![]() | 2009 | |
---|---|---|
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Zutao Zhu, Guan Wang, Wenliang Du: Deriving Private Information from Association Rule Mining Results. ICDE 2009: 18-29 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker: On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. WADS 2009: 242-253 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker: On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem CoRR abs/0904.3756: (2009) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhouxuan Teng, Wenliang Du: A hybrid multi-group approach for privacy-preserving data mining. Knowl. Inf. Syst. 19(2): 133-157 (2009) |
2008 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhengli Huang, Wenliang Du: OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. ICDE 2008: 705-714 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng: Inference Analysis in Privacy-Preserving Data Re-publishing. ICDM 2008: 1079-1084 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Zhouxuan Teng, Zutao Zhu: Privacy-MaxEnt: integrating background knowledge in privacy quantification. SIGMOD Conference 2008: 459-472 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Ronghua Wang: SEED: A Suite of Instructional Laboratories for Computer Security Education. ACM Journal of Educational Resources in Computing 8(1): (2008) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Privacy-preserving top-N recommendation on distributed data. JASIST 59(7): 1093-1108 (2008) |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008) |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008) |
2007 | ||
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ronghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhouxuan Teng, Wenliang Du: A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. PAKDD 2007: 296-307 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhengli Huang, Wenliang Du, Zhouxuan Teng: Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. PKDD 2007: 487-497 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Effects of inconsistently masked data using RPT on CF with privacy. SAC 2007: 649-653 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Zhouxuan Teng, Ronghua Wang: SEED: a suite of instructional laboratories for computer SEcurity EDucation. SIGCSE 2007: 486-490 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Shigang Chen, Yong Tang, Wenliang Du: Stateful DDoS attacks and targeted filtering. J. Network and Computer Applications 30(3): 823-840 (2007) |
2006 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhouxuan Teng, Wenliang Du: Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. ICDM 2006: 1091-1096 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Achieving Private Recommendations Using Randomized Response Techniques. PAKDD 2006: 637-646 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Abdulrahman Alarifi, Wenliang Du: Diversify sensor nodes to improve resilience against node compromise. SASN 2006: 101-112 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mingdong Shang, Haizhi Xu: A novel approach for computer security education using Minix instructional operating system. Computers & Security 25(3): 190-200 (2006) |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Dependable Sec. Comput. 3(1): 62-77 (2006) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006) |
2005 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Michael T. Goodrich: Searching for High-Value Rare Events with Uncheatable Grid Computing. ACNS 2005: 122-137 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Abdulrahman Alarifi, Wenliang Du: Risk-Based Routing Protocol for Wireless Ad-hoc Networks. ICWN 2005: 161-165 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. PKDD 2005: 651-658 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: SVD-based collaborative filtering with privacy. SAC 2005: 791-795 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhengli Huang, Wenliang Du, Biao Chen: Deriving Private Information from Randomized Data. SIGMOD Conference 2005: 37-48 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. Web Intelligence 2005: 725-731 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005) |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005) |
2004 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Haizhi Xu, Wenliang Du, Steve J. Chapin: Detecting Exploit Code Execution in Loadable Kernel Modules. ACSAC 2004: 101-110 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan: Uncheatable Grid Computing. ICDCS 2004: 4-11 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Haizhi Xu, Wenliang Du, Steve J. Chapin: Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID 2004: 21-38 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Yunghsiang S. Han, Shigang Chen: Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. SDM 2004 |
2003 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Conference on Computer and Communications Security 2003: 42-51 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Huseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. ICDM 2003: 625-628 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Zhijun Zhan: Using randomized response techniques for privacy-preserving data mining. KDD 2003: 505-510 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du: Secure and private sequence comparisons. WPES 2003: 39-44 |
2001 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-112 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Mikhail J. Atallah: Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Mikhail J. Atallah, Wenliang Du: Secure Multi-party Computational Geometry. WADS 2001: 165-179 |
2000 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Aditya P. Mathur: Testing for Software Vulnerability Using Environment Perturbation. DSN 2000: 603-612 |
1999 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Praerit Garg, Aditya P. Mathur: Security Relevancy Analysis on the Registry of Windows NT 4.0. ACSAC 1999: 331-340 |
1996 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist: A Formalism for Architectural Modeling of Distributed Real-Time Systems. SEKE 1996: 408-417 |