Wenjuan Li's Homepage

Wenjuan Li Dr. Wenjuan Li
Assistant Professor, PhD, SMIEEE

Department of Mathematics and Information Technology
The Education University of Hong Kong,
Hong Kong SAR, China

Email: lwenjuan [at] eduhk [dot] hk
ORCID: 0000-0003-3745-5669

Profile

Wenjuan Li received her Ph.D. degree in Computer Science from the City University of Hong Kong, Hong Kong. She received both Research Tuition Scholarships and Outstanding Academic Performance Award during the doctorate studies. She is currently an Assistant Professor in the Department of Mathematics and Information Technology, The Education University of Hong Kong. Prior to that, she was a Research Assistant Professor in the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, China. She received the Best Student Paper Award at NSS 2016 and SpaCCS 2021, SciSec 2023, and Best Paper Award at ProvSec 2022, ICA3PP 2022, IEEE DSC 2021 & EISA 2020 and AIBlock 2019. For contributions to hyper-intelligent and distributed system security, she received the IEEE HITC Award for Excellence in Hyper-Intelligence Systems (Early Career Researcher award) in 2022. She is a senior member of IEEE.

Her research interests include blockchain and cyber security, including intrusion detection, spam detection, trust management, web technology, IoT security, and E-commerce security.


News

[December 2023] Welcome submitting your work to ESORICS 2024! The first submission deadline is January 8, 2024.

[December 2022] Welcome submitting your work to ACM CCS 2023 in Copenhagen.

[February 2022] Welcome submitting your work to Sensors SI on Security of IoT-enabled Infrastructures in Smart Cities.


Teaching Experience

- Hong Kong Polytechnic University
  • EIE553-Security in Data Communication, EIE [Autumn 2022]
  • EIE2211-Logic Design, EIE [Spring 2022]

  • - City University of Hong Kong
  • CS3347-Software Engineering Principles and Practice [Semester B 2018/19]
  • CS5294-Information Security Technology Management [Semester A 2018/19]
  • CS4394-Information Security and Management [Semester A 2018/19]
  • CS3347-Software Engineering Principles and Practice [Semester B 2017/18]
  • CS3347-Software Engineering Principles and Practice [Semester B 2016/17]
  • CS2204-Fundamentals of Internet Applications Development [Semester A 2016/17]
  • CS2611-Seminars on Contemporary Technology II [Semester A 2016/17]
  • CS2611-Seminars on Contemporary Technology I [Semester A 2016/17]
  • CS1303-Introduction to Internet & Programming [Semester B 2015/16]
  • CS3354-Software Engineering [Semester A 2015/16]

  • Professional Services

    Editorial Service:
    - Area Editor
  • Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2023-]

  • - Associate Editor
  • Journal of Information Security and Applications (JISA) (SCIE Index), Elsevier
  • International Journal of Information Security (SCIE Index), Springer
  • Network: Computation in Neural Systems (TNET) (SCIE Index), Taylor & Francis
  • Heliyon (Computer Science) (SCIE Index), Cell Press [2023-]
  • Royal Society Open Science (SCIE Index), The Royal Society
  • International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global
  • Blockchain Journal, ELS Publishing
  • Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2021-2023]

  • - Editorial Board Member
  • Connection Science, Taylor & Francis
  • Security and Communication Networks, Hindawi
  • Wireless Communications and Mobile Computing, Hindawi
  • Frontiers in Communications and Networks (Security, Privacy and Authentication), Frontiers

  • - Editorial Advisory Board
  • Heliyon (Computer Science), Cell Press [2021-2023]

  • - Editorial Review Board
  • International Journal of Information Security and Privacy (IJISP) , IGI Global

  • - Journal Guest Editor
  • Peer-to-Peer Networking and Applications, Blockchain for Peer-to-Peer Computing
  • Journal of Network and Computer Applications (JISA), Special Issue on Trends in Cybersecurity
  • Connection Science, Security, Trust and Privacy in Computer Networks

  • Conference Organizing Committee:
    - General Chair
  • EAI International Conference on Cloud Computing (CloudComp), 2023

  • - Program Chair
  • IEEE International Conference on Smart Data (SmartData), 2024
  • International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 2022, 2023
  • EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2022

  • - Program Vice/Track Chair
  • IEEE International Conference on Internet of Things (iThings), 2024
  • Annual International Conference on Privacy, Security & Trust (PST), 2023

  • - Publicity Chair
  • European Symposium on Research in Computer Security (ESORICS), 2022, 2024
  • ACM Conference on Computer and Communications Security (CCS), 2023
  • The Workshop on Security and Privacy in CPS&IoT (CPSIoTSec) with ACM CCS, 2022
  • IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022
  • International Symposium on Cyberspace Safety and Security (CSS), 2021

  • - Publication Chair
  • IEEE International Conference on Blockchain (Blockchain), 2024
  • International Conference on Information Security Practice and Experience (ISPEC), 2023
  • International Conference on Science of Cyber Security (SciSec), 2023
  • EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2021, 2022, 2023
  • International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2022
  • International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021, 2022
  • IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
  • ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021
  • International Conference on Information and Communications Security (ICICS), 2020

  • - Web Chair
  • International Conference on Security and Privacy in New Computing Environments (SPNCE), 2020

  • - Conference Program Committee Members
  • IEEE Global Communications Conference (GLOBECOM), 2020, 2021, 2022, 2023, 2024
  • IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019, 2020, 2021, 2022, 2023, 2024
  • IEEE International Conference on Blockchain (Blockchain), 2018, 2019, 2020, 2024
  • Annual International Conference on Privacy, Security, and Trust (PST), 2022, 2023, 2024
  • International Conference on Network and System Security (NSS), 2023, 2024
  • EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2023, 2024
  • International Conference on Science of Cyber Security (SciSec), 2023, 2024
  • IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom), 2023, 2024
  • International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2022, 2023, 2024
  • International Conference on Information Systems Security and Privacy (ICISSP), 2023, 2024
  • European Interdisciplinary Cybersecurity Conference (EICC), 2024
  • International Conference on Intelligent Environments (IE), 2024
  • IEEE International Conference on Consumer Electronics (ICCE), 2024
  • International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY), 2018, 2019, 2020, 2021, 2022, 2023, 2024
  • International Conference on Advances in Computer-Human Interactions (ACHI), 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024
  • IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 2022, 2023
  • IEEE International Symposium on Parallel & Distributed Processing with Applications (ISPA), 2023
  • International Conference on Information Security Practice and Experience (ISPEC), 2023
  • IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022, 2023
  • International Workshop on Security and Trust Management (STM) with ESORICS, 2022, 2023
  • International Symposium on Emerging Information Security and Applications (EISA), 2020, 2021, 2022, 2023
  • International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), 2017, 2018, 2019, 2020, 2021, 2022, 2023
  • International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), 2018, 2019, 2021, 2022, 2023
  • International Conference on Sensor Technologies and Applications (SENSORCOMM), 2023
  • International Workshop on Application Intelligence and Blockchain Security (AIBlock) with ACNS, 2020, 2021, 2022, 2023
  • ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021, 2023
  • International conference on Mathematics and Computing (ICMC), 2021, 2022, 2023
  • International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP), in conjunction with IEEE INFOCOM, 2023
  • IEEE International Conference on Mobility, Sensing, and Networking (MSN), 2022
  • EAI International Conference on Big Data Technologies and Applications (EAI BDTA), 2022
  • International Conference on Information and Communications Security (ICICS), 2020, 2021, 2022
  • Special Session on Private, Secure, and Trust Data Analytics (PSTDA2022) with DSAA2022, 2022
  • International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2019, 2020, 2021, 2022
  • The IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications (IARIA Congress), 2022
  • International Conference on Information, Communication & Cybersecurity (ICI2C), 2021
  • International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 2019, 2020, 2021
  • International Conference on Data Mining and Big Data (DMBD), 2021
  • International Symposium on Cyberspace Safety and Security (CSS), 2020, 2021
  • International Workshop on Privacy, Security, and Trust in Computational Intelligence (PSTCI) with CIKM, 2021
  • ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2021
  • IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021
  • IFIP International Conference on Trust Management (IFIPTM), 2019, 2020
  • International Conference on Smart City and Informatization (iSCI), 2019, 2020
  • IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2020,
  • IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2020
  • IEEE International Conference on Advanced and Trusted Computing (IEEE ATC), 2019, 2020

  • Publications

    My publications can be found at Google Scholar and ResearchGate.
    Before you download the papers, please carefully read relevant copyright requirements.

