2008 | ||
---|---|---|
32 | EE | Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irun-Briz: Tupni: automatic reverse engineering of input formats. ACM Conference on Computer and Communications Security 2008: 391-402 |
31 | EE | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar: Characterizing Botnets from Email Spam Records. LEET 2008 |
2007 | ||
30 | EE | Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto: ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. IEEE Symposium on Security and Privacy 2007: 252-266 |
29 | EE | José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang: A Systematic Approach to Uncover Security Flaws in GUI Logic. IEEE Symposium on Security and Privacy 2007: 71-85 |
28 | EE | Tao Jiang, Helen J. Wang, Yih-Chun Hu: Preserving location privacy in wireless lans. MobiSys 2007: 246-257 |
27 | EE | Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo: Generic Application-Level Protocol Analyzer and its Language. NDSS 2007 |
26 | EE | Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson: Protection and communication abstractions for web browsers in MashupOS. SOSP 2007: 1-16 |
25 | EE | Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang: RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 |
24 | EE | Collin Jackson, Helen J. Wang: Subspace: secure cross-domain communication for web mashups. WWW 2007: 611-620 |
23 | EE | Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir: BrowserShield: Vulnerability-driven filtering of dynamic HTML. TWEB 1(3): (2007) |
2006 | ||
22 | EE | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch: SubVirt: Implementing malware with virtual machines. IEEE Symposium on Security and Privacy 2006: 314-327 |
21 | EE | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker: Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 |
20 | EE | Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir: BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. OSDI 2006: 61-74 |
2005 | ||
19 | EE | Qiang Huang, David Jao, Helen J. Wang: Applications of secure electronic voting to automated privacy-preserving troubleshooting. ACM Conference on Computer and Communications Security 2005: 68-80 |
18 | EE | Qiang Huang, Helen J. Wang, Nikita Borisov: Privacy-Preserving Friends Troubleshooting Network. NDSS 2005 |
17 | EE | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford: Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 |
2004 | ||
16 | EE | Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 |
15 | EE | Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou: Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming. IPTPS 2004: 54-63 |
14 | EE | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258 |
13 | EE | Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier: Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM 2004: 193-204 |
12 | EE | Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang: PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399 |
11 | EE | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004) |
2003 | ||
10 | EE | Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou: Resilient Peer-to-Peer Streaming. ICNP 2003: 16-27 |
9 | EE | Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony I. T. Rowstron, Marvin Theimer, Helen J. Wang, Alec Wolman: An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. INFOCOM 2003 |
8 | EE | Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang: Server-based Inference of Internet Link Lossiness. INFOCOM 2003 |
7 | EE | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang: STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172 |
2002 | ||
6 | EE | Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang: Passive network tomography using Bayesian inference. Internet Measurement Workshop 2002: 93-94 |
5 | EE | Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, Kunwadee Sripanidkulchai: Distributing streaming media content using cooperative networking. NOSSDAV 2002: 177-186 |
2001 | ||
4 | EE | Helen J. Wang, Randy H. Katz: Mobility support in unified communication networks. WOWMOM 2001: 95-102 |
2000 | ||
3 | EE | Helen J. Wang, Anthony D. Joseph, Randy H. Katz: A Signaling System Using Lightweight Call Sessions. INFOCOM 2000: 697-706 |
1999 | ||
2 | EE | Helen J. Wang, Randy H. Katz, Jochen Giese: Policy-Enabled Handoffs Across Heterogeneous Wireless Networks. WMCSA 1999: 51- |
1997 | ||
1 | EE | Joseph M. Hellerstein, Peter J. Haas, Helen J. Wang: Online Aggregation. SIGMOD Conference 1997: 171-182 |