Follow
Wanpeng Li
Wanpeng Li
Lecturer (Assistant Professor) in Cyber Security, University of Aberdeen
Verified email at live.rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
A novel conformable fractional non-homogeneous grey model for forecasting carbon dioxide emissions of BRICS countries
W Wu, X Ma, Y Zhang, W Li, Y Wang
Science of the Total Environment 707, 135447, 2020
1642020
A novel Grey Bernoulli model for short-term natural gas consumption forecasting
W Wu, X Ma, B Zeng, W Lv, Y Wang, W Li
Applied Mathematical Modelling 84, 393-404, 2020
882020
Security issues in OAuth 2.0 SSO implementations
W Li, CJ Mitchell
International Conference on Information Security, 529-541, 2014
862014
Analysing the Security of Google’s implementation of OpenID Connect
W Li, CJ Mitchell
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
852016
Application of a new information priority accumulated grey model with time power to predict short-term wind turbine capacity
J Xia, X Ma, W Wu, B Huang, W Li
Journal of Cleaner Production 244, 118573, 2020
772020
Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order
Y Hu, X Ma, W Li, W Wu, D Tu
Computational and Applied Mathematics 39, 1-30, 2020
372020
Oauthguard: Protecting user security and privacy with oauth 2.0 and openid connect
W Li, CJ Mitchell, T Chen
Proceedings of the 5th ACM workshop on security standardisation research …, 2019
322019
Beyond cookie monster amnesia: Real world persistent online tracking
NM Al-Fannah, W Li, CJ Mitchell
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
302018
Not all browsers are created equal: Comparing web browser fingerprintability
NM Al-Fannah, W Li
Advances in Information and Computer Security: 12th International Workshop …, 2017
252017
User access privacy in OAuth 2.0 and OpenID connect
W Li, CJ Mitchell
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
192020
ICAS: Two-factor identity-concealed authentication scheme for remote-servers
MJ Hossain, C Xu, C Li, SMH Mahmud, X Zhang, W Li
Journal of Systems Architecture 117, 102077, 2021
152021
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect
W Li, CJ Mitchell, T Chen
arXiv preprint arXiv:1801.07983, 2018
142018
Forecasting short-term solar energy generation in Asia Pacific using a nonlinear grey Bernoulli model with time power term
W Wu, X Ma, B Zeng, Y Zhang, W Li
Energy & Environment 32 (5), 759-783, 2021
122021
An advanced quantum-resistant signature scheme for cloud based on eisenstein ring
F Wu, X Zhang, W Yao, Z Zheng, L Xiang, W Li
Computers, Materials and Continua, 2018
122018
Mitigating CSRF attacks on OAuth 2.0 Systems
W Li, CJ Mitchell, T Chen
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-5, 2018
92018
Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations
W Li, CJ Mitchell, T Chen
Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March …, 2018
92018
Keyword searchable encryption with fine-grained forward secrecy for internet of thing data
R Zhou, X Zhang, X Wang, G Yang, W Li
Algorithms and Architectures for Parallel Processing: 18th International …, 2018
82018
Industry herding in crypto assets
Y Zhao, N Liu, W Li
International Review of Financial Analysis 84, 102335, 2022
72022
Addressing threats to real-world identity management systems
W Li, CJ Mitchell
ISSE 2015: Highlights of the Information Security Solutions Europe 2015 …, 2015
62015
Threshold public key encryption scheme resilient against continual leakage without random oracles
X Zhang, C Xu, W Zhang, W Li
Frontiers of Computer Science 7, 955-968, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20