cham, p. 180-193 (IFIP Advances in Information and Communication Technology; vol. 562).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Check@CityULib
  10. Published

    Towards Blockchained Challenge-Based Collaborative Intrusion Detection

    Li, W., Wang, Y., Li, J. & Au, M. H., Jun 2019, Applied Cryptography and Network Security Workshops. Zhou, J., Deng, R., Li, Z., Majumdar, S., Meng, W. & Zhang, K. (eds.). Springer Nature Switzerland AG, p. 122-139 (Lecture Notes in Computer Science; vol. 11605 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Check@CityULib
  11. Published

    Design of multi-view based email classification for IoT systems via semi-supervised learning

    Li, W., Meng, W., Tan, Z. & Xiang, Y., 15 Feb 2019, In : Journal of Network and Computer Applications. 128, p. 56-63

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 1
    Check@CityULib
  12. 2018
  13. Published

    A fog-based privacy-preserving approach for distributed signature-based intrusion detection

    Wang, Y., Meng, W., Li, W., Li, J., Liu, W. & Xiang, Y., Dec 2018, In : Journal of Parallel and Distributed Computing. 122, p. 26-35

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 5
    Check@CityULib
  14. Published

    Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones

    Meng, W., Li, W. & Wong, D. S., Dec 2018, In : Multimedia Tools and Applications. 77, 23, p. 30167-30185

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 3
    Check@CityULib
  15. Published

    Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA

    Madsen, D., Li, W., Meng, W. & Wang, Y., Nov 2018, Algorithms and Architectures for Parallel Processing: Proceedings, Part IV. Vaidya, J. & Li, J. (eds.). Springer Nature Switzerland AG, p. 481-494 (Lecture Notes in Computer Science; vol. LNCS 11337 ).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Scopus citations: 2
    Check@CityULib
  16. Published

    Towards securing challenge-based collaborative intrusion detection networks via message verification

    Li, W., Meng, W., Wang, Y., Han, J. & Li, J., Sep 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Su, C. & Kikuchi, H. (eds.). Springer, p. 313-328 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Scopus citations: 1
    Check@CityULib
  17. Published

    Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

    Meng, W., Wang, Y., Li, W., Liu, Z., Li, J. & Probst, C. W., Jul 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer, Cham, p. 759-767 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. LNCS 10946).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Scopus citations: 3
    Check@CityULib
  18. Published

    Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks

    Li, W., Meng, W., Wang, Y., Kwok, L. F. & Lu, R., Jul 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering. IEEE, p. 1208-1213 8456036

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)Not applicablepeer-review

    Scopus citations: 2
    Check@CityULib
  19. E-pub ahead of print

    Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

    Meng, W., Li, W., Wang, Y. & Au, M. H., 6 Jun 2018, In : Future Generation Computer Systems.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 8
    Check@CityULib
  20. Published

    Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    Li, W., Meng, W., Kwok, L. & Ip, H. H. S., Mar 2018, In : Cluster Computing. 21, 1, p. 299–310

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 3
    Check@CityULib
  21. Published

    Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

    Li, W., Meng, W. & Kwok, L. F., Jan 2018, In : Future Internet. 10, 1

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 11
    Check@CityULib
  22. Published

    Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    MENG, W., LI, W., SU, C., ZHOU, J. & LU, R., 2018, In : IEEE Access. 6, p. 7234-7243

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalNot applicablepeer-review

    Scopus citations: 19
    Check@CityULib
Previous 1 2 3 Next