Fest: A feature extraction and selection tool for Android malware detection
Kai Zhao, Dafang Zhang, Xin Su, Wenjia Li
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01.07.2015)
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01.07.2015)
Get full text
Conference Proceeding
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks
Wenjia Li, Joshi, Anupam, Finin, Tim
Published in 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall) (01.09.2015)
Published in 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall) (01.09.2015)
Get full text
Conference Proceeding
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach
Wenjia Li, Joshi, Anupam, Finin, Tim
Published in 2010 Eleventh International Conference on Mobile Data Management (01.05.2010)
Published in 2010 Eleventh International Conference on Mobile Data Management (01.05.2010)
Get full text
Conference Proceeding
A Deep Learning Approach to Android Malware Feature Learning and Detection
Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao
Published in 2016 IEEE Trustcom/BigDataSE/ISPA (01.08.2016)
Published in 2016 IEEE Trustcom/BigDataSE/ISPA (01.08.2016)
Get full text
Conference Proceeding
Android app recommendation approach based on network traffic measurement and analysis
Xin Su, Dafang Zhang, Wenjia Li, Wenwei Li
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01.07.2015)
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01.07.2015)
Get full text
Conference Proceeding
Quantitative Expression of Outlet Deviation Angle of Turbomachine Stator Based on Equivalent Moment of Momentum Principle
Li, Wenjia, Wang, Anlin, Cheng, Wei, Li, Xiaotian, Han, Jibin
Published in MATEC Web of Conferences (01.01.2017)
Published in MATEC Web of Conferences (01.01.2017)
Get full text
Journal Article
Conference Proceeding
Unequal Failure Protection Coding Technology for Cloud Storage Systems
Yupeng Hu, Yonghe Liu, Wenjia Li, Nong Xiao, Zheng Qin, Shu Yin
Published in 2016 IEEE International Conference on Cluster Computing (CLUSTER) (01.09.2016)
Published in 2016 IEEE International Conference on Cluster Computing (CLUSTER) (01.09.2016)
Get full text
Conference Proceeding
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks
Wenjia Li, Joshi, A., Finin, T.
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Get full text
Conference Proceeding
Detecting Malware for Android Platform: An SVM-Based Approach
Wenjia Li, Jigang Ge, Guqian Dai
Published in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (01.11.2015)
Published in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (01.11.2015)
Get full text
Conference Proceeding
Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems
Mohr, B., Wenjia Li, Heinen, S.
Published in 2012 IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS) (01.08.2012)
Published in 2012 IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS) (01.08.2012)
Get full text
Conference Proceeding
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine
Wenjia Li, Joshi, A., Finin, T.
Published in 2011 IEEE 12th International Conference on Mobile Data Management (01.06.2011)
Published in 2011 IEEE 12th International Conference on Mobile Data Management (01.06.2011)
Get full text
Conference Proceeding
Driver identification and authentication with active behavior modeling
Burton, Angela, Parikh, Tapan, Mascarenhas, Shannon, Jue Zhang, Voris, Jonathan, Artan, N. Sertac, Wenjia Li
Published in 2016 12th International Conference on Network and Service Management (CNSM) (01.10.2016)
Published in 2016 12th International Conference on Network and Service Management (CNSM) (01.10.2016)
Get full text
Conference Proceeding
Extracting Information about Security Vulnerabilities from Web Text
Mulwad, V., Wenjia Li, Joshi, A., Finin, T., Viswanathan, K.
Published in 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (01.08.2011)
Published in 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (01.08.2011)
Get full text
Conference Proceeding
Enforcing secure and robust routing with declarative policies
Kodeswaran, P, Wenjia Li, Joshi, A, Finin, T, Perich, F
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Get full text
Conference Proceeding
DroidDeepLearner: Identifying Android malware using deep learning
Zi Wang, Juecong Cai, Sihua Cheng, Wenjia Li
Published in 2016 IEEE 37th Sarnoff Symposium (01.09.2016)
Published in 2016 IEEE 37th Sarnoff Symposium (01.09.2016)
Get full text
Conference Proceeding
BAN-trust: An attack-resilient malicious node detection scheme for body area networks
Wenjia Li, Xianshu Zhu
Published in 2016 International Conference on Computing, Networking and Communications (ICNC) (01.02.2016)
Published in 2016 International Conference on Computing, Networking and Communications (ICNC) (01.02.2016)
Get full text
Conference Proceeding
Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare
Wenjia Li, Xianshu Zhu
Published in 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (01.10.2014)
Published in 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (01.10.2014)
Get full text
Conference Proceeding
Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks
Dou, Yueyue, Zeng, Feng, Li, Wenjia
Published in Wireless Algorithms, Systems, and Applications (01.01.2017)
Published in Wireless Algorithms, Systems, and Applications (01.01.2017)
Get full text
Book Chapter
Trustworthy data management for wireless networks in Cyber-Physical Systems
Wenjia Li, Kotut, Lindah
Published in 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) (01.12.2013)
Published in 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) (01.12.2013)
Get full text
Conference Proceeding
Poster abstract: Finding abnormal data in vehicular cyber physical systems
Wenjia Li, Kotut, Lindah
Published in 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) (01.04.2013)
Published in 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) (01.04.2013)
Get full text
Conference Proceeding