dblp.uni-trier.dewww.uni-trier.de

Wenliang Du

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
55EEZutao Zhu, Guan Wang, Wenliang Du: Deriving Private Information from Association Rule Mining Results. ICDE 2009: 18-29
54EEWenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker: On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem CoRR abs/0904.3756: (2009)
2008
53EEZhengli Huang, Wenliang Du: OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. ICDE 2008: 705-714
52EEGuan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng: Inference Analysis in Privacy-Preserving Data Re-publishing. ICDM 2008: 1079-1084
51EESangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456
50EEWenliang Du, Zhouxuan Teng, Zutao Zhu: Privacy-MaxEnt: integrating background knowledge in privacy quantification. SIGMOD Conference 2008: 459-472
49EEWenliang Du, Ronghua Wang: SEED: A Suite of Instructional Laboratories for Computer Security Education. ACM Journal of Educational Resources in Computing 8(1): (2008)
48EEDonggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
47EEHuseyin Polat, Wenliang Du: Privacy-preserving top-N recommendation on distributed data. JASIST 59(7): 1093-1108 (2008)
46EEPeng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008)
45EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008)
2007
44EERonghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79
43EEZhouxuan Teng, Wenliang Du: A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. PAKDD 2007: 296-307
42EEZhengli Huang, Wenliang Du, Zhouxuan Teng: Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. PKDD 2007: 487-497
41EEHuseyin Polat, Wenliang Du: Effects of inconsistently masked data using RPT on CF with privacy. SAC 2007: 649-653
40EEWenliang Du, Zhouxuan Teng, Ronghua Wang: SEED: a suite of instructional laboratories for computer SEcurity EDucation. SIGCSE 2007: 486-490
39EEShigang Chen, Yong Tang, Wenliang Du: Stateful DDoS attacks and targeted filtering. J. Network and Computer Applications 30(3): 823-840 (2007)
2006
38EEZhouxuan Teng, Wenliang Du: Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. ICDM 2006: 1091-1096
37EEHuseyin Polat, Wenliang Du: Achieving Private Recommendations Using Randomized Response Techniques. PAKDD 2006: 637-646
36EEAbdulrahman Alarifi, Wenliang Du: Diversify sensor nodes to improve resilience against node compromise. SASN 2006: 101-112
35EEWenliang Du, Mingdong Shang, Haizhi Xu: A novel approach for computer security education using Minix instructional operating system. Computers & Security 25(3): 190-200 (2006)
34EEWenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Dependable Sec. Comput. 3(1): 62-77 (2006)
33EEWenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006)
2005
32 Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005
31EEWenliang Du, Michael T. Goodrich: Searching for High-Value Rare Events with Uncheatable Grid Computing. ACNS 2005: 122-137
30EEDonggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
29 Abdulrahman Alarifi, Wenliang Du: Risk-Based Routing Protocol for Wireless Ad-hoc Networks. ICWN 2005: 161-165
28EELei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171
27EEWenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005
26EEDonggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
25EEWenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67
24EEHuseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. PKDD 2005: 651-658
23EEHuseyin Polat, Wenliang Du: SVD-based collaborative filtering with privacy. SAC 2005: 791-795
22EEZhengli Huang, Wenliang Du, Biao Chen: Deriving Private Information from Randomized Data. SIGMOD Conference 2005: 37-48
21EEHuseyin Polat, Wenliang Du: Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. Web Intelligence 2005: 725-731
20EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20
19EEWenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005)
18EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
2004
17EEHaizhi Xu, Wenliang Du, Steve J. Chapin: Detecting Exploit Code Execution in Loadable Kernel Modules. ACSAC 2004: 101-110
16EEWenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan: Uncheatable Grid Computing. ICDCS 2004: 4-11
15EEWenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004
14EEHaizhi Xu, Wenliang Du, Steve J. Chapin: Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID 2004: 21-38
13EEWenliang Du, Yunghsiang S. Han, Shigang Chen: Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. SDM 2004
2003
12EEWenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Conference on Computer and Communications Security 2003: 42-51
11EEHuseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. ICDM 2003: 625-628
10EEWenliang Du, Zhijun Zhan: Using randomized response techniques for privacy-preserving data mining. KDD 2003: 505-510
9EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189
8EEMikhail J. Atallah, Florian Kerschbaum, Wenliang Du: Secure and private sequence comparisons. WPES 2003: 39-44
2001
7EEWenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-112
6EEWenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294
5EEWenliang Du, Mikhail J. Atallah: Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22
4EEMikhail J. Atallah, Wenliang Du: Secure Multi-party Computational Geometry. WADS 2001: 165-179
2000
3EEWenliang Du, Aditya P. Mathur: Testing for Software Vulnerability Using Environment Perturbation. DSN 2000: 603-612
1999
2EEWenliang Du, Praerit Garg, Aditya P. Mathur: Security Relevancy Analysis on the Registry of Windows NT 4.0. ACSAC 1999: 331-340
1996
1 Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist: A Formalism for Architectural Modeling of Distributed Real-Time Systems. SEKE 1996: 408-417

Coauthor Index

1Abdulrahman Alarifi [29] [36]
2Mikhail J. Atallah [4] [5] [6] [7] [8]
3Vijayalakshmi Atluri (Vijay Atluri) [32]
4Paul C. Attie [1]
5Dan Boneh [9] [18]
6Steve J. Chapin [14] [17]
7Biao Chen [22]
8Shigang Chen [13] [15] [39]
9Jing Deng [12] [15] [19] [34]
10Yi Deng [1]
11David Eppstein [54]
12Michael Evangelist [1]
13Lei Fang [27] [28] [33]
14Praerit Garg [2]
15Michael T. Goodrich [31] [54]
16Yunghsiang S. Han [12] [13] [15] [19] [34]
17Zhengli Huang [22] [42] [53]
18Sangwon Hyun [51]
19Jing Jia [16]
20Jonathan Katz [19]
21Florian Kerschbaum [8]
22Aram Khalili [19]
23Ninghui Li [9] [18]
24An Liu [46] [48] [51]
25Donggang Liu [20] [26] [30] [45] [48]
26George S. Lueker [54]
27Manish Mangal [16]
28Aditya P. Mathur [2] [3]
29Mummoorthy Murugesan [16]
30Peng Ning [20] [25] [26] [27] [28] [30] [32] [33] [44] [45] [46] [48] [51]
31Huseyin Polat [11] [21] [23] [24] [37] [41] [47]
32Mingdong Shang [35]
33Yong Tang [39]
34Zhouxuan Teng [38] [40] [42] [43] [50] [52]
35Pramod K. Varshney [12] [15] [19] [34]
36Cliff Wang [48]
37Guan Wang [52] [55]
38Ronghua Wang [25] [40] [44] [49]
39Haizhi Xu [14] [17] [35]
40Zhijun Zhan [10]
41Zutao Zhu [50] [52] [55]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)