Dr LI, Wenjuan    李文娟 博士
Assistant Professor
Department of Mathematics and Information Technology
Contact
ORCiD
0000-0003-3745-5669
Phone
(852) 2948 7711
Email
lwenjuan@eduhk.hk
Address
10 Lo Ping Road, Tai Po, New Territories, Hong Kong
Scopus ID
57189107700
SDGs
4 - Quality Education
9 - Industry, Innovation and Infrastructure
Research Interests
Her research interests include blockchain and cyber security, including intrusion detection, spam detection, trust management, web technology, IoT security, and E-commerce security. 
Teaching Interests

Teaching Experience

- The Education University of Hong Kong

INT6064-Coding and Computational Thinking, MIT [2024]

INT6110-Creative Multimedia and Design, MIT [2024]


- The Hong Kong Polytechnic University

EIE553-Security in Data Communication, EIE

EIE2211-Logic Design, EIE


- City University of Hong Kong

CS3347-Software Engineering Principles and Practice [Semester B 2016-2019]

CS5294-Information Security Technology Management [Semester A 2018/19]

CS4394-Information Security and Management [Semester A 2018/19]

CS2204-Fundamentals of Internet Applications Development [Semester A 2016/17]

CS2611-Seminars on Contemporary Technology I & II [Semester A 2016/17]

CS1303-Introduction to Internet & Programming [Semester B 2015/16]

CS3354-Software Engineering [Semester A 2015/16]

External Appointments

- Editor-in-Chief

EAI Endorsed Transactions on Cloud System (ToCS) , EAI [2024-]

International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global [2024-]


- Area Editor

Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2023-2025]


- Associate Editor

Journal of Information Security and Applications (JISA) (SCIE Index), Elsevier

International Journal of Information Security (SCIE Index), Springer

Network: Computation in Neural Systems (TNET) (SCIE Index), Taylor & Francis

Heliyon (Computer Science) (SCIE Index), Cell Press [2023-]

Royal Society Open Science (SCIE Index), The Royal Society

Blockchain Journal, ELS Publishing

Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2021-2023]

International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global [2021-2024]


- Editorial Board Member

Frontiers in Communications and Networks (Security, Privacy and Authentication), Frontiers

Discover Computing, Springer [2024-]

Discover Networks, Springer [2024-]

Connection Science, Taylor & Francis [2021-2024]

Security and Communication Networks, Wiley [2020-2023]


- Editorial Advisory Board

Heliyon (Computer Science), Cell Press [2021-2023]


- Editorial Review Board

International Journal of Cyber Research and Education (IJCRE) , IGI Global

International Journal of Information Security and Privacy (IJISP) , IGI Global


- Journal Guest Editor

Peer-to-Peer Networking and Applications, Blockchain for Peer-to-Peer Computing

Journal of Network and Computer Applications (JISA), Special Issue on Trends in Cybersecurity

Connection Science, Security, Trust and Privacy in Computer Networks


Conference Organizing Committee:

- General Chair

EAI International Conference on Cloud Computing (CloudComp), 2023


- Program Chair

IEEE International Conference on Smart Data (SmartData), 2024

International Symposium on Emerging Information Security and Applications (EISA), 2024

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 20222023

EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2022


- Program Vice/Track Chair

IEEE International Conference on Internet of Things (iThings), 2024

Annual International Conference on Privacy, Security & Trust (PST), 2023


- Publicity Chair

European Symposium on Research in Computer Security (ESORICS), 202220242025

International Workshop on Security and Trust Management (STM) with ESORICS, 2025,

ACM Conference on Computer and Communications Security (CCS), 2023

The Workshop on Security and Privacy in CPS&IoT (CPSIoTSec) with ACM CCS, 2022

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022

International Symposium on Cyberspace Safety and Security (CSS), 2021


- Publication Chair

International Conference on Application Intelligence and Blockchain Security (AIBlock), 2025

IEEE International Conference on Blockchain (Blockchain), 2024

International Conference on Information Security Practice and Experience (ISPEC), 2023

International Conference on Science of Cyber Security (SciSec), 2023

EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 202120222023

International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2022

International Symposium on Emerging Information Security and Applications (EISA), 202020212022

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021

ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021

International Conference on Information and Communications Security (ICICS), 2020


- Workshop Chair

EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2025


- Web Chair

International Conference on Security and Privacy in New Computing Environments (SPNCE), 2020

Other Activities

- Conference Program Committee Members

IEEE Global Communications Conference (GLOBECOM), 202020212022202320242025

IEEE International Conference on High Performance Computing and Communications (HPCC), 2025

IEEE International Symposium on Parallel & Distributed Processing with Applications (ISPA), 202320242025

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2025

IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019202020212022202320242025

Annual International Conference on Privacy, Security, and Trust (PST), 2022202320242025

IEEE Global Information Infrastructure and Networking Symposium (GIIS), 2025

European Interdisciplinary Cybersecurity Conference (EICC), 20242025

International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), 201720182019202020212022202320242025

International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), 2018201920212022202320242025

International Conference on Sensor Technologies and Applications (SENSORCOMM), 202320242025

The IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications (IARIA Congress), 2022202320242025

International Conference on IoT-AI (IoTAI), 2025

IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 202220232024

IEEE International Conference on Blockchain (Blockchain), 2018201920202024

IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2024

IEEE International Conference on Computational Science and Engineering (CSE), 2024

IEEE International Conference on High Performance Computing and Communications (HPCC), 2024

International Symposium on Emerging Information Security and Applications (EISA), 20202021202220232024

International Conference on Network and System Security (NSS), 20232024

EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 20232024

International Conference on Science of Cyber Security (SciSec), 20232024

IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom), 20232024

International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 202220232024

IFIP International Conference on Trust Management (IFIPTM), 2019202020232024

International Conference on Information Systems Security and Privacy (ICISSP), 20232024

International Conference on Intelligent Environments (IE), 2024

IEEE International Conference on Consumer Electronics (ICCE), 2024

International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY), 2018201920202021202220232024

International Conference on Advances in Computer-Human Interactions (ACHI), 20172018201920202021202220232024

International Conference on Information Security Practice and Experience (ISPEC), 2023

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 20222023

International Workshop on Security and Trust Management (STM) with ESORICS, 20222023

International Workshop on Application Intelligence and Blockchain Security (AIBlock) with ACNS, 2020202120222023

ACM International Symposium on Advanced Security on Software and Systems (ASSS), 20212023

International conference on Mathematics and Computing (ICMC), 202120222023

International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP), in conjunction with IEEE INFOCOM, 2023

IEEE International Conference on Mobility, Sensing, and Networking (MSN), 2022

EAI International Conference on Big Data Technologies and Applications (EAI BDTA), 2022

International Conference on Information and Communications Security (ICICS), 202020212022

Special Session on Private, Secure, and Trust Data Analytics (PSTDA2022) with DSAA2022, 2022

International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2019202020212022

International Conference on Information, Communication & Cybersecurity (ICI2C), 2021

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 201920202021

International Conference on Data Mining and Big Data (DMBD), 2021

International Symposium on Cyberspace Safety and Security (CSS), 20202021

International Workshop on Privacy, Security, and Trust in Computational Intelligence (PSTCI) with CIKM, 2021

ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2021

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021

International Conference on Smart City and Informatization (iSCI), 20192020

IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2020,

IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2020

IEEE International Conference on Advanced and Trusted Computing (IEEE ATC), 20192020

Personal Profile

Wenjuan Li received her Ph.D. degree in Computer Science from the City University of Hong Kong, Hong Kong. She received both Research Tuition Scholarships and Outstanding Academic Performance Award during the doctorate studies. She is currently an Assistant Professor in the Department of Mathematics and Information Technology, The Education University of Hong Kong. Prior to that, she was a Research Assistant Professor in the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, China. She received the Best Student Paper Award at NSS 2016 and SpaCCS 2021, SciSec 2023, and Best Paper Award at ProvSec 2022, ICA3PP 2022, IEEE DSC 2021 & EISA 2020 and AIBlock 2019. For contributions to hyper-intelligent and distributed system security, she received the IEEE HITC Award for Excellence in Hyper-Intelligence Systems (Early Career Researcher award) in 2022 and IEEE ComSoc WICE (Women in Communications Engineering Committee) Early Achievement Award in 2023.


Dr. LI is a senior member of IEEE and one of the World’s Top 2% Most-cited Scientists in the 2024 rankings published by Stanford University.



Research Interests

Her research interests include blockchain and cyber security, including intrusion detection, spam detection, trust management, web technology, IoT security, and E-commerce security. 
Teaching Interests

Teaching Experience

- The Education University of Hong Kong

INT6064-Coding and Computational Thinking, MIT [2024]

INT6110-Creative Multimedia and Design, MIT [2024]


- The Hong Kong Polytechnic University

EIE553-Security in Data Communication, EIE

EIE2211-Logic Design, EIE


- City University of Hong Kong

CS3347-Software Engineering Principles and Practice [Semester B 2016-2019]

CS5294-Information Security Technology Management [Semester A 2018/19]

CS4394-Information Security and Management [Semester A 2018/19]

CS2204-Fundamentals of Internet Applications Development [Semester A 2016/17]

CS2611-Seminars on Contemporary Technology I & II [Semester A 2016/17]

CS1303-Introduction to Internet & Programming [Semester B 2015/16]

CS3354-Software Engineering [Semester A 2015/16]

External Appointments

- Editor-in-Chief

EAI Endorsed Transactions on Cloud System (ToCS) , EAI [2024-]

International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global [2024-]


- Area Editor

Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2023-2025]


- Associate Editor

Journal of Information Security and Applications (JISA) (SCIE Index), Elsevier

International Journal of Information Security (SCIE Index), Springer

Network: Computation in Neural Systems (TNET) (SCIE Index), Taylor & Francis

Heliyon (Computer Science) (SCIE Index), Cell Press [2023-]

Royal Society Open Science (SCIE Index), The Royal Society

Blockchain Journal, ELS Publishing

Journal of Ambient Intelligence and Humanized Computing (AIHC), Springer [2021-2023]

International Journal of Blockchain Applications and Secure Computing (IJBASC) , IGI Global [2021-2024]


- Editorial Board Member

Frontiers in Communications and Networks (Security, Privacy and Authentication), Frontiers

Discover Computing, Springer [2024-]

Discover Networks, Springer [2024-]

Connection Science, Taylor & Francis [2021-2024]

Security and Communication Networks, Wiley [2020-2023]


- Editorial Advisory Board

Heliyon (Computer Science), Cell Press [2021-2023]


- Editorial Review Board

International Journal of Cyber Research and Education (IJCRE) , IGI Global

International Journal of Information Security and Privacy (IJISP) , IGI Global


- Journal Guest Editor

Peer-to-Peer Networking and Applications, Blockchain for Peer-to-Peer Computing

Journal of Network and Computer Applications (JISA), Special Issue on Trends in Cybersecurity

Connection Science, Security, Trust and Privacy in Computer Networks


Conference Organizing Committee:

- General Chair

EAI International Conference on Cloud Computing (CloudComp), 2023


- Program Chair

IEEE International Conference on Smart Data (SmartData), 2024

International Symposium on Emerging Information Security and Applications (EISA), 2024

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 20222023

EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 2022


- Program Vice/Track Chair

IEEE International Conference on Internet of Things (iThings), 2024

Annual International Conference on Privacy, Security & Trust (PST), 2023


- Publicity Chair

European Symposium on Research in Computer Security (ESORICS), 202220242025

International Workshop on Security and Trust Management (STM) with ESORICS, 2025,

ACM Conference on Computer and Communications Security (CCS), 2023

The Workshop on Security and Privacy in CPS&IoT (CPSIoTSec) with ACM CCS, 2022

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2022

International Symposium on Cyberspace Safety and Security (CSS), 2021


- Publication Chair

International Conference on Application Intelligence and Blockchain Security (AIBlock), 2025

IEEE International Conference on Blockchain (Blockchain), 2024

International Conference on Information Security Practice and Experience (ISPEC), 2023

International Conference on Science of Cyber Security (SciSec), 2023

EAI International Conference on Blockchain Technology and Emerging Applications (BlockTEA), 202120222023

International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2022

International Symposium on Emerging Information Security and Applications (EISA), 202020212022

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021

ACM International Symposium on Advanced Security on Software and Systems (ASSS), 2021

International Conference on Information and Communications Security (ICICS), 2020


- Workshop Chair

EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2025


- Web Chair

International Conference on Security and Privacy in New Computing Environments (SPNCE), 2020

Other Activities

- Conference Program Committee Members

IEEE Global Communications Conference (GLOBECOM), 202020212022202320242025

IEEE International Conference on High Performance Computing and Communications (HPCC), 2025

IEEE International Symposium on Parallel & Distributed Processing with Applications (ISPA), 202320242025

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2025

IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2019202020212022202320242025

Annual International Conference on Privacy, Security, and Trust (PST), 2022202320242025

IEEE Global Information Infrastructure and Networking Symposium (GIIS), 2025

European Interdisciplinary Cybersecurity Conference (EICC), 20242025

International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE), 201720182019202020212022202320242025

International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), 2018201920212022202320242025

International Conference on Sensor Technologies and Applications (SENSORCOMM), 202320242025

The IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications (IARIA Congress), 2022202320242025

International Conference on IoT-AI (IoTAI), 2025

IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), 202220232024

IEEE International Conference on Blockchain (Blockchain), 2018201920202024

IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2024

IEEE International Conference on Computational Science and Engineering (CSE), 2024

IEEE International Conference on High Performance Computing and Communications (HPCC), 2024

International Symposium on Emerging Information Security and Applications (EISA), 20202021202220232024

International Conference on Network and System Security (NSS), 20232024

EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 20232024

International Conference on Science of Cyber Security (SciSec), 20232024

IEEE International Conference on Metaverse Computing, Networking and Applications (IEEE MetaCom), 20232024

International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 202220232024

IFIP International Conference on Trust Management (IFIPTM), 2019202020232024

International Conference on Information Systems Security and Privacy (ICISSP), 20232024

International Conference on Intelligent Environments (IE), 2024

IEEE International Conference on Consumer Electronics (ICCE), 2024

International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY), 2018201920202021202220232024

International Conference on Advances in Computer-Human Interactions (ACHI), 20172018201920202021202220232024

International Conference on Information Security Practice and Experience (ISPEC), 2023

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 20222023

International Workshop on Security and Trust Management (STM) with ESORICS, 20222023

International Workshop on Application Intelligence and Blockchain Security (AIBlock) with ACNS, 2020202120222023

ACM International Symposium on Advanced Security on Software and Systems (ASSS), 20212023

International conference on Mathematics and Computing (ICMC), 202120222023

International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP), in conjunction with IEEE INFOCOM, 2023

IEEE International Conference on Mobility, Sensing, and Networking (MSN), 2022

EAI International Conference on Big Data Technologies and Applications (EAI BDTA), 2022

International Conference on Information and Communications Security (ICICS), 202020212022

Special Session on Private, Secure, and Trust Data Analytics (PSTDA2022) with DSAA2022, 2022

International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 2019202020212022

International Conference on Information, Communication & Cybersecurity (ICI2C), 2021

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) with ESORICS, 201920202021

International Conference on Data Mining and Big Data (DMBD), 2021

International Symposium on Cyberspace Safety and Security (CSS), 20202021

International Workshop on Privacy, Security, and Trust in Computational Intelligence (PSTCI) with CIKM, 2021

ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI), 2021

IEEE Conference on Dependable and Secure Computing (IEEE DSC), 2021

International Conference on Smart City and Informatization (iSCI), 20192020

IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2020,

IEEE International Conference on Omni-Layer Intelligent Systems (COINS), 2020

IEEE International Conference on Advanced and Trusted Computing (IEEE ATC), 20192020

Research Outputs

Scholarly Books, Monographs and Chapters
Wenjuan Li and Weizhi Meng (2022). Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges. Ali Ismail AWAD, Jemal ABAWAJY, Security and privacy in the internet of things: Architectures, techniques, and applications (123-149). Wiley. https://doi.org/10.1002/9781119607755.ch5
Weizhi Meng; Wenjuan Li (2015). A review of network intrusion detection in the big data era: Challenges and future trends. Shui YU, Xiaodong LIN, Jelena MIŠIC, Xuemin S. SHEN, Networking for big data (195-214). CRC Press. http://www.scopus.com/inward/record.url?scp=85125610256&partnerID=8YFLogxK Scopus publicationLink to publication in Scopus
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2014). A case study of intelligent ids false alarm reduction in cloud environments: Challenges and trends. Biju ISSAC, Nauman ISRAR, Case studies in secure computing: Achievements and trends (189-206). CRC Press. https://doi.org/10.1201/b17352-14

Journal Publications
Li, C., Meng, W., & Li, W. (2025). Enhancing EEG-Based Authentication with Transformer in Internet of Things. IEEE Transactions on Information Forensics and Security, 20, 7197-7210. https://doi.org/10.1109/TIFS.2025.3586486
Li, W., & Tan, S. (2025). DOT-C: A Smartphone Unlock Scheme Based on Dot-dot Connection in IoT-enabled Smart Cities. International Journal of Information Security, 24, Article 153. https://doi.org/10.1007/s10207-025-01068-2
Chen, T., Tan, Y., Li, W., Ci, Z., & Shi, N. (2025). Toward Secure Program Execution in Multi-tenant Cloud FPGA Environments. The Journal of Supercomputing, 81, Article 871. https://doi.org/10.1007/s11227-025-07340-5
Deng, L., Zhong, Q., Song, J., Lei, H., & Li, W. (2025). LLM-Based Unknown Function Automated Modeling in Sensor-Driven Systems for Multi-Language Software Security Verification. Sensors, 25(9), Article 2683. https://doi.org/10.3390/s25092683
Jialin Tian; Harry Min; Jia Hu; Wenjuan Li (2025). Trustworthy 6G-powered industrial IoT for resilient intelligent manufacturing. IEEE Wireless Communications, 32(2), 60-66. https://doi.org/10.1109/MWC.001.2400303
Xinyuan Qin, Wenjuan Li, and Philip Rosenberg (2025). RoundImage: Towards secure graphical password authentication via rounded image selection in IoT. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2025.3547816
Xin Xie, Junbo Wang, Yu Han, and Wenjuan Li (2024). Knowledge graph-based in-context learning for advanced fault diagnosis in sensor networks. Sensors, 24(24), Article 8086. https://doi.org/10.3390/s24248086
Weizhi Meng; Wenjuan Li; Andrei Nicolae Calugar (2024). BANN-TMGuard: Towards touch movement-based screen unlock patterns via blockchain-enabled artificial neural networks on IoT devices. IEEE Internet of Things Journal, 12(2), 1856-1866. https://doi.org/10.1109/JIOT.2024.3465891
Wang, X., Yi, B., Felemban, B. F., Aly, A. A., Li, W., & Liu, J. (2024). Sentiment analysis via trustworthy label enhancement for consumer electronics applications. IEEE Transactions on Consumer Electronics, 71, 1935-1944. https://doi.org/10.1109/TCE.2024.3438841
Li, Y., Zhang, K., Zhu, J., & Li, W. (2024). BlockFD: Blockchain-based Federated Distillation Against Poisoning Attacks. Neural Computing and Applications, 36, 12901-12916. https://doi.org/10.1007/s00521-024-09715-w
Li, W., Rosenberg, P., Glisby, M., & Han, M. (2024). Designing Energy-aware Collaborative Intrusion Detection in IoT Networks. Journal of Information Security and Applications, 81, 103713, Article 103713. https://doi.org/10.1016/j.jisa.2024.103713
Hao Sui, Xiaobing Sun, Jiale Zhang, Bing Chen, and Wenjuan Li (2023). Multi-level Membership Inference Attacks in Federated Learning based on Active GAN. Neural Computing and Applications, 35, 17013-17027. https://doi.org/10.1007/s00521-023-08593-y
Wenjuan Li, Christian Stidsen, and Tobias Adam (2023). A Blockchain-assisted Security Management Framework for Collaborative Intrusion Detection in Smart Cities. Computers and Electrical Engineering, 111(Part A), Article 108884. https://doi.org/10.1016/j.compeleceng.2023.108884
Wenjuan Li, Jiao Tan, and Nan Zhu (2023). Design of Double-Cross-based Smartphone Unlock Mechanism. Computers & Security, 129, Article 103204. https://doi.org/10.1016/j.cose.2023.103204
Yuan Chang, Jiliang Li, and Wenjuan Li (2023). 2D2PS: A Demand-driven Privacy-preserving Scheme for Anonymous Data Sharing in Smart Grids. Journal of Information Security and Applications, 74, Article 103466. https://doi.org/10.1016/j.jisa.2023.103466
Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, and Wenjuan Li (2023). ADCL: Towards An Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet of Things Journal, 10(14), 12521-12536. https://doi.org/10.1109/JIOT.2023.3248259
Li, W., Gleerup, T., Tan, J., & Wang, Y. (2023). A Security Enhanced Android Unlock Scheme based on Pinch-to-Zoom for Smart Devices. IEEE Transactions on Consumer Electronics, 70(1), 3985-3993. https://doi.org/10.1109/TCE.2023.3280064
Li, W., Wang, Y., & Li, J. (2023). A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. International Journal of Information Security, 22, 1219-1230. https://doi.org/10.1007/s10207-023-00687-x
Lina Zhang, Xiangqin Zheng, Keping Yu, Wenjuan Li, Tao Wang, Xuan Dang, Bo Yang (2022). Modular-based Secret Image Sharing in IoT: A Global Progressive-Enabled Approach. Concurrency and Computation: Practice and Experience, 34(16), Article e6000. https://doi.org/10.1002/cpe.6000
Weizhi Meng, Wenjuan Li, Jinguang Han, Chunhua Su (2022). Security, trust, and privacy in machine learning-based Internet of Things. Security and Communication Networks, 2022, Article 9851463. https://doi.org/10.1155/2022/9851463
Wenjuan Li and Weizhi Meng (2022). BCTrustFrame: Enhancing Trust Management via Blockchain and IPFS in 6G Era. IEEE Network, 36(4), 120-125. https://doi.org/10.1109/MNET.013.2100768
Wenjuan Li, Fei Tian, Jin Li, and Yang Xiang (2022). Evaluating Intrusion Sensitivity Allocation with Supervised Learning in Collaborative Intrusion Detection. Concurrency and Computation: Practice and Experience, 34(16), Article e5957. https://doi.org/10.1002/cpe.5957
Wenjuan Li, Lishan Ke, Weizhi Meng, and Jinguang Han (2022). An Empirical Study of Supervised Email Classification in Internet of Things: Practical Performance and Key Influencing Factors. International Journal of Intelligent Systems, 37(1), 287-304. https://doi.org/10.1002/int.22625
Wenjuan Li, Weizhi Meng, and Lam For Kwok (2022). Surveying Trust-based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Communications Surveys & Tutorials, 24(1), 280-305. https://doi.org/10.1109/COMST.2021.3139052
Wenjuan Li, Yu Wang, Jiao Tan, and Nan Zhu (2022). DCUS: Evaluating Double-Click-based Unlocking Scheme on Smartphones. Mobile Networks and Applications, 27, 382-391. https://doi.org/10.1007/s11036-021-01842-1
Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, and Chunhua Su (2022). BlockCSDN: Towards Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. IEICE Transactions on Information and Systems, E105–D(2), 272-279. https://doi.org/10.1587/transinf.2021BCP0013
Wenjuan Li, Yu Wang, and Jin Li (2022). Enhancing Blockchain-based Filtration Mechanism via IPFS for Collaborative Intrusion Detection in IoT Networks. Journal of Systems Architecture, 127, Article 102510. https://doi.org/10.1016/j.sysarc.2022.102510
Chunhui Wu and Wenjuan Li (2021). Enhancing Intrusion Detection with Feature Selection and Neural Network. International Journal of Intelligent Systems, 36(7), 3087-3105. https://doi.org/10.1002/int.22397
Junjie Huang, Liang Tan, Wenjuan Li, and Keping Yu (2021). RON-Enhanced Blockchain Propagation Mechanism for Edge-Enabled Smart Cites. Journal of Information Security and Applications, 61, Article 102936. https://doi.org/10.1016/j.jisa.2021.102936
Na Shi, Liang Tan, Wenjuan Li, Xin Qi, Keping Yu (2021). A Blockchain-Empowered AAA Scheme in the Large-Scale HetNet. Digital Communications and Networks, 7(3), 308-316. https://doi.org/10.1016/j.dcan.2020.10.002
Weizhi Meng, Wenjuan Li, and Jianying Zhou (2021). Enhancing the Security of Blockchain-based Software Defined Networking through Trust-based Traffic Fusion and Filtration. Information Fusion, 70, 60-71. https://doi.org/10.1016/j.inffus.2020.12.006
