Wenjia Li
Wenjia Li
Assistant Professor of Computer Science, Georgia Southern University
Verified email at georgiasouthern.edu
Cited by
Cited by
Measurement of the single-top-quark t -channel cross section in pp collisions at TeV
S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ...
Journal of High Energy Physics 2012 (12), 1-47, 2012
Measurement of the -Channel Single Top Quark Production Cross Section in Collisions at
S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ...
Physical Review Letters 107 (9), 091802, 2011
ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
W Li, H Song
IEEE transactions on intelligent transportation systems 17 (4), 960-969, 2015
Mathematics teachers’ interpretation of higher-order thinking in Bloom’s taxonomy
T Thompson
International electronic journal of mathematics education 3 (2), 96-109, 2008
Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach
W Li, A Joshi, T Finin
2010 Eleventh International Conference on Mobile Data Management, 85-94, 2010
Department of Orthopedics
Shanghai Municipal Crops Hospital, Chinese People's Armed Polices, Shanghai …, 1
Object-Oriented BESⅢ Detector Simulation System
ZY Deng, GF Cao, CD Fu, M He, HM LIU, YJ MAO, Y XIA, ZY YOU, ...
Chinese Physics C 30 (5), 371-377, 2006
Security issues in mobile ad-hoc networks: a survey
OO Obi
The 17 th White House Papers Graduate Research In Informatics at Sussex, 2004
Policy-based secure and trustworthy sensing for internet of things in smart cities
W Li, H Song, F Zeng
IEEE Internet of Things Journal 5 (2), 716-723, 2017
100 years of the physics of diodes
P Zhang, Á Valfells, LK Ang, JW Luginsland, YY Lau
Applied Physics Reviews 4 (1), 011304, 2017
Extracting information about security vulnerabilities from web text
V Mulwad, W Li, A Joshi, T Finin, K Viswanathan
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
A deep learning approach to android malware feature learning and detection
X Su, D Zhang, W Li, K Zhao
2016 IEEE Trustcom/BigDataSE/ISPA, 244-251, 2016
Association between vitamin D insufficiency and the risk for gestational diabetes mellitus in pregnant Chinese women
W Ou, NIE Min, YY Hu, K Zhang, LI Wei, P Fan, JT Liu, LM Chen, XP Xing
Biomedical and Environmental Sciences 25 (4), 399-406, 2012
Surface chemistry
TR Gu, BY Zhu, WL Li, JM Ma, LR Dai, HM Cheng
Beijing: SciencePress 131, 1994
Security through collaboration and trust in MANETs
W Li, J Parker, A Joshi
Mobile Networks and Applications 17 (3), 342-352, 2012
Detecting malware for android platform: An svm-based approach
W Li, J Ge, G Dai
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
Cast: Context-aware security and trust framework for mobile ad-hoc networks using policies
W Li, A Joshi, T Finin
Distributed and Parallel Databases 31 (2), 353-376, 2013
Outlier detection in ad hoc networks using dempster-shafer theory
W Li, A Joshi
2009 Tenth International Conference on Mobile Data Management: Systems …, 2009
Fest: A feature extraction and selection tool for Android malware detection
K Zhao, D Zhang, X Su, W Li
2015 IEEE symposium on computers and communication (ISCC), 714-720, 2015
Process intensification of VOC removal from high viscous media by rotating packed bed
L Woyuan, W Wei, Z Haikui, C Guangwen, S Lei, C Jianfeng
Chinese journal of chemical engineering 17 (3), 389-393, 2009
The system can't perform the operation now. Try again later.
Articles 1–20