dblp.uni-trier.dewww.uni-trier.de

Helen J. Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
32EEWeidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irun-Briz: Tupni: automatic reverse engineering of input formats. ACM Conference on Computer and Communications Security 2008: 391-402
31EELi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar: Characterizing Botnets from Email Spam Records. LEET 2008
2007
30EEWeidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto: ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. IEEE Symposium on Security and Privacy 2007: 252-266
29EEJosé Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang: A Systematic Approach to Uncover Security Flaws in GUI Logic. IEEE Symposium on Security and Privacy 2007: 71-85
28EETao Jiang, Helen J. Wang, Yih-Chun Hu: Preserving location privacy in wireless lans. MobiSys 2007: 246-257
27EENikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo: Generic Application-Level Protocol Analyzer and its Language. NDSS 2007
26EEHelen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson: Protection and communication abstractions for web browsers in MashupOS. SOSP 2007: 1-16
25EEXuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang: RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218
24EECollin Jackson, Helen J. Wang: Subspace: secure cross-domain communication for web mashups. WWW 2007: 611-620
23EECharles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir: BrowserShield: Vulnerability-driven filtering of dynamic HTML. TWEB 1(3): (2007)
2006
22EESamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch: SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy 2006: 314-327
21EEJustin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker: Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64
20EECharles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir: BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. OSDI 2006: 61-74
2005
19EEQiang Huang, David Jao, Helen J. Wang: Applications of secure electronic voting to automated privacy-preserving troubleshooting. ACM Conference on Computer and Communications Security 2005: 68-80
18EEQiang Huang, Helen J. Wang, Nikita Borisov: Privacy-Preserving Friends Troubleshooting Network. NDSS 2005
17EEXuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford: Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21
2004
16EEHelen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194
15EEVenkata N. Padmanabhan, Helen J. Wang, Philip A. Chou: Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming. IPTPS 2004: 54-63
14EEHelen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258
13EEHelen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier: Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM 2004: 193-204
12EEHelen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399
11EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004)
2003
10EEVenkata N. Padmanabhan, Helen J. Wang, Philip A. Chou: Resilient Peer-to-Peer Streaming. ICNP 2003: 16-27
9EEMiguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony I. T. Rowstron, Marvin Theimer, Helen J. Wang, Alec Wolman: An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. INFOCOM 2003
8EEVenkata N. Padmanabhan, Lili Qiu, Helen J. Wang: Server-based Inference of Internet Link Lossiness. INFOCOM 2003
7EEYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172
2002
6EEVenkata N. Padmanabhan, Lili Qiu, Helen J. Wang: Passive network tomography using Bayesian inference. Internet Measurement Workshop 2002: 93-94
5EEVenkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, Kunwadee Sripanidkulchai: Distributing streaming media content using cooperative networking. NOSSDAV 2002: 177-186
2001
4EEHelen J. Wang, Randy H. Katz: Mobility support in unified communication networks. WOWMOM 2001: 95-102
2000
3EEHelen J. Wang, Anthony D. Joseph, Randy H. Katz: A Signaling System Using Lightweight Call Sessions. INFOCOM 2000: 697-706
1999
2EEHelen J. Wang, Randy H. Katz, Jochen Giese: Policy-Enabled Handoffs Across Heterogeneous Wireless Networks. WMCSA 1999: 51-
1997
1EEJoseph M. Hellerstein, Peter J. Haas, Helen J. Wang: Online Aggregation. SIGMOD Conference 1997: 171-182

Coauthor Index

1Nikita Borisov [18] [27]
2David Brumley [27]
3Miguel Castro [9]
4Karl Chen [32]
5Peter M. Chen [22]
6Yu Chen [7] [11] [12] [14]
7Philip A. Chou [5] [10] [15]
8Weidong Cui [30] [32]
9Opher Dubrovsky [20] [23]
10John Dunagan [7] [11] [20] [21] [23] [27] [31]
11Saher Esmeir [20] [23]
12Xiaofeng Fan [26]
13Jochen Giese [2]
14Chuanxiong Guo [13] [27]
15Peter J. Haas [1]
16Joseph M. Hellerstein [1]
17Jon Howell [26]
18Yih-Chun Hu [16] [28]
19Qiang Huang [18] [19]
20Luis Irun-Briz [32]
21Collin Jackson [24] [26]
22David Jao [19]
23Tao Jiang [28]
24Xuxian Jiang [17] [25]
25Michael B. Jones [9]
26Anthony D. Joseph [3]
27Pallavi Joshi [27]
28Randy H. Katz [2] [3] [4]
29Anne-Marie Kermarrec [9]
30Samuel T. King [22]
31Michael E. Locasto [30]
32Jacob R. Lorch [22]
33Justin Ma [21]
34José Meseguer [29]
35Ivan Osipkov [31]
36Venkata N. Padmanabhan [5] [6] [8] [10] [15]
37Marcus Peinado [30] [32]
38John C. Platt [12] [14]
39Lili Qiu [6] [8]
40Charles Reis [20] [23]
41Antony I. T. Rowstron [9]
42Ralf Sasse [29]
43Stefan Savage [21]
44Daniel R. Simon [13] [31]
45Eugene H. Spafford [17]
46Kunwadee Sripanidkulchai [5]
47Marvin Theimer [9]
48J. Doug Tygar (J. D. Tygar) [31]
49Chad Verbowski [7] [11] [22]
50Geoffrey M. Voelker [21]
51Yi-Min Wang [7] [11] [12] [14] [16] [22] [25] [29]
52Alec Wolman [9]
53Dongyan Xu [17] [25]
54Chun Yuan [7] [11] [16]
55Ruyun Zhang [12] [14]
56Zheng Zhang [7] [11] [16]
57Li Zhuang [31]
58Alf Zugenmaier [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)