Wenjuan Li, Man Ho Au and Yu Wang (2021). A Fog-based Collaborative Intrusion Detection Framework for Smart Grid. International Journal of Network Management, 31(2), Article e2107. https://doi.org/10.1002/nem.2107
Wenjuan Li, Weizhi Meng, and Steven Furnell (2021). Exploring Touch-based Behavioral Authentication on Smartphone Email Applications in IoT-enabled Smart Cities. Pattern Recognition Letters, 144, 35-41. https://doi.org/10.1016/j.patrec.2021.01.019
Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au (2021). Toward A Blockchain-based Framework for Challenge-based Collaborative Intrusion Detection. International Journal of Information Security, 20, 127-139. https://doi.org/10.1007/s10207-020-00488-6
Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang (2021). Challenge-based Collaborative Intrusion Detection in Software Defined Networking: An Evaluation. Digital Communications and Networks, 7(2), 257-263. https://doi.org/10.1016/j.dcan.2020.09.003
Tan Liang, Huan Xiao, Xinglin Shang, Yong Wang, Feng Ding and Wenjuan Li (2020). A Blockchain-based Trusted Service Mechanism for Crowdsourcing System. Proceedings of 2020 IEEE 91st Vehicular Technology Conference, VTC Spring 2020, Article 9128425. https://doi.org/10.1109/VTC2020-Spring48590.2020.9128425
Weizhi Meng, Wenjuan Li, Liqiu Zhu (2020). Enhancing Medical Smartphone Networks via Blockchain-based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management, 67(4), 1377-1386. https://doi.org/10.1109/TEM.2019.2921736
Weizhi Meng, Wenjuan Li, Steven Tug, and Jiao Tan (2020). Towards Blockchain-enabled Single Character Frequency-Based Exclusive Signature Matching in IoT-assisted Smart Cities. Journal of Parallel and Distributed Computing, 144, 268-277. https://doi.org/10.1016/j.jpdc.2020.05.013
Weizhi Meng, Wenjuan Li, Yu Wang, and Man Ho Au (2020). Detecting Insider Attacks in Medical Cyber-Physical Networks based on Behavioral Profiling. Future Generation Computer Systems, 108, 1258-1266. https://doi.org/10.1016/j.future.2018.06.007
Wenjuan Li, Jiao Tan, Weizhi Meng, and Yu Wang (2020). A Swipe-based Unlocking Mechanism with Supervised Learning on Smartphones: Design and Evaluation. Journal of Network and Computer Applications, 165, Article 102687. https://doi.org/10.1016/j.jnca.2020.102687
Wenjuan Li, Weizhi Meng, Zhiqiang Liu, and Man Ho Au (2020). Towards Blockchain-based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, E103-D(2), 196-203. https://doi.org/10.1587/transinf.2019INI0002
Wenjuan Li, Weizhi Meng, and Man Ho Au (2020). Enhancing Collaborative Intrusion Detection via Disagreement-based Semi-Supervised Learning in IoT environments. Journal of Network and Computer Applications, 161, Article 102631. https://doi.org/10.1016/j.jnca.2020.102631
Wenjuan Li, Yu Wang, Jin Li, and Yang Xiang (2020). Toward Supervised Shape-based Behavioral Authentication on Smartphones. Journal of Information Security and Applications, 55, Article 102591. https://doi.org/10.1016/j.jisa.2020.102591
Wenjuan Li, Weizhi Meng, Zhiyuan Tan, and Yang Xiang (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002
u Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, and Hanxiao Xue (2019). Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurrency and Computation: Practice and Experience, 31(19), Article e5101. https://doi.org/10.1002/cpe.5101
Weizhi Meng, Liqiu Zhu, Wenjuan Li, Jinguang Han, Yan Li (2019). Enhancing the security of FinTech applications with map-based graphical password authentication. Future Generation Computer Systems, 101, 1018-1027. https://doi.org/10.1016/j.future.2019.07.038
Wenjuan Li, Lam For Kwok (2019). Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. Journal of Information Security and Applications, 47, 1-7. https://doi.org/10.1016/j.jisa.2019.03.019
Wenjuan Li, Steven Tug, Weizhi Meng, and Yu Wang (2019). Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Generation Computer Systems, 96, 481-489. https://doi.org/10.1016/j.future.2019.02.064
Weizhi Meng, Wenjuan Li, and Duncan S. Wong (2018). Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multimedia Tools and Applications, 77, 30167-30185. https://doi.org/10.1007/s11042-018-6094-2
Wenjuan Li, Weizhi Meng, Chunhua Su, Lam For Kwok (2018). Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems. IEEE Access, 6, 6530-6539. https://doi.org/10.1109/ACCESS.2018.2794685
Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Waixi Liu, Yang Xiang (2018). A fog-based privacy-preserving approach for distributed signature-based intrusion detection. Journal of Parallel and Distributed Computing, 122, 26-35. https://doi.org/10.1016/j.jpdc.2018.07.013
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip (2018). Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Cluster Computing, 21, 299-310. https://doi.org/10.1007/s10586-017-0955-8
Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou and Rongxing Lu (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, 7234-7243. https://doi.org/10.1109/ACCESS.2017.2772294
Weizhi Meng, Wenjuan Li, and Lam-For Kwok (2017). Towards effective trust-based packet filtering in collaborative network environments. IEEE Transactions on Network and Service Management, 14(1), 233-245. https://doi.org/10.1109/TNSM.2017.2664893
Weizhi Meng, Wenjuan Li and Lam-For Kwok (2017). Towards effective and robust list-based packet filter for signature-based network intrusion detection: An engineering approach. HKIE Transactions, 24(4), 204-215. https://doi.org/10.1080/1023697X.2017.1375437
Wenjuan Li, Weizhi Meng, and Lam For Kwok (2017). Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks. Future Internet, 10(1), Article 6. https://doi.org/10.3390/fi10010006
Weizhi Meng, Wenjuan Li, Lam-For Kwok and Kim-Kwang Raymond Choo (2016). Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Computers & Security, 65, 213-229. https://doi.org/10.1016/j.cose.2016.11.010
Weizhi Meng, Wenjuan Li, Yang Xiang and Kim-Kwang Raymond Choo (2016). A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. Journal of Network and Computer Applications, 78, 162-169. https://doi.org/10.1016/j.jnca.2016.11.012
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip (2016). Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. Journal of Network and Computer Applications, 77, 135-145. https://doi.org/10.1016/j.jnca.2016.09.014
Wenjuan Li, Weizhi Meng (2016). Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Information and Computer Security, 24(3), 265-276. https://doi.org/10.1108/ICS-12-2014-0077
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip (2016). MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. Computers & Security, 60, 177-192. https://doi.org/10.1016/j.cose.2016.04.007
Wenjuan Li, Weizhi Meng, and Lam-For Kwok (2016). A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. Journal of Network and Computer Applications, 68, 126-139. https://doi.org/10.1016/j.jnca.2016.04.011
Weizhi Meng, Wenjuan Li, and Lam-For Kwok (2015). Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Security and Communication Networks, 8(18), 3883-3895. https://doi.org/10.1002/sec.1307
Weizhi Meng, Wenjuan Li, and Lam-For Kwok (2014). EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers & Security, 43, 189-204. https://doi.org/10.1016/j.cose.2014.02.006
Weizhi Meng, Wenjuan Li, and Lam-For Kwok (2013). Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Computer Networks, 57(17), 3630-3640. https://doi.org/10.1016/j.comnet.2013.08.009

