Wenjia Li, Ph.D., SMIEEE
New York Institute of Technology
H-index: 26
North America-United States
Top articles of Wenjia Li, Ph.D., SMIEEE
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android | Journal of Computer Security | Yupeng Hu Wenxin Kuang Jin Zhe Wenjia Li Keqin Li | 2023 |
EnsembleDroid: A Malware Detection Approach for Android System based on Ensemble Learning | Sharon Guan Wenjia Li | 2022/9 | |
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks | Jiaying Lin Yehua Wei Wenjia Li Jing Long | 2022/2 | |
A Robust Malware Detection Approach for Android System Based on Ensemble Learning | Wenjia Li Juecong Cai Zi Wang Sihua Cheng | 2021/12/28 | |
Security and privacy for emerging iot and cps domains | Elisa Bertino Ravi Sandhu Bhavani Thuraisingham Indrakshi Ray Wenjia Li | 2022/4 | |
Toward A Decentralized, Trustworthy and Fair Vehicle Resource Sharing as a Service: Key Technologies and Challenges | Yuhong Liu Wenjia Li Weisong Shi | 2022/4 | |
Task-offloading strategy based on performance prediction in vehicular edge computing | Mathematics | Feng Zeng Jiangjunzhe Tang Chengsheng Liu Xiaoheng Deng Wenjia Li | 2022/3/22 |
DroidEnemy: battling adversarial example attacks for Android malware detection | Digital communications and networks | Neha Bala Aemun Ahmar Wenjia Li Fernanda Tovar Arpit Battu | 2022/12/1 |
Dynamic Bayesian Network Based Security Analysis for Physical Layer Key Extraction | IEEE Open Journal of the Communications Society | Xueqing Huang Nirwan Ansari Siqi Huang Wenjia Li | 2022/2/25 |
FLAM-PUF: A response–feedback-based lightweight anti-machine-learning-attack PUF | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Linjun Wu Yupeng Hu Kehuan Zhang Wenjia Li Xiaolin Xu | 2022/10/20 |
Half-duplex mode based secure key generation method for resource-constrained IoT devices | IEEE Internet of Things Journal | Qiao Hu Jingyi Zhang Gerhard P Hancke Yupeng Hu Wenjia Li | 2021/6/7 |
Discovering Coherent Topics from Urdu Text. | Mubashar Mustafa Feng Zeng Hussain Ghulam Wenjia Li | 2021 | |
Deep learning-based task offloading for vehicular edge computing | Feng Zeng Chengsheng Liu Junzhe Tangjiang Wenjia Li | 2021 | |
Artificial intelligence security: Threats and countermeasures | Yupeng Hu Wenxin Kuang Zheng Qin Kenli Li Jiliang Zhang | 2021/11/23 | |
AdversarialDroid: A Deep Learning based Malware Detection Approach for Android System Against Adversarial Example Attacks | Giuseppe D'Ambrosio Wenjia Li | 2021/10 | |
Blockchain-based secure and trustworthy sensing for IoT-based smart cities | Wenjia Li Jerry Cheng | 2021/7 | |
Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services | Sensors | Yuansheng Luo Wenjia Li Shi Qiu | 2020/1 |
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android | arXiv preprint arXiv:2006.12831 | Yupeng Hu Zhe Jin Wenjia Li Yang Xiang Jiliang Zhang | 2020/6/23 |
DroidPortrait: android malware portrait construction based on multidimensional behavior analysis | Applied Sciences | Xin Su Lijun Xiao Wenjia Li Xuchong Liu Kuan-Ching Li | 2020/6/8 |
Direct sequencing of tRNA by 2D-HELS-AA MS Seq reveals its different isoforms and dynamic base modifications | ACS chemical biology | Ning Zhang Shundi Shi Xuanting Wang Wenhao Ni Xiaohong Yuan | 2020/5/4 |