Primary Role:Ph.D. AlumnusGraduation date: August 2011
New York Institute of Technology
Department: Computer Science
Room: EGGC 8th Fl, Rm 807
Street: 1855 BroadwayCountry: USA
City: New York
15 Refereed Publications
1. Wenjia Li et al., "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 337 downloads.
2. Wenjia Li et al., "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 721 downloads.
3. Wenjia Li et al., "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
4. Wenjia Li et al., "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 772 downloads.
5. Wenjia Li et al., "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1056 downloads.
6. Varish Mulwad et al., "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 1963 downloads.
7. Wenjia Li et al., "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 993 downloads.
8. Wenjia Li et al., "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1053 downloads.
9. Palanivel Andiappan Kodeswaran et al., "Enforcing Secure and Robust Routing with Declarative Policies ", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1094 downloads.
10. Wenjia Li et al., "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 1902 downloads.
11. Wenjia Li et al., "Policy-based Malicious Peer Detection in Ad Hoc Networks ", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1699 downloads.
12. Wenjia Li et al., "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1229 downloads.
13. Wenjia Li et al., "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1533 downloads.
14. Patti Ordonez et al., "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 1686 downloads.
15. Xianshu Zhu et al., "A Prediction-Based Fair Replication Algorithm in Structured P2P Systems", InProceedings, Proceedings of the 4th International Conference on Autonomic and Trusted Computing, July 2007, 1067 downloads.
Wenjia Li is associated with 2 projects: Hide the list...