Conference Papers
Chen, T., Meng, W., & Li, W. (2024, December). User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics. [Paper presentation]. 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sanya, China. https://doi.org/10.1109/TrustCom63139.2024.00111
Jiapeng Wang, Zhihan Zheng, Kefan Qiu, Yuan Tan, Chen Liang, and Wenjuan Li (2024, December). A framework for BMC firmware vulnerability analysis and exploitation. Proceedings of IEEE Congress on Cybermatics 2024 IEEE International Conferences on Internet of Things, iThings 2024, IEEE Green Computing and Communications, GreenCom 2024, IEEE Cyber, Physical and Social Computing, CPSCom 2024, IEEE Smart Data, SmartData 2024 https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics62450.2024.00026
Krudsen, S., & Li, W. (2024, December). Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging. [Paper presentation]. 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sanya, China. https://doi.org/10.1109/TrustCom63139.2024.00365
Sahay, R., Meng, W., & Li, W. (2024, October). A Comparative Analysis of Phishing Tools: Features and Countermeasures. [Paper presentation]. The 19th International Conference on Information Security Practice and Experience (ISPEC 2024), Wuhan, China. https://doi.org/10.1007/978-981-97-9053-1_21
Fu, H.C., Li, W., & Wang, Y. (2024, April). PassFile: Graphical Password Authentication Based on File Browsing Records. 5th International Conference on Machine Learning for Cyber Security (ML4CS), Yanuca Island, Fiji. https://doi.org/10.1007/978-981-97-2458-1_3
Xue, B., Zhang, J., Chen, B., & Li, W. (2024, April). Tackling Non-IID for Federated Learning with Components Alignment. 5th International Conference on Machine Learning for Cyber Security (ML4CS), Yanuca Island, Fiji. https://doi.org/10.1007/978-981-97-2458-1_9
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li (2023). TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT. Proceedings of 2023 International Conference on Computing, Networking and Communications, ICNC 2023, Hawaii, USA. https://doi.org/10.1109/ICNC57223.2023.10074126
Wenjuan Li, Philip Rosenberg, Mads Glisby, and Michael Ha (2023). EnergyCIDN: Enhanced Energy-aware Challenge-based Collaborative Intrusion Detection in Internet of Things. Algorithms and architectures for parallel processing: 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10–12, 2022, proceedings, Copenhagen, Denmark. https://doi.org/10.1007/978-3-031-22677-9_16
Xinyuan Qin and Wenjuan Li (2023). A Graphical Password Scheme based on Rounded Image Selection. Science of cyber security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, proceedings, Melbourne, Australia. https://doi.org/10.1007/978-3-031-45933-7_6
Wu, J., Chiu, W.-Y., Liu, P., Meng, W., & Li, W. (2023, December). The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. 21st IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Wuhan, China. https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00070
Thomas Gleerup, Wenjuan Li, Jiao Tan and Yu Wang (2022). ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices. Science of cyber security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, revised selected papers, Matsue, Japan. https://doi.org/10.1007/978-3-031-17551-0_16
Wei-Yang Chiu, Weizhi Meng, Wenjuan Li and Limin Fang (2022). FolketID: A Decentralized Blockchain-based NemID Alternative against DDoS Attacks. Provable and practical security: 16th International Conference, ProvSec 2022, Nanjing, China, November 11–12, 2022, proceedings, Nanjing, China. https://doi.org/10.1007/978-3-031-20917-8_15
Wenjuan Li, Jiao Tan and Nan Zhu (2022). Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones. ICT systems security and privacy protection: 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13–15, 2022, proceedings, Copenhagen, Denmark. https://doi.org/10.1007/978-3-031-06975-8_24
Ye Li, Jiale Zhang, Junwu Zhu, and Wenjuan Li (2022). HBMD-FL: Heterogeneous Federated Learning Algorithm Based on Blockchain and Model Distillation. Emerging information security and applications: Third International Conference, EISA 2022, Wuhan, China, October 29–30, 2022, proceedings, Wuhan, China. https://doi.org/10.1007/978-3-031-23098-1_9
Yiming Sun, Weizhi Meng, and Wenjuan Li (2022). Designing In-Air Hand Gesture-based User Authentication System via Convex Hull. Proceedings of 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022 https://doi.org/10.1109/PST55820.2022.9851982
Yuanyuan Xie, Bing Chen, Jiale Zhang, and Wenjuan Li (2022). ALGANs: Enhancing membership inference attacks in federated learning with GANs and active learning. Proceedings of 2022 IEEE International Symposium on Product Compliance Engineering - Asia, ISPCE-ASIA 2022, Guangzhou, China. https://doi.org/10.1109/ISPCE-ASIA57917.2022.9971068
Li Wang, Weizhi Meng, and Wenjuan Li (2021). Towards DTW-based Unlock Scheme using Handwritten Graphics on Smartphones. Proceedings of 2021 17th International Conference on Mobility, Sensing and Networking, MSN 2021, Exeter, UK. https://doi.org/10.1109/MSN53354.2021.00078
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li (2021). I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-based Authentication. Security, privacy, and anonymity in computation, communication, and storage: 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, proceedings, Nanjing, China. https://doi.org/10.1007/978-3-030-68851-6_18
Wei-Yang Chiu, Weizhi Meng, and Wenjuan Li (2021). LibBlock - Towards Decentralized Library System based on Blockchain and IPFS. Proceedings of 2021 18th International Conference on Privacy, Security and Trust, PST 2021, Auckland, New Zealand. https://doi.org/10.1109/PST52912.2021.9647821
Wenjuan Li, Jiao Tan, Nan Zhu, and Yu Wang (2021). Designing Double-Click-based Unlocking Mechanism on Smartphones. Security, privacy, and anonymity in computation, communication, and storage: SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, proceedings, Nanjing, China. https://doi.org/10.1007/978-3-030-68884-4_47
Wenjuan Li, Weizhi Meng, Javier Parra Arnau, and Kim-Kwang Raymond Choo (2021). Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation. Proceedings of 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021, Fukushima, Japan. https://doi.org/10.1109/DSC49826.2021.9346232
Wenjuan Li, Weizhi Meng, Yu Wang and Jin Li (2021). Enhancing Blackslist-based Packet Filtration using Blockchain in Wireless Sensor Networks. Wireless algorithms, systems, and applications: 16th International Conference, WASA 2021, Nanjing, China, June 25–27, 2021, proceedings, part II, Nanjing, China. https://doi.org/10.1007/978-3-030-86130-8_49
Wenjuan Li, Weizhi Meng, and Laurence Yang (2021). Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. Proceedings of 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. https://doi.org/10.1109/TrustCom53373.2021.00034
Weizhi Meng, Wenjuan Li, Laurence T. Yang, and Peng Li (2020). Enhancing Challenge-based Collaborative Intrusion Detection Networks Against Insider Attacks using Blockchain. International Journal of Information Security https://doi.org/10.1007/s10207-019-00462-x
Wenjuan Li, Jiao Tan, and Yu Wang (2020). A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking. Network and system security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, proceedings, Melbourne, Australia. https://doi.org/10.1007/978-3-030-65745-1_15
Wenjuan Li, Weizhi Meng, and Hui Zhu (2020). Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China. https://doi.org/10.1109/TrustCom50675.2020.00158
Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, and Chunhua Su (2019). Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks. Computer Security – ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, proceedings, part I, Luxemburg. https://doi.org/10.1007/978-3-030-29959-0_24
Wenjuan Li, Weizhi Meng and Lam-For Kwok (2019, November). Evaluating intrusion sensitivity allocation with support vector machine for collaborative intrusion detection. Information security practice and experience: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, proceedings https://doi.org/10.1007/978-3-030-34339-2_26
Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, and Jing Li (2019, September). SwipeVLock: A supervised unlocking mechanism based on swipe behavior on smartphones. Machine learning for cyber security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, proceedings https://doi.org/10.1007/978-3-030-30619-9_11
Teng Zhou, Liang Liu, Haifeng Wang, Wenjuan Li, and Chong Jiang (2019, July). PassGrid: Towards graph-supplemented textual shoulder surfing resistant authentication. Security and privacy in social networks and big data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, revised selected papers https://doi.org/10.1007/978-981-15-0758-8_19
Weizhi Meng, Wenjuan Li, Lijun Jiang, and Jianying Zhou (2019, June). SocialAuth: Designing touch behavioral smartphone user authentication based on social networking applications. ICT systems security and privacy protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, proceedings https://doi.org/10.1007/978-3-030-22312-0_13
Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au (2019, June). Towards blockchained challenge-based collaborative intrusion detection. Applied cryptography and network security workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, proceedings https://doi.org/10.1007/978-3-030-29729-9_7
