Wenjia Li
Wenjia Li

Dr.

Alumnus, Ph.D. Alumnus

New York Institute of Technology
Computer Science, EGGC 8th Fl, Rm 807, 1855 Broadway, New York, NY 10023, USA

Graduated in August 2011

Wenjia Li

Refereed Publications

2015

  1. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 737 downloads.

2013

  1. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1022 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  2. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1015 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1302 downloads.
  2. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 2361 downloads.
  3. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1182 downloads.
  4. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1480 downloads.

2010

  1. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1333 downloads, 1 citation.
  2. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2250 downloads, 7 citations.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2063 downloads, 4 citations.
  2. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1506 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1735 downloads, 1 citation.

2007

  1. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 1910 downloads, 1 citation.
  2. X. Zhu, D. Zhang, W. Li, and K. Huang, "A Prediction-Based Fair Replication Algorithm in Structured P2P Systems", InProceedings, Proceedings of the 4th International Conference on Autonomic and Trusted Computing, July 2007, 1217 downloads.

Assertions

  1. (Person) Wenjia Li is advised by (Person) Anupam Joshi.