Wenjia Li
Wenjia Li

Dr.

Alumnus, Ph.D. Alumnus

New York Institute of Technology
Computer Science, EGGC 8th Fl, Rm 807, 1855 Broadway, New York, NY 10023, USA

Graduated in August 2011

Wenjia Li

Publications

2015

  1. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1562 downloads.

2013

  1. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1902 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 130 downloads.
  2. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1698 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1936 downloads.
  2. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3338 downloads.
  3. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1813 downloads.
  4. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2247 downloads.

2010

  1. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 2009 downloads, 1 citation.
  2. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 286 downloads.
  3. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3202 downloads, 7 citations.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3161 downloads, 4 citations.
  2. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 341 downloads.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2119 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2324 downloads, 1 citation.

2007

  1. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 2582 downloads, 1 citation.
  2. X. Zhu, D. Zhang, W. Li, and K. Huang, "A Prediction-Based Fair Replication Algorithm in Structured P2P Systems", InProceedings, Proceedings of the 4th International Conference on Autonomic and Trusted Computing, July 2007, 1757 downloads.

Assertions

  1. (Person) Wenjia Li is advised by (Person) Anupam Joshi.