A novel conformable fractional non-homogeneous grey model for forecasting carbon dioxide emissions of BRICS countries W Wu, X Ma, Y Zhang, W Li, Y Wang Science of the Total Environment 707, 135447, 2020 | 166 | 2020 |
A novel Grey Bernoulli model for short-term natural gas consumption forecasting W Wu, X Ma, B Zeng, W Lv, Y Wang, W Li Applied Mathematical Modelling 84, 393-404, 2020 | 89 | 2020 |
Analysing the Security of Google’s implementation of OpenID Connect W Li, CJ Mitchell Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 86 | 2016 |
Security issues in OAuth 2.0 SSO implementations W Li, CJ Mitchell International Conference on Information Security, 529-541, 2014 | 86 | 2014 |
Application of a new information priority accumulated grey model with time power to predict short-term wind turbine capacity J Xia, X Ma, W Wu, B Huang, W Li Journal of Cleaner Production 244, 118573, 2020 | 78 | 2020 |
Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order Y Hu, X Ma, W Li, W Wu, D Tu Computational and Applied Mathematics 39, 1-30, 2020 | 37 | 2020 |
Oauthguard: Protecting user security and privacy with oauth 2.0 and openid connect W Li, CJ Mitchell, T Chen Proceedings of the 5th ACM workshop on security standardisation research …, 2019 | 32 | 2019 |
Beyond cookie monster amnesia: Real world persistent online tracking NM Al-Fannah, W Li, CJ Mitchell Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 30 | 2018 |
Not all browsers are created equal: Comparing web browser fingerprintability NM Al-Fannah, W Li Advances in Information and Computer Security: 12th International Workshop …, 2017 | 25 | 2017 |
User access privacy in OAuth 2.0 and OpenID connect W Li, CJ Mitchell 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 22 | 2020 |
ICAS: Two-factor identity-concealed authentication scheme for remote-servers MJ Hossain, C Xu, C Li, SMH Mahmud, X Zhang, W Li Journal of Systems Architecture 117, 102077, 2021 | 16 | 2021 |
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect W Li, CJ Mitchell, T Chen arXiv preprint arXiv:1801.07983, 2018 | 14 | 2018 |
Forecasting short-term solar energy generation in Asia Pacific using a nonlinear grey Bernoulli model with time power term W Wu, X Ma, B Zeng, Y Zhang, W Li Energy & Environment 32 (5), 759-783, 2021 | 12 | 2021 |
An advanced quantum-resistant signature scheme for cloud based on eisenstein ring F Wu, X Zhang, W Yao, Z Zheng, L Xiang, W Li Computers, Materials and Continua, 2018 | 12 | 2018 |
Mitigating CSRF attacks on OAuth 2.0 Systems W Li, CJ Mitchell, T Chen 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-5, 2018 | 10 | 2018 |
Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations W Li, CJ Mitchell, T Chen Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018 | 9 | 2018 |
Industry herding in crypto assets Y Zhao, N Liu, W Li International Review of Financial Analysis 84, 102335, 2022 | 8 | 2022 |
Keyword searchable encryption with fine-grained forward secrecy for internet of thing data R Zhou, X Zhang, X Wang, G Yang, W Li Algorithms and Architectures for Parallel Processing: 18th International …, 2018 | 8 | 2018 |
Addressing threats to real-world identity management systems W Li, CJ Mitchell ISSE 2015: Highlights of the Information Security Solutions Europe 2015 …, 2015 | 6 | 2015 |
Threshold public key encryption scheme resilient against continual leakage without random oracles X Zhang, C Xu, W Zhang, W Li Frontiers of Computer Science 7, 955-968, 2013 | 5 | 2013 |