2009 |
55 | EE | Zutao Zhu,
Guan Wang,
Wenliang Du:
Deriving Private Information from Association Rule Mining Results.
ICDE 2009: 18-29 |
54 | EE | Wenliang Du,
David Eppstein,
Michael T. Goodrich,
George S. Lueker:
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem
CoRR abs/0904.3756: (2009) |
2008 |
53 | EE | Zhengli Huang,
Wenliang Du:
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining.
ICDE 2008: 705-714 |
52 | EE | Guan Wang,
Zutao Zhu,
Wenliang Du,
Zhouxuan Teng:
Inference Analysis in Privacy-Preserving Data Re-publishing.
ICDM 2008: 1079-1084 |
51 | EE | Sangwon Hyun,
Peng Ning,
An Liu,
Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks.
IPSN 2008: 445-456 |
50 | EE | Wenliang Du,
Zhouxuan Teng,
Zutao Zhu:
Privacy-MaxEnt: integrating background knowledge in privacy quantification.
SIGMOD Conference 2008: 459-472 |
49 | EE | Wenliang Du,
Ronghua Wang:
SEED: A Suite of Instructional Laboratories for Computer Security Education.
ACM Journal of Educational Resources in Computing 8(1): (2008) |
48 | EE | Donggang Liu,
Peng Ning,
An Liu,
Cliff Wang,
Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(4): (2008) |
47 | EE | Huseyin Polat,
Wenliang Du:
Privacy-preserving top-N recommendation on distributed data.
JASIST 59(7): 1093-1108 (2008) |
46 | EE | Peng Ning,
An Liu,
Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.
TOSN 4(1): (2008) |
45 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Group-based key predistribution for wireless sensor networks.
TOSN 4(2): (2008) |
2007 |
44 | EE | Ronghua Wang,
Wenliang Du,
Peng Ning:
Containing denial-of-service attacks in broadcast authentication in sensor networks.
MobiHoc 2007: 71-79 |
43 | EE | Zhouxuan Teng,
Wenliang Du:
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees.
PAKDD 2007: 296-307 |
42 | EE | Zhengli Huang,
Wenliang Du,
Zhouxuan Teng:
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining.
PKDD 2007: 487-497 |
41 | EE | Huseyin Polat,
Wenliang Du:
Effects of inconsistently masked data using RPT on CF with privacy.
SAC 2007: 649-653 |
40 | EE | Wenliang Du,
Zhouxuan Teng,
Ronghua Wang:
SEED: a suite of instructional laboratories for computer SEcurity EDucation.
SIGCSE 2007: 486-490 |
39 | EE | Shigang Chen,
Yong Tang,
Wenliang Du:
Stateful DDoS attacks and targeted filtering.
J. Network and Computer Applications 30(3): 823-840 (2007) |
2006 |
38 | EE | Zhouxuan Teng,
Wenliang Du:
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks.
ICDM 2006: 1091-1096 |
37 | EE | Huseyin Polat,
Wenliang Du:
Achieving Private Recommendations Using Randomized Response Techniques.
PAKDD 2006: 637-646 |
36 | EE | Abdulrahman Alarifi,
Wenliang Du:
Diversify sensor nodes to improve resilience against node compromise.
SASN 2006: 101-112 |
35 | EE | Wenliang Du,
Mingdong Shang,
Haizhi Xu:
A novel approach for computer security education using Minix instructional operating system.
Computers & Security 25(3): 190-200 (2006) |
34 | EE | Wenliang Du,
Jing Deng,
Yunghsiang S. Han,
Pramod K. Varshney:
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge.
IEEE Trans. Dependable Sec. Comput. 3(1): 62-77 (2006) |
33 | EE | Wenliang Du,
Lei Fang,
Peng Ning:
LAD: Localization anomaly detection for wireless sensor networks.
J. Parallel Distrib. Comput. 66(7): 874-886 (2006) |
2005 |
32 | | Vijay Atluri,
Peng Ning,
Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005
ACM 2005 |
31 | EE | Wenliang Du,
Michael T. Goodrich:
Searching for High-Value Rare Events with Uncheatable Grid Computing.
ACNS 2005: 122-137 |
30 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
ICDCS 2005: 609-619 |
29 | | Abdulrahman Alarifi,
Wenliang Du:
Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
ICWN 2005: 161-165 |
28 | EE | Lei Fang,
Wenliang Du,
Peng Ning:
A beacon-less location discovery scheme for wireless sensor networks.
