Wenjuan Li's Homepage

Wenjuan Li Dr. Wenjuan Li
Research Assistant Professor, PhD, SMIEEE

Department of Electronic and Information Engineering
The Hong Kong Polytechnic University, China

Email: wenjuan.li [at] polyu.edu.hk
ORCID: 0000-0003-3745-5669

Profile

Wenjuan Li received her Ph.D. degree in Computer Science from the City University of Hong Kong, Hong Kong. She received both Research Tuition Scholarships and Outstanding Academic Performance Award during the doctorate studies. She is currently a Research Assistant Professor in the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, China. Before, she was a lecturer in the Department of Computer Science, Zhaoqing Foreign Language College, China, and a Research Assistant in the CS Department, CityU HK from 2013 to 2014. She was a Winner of Cyber Quiz and Computer Security Competition, Final Round of Kaspersky Lab "Cyber Security for the Next Generation" Conference in 2014. She received the Best Student Paper Award at NSS 2016 and SpaCCS 2021, and Best Paper Award at IEEE DSC 2021 & EISA@SpaCCS 2020 and AIBlock 2019. She is a senior member of IEEE.

Her research interests include network management and security, intrusion detection, spam detection, trust management, web technology, blockchain and E-commerce security.


News

[December 2021] Welcome submitting your work to IFIP SEC 2022 [3 Feb 2022 (Firm!) and ESORICS 2022].

[September 2021] Welcome submitting your work to EAI BlockTEA 2021.

[April 2021] Welcome submitting your work to EISA 2021 and CSS 2021.

[November 2020] Welcome submitting your work to ICBC 2021.


Teaching Experience

- Hong Kong Polytechnic University
  • CS3347-Logic Design, EIE [Spring 2022]

  • - City University of Hong Kong
  • CS3347-Software Engineering Principles and Practice [Semester B 2018/19]
  • CS5294-Information Security Technology Management [Semester A 2018/19]
  • CS4394-Information Security and Management [Semester A 2018/19]
  • CS3347-Software Engineering Principles and Practice [Semester B 2017/18]
  • CS3347-Software Engineering Principles and Practice [Semester B 2016/17]
  • CS2204-Fundamentals of Internet Applications Development [Semester A 2016/17]
  • CS2611-Seminars on Contemporary Technology II [Semester A 2016/17]
  • CS2611-Seminars on Contemporary Technology I [Semester A 2016/17]
  • CS1303-Introduction to Internet & Programming [Semester B 2015/16]
  • CS3354-Software Engineering [Semester A 2015/16]

  • Professional Services

    Editorial Service:
    - Associate Editor
  • Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer
  • Journal of Information Security and Applications (JISA), Elsevier

  • - Editorial Board Member
  • Connection Science, Taylor & Francis
  • Security and Communication Networks, Hindawi
  • Wireless Communications and Mobile Computing, Hindawi
  • Frontiers in Communications and Networks (Security, Privacy and Authentication), Frontiers

  • - Editorial Advisory Board
  • Heliyon (Computer Science), Cell Press [2021-]

  • - Editorial Review Board
  • International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global
  • International Journal of Information Security and Privacy (IJISP) , IGI Global

  • - Journal Guest Editor
  • Peer-to-Peer Networking and Applications, Blockchain for Peer-to-Peer Computing
  • Journal of Network and Computer Applications (JISA), Special Issue on Trends in Cybersecurity
  • Connection Science, Security, Trust and Privacy in Computer Networks

  • Conference Organizing Committee:
    - Publicity Chair
  • European Symposium on Research in Computer Security (ESORICS), 2022
  • IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022
  • International Symposium on Cyberspace Safety and Security (CSS), 2021

  • - Publication Chair
  • EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2021
  • IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
  • ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021
  • International Conference on Information and Communications Security (ICICS), 2020
  • International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021

  • - Web Chair
  • International Conference on Security and Privacy in New Computing Environments (SPNCE), 2020

