ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks W Li, H Song IEEE Transactions on Intelligent Transportation Systems 17 (4), 960-969, 2016 | 542 | 2016 |
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach W Li, A Joshi, T Finin 2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010 | 238 | 2010 |
Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities W Li, H Song, Z Feng IEEE Internet of Things Journal, 1-1, 2017 | 206 | 2017 |
Security Issues in Mobile Ad Hoc Network W Li, A Joshi Department of Computer Science and Electrical Engineering, University of …, 2007 | 177* | 2007 |
Extracting information about security vulnerabilities from web text V Mulwad, W Li, A Joshi, T Finin, K Viswanathan 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 157 | 2011 |
A Deep Learning Approach to Android Malware Feature Learning and Detection X Su, D Zhang, W Li, K Zhao 15th IEEE International Conference on Trust, Security and Privacy in …, 2016 | 118 | 2016 |
Detecting Malware for Android Platform: An SVM based Approach W Li, J Ge, G Dai 2nd IEEE International Conference on Cyber Security and Cloud Computing …, 2015 | 93 | 2015 |
Cost-effective edge server placement in wireless metropolitan area networks F Zeng, Y Ren, X Deng, W Li Sensors 19 (1), 32, 2018 | 92 | 2018 |
Deep learning-based sentiment analysis for roman urdu text H Ghulam, F Zeng, W Li, Y Xiao Procedia computer science 147, 131-135, 2019 | 85 | 2019 |
Security through collaboration and trust in MANETs W Li, J Parker, A Joshi Mobile Networks and Applications 17, 342-352, 2012 | 85 | 2012 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection K Zhao, D Zhang, X Su, W Li 20th IEEE Symposium on Computers and Communication (IEEE ISCC 2015), 714-720, 2015 | 83 | 2015 |
DroidDeepLearner: Identifying Android Malware Using Deep Learning Z Wang, S Cheng, J Cai, W Li 37th IEEE Sarnoff Symposium, 160-165, 2016 | 77 | 2016 |
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes W Wei, S Liu, W Li, D Du IEEE Transactions on Computational Social Systems 5 (3), 736-747, 2018 | 75 | 2018 |
AIT: An AI-enabled Trust Management System for Vehicular Networks Using Blockchain Technology C Zhang, W Li, Y Luo, Y Hu IEEE Internet of Things Journal 8 (5), 3157 - 3169, 2020 | 71 | 2020 |
Artificial intelligence security: Threats and countermeasures Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 68 | 2021 |
An Android Malware Detection Approach Using Weight-Adjusted Deep Learning W Li, Z Wang, J Cai, S Cheng IEEE International Conference on Computing, Networking and Communications …, 2018 | 67 | 2018 |
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies W Li, A Joshi, T Finin Distributed and Parallel Databases 31, 353-376, 2013 | 62 | 2013 |
Outlier detection in ad hoc networks using dempster-shafer theory W Li, A Joshi Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09 …, 2009 | 62 | 2009 |
Driver identification and authentication with active behavior modeling A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 53 | 2016 |
Mlifdect: Android Malware Detection based on Parallel Machine Learning and Information Fusion X Wang, D Zhang, X Su, W Li SECURITY AND COMMUNICATION NETWORKS, 2017 | 41 | 2017 |