Follow
Wenjuan Li
Wenjuan Li
The Education University of Hong Kong
Verified email at cityu.edu.hk - Homepage
Title
Cited by
Cited by
Year
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
W Li, W Meng, LF Kwok
Journal of Network and Computer Applications 68, 126-139, 2016
2262016
Designing collaborative blockchained signature-based intrusion detection in IoT environments
W Li, S Tug, W Meng, Y Wang
Future Generation Computer Systems 96, 481-489, 2019
2032019
Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
W Meng, W Li, L Zhu
IEEE Transactions on Engineering Management 67 (4), 1377-1386, 2019
1372019
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
W Li, W Meng, MH Au
Journal of Network and Computer Applications 161, 102631, 2020
1292020
EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
W Meng, W Li, LF Kwok
computers & security 43, 189-204, 2014
1122014
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions
W Li, J Wu, J Cao, N Chen, Q Zhang, R Buyya
Journal of Cloud Computing 10 (1), 35, 2021
1092021
Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data
W Meng, W Li, C Su, J Zhou, R Lu
Ieee Access 6, 7234-7243, 2017
1052017
A blockchain-empowered AAA scheme in the large-scale HetNet
N Shi, L Tan, W Li, X Qi, K Yu
Digital Communications and Networks 7 (3), 308-316, 2021
1022021
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
W Li, W Meng, LF Kwok, HS Horace
Journal of Network and Computer Applications 77, 135-145, 2017
952017
Design of intelligent KNN‐based alarm filter using knowledge‐based alert verification in intrusion detection
W Meng, W Li, LF Kwok
Security and Communication Networks 8 (18), 3883-3895, 2015
912015
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue
Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019
872019
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
822018
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks
W Meng, W Li, Y Xiang, KKR Choo
Journal of Network and Computer Applications 78, 162-169, 2017
772017
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
W Meng, W Li, Y Wang, MH Au
Future Generation Computer Systems 108, 1258-1266, 2020
762020
An improved particle swarm optimization algorithm suitable for photovoltaic power tracking under partial shading conditions
K Hu, S Cao, W Li, F Zhu
IEEE Access 7, 143217-143232, 2019
692019
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration
W Meng, W Li, J Zhou
Information Fusion 70, 60-71, 2021
662021
Towards blockchain-based software-defined networking: security challenges and solutions
W Li, W Meng, Z Liu, MH Au
IEICE Transactions on Information and Systems 103 (2), 196-203, 2020
612020
Design of multi-view based email classification for IoT systems via semi-supervised learning
W Li, W Meng, Z Tan, Y Xiang
Journal of Network and Computer Applications 128, 56-63, 2019
612019
A new ultra-short-term photovoltaic power prediction model based on ground-based cloud images
K Hu, S Cao, L Wang, W Li, M Lv
Journal of Cleaner Production 200, 731-745, 2018
612018
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
W Meng, W Li, LT Yang, P Li
International Journal of Information Security 19 (3), 279-290, 2020
592020
The system can't perform the operation now. Try again later.
Articles 1–20