Madsen, D., Li, Wenjuan, Meng, Weizhi, & Wang, Yu (2018, November). Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA. Algorithms and architectures for parallel processing: 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, proceedings, part IV https://doi.org/10.1007/978-3-030-05063-4_36
Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, and Jin Li (2018, September). Towards securing challenge-based collaborative intrusion detection networks via message verification. Information security practice and experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, proceedings https://doi.org/10.1007/978-3-319-99807-7_19
Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li and Christian W. Probst (2018, July). Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. Information security and privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, proceedings https://doi.org/10.1007/978-3-319-93638-3_44
Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, and Rongxing Lu (2018, July). Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks. Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 https://doi.org/10.1109/TrustCom/BigDataSE.2018.00167
Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au (2017, December). Evaluating challenge-based trust mechanism in medical smartphone networks: An empirical study. Proceedings of 2017 IEEE Global Communications Conference, GLOBECOM 2017 https://doi.org/10.1109/GLOCOM.2017.8254002
Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au (2017, November). Harvesting smartphone privacy through enhanced juice filming charging attacks. Information security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, proceedings https://doi.org/10.1007/978-3-319-69659-1_16
Weizhi Meng, Yu Wang, Wenjuan Li, and Man Ho Au (2017, October). Detecting malicious nodes in medical smartphone networks through euclidean distance-based behavioral profiling. Cyberspace safety and security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, proceedings https://doi.org/10.1007/978-3-319-69471-9_12
Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li (2017, October). A privacy-preserving framework for collaborative intrusion detection networks through fog computing. Cyberspace safety and security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, proceedings https://doi.org/10.1007/978-3-319-69471-9_20
Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang and Jianying Zhou (2017, July). A pilot study of multiple password interference between text and map-based passwords. Applied cryptography and network security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, proceedings https://doi.org/10.1007/978-3-319-61204-1_8
Wenjuan Li, Weizhi Meng, and Lam-For Kwok (2017, May). SOOA: Exploring special on-off attacks on challenge-based collaborative intrusion detection networks. Green, pervasive, and cloud computing: 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, proceedings https://doi.org/10.1007/978-3-319-57186-7_30
Wenjuan Li, Weizhi Meng, Lam-For Kwok and Horace Ho Shing Ip (2016, September). PMFA: Toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. Network and system security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, proceedings, Taibei. https://doi.org/10.1007/978-3-319-46298-1_28
Weizhi Meng, Xiapu Luo, Wenjuan Li and Yan Li (2016, August). Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice. Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 https://doi.org/10.1109/TrustCom.2016.0176
Wenjuan Li, Lijun Jiang, Weizhi Meng, and Lam-For Kwok (2016, July). Trust it or not? An empirical study of rating mechanism and its impact on smartphone malware propagation. Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, proceedings https://doi.org/10.1007/978-3-319-41354-9_11
Weizhi Meng, Wenjuan Li, Duncan S. Wong and Jianying Zhou (2016, June). TMGuard: A touch movement-based security mechanism for screen unlock patterns on smartphones. Applied cryptography and network security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. proceedings https://doi.org/10.1007/978-3-319-39555-5_34
Weizhi Meng, Wenjuan Li, Lijun Jiang, and Liying Meng (2016, May). On multiple password interference of touch screen patterns and text passwords. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems https://doi.org/10.1145/2858036.2858547
Wenjuan Li and Weizhi Meng (2015, June). An empirical study on email classification using supervised machine learning in real environments. Proceedings of 2015 IEEE International Conference on Communications, ICC 2015 https://doi.org/10.1109/ICC.2015.7249515
Weizhi Meng, Wenjuan Li, and Lam-For Kwok (2014, October). An evaluation of single character frequency-based exclusive signature matching in distinct IDS environments. Information security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, proceedings https://doi.org/10.1007/978-3-319-13257-0_29
Wenjuan Li, Weizhi Meng, Zhiyuan Tan and Yang Xiang (2014, September). Towards designing an email classification system using multi-view based semi-supervised learning. Proceedings of 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 https://doi.org/10.1109/TrustCom.2014.26
Wenjuan Li, Weizhi Meng, and Lam-For Kwok (2014, July). Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. Trust management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, proceedings https://doi.org/10.1007/978-3-662-43813-8_5
Yuxin Meng, Wenjuan Li and Lam-For Kwok (2014, June). Enhancing email classification using data reduction and disagreement-based semi-supervised learning. Proceedings of 2014 IEEE International Conference on Communications, ICC 2014 https://doi.org/10.1109/ICC.2014.6883388
Yuxin Meng, Wenjuan Li and Lam-For Kwok (2013, November). Design of cloud-based parallel exclusive signature matching model in intrusion detection. Proceedings of 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 https://doi.org/10.1109/HPCC.and.EUC.2013.34
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2013, October). Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: Feasibility and challenges. Proceedings of 9th International Conference on Computational Intelligence and Security, CIS 2013 https://doi.org/10.1109/CIS.2013.115
Yuxin Meng, Wenjuan Li, Lam-For Kwok and Yang Xiang (2013, September). Towards designing privacy-preserving signature-based IDS as a service: A study and practice. Proceedings of 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013 https://doi.org/10.1109/INCoS.2013.35
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2013, August). Towards adaptive false alarm reduction using Cloud as a Service. Proceedings of 2013 8th International ICST Conference on Communications and Networking in China, CHINACOM 2013 https://doi.org/10.1109/ChinaCom.2013.6694633
Wenjuan Li and Yuxin Meng (2013, July). Improving the performance of neural networks with random forest in detecting network intrusions. Advances in Neural Networks- ISNN 2013: 10th International Symposium on Neural Networks, ISNN 2013, Dalian, China, July 4-6, 2013, proceedings, part II https://doi.org/10.1007/978-3-642-39068-5_74
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2013, July). Enhancing click-draw based graphical passwords using multi-touch on mobile phones. Security and privacy protection in information processing systems: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, proceedings https://doi.org/10.1007/978-3-642-39218-4_5
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2013, June). Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection. Network and system security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings https://doi.org/10.1007/978-3-642-38631-2_4
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2012, December). Intelligent alarm filter using knowledge-based alert verification in network intrusion detection. Foundations of intelligent systems: 20th International Symposium, ISMIS 2012, Macau, China, December 4-7, 2012, proceedings https://doi.org/10.1007/978-3-642-34624-8_14
Yuxin Meng, and Wenjuan Li (2012, October). Evaluating the effect of tolerance on click-draw based graphical password scheme. Information and communications security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, proceedings https://doi.org/10.1007/978-3-642-34129-8_32
Yuxin Meng, and Wenjuan Li (2012, October). Evaluating the effect of user guidelines on creating click-draw based graphical passwords. Proceeding of the 2012 ACM Research in Applied Computation Symposium, RACS 2012 https://doi.org/10.1145/2401603.2401673
Yuxin Meng, Lam-For Kwok, and Wenjuan Li (2012, September). Towards designing packet filter with a trust-based approach using Bayesian inference in network intrusion detection. Security and privacy in communication networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. revised selected papers https://doi.org/10.1007/978-3-642-36883-7_13
Yuxin Meng, and Wenjuan Li (2012, June). Adaptive character frequency-based exclusive signature matching scheme in distributed intrusion detection environment. Proceedings of The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012) and The 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2012) https://doi.org/10.1109/TrustCom.2012.65
Yuxin Meng, Wenjuan Li, and Lam-For Kwok (2012, May). Single character frequency-based exclusive signature matching scheme. Computer and Information science 2012 https://doi.org/10.1007/978-3-642-30454-5_5

