


default search action
Wenjuan Li 0001
Person information
- affiliation: City University of Hong Kong, Hong Kong, SAR, China
Other persons with the same name
- Wenjuan Li — disambiguation page
- Wenjuan Li 0002
— Hangzhou Normal University, School of Information Science and Technology, China (and 1 more)
- Wenjuan Li 0003
— Chinese Academy of Agricultural Sciences, Beijing, China
- Wenjuan Li 0004 — Shanghai Maritime University, Shanghai, China
- Wenjuan Li 0005
— Shandong University, School of Mathematics, Jinan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j55]Weizhi Meng
, Wenjuan Li
, Andrei Nicolae Calugar:
BANN-TMGuard: Toward Touch-Movement-Based Screen Unlock Patterns via Blockchain-Enabled Artificial Neural Networks on IoT Devices. IEEE Internet Things J. 12(2): 1856-1866 (2025) - 2024
- [j54]Wenjuan Li
, Philip Rosenberg, Mads Glisby, Michael Han:
Designing energy-aware collaborative intrusion detection in IoT networks. J. Inf. Secur. Appl. 81: 103713 (2024) - [j53]Ye Li, Jiale Zhang
, Junwu Zhu, Wenjuan Li:
Blockfd: blockchain-based federated distillation against poisoning attacks. Neural Comput. Appl. 36(21): 12901-12916 (2024) - [j52]Wenjuan Li
, Thomas Gleerup, Jiao Tan, Yu Wang
:
A Security Enhanced Android Unlock Scheme Based on Pinch-to-Zoom for Smart Devices. IEEE Trans. Consumer Electron. 70(1): 3985-3993 (2024) - [c57]Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. ISPEC 2024: 365-382 - [e3]Sokratis K. Katsikas
, Habtamu Abie
, Silvio Ranise
, Luca Verderame
, Enrico Cambiaso
, Rita Maria Ugarelli
, Isabel Praça
, Wenjuan Li
, Weizhi Meng
, Steven Furnell
, Basel Katt
, Sandeep Pirbhulal
, Ankur Shukla
, Michele Ianni
, Mila Dalla Preda
, Kim-Kwang Raymond Choo
, Miguel Pupo Correia, Abhishta Abhishta
, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage
, Naoto Yanai
:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - 2023
- [j51]Wenjuan Li
, Christian Stidsen, Tobias Adam:
A blockchain-assisted security management framework for collaborative intrusion detection in smart cities. Comput. Electr. Eng. 111(Part A): 108884 (2023) - [j50]Wenjuan Li
, Jiao Tan, Nan Zhu:
Design of double-cross-based smartphone unlock mechanism. Comput. Secur. 129: 103204 (2023) - [j49]Wenjuan Li, Yu Wang
, Jin Li:
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. Int. J. Inf. Sec. 22(5): 1219-1230 (2023) - [j48]Zuchao Ma
, Liang Liu
, Weizhi Meng
, Xiapu Luo
, Lisong Wang
, Wenjuan Li
:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j47]Yuan Chang, Jiliang Li, Wenjuan Li:
2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J. Inf. Secur. Appl. 74: 103466 (2023) - [j46]Hao Sui, Xiaobing Sun, Jiale Zhang
, Bing Chen, Wenjuan Li:
Multi-level membership inference attacks in federated Learning based on active GAN. Neural Comput. Appl. 35(23): 17013-17027 (2023) - [c56]Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng
, Wenjuan Li:
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. ISPA/BDCloud/SocialCom/SustainCom 2023: 286-293 - [c55]Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li:
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. ICNC 2023: 336-342 - [c54]Baolu Xue, Jiale Zhang
, Bing Chen, Wenjuan Li:
Tackling Non-IID for Federated Learning with Components Alignment. ML4CS 2023: 131-144 - [e2]Weizhi Meng
, Wenjuan Li
:
Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 498, Springer 2023, ISBN 978-3-031-31419-3 [contents] - 2022
- [j45]Wenjuan Li
, Weizhi Meng
, Lam For Kwok
:
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Commun. Surv. Tutorials 24(1): 280-305 (2022) - [j44]Wenjuan Li
, Fei Tian, Jin Li, Yang Xiang
:
Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j43]Lina Zhang
, Xiangqin Zheng
, Keping Yu
, Wenjuan Li
, Tao Wang, Xuan Dang, Bo Yang:
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j42]Wenjuan Li, Yu Wang, Weizhi Meng
, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j41]Wenjuan Li
, Lishan Ke
, Weizhi Meng
, Jinguang Han
:
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors. Int. J. Intell. Syst. 37(1): 287-304 (2022) - [j40]Wenjuan Li
, Yu Wang, Jin Li:
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks. J. Syst. Archit. 127: 102510 (2022) - [j39]Wenjuan Li
, Yu Wang
, Jiao Tan, Nan Zhu:
DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones. Mob. Networks Appl. 27(1): 382-391 (2022) - [j38]Wenjuan Li, Weizhi Meng
