


Остановите войну!
for scientists:
Wenting Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j26]Long Zhang
, Junxun Zhang, Yejun He
, Chun-Xu Mao
, Wenting Li, Sai-Wai Wong
, Peng Mei
, Steven Gao
:
A Single-Layer 10-30 GHz Reflectarray Antenna for the Internet of Vehicles. IEEE Trans. Veh. Technol. 71(2): 1480-1490 (2022) - 2021
- [j25]Frederik Armknecht, Jens-Matthias Bohli, Ghassan Karame
, Wenting Li
:
Outsourcing Proofs of Retrievability. IEEE Trans. Cloud Comput. 9(1): 286-301 (2021) - [j24]Wenting Li
, Haibo Cheng, Ping Wang
, Kaitai Liang
:
Practical Threshold Multi-Factor Authentication. IEEE Trans. Inf. Forensics Secur. 16: 3573-3588 (2021) - [j23]Wei He, Yejun He
, Long Zhang, Sai-Wai Wong, Wenting Li
, Amir Boag:
A Low-Profile Circularly Polarized Conical-Beam Antenna with Wide Overlap Bandwidth. Wirel. Commun. Mob. Comput. 2021: 6648887:1-6648887:11 (2021) - [c28]Yaling Chen, Long Zhang, Yejun He, Wenting Li, Sai-Wai Wong:
A Pattern Reconfigurable SIW Horn Antenna Realized by PIN Diode Switches. ComComAP 2021: 112-115 - [c27]Minqing Wang, Long Zhang, Xianting Xie, Yaling Chen, Wenting Li, Yejun He:
A Pattern Reconfigurable Antenna With Four Switchable Directional Beams Using Characteristic Mode Analysis. ComComAP 2021: 116-118 - [c26]Jinhua Huang, Wenting Li, Yejun He, Long Zhang, Sai-Wai Wong:
Optimization of Antenna Design Using the Artificial Neural Network and the Simulated Annealing Algorithm. ComComAP 2021: 119-122 - [c25]Wei Huang, Yejun He, Wenting Li, Long Zhang, Sai-Wai Wong, Zhi Zeng:
A Novel Base Station Antenna Operating in the 0.68-1 GHz Frequency Range. ComComAP 2021: 123-125 - [c24]Haibo Cheng, Wenting Li, Ping Wang, Kaitai Liang
:
Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction. ICASSP 2021: 2690-2694 - [c23]Yongyi Guo, Dominic Coey, Mikael Konutgan, Wenting Li, Chris Schoener, Matt Goldman:
Machine Learning for Variance Reduction in Online Experiments. NeurIPS 2021: 8637-8648 - [c22]Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
:
Regulating Storage Overhead in Existing PoW-based Blockchains. SACMAT 2021: 131-142 - [c21]Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. USENIX Security Symposium 2021: 857-874 - [c20]Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. USENIX Security Symposium 2021: 1289-1306 - [i13]Yongyi Guo, Dominic Coey, Mikael Konutgan, Wenting Li, Chris Schoener, Matt Goldman:
Machine Learning for Variance Reduction in Online Experiments. CoRR abs/2106.07263 (2021) - [i12]Wenting Li, Deepjyoti Deka:
Physics-Informed Graph Learning for Robust Fault Location in Distribution Systems. CoRR abs/2107.02275 (2021) - 2020
- [j22]Shangbing Gao, Wenting Li, Dajing Hao, Hui Wang, Jian Zhou:
Traffic incident detection based on the width characteristic of the moving object marker. Int. J. Inf. Commun. Technol. 16(4): 285-296 (2020) - [i11]Wenting Li, Deepjyoti Deka:
Physics Regulated Neural Network for High Impedance Faults Detection. CoRR abs/2008.02364 (2020) - [i10]Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts. CoRR abs/2010.00341 (2020)
2010 – 2019
- 2019
- [j21]Wenting Li, Ping Wang:
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. Future Gener. Comput. Syst. 101: 694-708 (2019) - [j20]Fuming Ye, Wenting Li, Ying Wang:
MC2ETS: 移动云计算中一种能效任务调度算法 (MC2ETS: An Energy-efficient Tasks Scheduling Algorithm in Mobile Cloud Computing). 计算机科学 46(6): 135-142 (2019) - [j19]Di Han
, Jianqing Li, Wenting Li, Ruibin Liu, Hai Chen:
An app usage recommender system: improving prediction accuracy for both warm and cold start users. Multim. Syst. 25(6): 603-616 (2019) - [j18]Jian Liu
, Wenting Li
, Ghassan O. Karame
, N. Asokan
:
Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing. IEEE Trans. Computers 68(1): 139-151 (2019) - [j17]Dan Dobre, Ghassan O. Karame
, Wenting Li
, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
Proofs of Writing for Robust Storage. IEEE Trans. Parallel Distributed Syst. 30(11): 2547-2566 (2019) - [j16]Dajun Du
, Xue Li
, Wenting Li
, Rui Chen, Minrui Fei, Lei Wu:
ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 49(8): 1698-1711 (2019) - [j15]Qi Luo
, Steven Gao, Wenting Li
, Mohammed Sobhy
, Ioanna Bakaimi, C. H. Kees de Groot
, Brian Hayden, Ian Reaney
, Xuexia Yang
:
Multibeam Dual-Circularly Polarized Reflectarray for Connected and Autonomous Vehicles. IEEE Trans. Veh. Technol. 68(4): 3574-3585 (2019) - [c19]Yiming Zhao, Wenting Li, Zijian Zhang, Ping Wang:
Password Expiration Strategy: A Perspective of Ecological Memory. BigDataService 2019: 167-172 - [c18]Wenting Li, Ping Wang:
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing. CSCloud/EdgeCom 2019: 157-162 - [c17]Wenting Li, Haibo Cheng, Ping Wang:
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. Cyber Security 2019: 1-8 - [c16]Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov:
ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud. EuroS&P 2019: 158-171 - [c15]Wenting Li, Shangbing Gao, Hong Zhou, Zihe Huang, Kewen Zhang, Wei Li:
The Automatic Text Classification Method Based on BERT and Feature Union. ICPADS 2019: 774-777 - [c14]Lihua Zhou, Minrui Fei, Dajun Du, Wenting Li, Huosheng Hu, Aleksandar Rakic
:
A Novel QGA-UKF Algorithm for Dynamic State Estimation of Power System. ISNN (1) 2019: 240-250 - [c13]Michael Rodler, Wenting Li
, Ghassan O. Karame, Lucas Davi:
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. NDSS 2019 - [c12]Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:
Probability Model Transforming Encoders Against Encoding Attacks. USENIX Security Symposium 2019: 1573-1590 - 2018
- [j14]Jian Liu, Wenting Li
, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. IEEE Secur. Priv. 16(3): 81-89 (2018) - [j13]Di Han
, Jianqing Li, Zihua Zeng, Xiaochen Yuan
, Wenting Li:
RegFrame: fast recognition of simple human actions on a stand-alone mobile device. Neural Comput. Appl. 30(9): 2787-2793 (2018) - [j12]Chenyu Wang
, Guoai Xu
, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. Secur. Commun. Networks 2018: 9062675:1-9062675:15 (2018) - [j11]Ding Wang
, Wenting Li, Ping Wang
:
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 14(9): 4081-4092 (2018) - [j10]Wenting Li
, Yaosheng Shen, Ping Wang:
Breaking Three Remote user Authentication Systems for Mobile Devices. J. Signal Process. Syst. 90(8-9): 1179-1190 (2018) - [j9]Wenting Li
, Bin Li, Yiming Zhao
, Ping Wang
, Fushan Wei:
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 8539674:1-8539674:11 (2018) - [c11]Wenting Li, Meng Wang:
Event Identification Using Extracted Features from High-dimensional Power System Data. ACSSC 2018: 1853-1857 - [c10]Zhengchao Fang, Wenting Li, Xianxiang Chen, Yan Han:
Image processing based on variable interval interpolation wavelet transform. ICIMCS 2018: 37:1-37:6 - [c9]Di Han, Jianqing Li, Wenting Li:
Predictor: an app cold start recommender system based on user similarity and app periodicity. ICIMCS 2018: 42:1-42:4 - [i9]Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov:
ReplicaTEE: Enabling Seamless Replication of SGX Enclaves in the Cloud. CoRR abs/1809.05027 (2018) - [i8]Wenting Li, Deepjyoti Deka, Michael Chertkov, Meng Wang:
Real-time Fault Localization in Power Grids With Convolutional Neural Networks. CoRR abs/1810.05247 (2018) - [i7]Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. CoRR abs/1812.05934 (2018) - [i6]Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson:
PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains. IACR Cryptol. ePrint Arch. 2018: 1135 (2018) - 2017
- [c8]Wenting Li, Sébastien Andreina, Jens-Matthias Bohli, Ghassan Karame:
Securing Proof-of-Stake Blockchain Protocols. DPM/CBT@ESORICS 2017: 297-315 - [i5]Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li:
Sharding PoW-based Blockchains via Proofs of Knowledge. IACR Cryptol. ePrint Arch. 2017: 1067 (2017) - 2016
- [j8]Manlin Fang, Jianqing Li
, Zhen Wang, Wenting Li:
Performance of Quantize-Map-Forward Based Cooperative Multicast Systems With Successive Relaying. IEEE Commun. Lett. 20(11): 2257-2260 (2016) - [j7]Wenting Li, Gu Xu
:
Unexpected Selectivity of UV Light Activated Metal-Oxide-Semiconductor Gas Sensors by Two Different Redox Processes. J. Sensors 2016: 4306154:1-4306154:6 (2016) - [j6]Xiang Ren, Weidong Ding, Zhaozhi Long, Wenting Li, Feng Li, Guan-Jun Zhang:
Uncertainty Evaluation of the Waveform Parameters of 1-kV Low-Impedance Impulse Voltage Calibrator. IEEE Trans. Instrum. Meas. 65(7): 1605-1613 (2016) - [c7]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. ICISSP 2016: 146-156 - [c6]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service. ICISSP (Revised Selected Papers) 2016: 148-168 - [i4]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Towards Fairness of Cryptocurrency Payments. CoRR abs/1609.07256 (2016) - [i3]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. CoRR abs/1612.04997 (2016) - 2015
- [c5]Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan:
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. ICICS 2015: 458-466 - [c4]Ghassan O. Karame, Wenting Li
:
Secure Erasure and Code Update in Legacy Sensors. TRUST 2015: 283-299 - 2014
- [j5]Ju-Min Zhao, Wenting Li, Deng-ao Li:
Identifying the Missing Tags in Categorized RFID Systems. Int. J. Distributed Sens. Networks 10 (2014) - [c3]Jens-Matthias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li
:
PrivLoc: Preventing Location Tracking in Geofencing Services. TRUST 2014: 143-160 - [i2]Jens-Matthias Bohli, Dan Dobre, Ghassan Karame, Wenting Li:
PrivLoc: Preventing Location Tracking in Geofencing Services. CoRR abs/1404.4744 (2014) - 2013
- [j4]Wei Li, Wenting Li, Fei Wang, Hongqing Zhang:
Differential invariants for Hirota-Ramani equation and Drinfel'd-Sokolov-Wilson system. Commun. Nonlinear Sci. Numer. Simul. 18(4): 888-894 (2013) - [c2]Dan Dobre, Ghassan Karame, Wenting Li
, Matthias Majuntke, Neeraj Suri
, Marko Vukolic:
PoWerStore: proofs of writing for efficient and robust storage. CCS 2013: 285-298 - 2012
- [j3]Wenting Li, Rui Wang, Linfu Bai, Zhangming Yan
, Zhirong Sun:
Cancer core modules identification through genomic and transcriptomic changes correlation detection at network level. BMC Syst. Biol. 6: 64 (2012) - [c1]Jens-Matthias Bohli, Wenting Li, Jan Seedorf:
Assisting Server for Secure Multi-Party Computation. WISTP 2012: 144-159 - [i1]Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic:
Proofs of Writing for Efficient and Robust Storage. CoRR abs/1212.3555 (2012)
2000 – 2009
- 2009
- [j2]Zhirong Sun, Jie Luo, Yun Zhou, Junjie Luo, Ke Liu, Wenting Li:
Exploring phenotype-associated modules in an oral cavity tumor using an integrated framework. Bioinform. 25(6): 795-800 (2009) - 2008
- [j1]Wenting Li, Hongqing Zhang:
Generalized multiple Riccati equations rational expansion method with symbolic computation to construct exact complexiton solutions of nonlinear partial differential equations. Appl. Math. Comput. 197(1): 288-296 (2008)
Coauthor Index
aka: Ghassan O. Karame

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-04 21:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint