Concordia University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
![]() | 2009 | |
---|---|---|
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Yiming Wang, Lingyu Wang, Benjamin C. M. Fung: Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Serguei A. Mokhov, Jian Li, Lingyu Wang: Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electr. Notes Theor. Comput. Sci. 254: 143-160 (2009) |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009) |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Usability of Security Specification Approaches for UML Design: A Survey. Journal of Object Technology 8(6): 102-122 (2009) |
2008 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Marcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Feng Chen, Lingyu Wang, Jinshu Su: An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Tania Islam, Lingyu Wang: A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Shuai Liu, Wei Li, Lingyu Wang: Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008) |
2007 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) |
2006 | ||
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006) |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006) |
2005 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 |
2004 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) |
2003 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 |
2002 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 |