INFOCOM 2005: 161-171 |
27 | EE | Wenliang Du,
Lei Fang,
Peng Ning:
LAD: Localization Anomaly Detection forWireless Sensor Networks.
IPDPS 2005 |
26 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Attack-resistant location estimation in sensor networks.
IPSN 2005: 99-106 |
25 | EE | Wenliang Du,
Ronghua Wang,
Peng Ning:
An efficient scheme for authenticating public keys in sensor networks.
MobiHoc 2005: 58-67 |
24 | EE | Huseyin Polat,
Wenliang Du:
Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data.
PKDD 2005: 651-658 |
23 | EE | Huseyin Polat,
Wenliang Du:
SVD-based collaborative filtering with privacy.
SAC 2005: 791-795 |
22 | EE | Zhengli Huang,
Wenliang Du,
Biao Chen:
Deriving Private Information from Randomized Data.
SIGMOD Conference 2005: 37-48 |
21 | EE | Huseyin Polat,
Wenliang Du:
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data.
Web Intelligence 2005: 725-731 |
20 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Group-based key pre-distribution in wireless sensor networks.
Workshop on Wireless Security 2005: 11-20 |
19 | EE | Wenliang Du,
Jing Deng,
Yunghsiang S. Han,
Pramod K. Varshney,
Jonathan Katz,
Aram Khalili:
A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005) |
18 | EE | Ninghui Li,
Wenliang Du,
Dan Boneh:
Oblivious signature-based envelope.
Distributed Computing 17(4): 293-302 (2005) |
2004 |
17 | EE | Haizhi Xu,
Wenliang Du,
Steve J. Chapin:
Detecting Exploit Code Execution in Loadable Kernel Modules.
ACSAC 2004: 101-110 |
16 | EE | Wenliang Du,
Jing Jia,
Manish Mangal,
Mummoorthy Murugesan:
Uncheatable Grid Computing.
ICDCS 2004: 4-11 |
15 | EE | Wenliang Du,
Jing Deng,
Yunghsiang S. Han,
Shigang Chen,
Pramod K. Varshney:
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
INFOCOM 2004 |
14 | EE | Haizhi Xu,
Wenliang Du,
Steve J. Chapin:
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.
RAID 2004: 21-38 |
13 | EE | Wenliang Du,
Yunghsiang S. Han,
Shigang Chen:
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification.
SDM 2004 |
2003 |
12 | EE | Wenliang Du,
Jing Deng,
Yunghsiang S. Han,
Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks.
ACM Conference on Computer and Communications Security 2003: 42-51 |
11 | EE | Huseyin Polat,
Wenliang Du:
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques.
ICDM 2003: 625-628 |
10 | EE | Wenliang Du,
Zhijun Zhan:
Using randomized response techniques for privacy-preserving data mining.
KDD 2003: 505-510 |
9 | EE | Ninghui Li,
Wenliang Du,
Dan Boneh:
Oblivious signature-based envelope.
PODC 2003: 182-189 |
8 | EE | Mikhail J. Atallah,
Florian Kerschbaum,
Wenliang Du:
Secure and private sequence comparisons.
WPES 2003: 39-44 |
2001 |
7 | EE | Wenliang Du,
Mikhail J. Atallah:
Privacy-Preserving Cooperative Statistical Analysis.
ACSAC 2001: 102-112 |
6 | EE | Wenliang Du,
Mikhail J. Atallah:
Privacy-Preserving Cooperative Scientific Computations.
CSFW 2001: 273-294 |
5 | EE | Wenliang Du,
Mikhail J. Atallah:
Secure multi-party computation problems and their applications: a review and open problems.
NSPW 2001: 13-22 |
4 | EE | Mikhail J. Atallah,
Wenliang Du:
Secure Multi-party Computational Geometry.
WADS 2001: 165-179 |
2000 |
3 | EE | Wenliang Du,
Aditya P. Mathur:
Testing for Software Vulnerability Using Environment Perturbation.
DSN 2000: 603-612 |
1999 |
2 | EE | Wenliang Du,
Praerit Garg,
Aditya P. Mathur:
Security Relevancy Analysis on the Registry of Windows NT 4.0.
ACSAC 1999: 331-340 |
1996 |
1 | | Yi Deng,
Wenliang Du,
Paul C. Attie,
Michael Evangelist:
A Formalism for Architectural Modeling of Distributed Real-Time Systems.
SEKE 1996: 408-417 |