Concordia University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
46 | Yiming Wang, Lingyu Wang, Benjamin C. M. Fung: Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5 | |
45 | Serguei A. Mokhov, Jian Li, Lingyu Wang: Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5 | |
44 | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 | |
43 | Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 | |
42 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) | |
41 | Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electr. Notes Theor. Comput. Sci. 254: 143-160 (2009) | |
40 | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009) | |
39 | Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Usability of Security Specification Approaches for UML Design: A Survey. Journal of Object Technology 8(6): 102-122 (2009) | |
2008 | ||
38 | Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 | |
37 | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 | |
36 | Marcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 | |
35 | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 | |
34 | Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 | |
33 | Feng Chen, Lingyu Wang, Jinshu Su: An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212 | |
32 | Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 | |
31 | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 | |
30 | Tania Islam, Lingyu Wang: A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5 | |
29 | Shuai Liu, Wei Li, Lingyu Wang: Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5 | |
28 | Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30 | |
27 | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 | |
26 | Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 | |
25 | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 | |
24 | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008) | |
23 | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008) | |
2007 | ||
22 | Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 | |
21 | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 | |
20 | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54 | |
19 | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78 | |
18 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 | |
17 | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) | |
2006 | ||
16 | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 | |
15 | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 | |
14 | Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006) | |
13 | Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006) | |
2005 | ||
12 | Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 | |
2004 | ||
11 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
10 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
9 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 | |
8 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- | |
7 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
2003 | ||
6 | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 | |
2002 | ||
5 | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 | |
4 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
3 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 | |
2 | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 | |
1 | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 |