2009 | ||
---|---|---|
57 | Zutao Zhu, Guan Wang, Wenliang Du: Deriving Private Information from Association Rule Mining Results. ICDE 2009: 18-29 | |
56 | Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker: On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. WADS 2009: 242-253 | |
55 | Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker: On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem CoRR abs/0904.3756: (2009) | |
54 | Zhouxuan Teng, Wenliang Du: A hybrid multi-group approach for privacy-preserving data mining. Knowl. Inf. Syst. 19(2): 133-157 (2009) | |
2008 | ||
53 | Zhengli Huang, Wenliang Du: OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. ICDE 2008: 705-714 | |
52 | Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng: Inference Analysis in Privacy-Preserving Data Re-publishing. ICDM 2008: 1079-1084 | |
51 | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 | |
50 | Wenliang Du, Zhouxuan Teng, Zutao Zhu: Privacy-MaxEnt: integrating background knowledge in privacy quantification. SIGMOD Conference 2008: 459-472 | |
49 | Wenliang Du, Ronghua Wang: SEED: A Suite of Instructional Laboratories for Computer Security Education. ACM Journal of Educational Resources in Computing 8(1): (2008) | |
48 | Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) | |
47 | Huseyin Polat, Wenliang Du: Privacy-preserving top-N recommendation on distributed data. JASIST 59(7): 1093-1108 (2008) | |
46 | Peng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008) | |
45 | Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008) | |
2007 | ||
44 | Ronghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 | |
43 | Zhouxuan Teng, Wenliang Du: A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. PAKDD 2007: 296-307 | |
42 | Zhengli Huang, Wenliang Du, Zhouxuan Teng: Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. PKDD 2007: 487-497 | |
41 | Huseyin Polat, Wenliang Du: Effects of inconsistently masked data using RPT on CF with privacy. SAC 2007: 649-653 | |
40 | Wenliang Du, Zhouxuan Teng, Ronghua Wang: SEED: a suite of instructional laboratories for computer SEcurity EDucation. SIGCSE 2007: 486-490 | |
39 | Shigang Chen, Yong Tang, Wenliang Du: Stateful DDoS attacks and targeted filtering. J. Network and Computer Applications 30(3): 823-840 (2007) | |
2006 | ||
38 | Zhouxuan Teng, Wenliang Du: Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. ICDM 2006: 1091-1096 | |
37 | Huseyin Polat, Wenliang Du: Achieving Private Recommendations Using Randomized Response Techniques. PAKDD 2006: 637-646 | |
36 | Abdulrahman Alarifi, Wenliang Du: Diversify sensor nodes to improve resilience against node compromise. SASN 2006: 101-112 | |
35 | Wenliang Du, Mingdong Shang, Haizhi Xu: A novel approach for computer security education using Minix instructional operating system. Computers & Security 25(3): 190-200 (2006) | |
34 | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Dependable Sec. Comput. 3(1): 62-77 (2006) | |
33 | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006) | |
2005 | ||
32 | Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 | |
31 | Wenliang Du, Michael T. Goodrich: Searching for High-Value Rare Events with Uncheatable Grid Computing. ACNS 2005: 122-137 | |
30 | Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 | |
29 | Abdulrahman Alarifi, Wenliang Du: Risk-Based Routing Protocol for Wireless Ad-hoc Networks. ICWN 2005: 161-165 | |
28 | Lei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 | |
27 | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 | |
26 | Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 | |
25 | Wenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 | |
24 | Huseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. PKDD 2005: 651-658 | |
23 | Huseyin Polat, Wenliang Du: SVD-based collaborative filtering with privacy. SAC 2005: 791-795 | |
22 | Zhengli Huang, Wenliang Du, Biao Chen: Deriving Private Information from Randomized Data. SIGMOD Conference 2005: 37-48 | |
21 | Huseyin Polat, Wenliang Du: Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. Web Intelligence 2005: 725-731 | |
20 | Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 | |
19 | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005) | |
18 | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005) | |
2004 | ||
17 | Haizhi Xu, Wenliang Du, Steve J. Chapin: Detecting Exploit Code Execution in Loadable Kernel Modules. ACSAC 2004: 101-110 | |
16 | Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan: Uncheatable Grid Computing. ICDCS 2004: 4-11 | |
15 | Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004 | |
14 | Haizhi Xu, Wenliang Du, Steve J. Chapin: Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID 2004: 21-38 | |
13 | Wenliang Du, Yunghsiang S. Han, Shigang Chen: Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. SDM 2004 | |
2003 | ||
12 | Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Conference on Computer and Communications Security 2003: 42-51 | |
11 | Huseyin Polat, Wenliang Du: Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. ICDM 2003: 625-628 | |
10 | Wenliang Du, Zhijun Zhan: Using randomized response techniques for privacy-preserving data mining. KDD 2003: 505-510 | |
9 | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189 | |
8 | Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du: Secure and private sequence comparisons. WPES 2003: 39-44 | |
2001 | ||
7 | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-112 | |
6 | Wenliang Du, Mikhail J. Atallah: Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294 | |
5 | Wenliang Du, Mikhail J. Atallah: Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22 | |
4 | Mikhail J. Atallah, Wenliang Du: Secure Multi-party Computational Geometry. WADS 2001: 165-179 | |
2000 | ||
3 | Wenliang Du, Aditya P. Mathur: Testing for Software Vulnerability Using Environment Perturbation. DSN 2000: 603-612 | |
1999 | ||
2 | Wenliang Du, Praerit Garg, Aditya P. Mathur: Security Relevancy Analysis on the Registry of Windows NT 4.0. ACSAC 1999: 331-340 | |
1996 | ||
1 | Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist: A Formalism for Architectural Modeling of Distributed Real-Time Systems. SEKE 1996: 408-417 |