Miss LI Wenjuan (李文娟)

Research Output

  1. 2018
  2. Online published

    Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

    Meng, W., Li, W., Wang, Y. & Au, M. H., 6 Jun 2018, In : Future Generation Computer Systems. 108, p. 1258-1266

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 9
    Check@CityULib
  3. Published

    Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    Li, W., Meng, W., Kwok, L. & Ip, H. H. S., Mar 2018, In : Cluster Computing. 21, 1, p. 299–310

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 5
    Check@CityULib
  4. Published

    Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks

    Li, W., Meng, W. & Kwok, L. F., Jan 2018, In : Future Internet. 10, 1

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 13
    Check@CityULib
  5. Published

    Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    MENG, W., LI, W., SU, C., ZHOU, J. & LU, R., 2018, In : IEEE Access. 6, p. 7234-7243

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 29
    Check@CityULib
  6. Published

    Towards false alarm reduction using fuzzy if-Then rules for medical cyber physical systems

    LI, W., MENG, W., SU, C. & KWOK, L. F., 2018, In : IEEE Access. 6, p. 6530-6539

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 8
    Check@CityULib
  7. 2017
  8. Published

    Evaluating challenge-based trust mechanism in medical smartphone networks: An empirical study

    Meng, W., Fei, F., Li, W. & Au, M. H., Dec 2017, 2017 IEEE Global Communications Conference (GLOBECOM) : Proceedings. IEEE, (IEEE Global Communications Conference).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Check@CityULib
  9. Published

    Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

    Meng, W., Fei, F., Li, W. & Au, M. H., Nov 2017, In : Lecture Notes in Computer Science. 10599, p. 291-308

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 10
    Check@CityULib
  10. Published

    A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

    Wang, Y., Xie, L., Li, W., Meng, W. & Li, J., Oct 2017, In : Lecture Notes in Computer Science. 10581, p. 267-279

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 4
    Check@CityULib
  11. Published

    Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

    Meng, W., Li, W., Wang, Y. & Au, M. H., Oct 2017, In : Lecture Notes in Computer Science. 10581, p. 163-175

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 3
    Check@CityULib
  12. Published

    A pilot study of multiple password interference between text and map-based passwords

    Meng, W., Li, W., Lee, W. H., Jiang, L. & Zhou, J., Jul 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017 Kanazawa, Japan, July 10–12, 2017 Proceedings. Gollmann, D., Kikuchi, H. & Miyaji, A. (eds.). Springer, Vol. 10355 LNCS. p. 145-162 (Lecture Notes in Computer Science ; vol. 10355).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 4
    Check@CityULib
  13. Published

    SOOA: Exploring special on-off attacks on challenge-based collaborative intrusion detection networks

    Li, W., Meng, W. & Kwok, L., Apr 2017, Green, Pervasive, and Cloud Computing: 12th International Conference, GPC 2017, Proceedings. Au, M. H. A., Choo, K. R., Li, K., Castiglione, A. & Palmieri, F. (eds.). Springer Verlag, Vol. 10232 LNCS. p. 402-415 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10232 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 14
    Check@CityULib
  14. Published

    Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

    Meng, W., Li, W. & Kwok, L. F., 1 Mar 2017, In : IEEE Transactions on Network and Service Management. 14, 1, p. 233-245 7843625.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 18
    Check@CityULib
  15. Published

    A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

    Meng, W., Li, W., Xiang, Y. & Choo, K. R., 15 Jan 2017, In : Journal of Network and Computer Applications. 78, p. 162-169

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 40
    Check@CityULib
  16. Published

    Towards effective and robust list-based packet filter for signature-based network intrusion detection: an engineering approach

    Meng, W., Li, W. & Kwok, L. F., 2017, In : HKIE Transactions Hong Kong Institution of Engineers. 24, 4, p. 204-215

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 2
    Check@CityULib
  17. 2016
  18. Published

    Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice

    Meng, W., Luo, X., Li, W. & Li, Y., 23 Aug 2016, 2016 IEEE TrustCom/BigDataSE/ISPA. IEEE, p. 1061-1068 7847059. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 15
    Check@CityULib
  19. Published

    A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures

    Li, W., Meng, W. & Kwok, L. F., Jun 2016, In : Journal of Network and Computer Applications. 68, p. 126-139

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 69
    Check@CityULib
  20. Published

    On multiple password interference of touch screen patterns and text passwords

    Meng, W., Li, W., Jiang, L. & Meng, L., 7 May 2016, Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, p. 4818-4822

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 9
    Check@CityULib
  21. Published

    Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks

    Li, W. & Meng, W., 2016, In : Information and Computer Security. 24, 3, p. 265-276

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 23
    Check@CityULib
  22. 2015
  23. Published

    Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection

    Meng, W., Li, W. & Kwok, L., Dec 2015, In : Security and Communication Networks. 8, 18, p. 3883-3895

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 37
    Check@CityULib
  24. 2014
  25. Published

    An evaluation of single character frequency-based exclusive signature matching in distinct IDS environments

    Meng, W., Li, W. & Kwok, L., Oct 2014, Information Security: 17th International Conference, ISC 2014, Proceedings. Camenisch, J., Hui, L. C., Yiu, S. M. & Chow, S. S. (eds.). Springer Verlag, Vol. 8783. p. 465-476 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8783).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with ISBN/ISSN)

    Scopus citations: 10
    Check@CityULib