Projects

Design of Robust AI-enabled Detection Systems in Internet of Things
This project aims to develop a blockchain-enabled system to help detect malicious events as well as unexpected data shared among different network nodes.
Project Start Year: 2024, Principal Investigator(s): LI, Wenjuan

 
Prizes and awards

Early-Career Award
It is a significant honor that validates past excellence and serves as a key that unlocks future opportunities, funding, and influence for the most promising talents in the blockchain ecosystem. This is a prestigious award given by a dedicated group of gloabl experts within IEEE to recognise a promising researcher or professional who has made noteworthy contributions to the field of Blockchain and DLT early in their career.
Date of receipt: /8/2025, Conferred by: IEEE TEMS TC on Blockchain and Distributed Ledger Technologies (DLT)
 
Best Paper Award
A Best Paper Award is a pretigious honor given by the organizers of an internaional conferencce to recognize the most outstanding scholarly paper presented at that event. It is a highly competitive accolade, as it is chosen from among all the papers accepted for presentation.
Date of receipt: /12/2024, Conferred by: The 27th IEEE International Conference on Computational Science and Engineering
 
Outstanding Paper Award
An Outstanding Paper Award in an international conference is a prestigious honor. It is a highly competitive accolade, as it is chosen from among all the appers accpeted for presentation.
Date of receipt: /12/2024, Conferred by: The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communication
 
IEEE ComSoc WICE (Women in Communications Engineering Committee) Early Achievement Award 2023
The WICE Early Achievement Award will be presented in each calendar year. A maximum of one award will be given per year. Its aim is to recognize members of IEEE ComSoc who have been involved with the Women in Communications Engineering Committee (WICE), have done outstanding technical work in the broad field of communications engineering and have achieved early career visibility in the field through research and service.
Date of receipt: /12/2023, Conferred by: IEEE ComSoc Women in Communications Engineering Committee