|
Dr. Wenjuan Li
Assistant Professor, PhD, SMIEEE
Area Coordinator, Doctor of Education Programme
Department of Mathematics and Information Technology
The Education University of Hong Kong, Hong Kong SAR, China
Email: lwenjuan [at] eduhk [dot] hk
ORCID: 0000-0003-3745-5669
|
Profile
Wenjuan Li received her Ph.D. degree in Computer Science from the City University of Hong Kong, Hong Kong. She received both Research Tuition Scholarships and Outstanding Academic Performance Award during the doctorate studies.
She is currently an Assistant Professor in the Department of Mathematics and Information Technology, The Education University of Hong Kong. Prior to that, she was a Research Assistant Professor in the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, China.
She received the Best Student Paper Award at NSS 2016 and SpaCCS 2021, SciSec 2023, and Best Paper Award at ProvSec 2022, ICA3PP 2022, IEEE DSC 2021 & EISA 2020 and AIBlock 2019.
For contributions to hyper-intelligent and distributed system security, she received the IEEE HITC Award for Excellence in Hyper-Intelligence Systems (Early Career Researcher award) in 2022 and IEEE ComSoc WICE (Women in Communications Engineering Committee) Early Achievement Award in 2023. She is a senior member of IEEE.
Her research interests include blockchain and cyber security, including intrusion detection, spam detection, trust management, web technology, IoT security, and E-commerce security.
News
[December 2024] Welcome submitting your work to ESORICS 2025! The first submission deadline is January 10, 2025.
[December 2023] Welcome submitting your work to ESORICS 2024! The first submission deadline is January 8, 2024.
[December 2022] Welcome submitting your work to
ACM CCS 2023 in Copenhagen.
[February 2022] Welcome submitting your work to Sensors SI on Security of IoT-enabled Infrastructures in Smart Cities.
Teaching Experience
- The Education University of Hong Kong
INT6064-Coding and Computational Thinking, MIT [2024]
INT6110-Creative Multimedia and Design, MIT [2024]
- The Hong Kong Polytechnic University
EIE553-Security in Data Communication, EIE
EIE2211-Logic Design, EIE
- City University of Hong Kong
CS3347-Software Engineering Principles and Practice [Semester B 2018/19]
CS5294-Information Security Technology Management [Semester A 2018/19]
CS4394-Information Security and Management [Semester A 2018/19]
CS3347-Software Engineering Principles and Practice [Semester B 2017/18]
CS3347-Software Engineering Principles and Practice [Semester B 2016/17]
CS2204-Fundamentals of Internet Applications Development [Semester A 2016/17]
CS2611-Seminars on Contemporary Technology II
[Semester A 2016/17]
CS2611-Seminars on Contemporary Technology I [Semester A 2016/17]
CS1303-Introduction to Internet & Programming [Semester B 2015/16]
CS3354-Software Engineering [Semester A 2015/16]
Professional Services
Editorial Service:
- Editor-in-Chief
EAI Endorsed Transactions on Cloud System (ToCS)
, EAI [2024-]
International Journal of Blockchain Applications and Secure Computing (IJBASC)
, IGI Global [2024-]
- Area Editor
Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2023-]
- Associate Editor
Journal of Information Security and Applications (JISA) (SCIE Index), Elsevier
International Journal of Information Security (SCIE Index), Springer
Network: Computation in Neural Systems (TNET) (SCIE Index), Taylor & Francis
Heliyon (Computer Science) (SCIE Index),
Cell Press [2023-]
Royal Society Open Science (SCIE Index), The Royal Society
Blockchain Journal, ELS Publishing
Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2021-2023]
International Journal of Blockchain Applications and Secure Computing (IJBASC)
, IGI Global [2021-2024]
- Editorial Board Member
Frontiers in Communications and Networks (Security, Privacy and Authentication), Frontiers
Discover Computing, Springer [2024-]
Connection Science, Taylor & Francis [2021-2024]
Security and Communication Networks, Wiley [2020-2023]
- Editorial Advisory Board
Heliyon (Computer Science),
Cell Press [2021-2023]
- Editorial Review Board
International Journal of Cyber Research and Education (IJCRE)
, IGI Global
International Journal of Information Security and Privacy (IJISP)
, IGI Global
- Journal Guest Editor
Peer-to-Peer Networking and Applications, Blockchain for Peer-to-Peer Computing
Journal of Network and Computer Applications (JISA), Special Issue on Trends in Cybersecurity
Connection Science, Security, Trust and Privacy in Computer Networks
Conference Organizing Committee:
- General Chair
EAI International Conference on Cloud Computing (CloudComp),
2023
- Program Chair
IEEE International Conference on Smart Data (SmartData),
2024
International Symposium on Emerging Information Security and Applications (EISA),
2024
International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS,
2022, 2023
EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2022
- Program Vice/Track Chair
IEEE International Conference on Internet of Things (iThings), 2024
Annual International Conference on Privacy, Security & Trust (PST), 2023
- Publicity Chair
European Symposium on Research in Computer Security (ESORICS), 2022,
2024
ACM Conference on Computer and Communications Security (CCS), 2023
The Workshop on Security and Privacy in CPS&IoT (CPSIoTSec) with ACM CCS, 2022
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022
International Symposium on Cyberspace Safety and Security (CSS), 2021
- Publication Chair
IEEE International Conference on Blockchain (Blockchain),
2024
International Conference on Information Security Practice and Experience (ISPEC), 2023
International Conference on Science of Cyber Security (SciSec), 2023
EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA),
2021, 2022,
2023
International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2022
International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021,
2022
IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021
International Conference on Information and Communications Security (ICICS), 2020
- Web Chair
International Conference on Security and Privacy in New Computing Environments (SPNCE), 2020
- Conference Program Committee Members
IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, 2020,
2021, 2022, 2023,
2024, 2025
Annual International Conference on Privacy, Security, and Trust (PST), 2022,
2023, 2024,
2025
IEEE Global Information Infrastructure and Networking Symposium (GIIS), 2025
European Interdisciplinary Cybersecurity Conference (EICC), 2024,
2025
The IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications (IARIA Congress),
2022, 2023,
2024,
2025
International Conference on IoT-AI (IoTAI), 2025
IEEE Global Communications Conference (GLOBECOM), 2020,
2021, 2022,
2023, 2024
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom),
2022, 2023,
2024
IEEE International Conference on Blockchain (Blockchain), 2018, 2019,
2020, 2024
IEEE International Symposium on Parallel & Distributed Processing with Applications (ISPA),
2023, 2024
IEEE International Conference on Embedded and Ubiquitous Computing (EUC),
2024
IEEE International Conference on Computational Science and Engineering (CSE),
2024
IEEE International Conference on High Performance Computing and Communications (HPCC),
2024
International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021,
2022,
2023,
2024
International Conference on Network and System Security (NSS), 2023,
2024
EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2023,
2024
International Conference on Science of Cyber Security (SciSec), 2023, 2024
IEEE International Conference on Metaverse Computing, Networking and
Applications (IEEE MetaCom), 2023,
2024
International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP),
2022,
2023, 2024
IFIP International Conference on Trust Management (IFIPTM), 2019,
2020, 2023,
2024
International Conference on Information Systems Security and Privacy (ICISSP), 2023,
2024
International Conference on Intelligent Environments (IE), 2024
IEEE International Conference on Consumer Electronics (ICCE), 2024
International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY), 2018,
2019,
2020,
2021,
2022,
2023,
2024
International Conference on Advances in Computer-Human Interactions (ACHI), 2017,
2018, 2019,
2020, 2021,
2022, 2023,
2024
International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), 2017,
2018, 2019,
2020,
2021, 2022,
2023,
2024
International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), 2018,
2019, 2021,
2022,
2023,
2024
International Conference on Sensor Technologies and Applications (SENSORCOMM),
2023,
2024
International Conference on Information Security Practice and Experience (ISPEC), 2023
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022,
2023
International Workshop on Security and Trust Management (STM) with ESORICS, 2022,
2023
International Workshop on Application Intelligence and Blockchain Security (AIBlock) with ACNS, 2020,
2021, 2022,
2023
ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021,
2023
International conference on Mathematics and Computing (ICMC), 2021, 2022,
2023
International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP), in conjunction with IEEE INFOCOM, 2023
IEEE International Conference on Mobility, Sensing, and Networking (MSN), 2022
EAI International Conference on Big Data Technologies and Applications (EAI BDTA),
2022
International Conference on Information and Communications Security (ICICS), 2020, 2021,
2022
Special Session on Private, Secure, and Trust Data Analytics (PSTDA2022) with DSAA2022, 2022
International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2019, 2020,
2021, 2022
International Conference on Information, Communication & Cybersecurity (ICI2C), 2021
International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 2019, 2020, 2021
International Conference on Data Mining and Big Data (DMBD), 2021
International Symposium on Cyberspace Safety and Security (CSS), 2020, 2021
International Workshop on Privacy, Security, and Trust in Computational Intelligence (PSTCI) with CIKM, 2021
ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2021
IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
International Conference on Smart City and Informatization (iSCI), 2019, 2020
IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2020,
IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2020
IEEE International Conference on Advanced and Trusted Computing (IEEE ATC), 2019, 2020
Publications
My publications can be found at Google Scholar and ResearchGate.
Before you download the papers, please carefully read relevant copyright requirements.
Journal
-
Weizhi Meng, Wenjuan Li and Andrei Nicolae Calugar. BANN-TMGuard: Toward Touch-Movement-Based Screen Unlock Patterns via Blockchain-Enabled Artificial Neural Networks on IoT Devices
IEEE Internet of Things Journal, vol. 12, no. 2, pp. 1856 - 1866, IEEE, 2025. [IF=10.6]
(Download the paper)
-
Xin Xie, Junbo Wang, Yu Han, and Wenjuan Li. Knowledge Graph-Based In-Context Learning for Advanced Fault Diagnosis in Sensor Networks.
Sensors, vol. 24, no. 24, MDPI, pp. 1-18, 2024. [IF=3.4]
(Download the paper)
-
Xin Wang, Bo Yi, Bassem F. Felemban, Ayman A. Aly, Wenjuan Li, and Jinlei Liu. Sentiment Analysis via Trustworthy Label Enhancement for Consumer Electronics Applications.
IEEE Transactions on Consumer Electronics, In Press, IEEE. [IF=4.3]
(Download the paper)
-
Wenjuan Li, Philip Rosenberg, Mads Glisby, and Michael Han. Designing Energy-aware Collaborative Intrusion Detection in IoT Networks.
Journal of Information Security and Applications, vol. 81, 103713, pp. 1-10, Elsevier, 2024. [IF=5.6]
(Download the paper)
-
Ye Li, Jiale Zhang, Junwu Zhu, and Wenjuan Li. BlockFD: Blockchain-based Federated Distillation against Poisoning Attacks.
Neural Computing and Applications, vol. 36, pp. 12901–12916, Springer, 2024. [IF=6.0]
(Download the paper)
-
Wenjuan Li, Thomas Gleerup, Jiao Tan, and Yu Wang. A Security Enhanced Android Unlock Scheme based on Pinch-to-Zoom for Smart Devices.
IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 3985-3993, IEEE, 2024. [IF=4.3]
(Download the paper)
-
Wenjuan Li, Christian Stidsen, and Tobias Adam. A Blockchain-assisted Security Management Framework for Collaborative Intrusion
Detection in Smart Cities.
Computers and Electrical Engineering, vol. 111, Part A, 108884, pp. 1-13, Elsevier, 2023. [IF=4.3]
(Download the paper)
-
Hao Sui, Xiaobing Sun, Jiale Zhang, Bing Chen, and Wenjuan Li. Multi-level Membership Inference Attacks in Federated Learning based on Active GAN.
Neural Computing and Applications, vol. 35, pp. 17013–17027, Springer, 2023. [IF=5.102]
(Download the paper)
-
Wenjuan Li, Jiao Tan, and Nan Zhu. Design of Double-Cross-based Smartphone Unlock Mechanism.
Computers & Security, vol. 129, 103204, Elsevier, 2023. [IF=5.105]
(Download the paper)
-
Wenjuan Li, Yu Wang, and Jin Li. A Blockchain-enabled Collaborative Intrusion Detection Framework for SDN-assisted Cyber-Physical Systems.
International Journal of Information Security, vol. 22, pp. 1219-1230, Springer, 2023. [IF=2.427]
(Download the paper)
-
Yuan Chang, Jiliang Li, and Wenjuan Li. 2D2PS: A Demand-driven Privacy-preserving Scheme for Anonymous
Data Sharing in Smart Grids. Journal of Information Security and Applications, Vol. 74, 103466, Elsevier, 2023. [IF=5.6]
(Download the paper)
-
Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, and Wenjuan Li. ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12521-12536, IEEE, 2023. [IF=10.238]
(Download the paper)
-
Wenjuan Li and Weizhi Meng. BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era.
IEEE Network, vol. 36, no. 4, pp. 120-125, IEEE, 2022. [IF=10.294] (Download the paper)
-
Wenjuan Li, Yu Wang, and Jin Li. Enhancing Blockchain-based Filtration Mechanism via IPFS for Collaborative Intrusion Detection in IoT Networks.
Journal of Systems Architecture, vol. 127, 102510, Elsevier, 2022. [IF=3.777] (Download the paper)
-
Wenjuan Li, Weizhi Meng, and Lam For Kwok. Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions.
IEEE Communications Surveys and Tutorials, vol. 24, no. 1, pp. 280-305, IEEE, 2022. [IF=25.249] (Download the paper)
-
Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, and Chunhua Su. BlockCSDN: Towards Blockchain-based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Transactions on Information and Systems, vol. E105.D, no. 2, pp. 272-279, IEICE, 2022. [IF=0.845] (Download the paper)
-
Wenjuan Li, Yu Wang, Jiao Tan, and Nan Zhu. DCUS: Evaluating Double-Click-based Unlocking Scheme on Smartphones. Mobile Networks and Applications, vol. 27, no. 1, pp. 382-391, Springer, 2022. [IF=2.602]
-
Junjie Huang, Liang Tan, Wenjuan Li, and Keping Yu. RON-Enhanced Blockchain Propagation Mechanism for Edge-Enabled Smart Cites. Journal of Information Security and Applications,
vol. 61, pp. 1-10, Elsevier, 2021. [IF=3.872] (Download the paper)
-
Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han. An Empirical Study of Supervised Email Classification in Internet of Things: Practical Performance and Key Influencing Factors. International Journal of Intelligent Systems, vol. 37, no. 1, pp. 287-304, Wiley, 2022. [IF=8.709]
-
Chunhui Wu and Wenjuan Li. Enhancing Intrusion Detection with Feature Selection and Neural Network. International Journal of Intelligent Systems, vol. 36, no. 7, pp. 3087-3105, Wiley, 2021. [IF=10.312]
-
Weizhi Meng, Wenjuan Li, and Jianying Zhou. Enhancing the Security of Blockchain-based Software Defined Networking through Trust-based Traffic Fusion and Filtration. Information Fusion, vol. 70, pp. 60-71, Elsevier, 2021. [IF=13.669]
-
Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang. Challenge-based Collaborative Intrusion Detection in Software Defined Networking: An Evaluation. Digital Communications and Networks, vol. 7, pp, 257-263, Elsevier, 2021. [IF=6.797]
-
Wenjuan Li, Man Ho Au and Yu Wang. A Fog-based Collaborative Intrusion Detection Framework for Smart Grid. International Journal of Network Management, vol. 31. no. 2, e2107, Wiley, 2021. [IF=1.338]
(Top Cited Article 2021-2022)
-
Wenjuan Li, Weizhi Meng, and Steven Furnell. Exploring Touch-based Behavioral Authentication on Smartphone Email Applications in IoT-enabled Smart Cities. Pattern Recognition Letters, vol. 144, pp. 35-41, Elsevier, 2021. [IF=3.255]
-
Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu. A Blockchain-Empowered AAA Scheme in the Large-Scale HetNet, Digital Communications and Networks, vol. 7, pp. 308-316, Elsevier, 2021. [IF=6.797]
-
Lina Zhang, Xiangqin Zheng, Keping Yu, Wenjuan Li, Tao Wang, Xuan Dang, Bo Yang. Modular-based Secret Image Sharing in IoT: A Global Progressive-Enabled Approach. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-13, Wiley, 2022. [IF=1.447]
-
Wenjuan Li, Yu Wang, Jin Li, and Yang Xiang. Towards Supervised Shape-based Behavioral Authentication on Smartphones. Journal of Information Security and Applications, vol. 55, 102591, Elsevier, 2020. [IF=2.327]
-
Wenjuan Li, Fei Tian, Jin Li, and Yang Xiang. Evaluating Intrusion Sensitivity Allocation with Supervised
Learning in Collaborative Intrusion Detection. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-15, Wiley, 2022. [IF=1.447]
-
Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards A Blockchain-based Framework for Challenge-based
Collaborative Intrusion Detection. International Journal of Information Security, vol. 20, no. 2, pp. 127-139, Springer, 2021. [IF=1.822]
-
Weizhi Meng, Wenjuan Li, Steven Tug, and Jiao Tan. Towards Blockchain-enabled Single Character Frequency-Based Exclusive Signature Matching in IoT-assisted Smart Cities. Journal of Parallel and Distributed Computing, vol. 144, pp. 268-277, Elsevier, 2020. [IF=2.296]
-
Wenjuan Li, Jiao Tan, Weizhi Meng, and Yu Wang. A Swipe-based Unlocking Mechanism with Supervised Learning on Smartphones: Design and Evaluation. Journal of Network and Computer Applications, vol. 165, 102687, Elsevier, 2020. [IF=5.570]
-
Weizhi Meng, Wenjuan Li, Liqiu Zhu. Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1377-1386, IEEE, 2020. [IF=2.784]
-
Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li. Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security, vol. 19, no. 3, Springer, 2020. [IF=1.822]
-
Wenjuan Li, Weizhi Meng, and Man Ho Au. Enhancing Collaborative Intrusion Detection via Disagreement-based Semi-Supervised Learning in IoT environments. Journal of Network and Computer Applications, vol. 161,
102631, pp. 1-9, Elsevier, 2020. [IF=5.273]
-
Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au. Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, 103-D(2): 196-203, IEICE,
2020. [IF=0.576]
-
Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au. Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, vol. 108, pp. 1258–1266, Elsevier, 2020. [IF=5.768]
-
Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li. Enhancing the Security of FinTech Applications with Map-Based Graphical Password Authentication. Future Generation Computer Systems, vol. 101, pp. 1018-1027,
Elsevier, 2019. [IF=5.768]
-
Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. Adaptive Machine Learning-based Alarm Reduction via Edge Computing for Distributed Intrusion Detection Systems. Concurrency and Computation: Practice and Experience, vol. 31, no. 19, Wiley, 2019. [IF=1.167]
-
Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang. Designing Collaborative Blockchained Signature-based Intrusion Detection in IoT environments. Future Generation Computer Systems, vol. 96, pp. 481-489, Elsevier,
2019. [IF=5.768]
-
Wenjuan Li, Lam For Kwok. Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. Journal of Information Security and Applications, vol. 47, pp. 1-7, Elsevier, 2019. [IF=1.537]
-
Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, vol. 128, pp. 56-63, Elsevier, 2019. [IF=5.273]
-
Weizhi Meng, Wenjuan Li, and Duncan S. Wong. Enhancing Touch Behavioral Authentication via Cost-based Intelligent Mechanism on Smartphones. Multimedia Tools and Applications, 77(23), pp. 30167-30185, Springer, 2018. [IF=1.541] (Download the paper)
-
Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, Yang Xiang. A Privacy-Preserving Approach for Signature-based Intrusion Detection using Fog Computing in Distributed Networks. Journal of Parallel and Distributed Computing, vol. 122, pp. 26-35, Elsevier, December 2018. [IF=1.815] (Download the paper)
-
Wenjuan Li, Weizhi Meng, Chunhua Su, and Lam For Kwok. False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access, vol. 6, no. 1, pp. 6530-6539, IEEE, 2018. [IF=3.557] (Download the paper)
-
Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou and Rongxing Lu. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access, vol. 6, no. 1, pp. 7234-7243, IEEE, 2018. [IF=3.557] (Download the paper)
-
Wenjuan Li, Weizhi Meng, and Lam For Kwok. Investigating the Influence of Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. Future Internet [ Invited Feature Article], Special Issue on Security and Privacy in Wireless and Mobile Networks, vol. 10, no. 1, pp. 1-16, 2018. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Developing Advanced Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. Cluster Computing, Springer, 2017. [IF=2.040] (Download the paper)
-
Weizhi Meng, Wenjuan Li and Lam-For Kwok. Towards Effective and Robust List-based Packet Filter for Signature-based Network Intrusion Detection: An Engineering Approach. HKIE Transactions, Taylor & Francis, In Press. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017 and published in this Special Issue.) (Download the paper)
-
Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective Trust-based Packet Filtering in Collaborative Network Environments. IEEE Transactions on Network and Service Management, IEEE, In Press. [IF=1.296]
-
Weizhi Meng, Wenjuan Li, Lam-For Kwok and Kim-Kwang Raymond Choo. Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security, vol. 65, pp. 213-229, Elsevier, 2017. [IF=1.64] (Download the paper)
-
Weizhi Meng, Wenjuan Li, Yang Xiang and Kim-Kwang Raymond Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017. [IF=2.331] (Download the paper)
-
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model. Journal of Network and Computer Applications, vol. 77, pp. 135-145, Elsevier, 2017. [IF=2.331] (Download the paper)
-
Wenjuan Li, Weizhi Meng, Xiapu Luo and Lam-For Kwok. MVPSys: Towards Practical Multi-View Based False Alarm Reduction System in Network Intrusion Detection. Computers & Security, vol. 60, pp. 177-192, Elsevier, 2016. [IF=1.64]
-
Wenjuan Li, Weizhi Meng and Lam-For Kwok. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network and Computer Applications, vol. 68, pp. 126-139, Elsevier, 2016. [IF=2.331]
-
Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection. Security and Communication Networks, vol. 8, no, 18, pp. 3883-3895, Wiley, 2015. [IF=0.72]
-
Wenjuan Li and Weizhi Meng. Enhancing Collaborative Intrusion Detection Networks Using Intrusion Sensitivity in Detecting Pollution Attacks. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 265-276, Emerald, 2016. (Special Issue for the Awarded Papers in Kaspersky Conference)
-
Weizhi Meng, Wenjuan Li and Lam-For Kwok. EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. Computers & Security, vol. 43, pp. 189-204, Elsevier, June 2014. [IF=1.172] (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection. Computer Networks. vol. 57, no. 17, pp. 3630-3640, Elsevier, 2013. [IF=1.282] (Download the paper)
Conference
-
Steven Krudsen and Wenjuan Li. Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging.
The 27th IEEE International Conference on Computational Science and Engineering (IEEE CSE), In Press, 2024.
(Best Paper Award)
(Download the paper)
-
Tongxi Chen, Weizhi Meng and Wenjuan Li. User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics.
The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), In Press, 2024.
(Outstanding Paper Award)
(Download the paper)
-
Rishikesh Sahay, Weizhi Meng and Wenjuan Li. A Comparative Analysis of Phishing Tools: Features and Countermeasures.
The 19th International Conference on Information Security Practice and Experience (ISPEC), pp. 365-382, Springer, 2024.
(Download the paper)
-
Jiapeng Wang, Zhihan Zheng, Kefan Qiu, Yuan Tan, Chen Liang, and Wenjuan Li. A Framework for BMC Firmware Vulnerability Analysis and Exploitation.
The 17th IEEE International Conference on Internet of Things (IEEE iThings), pp. 9-16, 2024.
(Download the paper)
-
Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, and Wenjuan Li. The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly.
The 21st IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA), pp. 286-293, IEEE, 2023.
(Download the paper)
-
Baolu Xue, Jiale Zhang, Bing Chen, and Wenjuan Li. Tackling Non-IID for Federated Learning with Components Alignment.
The 5th International Conference on Machine Learning for Cyber Security (ML4CS), pp. 131-144, Springer, 2023.
(Download the paper)
-
Ho Chun Fu, Wenjuan Li and Yu Wang. PassFile: Graphical Password Authentication based on File Browsing Records.
The 5th International Conference on Machine Learning for Cyber Security (ML4CS), pp. 28-43, Springer, 2023.
(Download the paper)
-
Xinyuan Qin and Wenjuan Li. A Graphical Password Scheme based on Rounded Image Selection.
The 5th International Conference on Science of Cyber Security (SciSec), pp. 97-114, Springer, 2023.
(Best Student Paper Award)
(Download the paper)
-
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT.
The 10th International Conference on Computing, Networking and Communications (ICNC), pp. 336-342, IEEE, 2023.
(Download the paper)
-
Wei-Yang Chiu, Weizhi Meng, Wenjuan Li and Limin Fang. FolketID: A Decentralized Blockchain-based NemID Alternative against DDoS Attacks.
The 16th International Conference on Provable and Practical Security (ProvSec), pp. 210-227, Springer, 2022. (Best Paper Award)
(Download the paper)
-
Yuanyuan Xie, Bing Chen, Jiale Zhang, and Wenjuan Li. ALGANs: Enhancing membership inference attacks in federated learning with GANs and active learning.
IEEE International Symposium on Product Compliance Engineering-Asia (ISPCE-AS), IEEE, 2022.
(Download the paper)
-
Wenjuan Li, Philip Rosenberg, Mads Glisby, and Michael Han. EnergyCIDN: Enhanced Energy-aware Challenge-based Collaborative Intrusion Detection in Internet of Things.
The 22nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Springer, 2022. (Best Paper Award)
(Download the paper)
-
Ye Li, Jiale Zhang, Junwu Zhu, and Wenjuan Li. HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation.
The 3rd International Conference on Emerging Information Security and Applications (EISA), Springer, 2022.
(Download the paper)
-
Thomas Gleerup, Wenjuan Li, Jiao Tan and Yu Wang. ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices.
The 4th International Conference on Science of Cyber Security (SciSec), pp. 245-259, Springer, 2022.
(Download the paper)
-
Yiming Sun, Weizhi Meng, and Wenjuan Li. Designing In-Air Hand Gesture-based User Authentication System via Convex Hull.
The 19th Annual International Conference on Privacy, Security and Trust (PST), pp. 1-5, IEEE, 2022.
(Download the paper)
-
Wenjuan Li, Jiao Tan and Nan Zhu. Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones.
The 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 412-428, Springer, 2022.
-
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. LibBlock - Towards Decentralized Library System based on Blockchain and IPFS.
The 18th International Conference on Privacy, Security, and Trust (PST), pp. 1-9, IEEE, 2021. (Download the paper)
-
Li Wang, Weizhi Meng, and Wenjuan Li. Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones.
The 17th International Conference on Mobility, Sensing and Networking (IEEE MSN), pp. 486-493, IEEE, 2021. (Download the paper)
-
Wenjuan Li, Weizhi Meng, and Laurence Yang. Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling.
The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 122-129, IEEE, 2021. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Yu Wang and Jin Li. Enhancing Blackslist-based Packet Filtration using Blockchain in Wireless Sensor Networks. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 624-635, Springer, 2021. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Javier Parra Arnau, and Kim-Kwang Raymond Choo. Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. The 4th IEEE Conference on Dependable and Secure Computing (IEEE DSC), pp. 1-8, IEEE, 2021. (Best Paper Award) (Download the paper)
-
Wenjuan Li, Weizhi Meng, and Hui Zhu. Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1179-1186, IEEE, 2020. (Download the paper)
-
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-based Authentication. The 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS), pp. 251-265, Springer, 2020. (Best Student Paper Award) (Download the paper)
-
Wenjuan Li, Jiao Tan, and Yu Wang. A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. The 14th International Conference on Network and System Security (NSS), pp. 261-276, Springer, 2020. (Download the paper)
-
Wenjuan Li, Jiao Tan, Nan Zhu, and Yu Wang. Designing Double-Click-based Unlocking Mechanism on Smartphones. The First International Symposium on Emerging Information Security and Applications (EISA), pp. 573-585, Springer, December 2020. (Best Paper Award) (Download the paper)
-
Tan Liang, Huan Xiao, Xinglin Shang, Yong Wang, Feng Ding and Wenjuan Li. A Blockchain-based Trusted Service Mechanism for Crowdsourcing System. The Emerging Blockchain Technology Solutions for Real-world Applications (EBTSRA), with The 91st IEEE Vehicular Technology Conference (VTC2020-Spring), pp. 1-6, 2020. (Download the paper)
-
Wenjuan Li, Weizhi Meng and Lam-For Kwok. Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. The 15th International Conference on Information Security Practice and Experience (ISPEC), pp. 453-463, Springer, November 2019. (Download the paper)
-
Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li. SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS), pp. 140-153, Springer, September 2019. (Download the paper)
-
Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su. Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 24th European Symposium on Research in Computer Security (ESORICS), pp. 493-511, Springer, September 2019. (Download the paper)
-
Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
The 1st International Workshop on Application Intelligence and Blockchain Security (AIBlock), In
Conjunction With ACNS 2019, pp. 122-139, Springer, September 2019. (Best Paper Award) (Download the paper)
-
Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li, and Chong Jiang. PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. The 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 251-263, 2019. (Download the paper)
-
Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou. SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications. The 34th IFIP International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 180-193, June 2019. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li. Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification. The 14th International Conference on Information Security Practice and Experience (ISPEC), pp. 313-328, Springer, September 2018. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1208-1213, IEEE, July 2018. (Download the paper)
-
Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst. Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. The 23rd Australasian Conference on Information Security and Privacy (ACISP), pp. 759-767, July 2018. (Download the paper)
-
Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. The 2017 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, IEEE, December 2017. (Download the paper)
-
Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. The 20th Information Security Conference (ISC), pp. 291-308, Springer, November 2017. (Download the paper)
-
Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou. A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. The 15th International Conference on Applied Cryptography and Network Security (ACNS), pp. 145-162, July 2017. (Download the paper)
-
Wenjuan Li, Weizhi Meng, and Lam-For Kwok. SOOA: Exploring Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 402-415, Springer, May 2017. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 10th International Conference on Network and System Security (NSS 2016), pp. 433-449, Springer, September 2016. (Best Student Paper Award) (Download the paper)
-
Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 1061-1068, IEEE, August 2016. (Download the paper)
-
Wenjuan Li, Lijun Jiang, Weizhi Meng and Lam For Kwok. Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. The 10th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2016), pp. 146-153, July 2016. (Download the paper)
-
Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou. TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), pp. 629-647, June 2016. (Download the paper)
-
Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. On Multiple Password Interference of Touch Screen Patterns and Text Passwords. ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818-4822, May 2016. (Download the paper)
-
Wenjuan Li and Weizhi Meng. An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments. The 2015 IEEE International Conference on Communications (ICC 2015), pp. 7438-7443, IEEE, June 2015. (Download the paper)
-
Weizhi Meng, Wenjuan Li and Lam-For Kwok. An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. The 17th International Conference on Information Security (ISC 2014), Springer, pp. 465-476, October 2014. (Download the paper)
-
Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang. Towards Designing An Email Classification System Using Multi-View Based Semi-Supervised Learning. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), IEEE, pp. 174-181, September 2014. (Download the paper)
-
Wenjuan Li, Weizhi Meng and Lam-For Kwok. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. The 8th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2014), Springer, pp. 61-76, July 2014. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning. The 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, June 2014. (Download the paper)
-
Wenjuan Li, Yuxin Meng and Lam-For Kwok. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. The 9th International Conference on Computational Intelligence and Security (CIS 2013), IEEE, pp. 518-522, December 2013. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, November 2013. (Download the paper or the draft)
-
Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang. Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice. The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), IEEE, pp. 181-188, September 2013. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive False Alarm Reduction Using Cloud as a Service. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, IEEE, pp. 420-425, August 2013. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones. The 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP Advances in Information and Communication Technology 405, Springer, pp. 55-68, July 2013. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. The 7th International Conference on Network and System Security (NSS 2013), Lecture Notes in Computer Science 7873, Springer, pp. 40-53, June 2013. (Download the paper or the draft)
-
Wenjuan Li and Yuxin Meng. Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. The 10th International Symposium on Neural Networks (ISNN 2013), Lecture Notes in Computer Science 7952, Part II, Springer, pp. 622-629, July 2013. (Download the paper)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. Intelligent Alarm Filter Using Knowledge-based Alert Verification in Network Intrusion Detection. The 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 2012), Lecture Notes in Artificial Intelligence 7661, Springer, pp. 115-124, December 2012. (Download the paper or the draft)
-
Yuxin Meng and Wenjuan Li. Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. The 14th International Conference on Information and Communications Security (ICICS 2012), Lecture Notes in Computer Science 7618, Springer, pp. 349-356, October 2012. (Download the paper or the draft)
-
Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach Using Bayesian Inference in Network Intrusion Detection. The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), Lecture Notes in ICST 106, Springer, pp. 203-221, September 2012. (Download the paper or the draft)
-
Yuxin Meng and Wenjuan Li. Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), IEEE, pp. 223-230, June 2012. (Download the paper or the draft)
-
Yuxin Meng and Wenjuan Li. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection. The 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), IEEE(IARIA), pp. 75-81, May 2012. (Download the paper- open access)
-
Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Single Character Frequency-based Exclusive Signature Matching Scheme. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Studies in Computational Intelligence, Springer, pp. 67-80, May 2012. (Selected paper and published in Springer) (Download the paper or the draft)
Book Chapter
-
Wenjuan Li and Weizhi Meng. Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications (Book), Ali Ismail Awad,Jemal Abawajy (eds), Wiley, John Wiley & Sons, December 2021. (Access the chapter)
-
Weizhi Meng and Wenjuan Li. A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends. Networking for Big Data (Book), Shui Yu, Xiaodong Lin, Jelena Misic, Xuemin (Sherman) Shen (eds), CRC Press, Taylor & Francis, August 2015. (Access the chapter)
-
Yuxin Meng, Wenjuan Li and Lam-For Kwok. A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends. Case Studies in Secure Computing-Achievements and Trends (Book), Biju Issa, Nauman Israr (eds), CRC Press, Taylor & Francis, pp. 191-208, September 2014. (Access the chapter)
Journal Reviewer
ACM Transactions on Management Information Systems (TMIS), ACM
ACM Transactions on Software Engineering and Methodology (TOSEM), ACM
Ad Hoc Networks, Elsevier (Outstanding reviewer 2018)
Alexandria Engineering Journal, Elsevier
Applied Sciences, MDPI
Concurrency and Computation: Practice and Experience, Wiley
Computers & Security, Elsevier (Outstanding reviewer 2018)
Computer Networks, Elsevier (Outstanding reviewer 2018)
Computer Standards & Interfaces, Elsevier
China Communications, IEEE
Computers and Electrical Engineering, Elsevier
Computer Science Review, Elsevier
Data in Brief, Elsevier (Outstanding reviewer 2018)
Digital Communications and Networks, Elsevier
Future Generation Computer Systems, Elsevier
Heliyon, Elsevier
IEEE Internet of Things Journal, IEEE
IEEE Systems Journal, IEEE
Informatics in Medicine Unlocked, Elsevier
IEEE Access, IEEE
IEEE Transactions on Mobile Computing, IEEE
IEEE Transactions on Industrial Informatics, IEEE
IEEE Transactions on Intelligent Transportation Systems, IEEE
IEEE Transactions on Dependable and Secure Computing, IEEE
IEEE/ACM Transactions on Networking, IEEE
Information Sciences, Elsevier
Information and Computer Security, Emerald
International Journal of Network Management, Wiley
International Journal of Intelligent Systems, Wiley
International Journal of Distributed Sensor Networks (IJDSN), Sagepub
International Journal of Critical Infrastructure Protection, Elsevier
International Journal of Communication Systems, Wiley
International Journal of Human - Computer Studies, Elsevier
Journal of Information Security and Applications, Elsevier
Journal of Industrial Information Integration, Elsevier
Journal of Parallel and Distributed Computing, Elsevier
Journal of Experimental & Theoretical Artificial Intelligence, Taylor & Francis
Journal of Network and Computer Applications (JNCA), Elsevier
Journal of Intelligent Systems, De Gruyter
KSII Transactions on Internet and Information Systems, KSII
Pervasive and Mobile Computing, Elsevier
Swarm and Evolutionary Computation, Elsevier
Wireless Communications and Mobile Computing, Hindawi
Security and Communication Networks, Hindawi
Sustainability, MDPI
The Computer Journal, Oxford University Press
SCIENTIA SINICA Informationis
Awards
[2023.12] IEEE ComSoc WICE (Women in Communications Engineering Committee) Early Achievement Award in 2023.
[2023.07] Best Student Paper Award - SciSec 2023.
[2022.12] IEEE HITC Award for Excellence in Hyper-Intelligence Systems (Early Career Researcher award) in 2022.
[2022.10] Best Paper Award - ProvSec 2022.
[2022.10] Best Paper Award - ICA3PP 2022.
[2021.02] Best Paper Award - IEEE DSC 2021.
[2020.11] Best Paper Award - EISA 2020.
[2020.11] Best Student Paper Award - SpaCCS 2020.
[2019.06] Best Paper Award - AIBlock 2019 in conjunction with ACNS 2019.
[2018.09] Research Tuition Scholarships - City University of Hong Kong.
[2018.09] Outstanding Academic Performance Award - City University of Hong Kong.
[2017.09] Research Tuition Scholarships - City University of Hong Kong.
[2017.09] Outstanding Academic Performance Award - City University of Hong Kong.
[2016.09] Best Student Paper Award - NSS 2016.
[2016.09] Research Tuition Scholarships - City University of Hong Kong.
[2016.09] Outstanding Academic Performance Award - City University of Hong Kong.
[2015.09-2019.08] Postgraduate Scholarship - City University of Hong Kong.
[2014.06] Winner of Cyber Quiz and Computer Security Competition, Final Round of Kaspersky Lab "Cyber Security for the Next Generation" student conference, Stockholm, Sweden, June, 2014.
Mics
International Association for Cryptologic Research, IACR
How to Do Research (Tips)
A Collection of Advice on Research and Writing
CS Security Conference Ranking (by Jianying Zhou)
Some General Security Conference Statics