    Journal

    1. Wenjuan Li, Philip Rosenberg, Mads Glisby, and Michael Han. Designing Energy-aware Collaborative Intrusion Detection in IoT Networks. Journal of Information Security and Applications, Elsevier, In Press. [IF=5.6] (Download the paper)
    2. Ye Li, Jiale Zhang, Junwu Zhu, and Wenjuan Li. BlockFD: Blockchain-based Federated Distillation against Poisoning Attacks. Neural Computing and Applications, Springer, In Press. [IF=6.0] (Download the paper)
    3. Wenjuan Li, Thomas Gleerup, Jiao Tan, and Yu Wang. A Security Enhanced Android Unlock Scheme based on Pinch-to-Zoom for Smart Devices. IEEE Transactions on Consumer Electronics, In Press, IEEE. [IF=4.3]
    4. Wenjuan Li, Christian Stidsen, and Tobias Adam. A Blockchain-assisted Security Management Framework for Collaborative Intrusion Detection in Smart Cities. Computers and Electrical Engineering, vol. 111, Part A, 108884, pp. 1-13, Elsevier, 2023. [IF=4.3] (Download the paper)
    5. Hao Sui, Xiaobing Sun, Jiale Zhang, Bing Chen, and Wenjuan Li. Multi-level Membership Inference Attacks in Federated Learning based on Active GAN. Neural Computing and Applications, vol. 35, pp. 17013–17027, Springer, 2023. [IF=5.102] (Download the paper)
    6. Wenjuan Li, Jiao Tan, and Nan Zhu. Design of Double-Cross-based Smartphone Unlock Mechanism. Computers & Security, vol. 129, 103204, Elsevier, 2023. [IF=5.105] (Download the paper)
    7. Wenjuan Li, Yu Wang, and Jin Li. A Blockchain-enabled Collaborative Intrusion Detection Framework for SDN-assisted Cyber-Physical Systems. International Journal of Information Security, vol. 22, pp. 1219-1230, Springer, 2023. [IF=2.427] (Download the paper)
    8. Yuan Chang, Jiliang Li, and Wenjuan Li. 2D2PS: A Demand-driven Privacy-preserving Scheme for Anonymous Data Sharing in Smart Grids. Journal of Information Security and Applications, Vol. 74, 103466, Elsevier, 2023. [IF=5.6] (Download the paper)
    9. Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, and Wenjuan Li. ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet of Things Journal, vol. 10, no. 14, pp. 12521-12536, IEEE, 2023. [IF=10.238] (Download the paper)
    10. Wenjuan Li and Weizhi Meng. BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Network, vol. 36, no. 4, pp. 120-125, IEEE, 2022. [IF=10.294] (Download the paper)
    11. Wenjuan Li, Yu Wang, and Jin Li. Enhancing Blockchain-based Filtration Mechanism via IPFS for Collaborative Intrusion Detection in IoT Networks. Journal of Systems Architecture, vol. 127, 102510, Elsevier, 2022. [IF=3.777] (Download the paper)
    12. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Communications Surveys and Tutorials, vol. 24, no. 1, pp. 280-305, IEEE, 2022. [IF=25.249] (Download the paper)
    13. Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, and Chunhua Su. BlockCSDN: Towards Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. IEICE Transactions on Information and Systems, vol. E105.D, no. 2, pp. 272-279, IEICE, 2022. [IF=0.845] (Download the paper)
    14. Wenjuan Li, Yu Wang, Jiao Tan, and Nan Zhu. DCUS: Evaluating Double-Click-based Unlocking Scheme on Smartphones. Mobile Networks and Applications, vol. 27, no. 1, pp. 382-391, Springer, 2022. [IF=2.602]
    15. Junjie Huang, Liang Tan, Wenjuan Li, and Keping Yu. RON-Enhanced Blockchain Propagation Mechanism for Edge-Enabled Smart Cites. Journal of Information Security and Applications, vol. 61, pp. 1-10, Elsevier, 2021. [IF=3.872] (Download the paper)
    16. Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han. An Empirical Study of Supervised Email Classification in Internet of Things: Practical Performance and Key Influencing Factors. International Journal of Intelligent Systems, vol. 37, no. 1, pp. 287-304, Wiley, 2022. [IF=8.709]
    17. Chunhui Wu and Wenjuan Li. Enhancing Intrusion Detection with Feature Selection and Neural Network. International Journal of Intelligent Systems, vol. 36, no. 7, pp. 3087-3105, Wiley, 2021. [IF=10.312]
    18. Weizhi Meng, Wenjuan Li, and Jianying Zhou. Enhancing the Security of Blockchain-based Software Defined Networking through Trust-based Traffic Fusion and Filtration. Information Fusion, vol. 70, pp. 60-71, Elsevier, 2021. [IF=13.669]
    19. Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang. Challenge-based Collaborative Intrusion Detection in Software Defined Networking: An Evaluation. Digital Communications and Networks, vol. 7, pp, 257-263, Elsevier, 2021. [IF=6.797]
    20. Wenjuan Li, Man Ho Au and Yu Wang. A Fog-based Collaborative Intrusion Detection Framework for Smart Grid. International Journal of Network Management, vol. 31. no. 2, e2107, Wiley, 2021. [IF=1.338] (Top Cited Article 2021-2022)
    21. Wenjuan Li, Weizhi Meng, and Steven Furnell. Exploring Touch-based Behavioral Authentication on Smartphone Email Applications in IoT-enabled Smart Cities. Pattern Recognition Letters, vol. 144, pp. 35-41, Elsevier, 2021. [IF=3.255]
    22. Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu. A Blockchain-Empowered AAA Scheme in the Large-Scale HetNet, Digital Communications and Networks, vol. 7, pp. 308-316, Elsevier, 2021. [IF=6.797]
    23. Lina Zhang, Xiangqin Zheng, Keping Yu, Wenjuan Li, Tao Wang, Xuan Dang, Bo Yang. Modular-based Secret Image Sharing in IoT: A Global Progressive-Enabled Approach. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-13, Wiley, 2022. [IF=1.447]
    24. Wenjuan Li, Yu Wang, Jin Li, and Yang Xiang. Towards Supervised Shape-based Behavioral Authentication on Smartphones. Journal of Information Security and Applications, vol. 55, 102591, Elsevier, 2020. [IF=2.327]
    25. Wenjuan Li, Fei Tian, Jin Li, and Yang Xiang. Evaluating Intrusion Sensitivity Allocation with Supervised Learning in Collaborative Intrusion Detection. Concurrency and Computation: Practice and Experience, vol. 34, no. 16, pp. 1-15, Wiley, 2022. [IF=1.447]
    26. Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards A Blockchain-based Framework for Challenge-based Collaborative Intrusion Detection. International Journal of Information Security, vol. 20, no. 2, pp. 127-139, Springer, 2021. [IF=1.822]
    27. Weizhi Meng, Wenjuan Li, Steven Tug, and Jiao Tan. Towards Blockchain-enabled Single Character Frequency-Based Exclusive Signature Matching in IoT-assisted Smart Cities. Journal of Parallel and Distributed Computing, vol. 144, pp. 268-277, Elsevier, 2020. [IF=2.296]
    28. Wenjuan Li, Jiao Tan, Weizhi Meng, and Yu Wang. A Swipe-based Unlocking Mechanism with Supervised Learning on Smartphones: Design and Evaluation. Journal of Network and Computer Applications, vol. 165, 102687, Elsevier, 2020. [IF=5.570]
    29. Weizhi Meng, Wenjuan Li, Liqiu Zhu. Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1377-1386, IEEE, 2020. [IF=2.784]
    30. Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li. Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security, vol. 19, no. 3, Springer, 2020. [IF=1.822]
    31. Wenjuan Li, Weizhi Meng, and Man Ho Au. Enhancing Collaborative Intrusion Detection via Disagreement-based Semi-Supervised Learning in IoT environments. Journal of Network and Computer Applications, vol. 161, 102631, pp. 1-9, Elsevier, 2020. [IF=5.273]
    32. Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au. Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, 103-D(2): 196-203, IEICE, 2020. [IF=0.576]
    33. Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au. Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, vol. 108, pp. 1258–1266, Elsevier, 2020. [IF=5.768]
    34. Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li. Enhancing the Security of FinTech Applications with Map-Based Graphical Password Authentication. Future Generation Computer Systems, vol. 101, pp. 1018-1027, Elsevier, 2019. [IF=5.768]
    35. Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue. Adaptive Machine Learning-based Alarm Reduction via Edge Computing for Distributed Intrusion Detection Systems. Concurrency and Computation: Practice and Experience, vol. 31, no. 19, Wiley, 2019. [IF=1.167]
    36. Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang. Designing Collaborative Blockchained Signature-based Intrusion Detection in IoT environments. Future Generation Computer Systems, vol. 96, pp. 481-489, Elsevier, 2019. [IF=5.768]
    37. Wenjuan Li, Lam For Kwok. Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. Journal of Information Security and Applications, vol. 47, pp. 1-7, Elsevier, 2019. [IF=1.537]
    38. Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, vol. 128, pp. 56-63, Elsevier, 2019. [IF=5.273]
    39. Weizhi Meng, Wenjuan Li, and Duncan S. Wong. Enhancing Touch Behavioral Authentication via Cost-based Intelligent Mechanism on Smartphones. Multimedia Tools and Applications, 77(23), pp. 30167-30185, Springer, 2018. [IF=1.541] (Download the paper)
    40. Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Wai-Xi Liu, Yang Xiang. A Privacy-Preserving Approach for Signature-based Intrusion Detection using Fog Computing in Distributed Networks. Journal of Parallel and Distributed Computing, vol. 122, pp. 26-35, Elsevier, December 2018. [IF=1.815] (Download the paper)
    41. Wenjuan Li, Weizhi Meng, Chunhua Su, and Lam For Kwok. False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access, vol. 6, no. 1, pp. 6530-6539, IEEE, 2018. [IF=3.557] (Download the paper)
    42. Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou and Rongxing Lu. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data. IEEE Access, vol. 6, no. 1, pp. 7234-7243, IEEE, 2018. [IF=3.557] (Download the paper)
    43. Wenjuan Li, Weizhi Meng, and Lam For Kwok. Investigating the Influence of Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. Future Internet [ Invited Feature Article], Special Issue on Security and Privacy in Wireless and Mobile Networks, vol. 10, no. 1, pp. 1-16, 2018. (Download the paper)
    44. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Developing Advanced Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. Cluster Computing, Springer, 2017. [IF=2.040] (Download the paper)
    45. Weizhi Meng, Wenjuan Li and Lam-For Kwok. Towards Effective and Robust List-based Packet Filter for Signature-based Network Intrusion Detection: An Engineering Approach. HKIE Transactions, Taylor & Francis, In Press. (This paper received the HKIE Outstanding Paper Award for Young Engineers/Researchers in 2017 and published in this Special Issue.) (Download the paper)
    46. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Towards Effective Trust-based Packet Filtering in Collaborative Network Environments. IEEE Transactions on Network and Service Management, IEEE, In Press. [IF=1.296]
    47. Weizhi Meng, Wenjuan Li, Lam-For Kwok and Kim-Kwang Raymond Choo. Towards Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch Behaviours on Smartphones. Computers & Security, vol. 65, pp. 213-229, Elsevier, 2017. [IF=1.64] (Download the paper)
    48. Weizhi Meng, Wenjuan Li, Yang Xiang and Kim-Kwang Raymond Choo. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017. [IF=2.331] (Download the paper)
    49. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-Based Trust Management Model. Journal of Network and Computer Applications, vol. 77, pp. 135-145, Elsevier, 2017. [IF=2.331] (Download the paper)
    50. Wenjuan Li, Weizhi Meng, Xiapu Luo and Lam-For Kwok. MVPSys: Towards Practical Multi-View Based False Alarm Reduction System in Network Intrusion Detection. Computers & Security, vol. 60, pp. 177-192, Elsevier, 2016. [IF=1.64]
    51. Wenjuan Li, Weizhi Meng and Lam-For Kwok. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures. Journal of Network and Computer Applications, vol. 68, pp. 126-139, Elsevier, 2016. [IF=2.331]
    52. Weizhi Meng, Wenjuan Li, and Lam-For Kwok. Design of Intelligent KNN-based Alarm Filter Using Knowledge-based Alert Verification in Intrusion Detection. Security and Communication Networks, vol. 8, no, 18, pp. 3883-3895, Wiley, 2015. [IF=0.72]
    53. Wenjuan Li and Weizhi Meng. Enhancing Collaborative Intrusion Detection Networks Using Intrusion Sensitivity in Detecting Pollution Attacks. Information and Computer Security (Previously Information Management and Computer Security), vol. 24, no. 3, pp. 265-276, Emerald, 2016. (Special Issue for the Awarded Papers in Kaspersky Conference)
    54. Weizhi Meng, Wenjuan Li and Lam-For Kwok. EFM: Enhancing the Performance of Signature-based Network Intrusion Detection Systems Using Enhanced Filter Mechanism. Computers & Security, vol. 43, pp. 189-204, Elsevier, June 2014. [IF=1.172] (Download the paper)
    55. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive Character Frequency-based Exclusive Signature Matching Scheme and its Applications in Distributed Intrusion Detection. Computer Networks. vol. 57, no. 17, pp. 3630-3640, Elsevier, 2013. [IF=1.282] (Download the paper)

    Conference

    1. Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, and Wenjuan Li. The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. The 21st IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA), In Press, IEEE, 2023. (Download the paper)
    2. Baolu Xue, Jiale Zhang, Bing Chen, and Wenjuan Li. Tackling Non-IID for Federated Learning with Components Alignment. The 5th International Conference on Machine Learning for Cyber Security (ML4CS), In Press, Springer, 2023. (Download the paper)
    3. Ho Chun Fu, Wenjuan Li and Yu Wang. PassFile: Graphical Password Authentication based on File Browsing Records. The 5th International Conference on Machine Learning for Cyber Security (ML4CS), In Press, Springer, 2023. (Download the paper)
    4. Xinyuan Qin and Wenjuan Li. A Graphical Password Scheme based on Rounded Image Selection. The 5th International Conference on Science of Cyber Security (SciSec), In Press, Springer, 2023. (Best Student Paper Award) (Download the paper)
    5. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. The 10th International Conference on Computing, Networking and Communications (ICNC), pp. 336-342, IEEE, 2023. (Download the paper)
    6. Wei-Yang Chiu, Weizhi Meng, Wenjuan Li and Limin Fang. FolketID: A Decentralized Blockchain-based NemID Alternative against DDoS Attacks. The 16th International Conference on Provable and Practical Security (ProvSec), pp. 210-227, Springer, 2022. (Best Paper Award) (Download the paper)
    7. Yuanyuan Xie, Bing Chen, Jiale Zhang, and Wenjuan Li. ALGANs: Enhancing membership inference attacks in federated learning with GANs and active learning. IEEE International Symposium on Product Compliance Engineering-Asia (ISPCE-AS), IEEE, 2022. (Download the paper)
    8. Wenjuan Li, Philip Rosenberg, Mads Glisby, and Michael Han. EnergyCIDN: Enhanced Energy-aware Challenge-based Collaborative Intrusion Detection in Internet of Things. The 22nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Springer, 2022. (Best Paper Award) (Download the paper)
    9. Ye Li, Jiale Zhang, Junwu Zhu, and Wenjuan Li. HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. The 3rd International Conference on Emerging Information Security and Applications (EISA), Springer, 2022. (Download the paper)
    10. Thomas Gleerup, Wenjuan Li, Jiao Tan and Yu Wang. ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices. The 4th International Conference on Science of Cyber Security (SciSec), pp. 245-259, Springer, 2022. (Download the paper)
    11. Yiming Sun, Weizhi Meng, and Wenjuan Li. Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. The 19th Annual International Conference on Privacy, Security and Trust (PST), pp. 1-5, IEEE, 2022. (Download the paper)
    12. Wenjuan Li, Jiao Tan and Nan Zhu. Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones. The 37th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 412-428, Springer, 2022.
    13. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. The 18th International Conference on Privacy, Security, and Trust (PST), pp. 1-9, IEEE, 2021. (Download the paper)
    14. Li Wang, Weizhi Meng, and Wenjuan Li. Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. The 17th International Conference on Mobility, Sensing and Networking (IEEE MSN), pp. 486-493, IEEE, 2021. (Download the paper)
    15. Wenjuan Li, Weizhi Meng, and Laurence Yang. Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 122-129, IEEE, 2021. (Download the paper)
    16. Wenjuan Li, Weizhi Meng, Yu Wang and Jin Li. Enhancing Blackslist-based Packet Filtration using Blockchain in Wireless Sensor Networks. The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA), pp. 624-635, Springer, 2021. (Download the paper)
    17. Wenjuan Li, Weizhi Meng, Javier Parra Arnau, and Kim-Kwang Raymond Choo. Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. The 4th IEEE Conference on Dependable and Secure Computing (IEEE DSC), pp. 1-8, IEEE, 2021. (Best Paper Award) (Download the paper)
    18. Wenjuan Li, Weizhi Meng, and Hui Zhu. Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1179-1186, IEEE, 2020. (Download the paper)
    19. Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li. I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-based Authentication. The 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS), pp. 251-265, Springer, 2020. (Best Student Paper Award) (Download the paper)
    20. Wenjuan Li, Jiao Tan, and Yu Wang. A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. The 14th International Conference on Network and System Security (NSS), pp. 261-276, Springer, 2020. (Download the paper)
    21. Wenjuan Li, Jiao Tan, Nan Zhu, and Yu Wang. Designing Double-Click-based Unlocking Mechanism on Smartphones. The First International Symposium on Emerging Information Security and Applications (EISA), pp. 573-585, Springer, December 2020. (Best Paper Award) (Download the paper)
    22. Tan Liang, Huan Xiao, Xinglin Shang, Yong Wang, Feng Ding and Wenjuan Li. A Blockchain-based Trusted Service Mechanism for Crowdsourcing System. The Emerging Blockchain Technology Solutions for Real-world Applications (EBTSRA), with The 91st IEEE Vehicular Technology Conference (VTC2020-Spring), pp. 1-6, 2020. (Download the paper)
    23. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. The 15th International Conference on Information Security Practice and Experience (ISPEC), pp. 453-463, Springer, November 2019. (Download the paper)
    24. Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li. SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. The 2nd International Conference on Machine Learning for Cyber Security (ML4CS), pp. 140-153, Springer, September 2019. (Download the paper)
    25. Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su. Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 24th European Symposium on Research in Computer Security (ESORICS), pp. 493-511, Springer, September 2019. (Download the paper)
    26. Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards Blockchained Challenge-Based Collaborative Intrusion Detection. The 1st International Workshop on Application Intelligence and Blockchain Security (AIBlock), In Conjunction With ACNS 2019, pp. 122-139, Springer, September 2019. (Best Paper Award) (Download the paper)
    27. Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li, and Chong Jiang. PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication. The 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 251-263, 2019. (Download the paper)
    28. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou. SocialAuth: Designing Touch Behavioral Smartphone User Authentication based on Social Networking Applications. The 34th IFIP International Conference on Information Security and Privacy Protection (IFIP SEC), pp. 180-193, June 2019. (Download the paper)
    29. Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. Towards Blockchained Challenge-Based Collaborative Intrusion Detection. The 1st International Workshop on Application Intelligence and Blockchain Security (AIBlock), In Conjunction With ACNS 2019, pp. 122-139, 2019. (Best Paper Award) (Download the paper)
    30. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li. Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification. The 14th International Conference on Information Security Practice and Experience (ISPEC), pp. 313-328, Springer, September 2018. (Download the paper)
    31. Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1208-1213, IEEE, July 2018. (Download the paper)
    32. Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst. Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. The 23rd Australasian Conference on Information Security and Privacy (ACISP), pp. 759-767, July 2018. (Download the paper)
    33. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. The 2017 IEEE Global Communications Conference (GLOBECOM), pp. 1-6, IEEE, December 2017. (Download the paper)
    34. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy through Enhanced Juice Filming Charging Attacks. The 20th Information Security Conference (ISC), pp. 291-308, Springer, November 2017. (Download the paper)
    35. Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou. A Pilot Study of Multiple Password Interference between Text and Map-based Passwords. The 15th International Conference on Applied Cryptography and Network Security (ACNS), pp. 145-162, July 2017. (Download the paper)
    36. Wenjuan Li, Weizhi Meng, and Lam-For Kwok. SOOA: Exploring Special On-Off Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 402-415, Springer, May 2017. (Download the paper)
    37. Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip. PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks. The 10th International Conference on Network and System Security (NSS 2016), pp. 433-449, Springer, September 2016. (Best Student Paper Award) (Download the paper)
    38. Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 1061-1068, IEEE, August 2016. (Download the paper)
    39. Wenjuan Li, Lijun Jiang, Weizhi Meng and Lam For Kwok. Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. The 10th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2016), pp. 146-153, July 2016. (Download the paper)
    40. Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou. TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016), pp. 629-647, June 2016. (Download the paper)
    41. Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng. On Multiple Password Interference of Touch Screen Patterns and Text Passwords. ACM Conference on Human Factors in Computing Systems (CHI 2016), pp. 4818-4822, May 2016. (Download the paper)
    42. Wenjuan Li and Weizhi Meng. An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments. The 2015 IEEE International Conference on Communications (ICC 2015), pp. 7438-7443, IEEE, June 2015. (Download the paper)
    43. Weizhi Meng, Wenjuan Li and Lam-For Kwok. An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. The 17th International Conference on Information Security (ISC 2014), Springer, pp. 465-476, October 2014. (Download the paper)
    44. Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang. Towards Designing An Email Classification System Using Multi-View Based Semi-Supervised Learning. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), IEEE, pp. 174-181, September 2014. (Download the paper)
    45. Wenjuan Li, Weizhi Meng and Lam-For Kwok. Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. The 8th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2014), Springer, pp. 61-76, July 2014. (Download the paper)
    46. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Email Classification Using Data Reduction and Disagreement-based Semi-Supervised Learning. The 2014 IEEE International Conference on Communications (ICC 2014), IEEE, pp. 622-627, June 2014. (Download the paper)
    47. Wenjuan Li, Yuxin Meng and Lam-For Kwok. Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. The 9th International Conference on Computational Intelligence and Security (CIS 2013), IEEE, pp. 518-522, December 2013. (Download the paper)
    48. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. The 15th IEEE International Conference on High Performance Computing and Communications (HPCC 2013), IEEE, November 2013. (Download the paper or the draft)
    49. Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang. Towards Designing Privacy Preserving Signature-based IDS As a Service: A Study and Practice. The 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), IEEE, pp. 181-188, September 2013. (Download the paper)
    50. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Towards Adaptive False Alarm Reduction Using Cloud as a Service. The 8th International Conference on Communications and Networking in China (ChinaCom 2013), Network and Information Security Track, IEEE, pp. 420-425, August 2013. (Download the paper)
    51. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Enhancing Click-Draw based Graphical Passwords Using Multi-Touch on Mobile Phones. The 28th IFIP TC 11 International Information Security and Privacy Conference (IFIP SEC 2013), IFIP Advances in Information and Communication Technology 405, Springer, pp. 55-68, July 2013. (Download the paper)
    52. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. The 7th International Conference on Network and System Security (NSS 2013), Lecture Notes in Computer Science 7873, Springer, pp. 40-53, June 2013. (Download the paper or the draft)
    53. Wenjuan Li and Yuxin Meng. Improving the Performance of Neural Networks with Random Forest in Detecting Network Intrusions. The 10th International Symposium on Neural Networks (ISNN 2013), Lecture Notes in Computer Science 7952, Part II, Springer, pp. 622-629, July 2013. (Download the paper)
    54. Yuxin Meng, Wenjuan Li and Lam-For Kwok. Intelligent Alarm Filter Using Knowledge-based Alert Verification in Network Intrusion Detection. The 20th International Symposium on Methodologies for Intelligent Systems (ISMIS 2012), Lecture Notes in Artificial Intelligence 7661, Springer, pp. 115-124, December 2012. (Download the paper or the draft)
    55. Yuxin Meng and Wenjuan Li. Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. The 14th International Conference on Information and Communications Security (ICICS 2012), Lecture Notes in Computer Science 7618, Springer, pp. 349-356, October 2012. (Download the paper or the draft)
    56. Yuxin Meng, Lam-For Kwok and Wenjuan Li. Towards Designing Packet Filter with A Trust-based Approach Using Bayesian Inference in Network Intrusion Detection. The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2012), Lecture Notes in ICST 106, Springer, pp. 203-221, September 2012. (Download the paper or the draft)
    57. Yuxin Meng and Wenjuan Li. Adaptive Character Frequency-based Exclusive Signature Matching Scheme in Distributed Intrusion Detection Environment. The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), IEEE, pp. 223-230, June 2012. (Download the paper or the draft)
    58. Yuxin Meng and Wenjuan Li. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection. The 7th International Conference on Internet Monitoring and Protection (ICIMP 2012), IEEE(IARIA), pp. 75-81, May 2012. (Download the paper- open access)
    59. Yuxin Meng, Wenjuan Li, and Lam-For Kwok. Single Character Frequency-based Exclusive Signature Matching Scheme. The 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012), Studies in Computational Intelligence, Springer, pp. 67-80, May 2012. (Selected paper and published in Springer) (Download the paper or the draft)

