ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks W Li, H Song IEEE Transactions on Intelligent Transportation Systems 17 (4), 960-969, 2016 | 460 | 2016 |
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach W Li, A Joshi, T Finin 2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010 | 235 | 2010 |
Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities W Li, H Song, Z Feng IEEE Internet of Things Journal, 1-1, 2017 | 186 | 2017 |
Security Issues in Mobile Ad Hoc Network W Li, A Joshi Department of Computer Science and Electrical Engineering, University of …, 2007 | 168* | 2007 |
Extracting information about security vulnerabilities from web text V Mulwad, W Li, A Joshi, T Finin, K Viswanathan 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 144 | 2011 |
A Deep Learning Approach to Android Malware Feature Learning and Detection X Su, D Zhang, W Li, K Zhao 15th IEEE International Conference on Trust, Security and Privacy in …, 2016 | 108 | 2016 |
Detecting Malware for Android Platform: An SVM based Approach W Li, J Ge, G Dai 2nd IEEE International Conference on Cyber Security and Cloud Computing …, 2015 | 80 | 2015 |
Security through collaboration and trust in MANETs W Li, J Parker, A Joshi Mobile Networks and Applications 17, 342-352, 2012 | 78 | 2012 |
Fest: A Feature Extraction and Selection Tool for Android Malware Detection K Zhao, D Zhang, X Su, W Li 20th IEEE Symposium on Computers and Communication (IEEE ISCC 2015), 714-720, 2015 | 73 | 2015 |
Cost-effective edge server placement in wireless metropolitan area networks F Zeng, Y Ren, X Deng, W Li Sensors 19 (1), 32, 2018 | 69 | 2018 |
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes W Wei, S Liu, W Li, D Du IEEE Transactions on Computational Social Systems 5 (3), 736-747, 2018 | 69 | 2018 |
Deep learning-based sentiment analysis for roman urdu text H Ghulam, F Zeng, W Li, Y Xiao Procedia computer science 147, 131-135, 2019 | 64 | 2019 |
DroidDeepLearner: Identifying Android Malware Using Deep Learning Z Wang, S Cheng, J Cai, W Li 37th IEEE Sarnoff Symposium, 160-165, 2016 | 63 | 2016 |
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies W Li, A Joshi, T Finin Distributed and Parallel Databases 31, 353-376, 2013 | 61 | 2013 |
Outlier detection in ad hoc networks using dempster-shafer theory W Li, A Joshi Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09 …, 2009 | 60 | 2009 |
An Android Malware Detection Approach Using Weight-Adjusted Deep Learning W Li, Z Wang, J Cai, S Cheng IEEE International Conference on Computing, Networking and Communications …, 2018 | 57 | 2018 |
Driver identification and authentication with active behavior modeling A Burton, T Parikh, S Mascarenhas, J Zhang, J Voris, NS Artan, W Li 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 43 | 2016 |
SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks W Li, A Joshi, T Finin UMBC CS Technical Report, 2011 | 42* | 2011 |
Mlifdect: Android Malware Detection based on Parallel Machine Learning and Information Fusion X Wang, D Zhang, X Su, W Li SECURITY AND COMMUNICATION NETWORKS, 2017 | 35 | 2017 |
AIT: An AI-enabled Trust Management System for Vehicular Networks Using Blockchain Technology C Zhang, W Li, Y Luo, Y Hu IEEE Internet of Things Journal 8 (5), 3157 - 3169, 2020 | 34 | 2020 |