  • - Conference Program Committee Members
  • IEEE Global Communications Conference (GLOBECOM), 2020, 2021, 2022
  • IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, 2020, 2021, 2022
  • International Conference on Information and Communications Security (ICICS), 2020, 2021, 2022
  • International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2019, 2020, 2021, 2022
  • International conference on Mathematics and Computing (ICMC), 2021, 2022
  • ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021
  • International Conference on Information, Communication & Cybersecurity (ICI2C), 2021
  • International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 2019, 2020, 2021
  • International Conference on Data Mining and Big Data (DMBD), 2021
  • International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021
  • International Symposium on Cyberspace Safety and Security (CSS), 2020, 2021
  • International Workshop on Privacy, Security, and Trust in Computational Intelligence (PSTCI) with CIKM, 2021
  • International Workshop on Application Intelligence and Blockchain Security (AIBlock) with ACNS, 2020, 2021
  • International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), 2017, 2018, 2019, 2020, 2021
  • International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY), 2018, 2019, 2020, 2021
  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017, 2018, 2019, 2020, 2021
  • International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), 2018, 2019, 2021
  • ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2021
  • IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
  • IFIP International Conference on Trust Management (IFIPTM), 2019, 2020
  • International Conference on Smart City and Informatization (iSCI), 2019, 2020
  • IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2020,
  • IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2020
  • IEEE International Conference on Advanced and Trusted Computing (IEEE ATC), 2019, 2020
  • IEEE International Conference on Blockchain (Blockchain), 2018, 2019

  • Publications

    My publications can be found at Google Scholar and ResearchGate.
    Before you download the papers, please carefully read relevant copyright requirements.

    Journal

    1. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Communications Surveys and Tutorials, In Press, IEEE [IF=25.249]
    2. Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, and Chunhua Su. BlockCSDN: Towards Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. IEICE Transactions on Information and Systems, In Press, IEICE [IF=0.845]
    3. Junjie Huang, Liang Tan, Wenjuan Li, and Keping Yu. RON-Enhanced Blockchain Propagation Mechanism for Edge-Enabled Smart Cites. Journal of Information Security and Applications, In Press, Elsevier, 2021. [IF=3.872]
    4. Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han. An Empirical Study of Supervised Email Classification in Internet of Things: Practical Performance and Key Influencing Factors. International Journal of Intelligent Systems, vol. 37, no. 1, pp. 287-304, Wiley, 2022. [IF=8.709]
    5. Wenjuan Li, Yu Wang, Jiao Tan, and Nan Zhu. DCUS: Evaluating Double-Click-based Unlocking Scheme on Smartphones. Mobile Networks and Applications, In press, Springer. [IF=2.602]
    6. Chunhui Wu and Wenjuan Li. Enhancing Intrusion Detection with Feature Selection and Neural Network. International Journal of Intelligent Systems, vol. 36, no. 7, pp. 3087-3105, Wiley, 2021. [IF=10.312]
    7. Weizhi Meng, Wenjuan Li, and Jianying Zhou. Enhancing the Security of Blockchain-based Software Defined Networking through Trust-based Traffic Fusion and Filtration. Information Fusion, vol. 70, pp. 60-71, Elsevier, 2021. [IF=13.669]
    8. Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang. Challenge-based Collaborative Intrusion Detection in Software Defined Networking: An Evaluation. Digital Communications and Networks, vol. 7, pp, 257-263, Elsevier, 2021. [IF=6.797]
    9. Wenjuan Li, Man Ho Au and Yu Wang. A Fog-based Collaborative Intrusion Detection Framework for Smart Grid. International Journal of Network Management, vol. 31. no. 2, e2107, Wiley, 2021. [IF=1.338]
    10. Wenjuan Li, Weizhi Meng, and Steven Furnell. Exploring Touch-based Behavioral Authentication on Smartphone Email Applications in IoT-enabled Smart Cities. Pattern Recognition Letters, vol. 144, pp. 35-41, Elsevier, 2021. [IF=3.255]
    11. Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu. A Blockchain-Empowered AAA Scheme in the Large-Scale HetNet, Digital Communications and Networks, vol. 7, pp. 308-316, Elsevier, 2021. [IF=6.797]
    12. Lina Zhang, Xiangqin Zheng, Keping Yu, Wenjuan Li, Tao Wang, Xuan Dang, Bo Yang. Modular-based Secret Image Sharing in IoT: A Global Progressive-Enabled Approach. Concurrency and Computation: Practice and Experience, In press, Elsevier. [IF=1.447]
    13. Wenjuan Li, Yu Wang, Jin Li, and Yang Xiang. Towards Supervised Shape-based Behavioral Authentication on Smartphones. Journal of Information Security and Applications, vol. 55, 102591, Elsevier, 2020. [IF=2.327]
    14. Wenjuan Li, Fei Tian, Jin Li, and Yang Xiang. Evaluating Intrusion Sensitivity Allocation with Supervised Learning in Collaborative Intrusion Detection. Concurrency and Computation: Practice and Experience, In press, Wiley. [IF=1.447]
    15. Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards A Blockchain-based Framework for Challenge-based Collaborative Intrusion Detection. International Journal of Information Security, vol. 20, no. 2, pp. 127-139, Springer, 2021. [IF=1.822]
    16. Weizhi Meng, Wenjuan Li, Steven Tug, and Jiao Tan. Towards Blockchain-enabled Single Character Frequency-Based Exclusive Signature Matching in IoT-assisted Smart Cities. Journal of Parallel and Distributed Computing, vol. 144, pp. 268-277, Elsevier, 2020. [IF=2.296]
    17. Wenjuan Li, Jiao Tan, Weizhi Meng, and Yu Wang. A Swipe-based Unlocking Mechanism with Supervised Learning on Smartphones: Design and Evaluation. Journal of Network and Computer Applications, vol. 165, 102687, Elsevier, 2020. [IF=5.570]
    18. Weizhi Meng, Wenjuan Li, Liqiu Zhu. Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1377-1386, IEEE, 2020. [IF=2.784]
    19. Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li. Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security, vol. 19, no. 3, Springer, 2020. [IF=1.822]
    20. Wenjuan Li, Weizhi Meng, and Man Ho Au. Enhancing Collaborative Intrusion Detection via Disagreement-based Semi-Supervised Learning in IoT environments. Journal of Network and Computer Applications, vol. 161, 102631, pp. 1-9, Elsevier, 2020. [IF=5.273]
    21. Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au. Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, 103-D(2): 196-203, IEICE, 2020. [IF=0.576]
    22. Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au. Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, vol. 108, pp. 1258–1266, Elsevier, 2020. [IF=5.768]
    23. Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li. Enhancing the Security of FinTech Applications with Map-Based Graphical Password Authentication. Future Generation Computer Systems, vol. 101, pp. 1018-1027, Elsevier, 2019. [IF=5.768]
    24. Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. Adaptive Machine Learning-based Alarm Reduction via Edge Computing for Distributed Intrusion Detection Systems. Concurrency and Computation: Practice and Experience, vol. 31, no. 19, Wiley, 2019. [IF=1.167]
    25. Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang. Designing Collaborative Blockchained Signature-based Intrusion Detection in IoT environments. Future Generation Computer Systems, vol. 96, pp. 481-489, Elsevier, 2019. [IF=5.768]
    26. Wenjuan Li, Lam For Kwok. Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. Journal of Information Security and Applications, vol. 47, pp. 1-7, Elsevier, 2019. [IF=1.537]
    27. Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, vol. 128, pp. 56-63, Elsevier, 2019. [IF=5.273]
    28. Weizhi Meng, Wenjuan Li, and Duncan S. Wong. Enhancing Touch Behavioral Authentication via Cost-based Intelligent Mechanism on Smartphones. Multimedia Tools and Applications, 77(23), pp. 30167-30185, Springer, 2018. [IF=1.541] (Download the paper)
    29. Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, Yang Xiang. A Privacy-Preserving Approach for Signature-based Intrusion Detection using Fog Computing in Distributed Networks. Journal of Parallel and Distributed Computing, vol. 122, pp. 26-35, Elsevier, December 2018. [IF=1.815] (Download the paper)
    30. Wenjuan Li, Weizhi Meng, Chunhua Su, and Lam For Kwok. False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access, vol. 6, no. 1, pp. 6530-6539, IEEE, 2018. [IF=3.557] (Download the paper)
    31. Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou and Rongxing Lu. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access, vol. 6, no. 1, pp. 7234-7243, IEEE, 2018. [IF=3.557] (Download the paper)
    32. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Investigating the Influence of Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. Future Internet [ Invited Feature Article], Special Issue on Security and Privacy in Wireless and Mobile Networks, vol. 10, no. 1, pp. 1-16, 2018. (Download the paper)
    33. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Developing Advanced Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. Cluster Computing, Springer, 2017. [IF=2.040] (Download the paper)
    34. Weizhi Meng, Wenjuan Li and Lam-For Kwok. Towards Effective and Robust List-based Packet Filter for Signature-based Network Intrusion Detection: An Engineering Approach. HKIE Transactions, Taylor & Francis, In Press. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017 and published in this Special Issue.) (Download the paper)
    35. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective Trust-based Packet Filtering in Collaborative Network Environments. IEEE Transactions on Network and Service Management, IEEE, In Press. [IF=1.296]
    36. Weizhi Meng, Wenjuan Li, Lam-For Kwok and Kim-Kwang Raymond Choo. Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security, vol. 65, pp. 213-229, Elsevier, 2017. [IF=1.64] (Download the paper)
    37. Weizhi Meng, Wenjuan Li, Yang Xiang and Kim-Kwang Raymond Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017. [IF=2.331] (Download the paper)
    38. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model. Journal of Network and Computer Applications, vol. 77, pp. 135-145, Elsevier, 2017. [IF=2.331] (Download the paper)
    39. Wenjuan Li, Weizhi Meng, Xiapu Luo and Lam-For Kwok. MVPSys: Towards Practical Multi-View Based False Alarm Reduction System in Network Intrusion Detection. Computers & Security, vol. 60, pp. 177-192, Elsevier, 2016. [IF=1.64]
    40. Wenjuan Li, Weizhi Meng and Lam-For Kwok. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network and Computer Applications, vol. 68, pp. 126-139, Elsevier, 2016. [IF=2.331]
    41. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection. Security and Communication Networks, vol. 8, no, 18, pp. 3883-3895, Wiley, 2015. [IF=0.72]
    42. Wenjuan Li and Weizhi Meng. Enhancing Collaborative Intrusion Detection Networks Using Intrusion Sensitivity in Detecting Pollution Attacks. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 265-276, Emerald, 2016. (Special Issue for the Awarded Papers in Kaspersky Conference)
    43. Weizhi Meng, Wenjuan Li and Lam-For Kwok. EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. Computers & Security, vol. 43, pp. 189-204, Elsevier, June 2014. [IF=1.172] (Download the paper)
    44. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection. Computer Networks. vol. 57, no. 17, pp. 3630-3640, Elsevier, 2013. [IF=1.282] (Download the paper)

    Conference

    1. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. The 18th International Conference on Privacy, Security, and Trust (PST), IEEE, 2021.
    2. Li Wang, Weizhi Meng, and Wenjuan Li. Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. The 17th International Conference on Mobility, Sensing and Networking (IEEE MSN), IEEE, 2021.
    3. Wenjuan Li, Weizhi Meng, and Laurence Yang. Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, 2021.
    4. Wenjuan Li, Weizhi Meng, Yu Wang and Jin Li. Enhancing Blackslist-based Packet Filtration using Blockchain in Wireless Sensor Networks. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 624-635, Springer, 2021.
    5. Wenjuan Li, Weizhi Meng, Javier Parra Arnau, and Kim-Kwang Raymond Choo. Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. The 4th IEEE Conference on Dependable and Secure Computing (IEEE DSC), pp. 1-8, IEEE, 2021. (Best Paper Award) (Download the paper)
    6. Wenjuan Li, Weizhi Meng, and Hui Zhu. Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1179-1186, IEEE, 2020. (Download the paper)
    7. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-based Authentication. The 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS), pp. 251-265, Springer, 2020. (Best Student Paper Award) (Download the paper)
    8. Wenjuan Li, Jiao Tan, and Yu Wang. A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. The 14th International Conference on Network and System Security (NSS), pp. 261-276, Springer, 2020. (Download the paper)
    9. Wenjuan Li, Jiao Tan, Nan Zhu, and Yu Wang. Designing Double-Click-based Unlocking Mechanism on Smartphones. The First International Symposium on Emerging Information Security and Applications (EISA), pp. 573-585, Springer, December 2020. (Best Paper Award) (Download the paper)
    10. Tan Liang, Huan Xiao, Xinglin Shang, Yong Wang, Feng Ding and Wenjuan Li. A Blockchain-based Trusted Service Mechanism for Crowdsourcing System. The Emerging Blockchain Technology Solutions for Real-world Applications (EBTSRA), with The 91st IEEE Vehicular Technology Conference (VTC2020-Spring), pp. 1-6, 2020. (Download the paper)
    11. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. The 15th International Conference on Information Security Practice and Experience (ISPEC), pp. 453-463, Springer, November 2019. (Download the paper)
    12. Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li. SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS), pp. 140-153, Springer, September 2019. (Download the paper)
    13. Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su. Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 24th European Symposium on Research in Computer Security (ESORICS), pp. 493-511, Springer, September 2019. (Download the paper)
    14. Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li, and Chong Jiang. PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. The 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 251-263, 2019. (Download the paper)
    15. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou. SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications. The 34th IFIP International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 180-193, June 2019. (Download the paper)
    16. Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards Blockchained Challenge-Based Collaborative Intrusion Detection. The 1st International Workshop on Application Intelligence and Blockchain Security (AIBlock), In Conjunction With ACNS 2019, pp. 122-139, 2019. (Best Paper Award) (Download the paper)
    17. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li. Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification. The 14th International Conference on Information Security Practice and Experience (ISPEC), pp. 313-328, Springer, September 2018. (Download the paper)
    18. Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1208-1213, IEEE, July 2018. (Download the paper)
    19. Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst. Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. The 23rd Australasian Conference on Information Security and Privacy (ACISP), pp. 759-767, July 2018. (Download the paper)
    20. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. The 2017 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, IEEE, December 2017. (Download the paper)
    21. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. The 20th Information Security Conference (ISC), pp. 291-308, Springer, November 2017. (Download the paper)
    22. Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou. A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. The 15th International Conference on Applied Cryptography and Network Security (ACNS), pp. 145-162, July 2017. (Download the paper)
    23. Wenjuan Li, Weizhi Meng, and Lam-For Kwok. SOOA: Exploring Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 402-415, Springer, May 2017. (Download the paper)
    24. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 10th International Conference on Network and System Security (NSS 2016), pp. 433-449, Springer, September 2016. (Best Student Paper Award) (Download the paper)
    25. Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 1061-1068, IEEE, August 2016. (Download the paper)
    26. Wenjuan Li, Lijun Jiang, Weizhi Meng and Lam For Kwok. Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. The 10th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2016), pp. 146-153, July 2016. (Download the paper)
    27. Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou. TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), pp. 629-647, June 2016. (Download the paper)
    28. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. On Multiple Password Interference of Touch Screen Patterns and Text Passwords. ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818-4822, May 2016. (Download the paper)
    29. Wenjuan Li and Weizhi Meng. An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments. The 2015 IEEE International Conference on Communications (ICC 2015), pp. 7438-7443, IEEE, June 2015. (Download the paper)
    30. Weizhi Meng, Wenjuan Li and Lam-For Kwok. An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. The 17th International Conference on Information Security (ISC 2014), Springer, pp. 465-476, October 2014. (Download the paper)
    31. Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang. Towards Designing An Email Classification System Using Multi-View Based Semi-Supervised Learning. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), IEEE, pp. 174-181, September 2014. (Download the paper)
    32. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. The 8th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2014), Springer, pp. 61-76, July 2014. (Download the paper)
    33. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning. The 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, June 2014. (Download the paper)
    34. Wenjuan Li, Yuxin Meng and Lam-For Kwok. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. The 9th International Conference on Computational Intelligence and Security (CIS 2013), IEEE, pp. 518-522, December 2013. (Download the paper)
    35. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, November 2013. (Download the paper or the draft)
    36. Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang. Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice. The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), IEEE, pp. 181-188, September 2013. (Download the paper)
    37. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive False Alarm Reduction Using Cloud as a Service. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, IEEE, pp. 420-425, August 2013. (Download the paper)
    38. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones. The 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP Advances in Information and Communication Technology 405, Springer, pp. 55-68, July 2013. (Download the paper)
    39. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. The 7th International Conference on Network and System Security (NSS 2013), Lecture Notes in Computer Science 7873, Springer, pp. 40-53, June 2013. (Download the paper or the draft)
    40. Wenjuan Li and Yuxin Meng. Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. The 10th International Symposium on Neural Networks (ISNN 2013), Lecture Notes in Computer Science 7952, Part II, Springer, pp. 622-629, July 2013. (Download the paper)
    41. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Intelligent Alarm Filter Using Knowledge-based Alert Verification in Network Intrusion Detection. The 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 2012), Lecture Notes in Artificial Intelligence 7661, Springer, pp. 115-124, December 2012. (Download the paper or the draft)
    42. Yuxin Meng and Wenjuan Li. Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. The 14th International Conference on Information and Communications Security (ICICS 2012), Lecture Notes in Computer Science 7618, Springer, pp. 349-356, October 2012. (Download the paper or the draft)
    43. Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach Using Bayesian Inference in Network Intrusion Detection. The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), Lecture Notes in ICST 106, Springer, pp. 203-221, September 2012. (Download the paper or the draft)
    44. Yuxin Meng and Wenjuan Li. Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), IEEE, pp. 223-230, June 2012. (Download the paper or the draft)
    45. Yuxin Meng and Wenjuan Li. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection. The 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), IEEE(IARIA), pp. 75-81, May 2012. (Download the paper- open access)
    46. Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Single Character Frequency-based Exclusive Signature Matching Scheme. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Studies in Computational Intelligence, Springer, pp. 67-80, May 2012. (Selected paper and published in Springer) (Download the paper or the draft)

    Book Chapter

    1. Wenjuan Li and Weizhi Meng. Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications (Book), Ali Ismail Awad,Jemal Abawajy (eds), Wiley, John Wiley & Sons, December 2021. (Access the chapter)
    2. Weizhi Meng and Wenjuan Li. A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends. Networking for Big Data (Book), Shui Yu, Xiaodong Lin, Jelena Misic, Xuemin (Sherman) Shen (eds), CRC Press, Taylor & Francis, August 2015. (Access the chapter)
    3. Yuxin Meng, Wenjuan Li and Lam-For Kwok. A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends. Case Studies in Secure Computing-Achievements and Trends (Book), Biju Issa, Nauman Israr (eds), CRC Press, Taylor & Francis, pp. 191-208, September 2014. (Access the chapter)

    Journal Reviewer

  • ACM Transactions on Management Information Systems (TMIS), ACM
  • Ad Hoc Networks, Elsevier (Outstanding reviewer 2018)
  • Alexandria Engineering Journal, Elsevier
  • Applied Sciences, MDPI
  • Concurrency and Computation: Practice and Experience, Wiley
  • Computers & Security, Elsevier (Outstanding reviewer 2018)
  • Computer Networks, Elsevier (Outstanding reviewer 2018)
  • Computer Standards & Interfaces, Elsevier
  • China Communications, IEEE
  • Computers and Electrical Engineering, Elsevier
  • Computer Science Review, Elsevier
  • Data in Brief, Elsevier (Outstanding reviewer 2018)
  • Digital Communications and Networks, Elsevier
  • Future Generation Computer Systems, Elsevier
  • Heliyon, Elsevier
  • IEEE Internet of Things Journal, IEEE
  • IEEE Systems Journal, IEEE
  • Informatics in Medicine Unlocked, Elsevier
  • IEEE Access, IEEE
  • IEEE Transactions on Mobile Computing, IEEE
  • IEEE Transactions on Industrial Informatics, IEEE
  • IEEE Transactions on Intelligent Transportation Systems, IEEE
  • IEEE/ACM Transactions on Networking, IEEE
  • Information Sciences, Elsevier
  • Information and Computer Security, Emerald
  • International Journal of Network Management, Wiley
  • International Journal of Intelligent Systems, Wiley
  • International Journal of Distributed Sensor Networks (IJDSN), Sagepub
  • International Journal of Critical Infrastructure Protection, Elsevier
  • International Journal of Communication Systems, Wiley
  • International Journal of Human - Computer Studies, Elsevier
  • Journal of Information Security and Applications, Elsevier
  • Journal of Parallel and Distributed Computing, Elsevier
  • Journal of Experimental & Theoretical Artificial Intelligence, Taylor & Francis
  • Journal of Network and Computer Applications (JNCA), Elsevier
  • Journal of Intelligent Systems, De Gruyter
  • KSII Transactions on Internet and Information Systems, KSII
  • Pervasive and Mobile Computing, Elsevier
  • Wireless Communications and Mobile Computing, Hindawi
  • Security and Communication Networks, Hindawi
  • Sustainability, MDPI
  • The Computer Journal, Oxford University Press
  • SCIENTIA SINICA Informationis

  • Awards

  • [2021.02] Best Paper Award - IEEE DSC 2021.
  • [2020.11] Best Paper Award - EISA 2020.
  • [2020.11] Best Student Paper Award - SpaCCS 2020.
  • [2019.06] Best Paper Award - AIBlock 2019 in conjunction with ACNS 2019.
  • [2018.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2018.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2017.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2017.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2016.09] Best Student Paper Award - NSS 2016.
  • [2016.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2016.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2015.09-2019.08] Postgraduate Scholarship - City University of Hong Kong.
  • [2014.06] Winner of Cyber Quiz and Computer Security Competition, Final Round of Kaspersky Lab "Cyber Security for the Next Generation" student conference, Stockholm, Sweden, June, 2014.


  • Mics

  • International Association for Cryptologic Research, IACR
  • How to Do Research (Tips)
  • A Collection of Advice on Research and Writing
  • CS Security Conference Ranking (by Jianying Zhou)
  • Some General Security Conference Statics