    Book Chapter

    1. Wenjuan Li and Weizhi Meng. Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications (Book), Ali Ismail Awad,Jemal Abawajy (eds), Wiley, John Wiley & Sons, December 2021. (Access the chapter)
    2. Weizhi Meng and Wenjuan Li. A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trends. Networking for Big Data (Book), Shui Yu, Xiaodong Lin, Jelena Misic, Xuemin (Sherman) Shen (eds), CRC Press, Taylor & Francis, August 2015. (Access the chapter)
    3. Yuxin Meng, Wenjuan Li and Lam-For Kwok. A Case Study of Intelligent False Alarm Reduction in Cloud Environments - Challenges and Trends. Case Studies in Secure Computing-Achievements and Trends (Book), Biju Issa, Nauman Israr (eds), CRC Press, Taylor & Francis, pp. 191-208, September 2014. (Access the chapter)

    Journal Reviewer

  • ACM Transactions on Management Information Systems (TMIS), ACM
  • ACM Transactions on Software Engineering and Methodology (TOSEM), ACM
  • Ad Hoc Networks, Elsevier (Outstanding reviewer 2018)
  • Alexandria Engineering Journal, Elsevier
  • Applied Sciences, MDPI
  • Concurrency and Computation: Practice and Experience, Wiley
  • Computers & Security, Elsevier (Outstanding reviewer 2018)
  • Computer Networks, Elsevier (Outstanding reviewer 2018)
  • Computer Standards & Interfaces, Elsevier
  • China Communications, IEEE
  • Computers and Electrical Engineering, Elsevier
  • Computer Science Review, Elsevier
  • Data in Brief, Elsevier (Outstanding reviewer 2018)
  • Digital Communications and Networks, Elsevier
  • Future Generation Computer Systems, Elsevier
  • Heliyon, Elsevier
  • IEEE Internet of Things Journal, IEEE
  • IEEE Systems Journal, IEEE
  • Informatics in Medicine Unlocked, Elsevier
  • IEEE Access, IEEE
  • IEEE Transactions on Mobile Computing, IEEE
  • IEEE Transactions on Industrial Informatics, IEEE
  • IEEE Transactions on Intelligent Transportation Systems, IEEE
  • IEEE Transactions on Dependable and Secure Computing, IEEE
  • IEEE/ACM Transactions on Networking, IEEE
  • Information Sciences, Elsevier
  • Information and Computer Security, Emerald
  • International Journal of Network Management, Wiley
  • International Journal of Intelligent Systems, Wiley
  • International Journal of Distributed Sensor Networks (IJDSN), Sagepub
  • International Journal of Critical Infrastructure Protection, Elsevier
  • International Journal of Communication Systems, Wiley
  • International Journal of Human - Computer Studies, Elsevier
  • Journal of Information Security and Applications, Elsevier
  • Journal of Industrial Information Integration, Elsevier
  • Journal of Parallel and Distributed Computing, Elsevier
  • Journal of Experimental & Theoretical Artificial Intelligence, Taylor & Francis
  • Journal of Network and Computer Applications (JNCA), Elsevier
  • Journal of Intelligent Systems, De Gruyter
  • KSII Transactions on Internet and Information Systems, KSII
  • Pervasive and Mobile Computing, Elsevier
  • Swarm and Evolutionary Computation, Elsevier
  • Wireless Communications and Mobile Computing, Hindawi
  • Security and Communication Networks, Hindawi
  • Sustainability, MDPI
  • The Computer Journal, Oxford University Press
  • SCIENTIA SINICA Informationis

  • Awards

  • [2023.12] IEEE ComSoc WICE (Women in Communications Engineering Committee) Early Achievement Award in 2023.
  • [2023.07] Best Student Paper Award - SciSec 2023.
  • [2022.12] IEEE HITC Award for Excellence in Hyper-Intelligence Systems (Early Career Researcher award) in 2022.
  • [2022.10] Best Paper Award - ProvSec 2022.
  • [2022.10] Best Paper Award - ICA3PP 2022.
  • [2021.02] Best Paper Award - IEEE DSC 2021.
  • [2020.11] Best Paper Award - EISA 2020.
  • [2020.11] Best Student Paper Award - SpaCCS 2020.
  • [2019.06] Best Paper Award - AIBlock 2019 in conjunction with ACNS 2019.
  • [2018.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2018.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2017.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2017.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2016.09] Best Student Paper Award - NSS 2016.
  • [2016.09] Research Tuition Scholarships - City University of Hong Kong.
  • [2016.09] Outstanding Academic Performance Award - City University of Hong Kong.
  • [2015.09-2019.08] Postgraduate Scholarship - City University of Hong Kong.
  • [2014.06] Winner of Cyber Quiz and Computer Security Competition, Final Round of Kaspersky Lab "Cyber Security for the Next Generation" student conference, Stockholm, Sweden, June, 2014.


  • Mics

  • International Association for Cryptologic Research, IACR
  • How to Do Research (Tips)
  • A Collection of Advice on Research and Writing
  • CS Security Conference Ranking (by Jianying Zhou)
  • Some General Security Conference Statics