:
BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Netw. 36(4): 120-125 (2022) - [c53]Ye Li, Jiale Zhang
, Junwu Zhu, Wenjuan Li:
HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. EISA 2022: 145-159 - [c52]Wenjuan Li
, Philip Rosenberg, Mads Glisby, Michael Han:
EnergyCIDN: Enhanced Energy-Aware Challenge-Based Collaborative Intrusion Detection in Internet of Things. ICA3PP 2022: 293-312 - [c51]Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li
, Liming Fang
:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. ProvSec 2022: 210-227 - [c50]Yiming Sun, Weizhi Meng
, Wenjuan Li:
Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. PST 2022: 1-5 - [c49]Thomas Gleerup, Wenjuan Li, Jiao Tan, Yu Wang:
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices. SciSec 2022: 245-259 - [c48]Wenjuan Li, Jiao Tan, Nan Zhu:
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones. SEC 2022: 412-428 - [e1]Wenjuan Li
, Steven Furnell
, Weizhi Meng
:
Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13745, Springer 2022, ISBN 978-3-031-21310-6 [contents] - 2021
- [j37]Wenjuan Li
, Yu Wang, Zhiping Jin
, Keping Yu
, Jin Li, Yang Xiang
:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit. Commun. Networks 7(2): 257-263 (2021) - [j36]Na Shi
, Liang Tan, Wenjuan Li
, Xin Qi, Keping Yu
:
A blockchain-empowered AAA scheme in the large-scale HetNet. Digit. Commun. Networks 7(3): 308-316 (2021) - [j35]Chunhui Wu
, Wenjuan Li
:
Enhancing intrusion detection with feature selection and neural network. Int. J. Intell. Syst. 36(7): 3087-3105 (2021) - [j34]Wenjuan Li
, Yu Wang
, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Sec. 20(2): 127-139 (2021) - [j33]Wenjuan Li
, Man Ho Au, Yu Wang
:
A fog-based collaborative intrusion detection framework for smart grid. Int. J. Netw. Manag. 31(2) (2021) - [j32]Weizhi Meng
, Wenjuan Li
, Jianying Zhou:
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70: 60-71 (2021) - [j31]Junjie Huang
, Liang Tan, Wenjuan Li
, Keping Yu
:
RON-enhanced blockchain propagation mechanism for edge-enabled smart cities. J. Inf. Secur. Appl. 61: 102936 (2021) - [j30]Wenjuan Li
, Weizhi Meng
, Steven Furnell
:
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144: 35-41 (2021) - [c47]Wenjuan Li
, Weizhi Meng
, Javier Parra-Arnau, Kim-Kwang Raymond Choo:
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. DSC 2021: 1-8 - [c46]Li Wang, Weizhi Meng
, Wenjuan Li:
Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. MSN 2021: 486-493 - [c45]Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li:
LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. PST 2021: 1-9 - [c44]Wenjuan Li, Weizhi Meng
, Laurence T. Yang:
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. TrustCom 2021: 122-129 - [c43]Wenjuan Li
, Weizhi Meng
, Yu Wang, Jin Li:
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. WASA (2) 2021: 624-635 - 2020
- [j29]Weizhi Meng
, Wenjuan Li
, Yu Wang
, Man Ho Au
:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j28]Wenjuan Li
, Weizhi Meng
, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Trans. Inf. Syst. 103-D(2): 196-203 (2020) - [j27]Weizhi Meng
, Wenjuan Li
, Laurence T. Yang, Peng Li:
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inf. Sec. 19(3): 279-290 (2020) - [j26]Wenjuan Li
, Yu Wang, Jin Li, Yang Xiang
:
Toward supervised shape-based behavioral authentication on smartphones. J. Inf. Secur. Appl. 55: 102591 (2020) - [j25]Wenjuan Li
, Weizhi Meng
, Man Ho Au:
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161: 102631 (2020) - [j24]Wenjuan Li
, Jiao Tan, Weizhi Meng
, Yu Wang:
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation. J. Netw. Comput. Appl. 165: 102687 (2020) - [j23]Weizhi Meng
, Wenjuan Li
, Steven Tug, Jiao Tan:
Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities. J. Parallel Distributed Comput. 144: 268-277 (2020) - [j22]Weizhi Meng
, Wenjuan Li
, Liqiu Zhu:
Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management Against Insider Attacks. IEEE Trans. Engineering Management 67(4): 1377-1386 (2020) - [c42]Wenjuan Li
, Jiao Tan, Yu Wang:
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. NSS 2020: 261-276 - [c41]Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li
:
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication. SpaCCS 2020: 251-265 - [c40]Wenjuan Li
, Jiao Tan, Nan Zhu, Yu Wang:
Designing Double-Click-Based Unlocking Mechanism on Smartphones. SpaCCS Workshops 2020: 573-585 - [c39]Wenjuan Li
, Weizhi Meng
, Hui Zhu:
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. TrustCom 2020: 1179-1186 - [c38]Liang Tan, Huan Xiao, Xinglin Shang
, Yong Wang, Feng Ding, Wenjuan Li
:
A Blockchain-based Trusted Service Mechanism for Crowdsourcing System. VTC Spring 2020: 1-6 - [p1]Zhi Lin, Weizhi Meng
, Wenjuan Li, Duncan S. Wong:
Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones. Deep Biometrics 2020: 141-159
2010 – 2019
- 2019
- [j21]Yu Wang
, Weizhi Meng
, Wenjuan Li
, Zhe Liu, Yang Liu, Hanxiao Xue:
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j20]Wenjuan Li
, Steven Tug, Weizhi Meng
, Yu Wang:
Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96: 481-489 (2019) - [j19]Weizhi Meng
, Liqiu Zhu, Wenjuan Li
, Jinguang Han, Yan Li:
Enhancing the security of FinTech applications with map-based graphical password authentication. Future Gener. Comput. Syst. 101: 1018-1027 (2019) - [j18]Wenjuan Li
, Lam For Kwok
:
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. J. Inf. Secur. Appl. 47: 1-7 (2019) - [j17]Wenjuan Li
, Weizhi Meng
, Zhiyuan Tan, Yang Xiang:
Design of multi-view based email classification for IoT systems via semi-supervised learning. J. Netw. Comput. Appl. 128: 56-63 (2019) - [c37]Wenjuan Li
, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c36]Weizhi Meng
, Wenjuan Li
, Lijun Jiang, Kim-Kwang Raymond Choo
, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. ESORICS (1) 2019: 493-511 - [c35]Wenjuan Li
, Weizhi Meng
, Lam For Kwok
:
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. ISPEC 2019: 453-463 - [c34]Wenjuan Li
, Jiao Tan, Weizhi Meng
, Yu Wang, Jing Li:
SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. ML4CS 2019: 140-153 - [c33]Weizhi Meng
, Wenjuan Li
, Lijun Jiang, Jianying Zhou
:
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications. SEC 2019: 180-193 - [c32]Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li
, Chong Jiang:
PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. SocialSec 2019: 251-263 - 2018
- [j16]Wenjuan Li
, Weizhi Meng
, Chunhua Su, Lam For Kwok
:
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access 6: 6530-6539 (2018) - [j15]Weizhi Meng
, Wenjuan Li
, Chunhua Su, Jianying Zhou
, Rongxing Lu
:
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access 6: 7234-7243 (2018) - [j14]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
, Horace H. S. Ip:
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Clust. Comput. 21(1): 299-310 (2018) - [j13]Wenjuan Li
, Weizhi Meng
, Lam For Kwok
:
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Future Internet 10(1): 6 (2018) - [j12]Yu Wang
, Weizhi Meng
, Wenjuan Li
, Jin Li, Waixi Liu, Yang Xiang:
A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122: 26-35 (2018) - [j11]Weizhi Meng
, Wenjuan Li
, Duncan S. Wong:
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multim. Tools Appl. 77(23): 30167-30185 (2018) - [c31]Weizhi Meng
, Yu Wang, Wenjuan Li
, Zhe Liu, Jin Li, Christian W. Probst
:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - [c30]David Madsen, Wenjuan Li
, Weizhi Meng
, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. ICA3PP (4) 2018: 481-494 - [c29]Wenjuan Li
, Weizhi Meng
, Yu Wang, Jinguang Han
, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. ISPEC 2018: 313-328 - [c28]Wenjuan Li
, Weizhi Meng
, Yu Wang, Lam For Kwok
, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. TrustCom/BigDataSE 2018: 1208-1213 - 2017
- [j10]Weizhi Meng
, Wenjuan Li
, Lam-for Kwok
, Kim-Kwang Raymond Choo
:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65: 213-229 (2017) - [j9]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
, Horace Ho-Shing Ip:
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77: 135-145 (2017) - [j8]Weizhi Meng
, Wenjuan Li
, Yang Xiang, Kim-Kwang Raymond Choo
:
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78: 162-169 (2017) - [j7]Weizhi Meng
, Wenjuan Li
, Lam For Kwok
:
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments. IEEE Trans. Netw. Serv. Manag. 14(1): 233-245 (2017) - [c27]Weizhi Meng
, Wenjuan Li
, Lee Wang Hao, Lijun Jiang, Jianying Zhou
:
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. ACNS 2017: 145-162 - [c26]Weizhi Meng
, Wenjuan Li
, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. CSS 2017: 163-175 - [c25]Yu Wang, Lin Xie, Wenjuan Li
, Weizhi Meng
, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. CSS 2017: 267-279 - [c24]Weizhi Meng
, Fei Fei, Wenjuan Li
, Man Ho Au:
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. GLOBECOM 2017: 1-6 - [c23]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
:
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. GPC 2017: 402-415 - [c22]Weizhi Meng
, Fei Fei, Wenjuan Li
, Man Ho Au:
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. ISC 2017: 291-308 - 2016
- [j6]Wenjuan Li
, Weizhi Meng
, Xiapu Luo
, Lam-for Kwok
:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. Comput. Secur. 60: 177-192 (2016) - [j5]Wenjuan Li
, Weizhi Meng
:
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3): 265-276 (2016) - [j4]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
:
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. J. Netw. Comput. Appl. 68: 126-139 (2016) - [c21]Weizhi Meng
, Wenjuan Li
, Duncan S. Wong, Jianying Zhou
:
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. ACNS 2016: 629-647 - [c20]Weizhi Meng
, Wenjuan Li
, Lijun Jiang, Liying Meng:
On Multiple Password Interference of Touch Screen Patterns and Text Passwords. CHI 2016: 4818-4822 - [c19]Wenjuan Li
, Lijun Jiang, Weizhi Meng
, Lam-for Kwok
:
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. IFIPTM 2016: 146-153 - [c18]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok
, Horace Ho-Shing Ip:
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. NSS 2016: 433-449 - [c17]Weizhi Meng, Xiapu Luo
, Wenjuan Li
, Yan Li:
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. Trustcom/BigDataSE/ISPA 2016: 1061-1068 - 2015
- [j3]Weizhi Meng
, Wenjuan Li
, Lam-for Kwok
:
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Networks 8(18): 3883-3895 (2015) - [c16]Wenjuan Li
, Weizhi Meng
:
An empirical study on email classification using supervised machine learning in real environments. ICC 2015: 7438-7443 - 2014
- [j2]Weizhi Meng
, Wenjuan Li
, Lam-for Kwok
:
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43: 189-204 (2014) - [c15]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Enhancing email classification using data reduction and disagreement-based semi-supervised learning. ICC 2014: 622-627 - [c14]Wenjuan Li
, Weizhi Meng
, Lam-for Kwok:
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. IFIPTM 2014: 61-76 - [c13]Weizhi Meng
, Wenjuan Li
, Lam-for Kwok:
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. ISC 2014: 465-476 - [c12]Wenjuan Li
, Weizhi Meng
, Zhiyuan Tan
, Yang Xiang
:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. TrustCom 2014: 174-181 - 2013
- [j1]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Comput. Networks 57(17): 3630-3640 (2013) - [c11]Wenjuan Li
, Yuxin Meng
, Lam-for Kwok
:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. CIS 2013: 518-522 - [c10]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection. HPCC/EUC 2013: 175-182 - [c9]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
, Yang Xiang
:
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice. INCoS 2013: 181-188 - [c8]Wenjuan Li
, Yuxin Meng
:
Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. ISNN (2) 2013: 622-629 - [c7]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. NSS 2013: 40-53 - [c6]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok:
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. SEC 2013: 55-68 - 2012
- [c5]Yuxin Meng
, Wenjuan Li
:
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. ICICS 2012: 349-356 - [c4]Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection. ISMIS 2012: 115-124 - [c3]Yuxin Meng
, Wenjuan Li
:
Evaluating the effect of user guidelines on creating click-draw based graphical passwords. RACS 2012: 322-327 - [c2]Yuxin Meng, Lam-for Kwok
, Wenjuan Li
:
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. SecureComm 2012: 203-221 - [c1]Yuxin Meng
, Wenjuan Li
:
Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. TrustCom 2012: 223-230
Coauthor Index
aka: Lam For Kwok

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 00:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint