Lingyu Wang Home Page Coauthor index DBLP Vis pubzone.org

Concordia University

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYiming Wang, Lingyu Wang, Benjamin C. M. Fung: Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSerguei A. Mokhov, Jian Li, Lingyu Wang: Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDjedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009)
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electr. Notes Theor. Comput. Sci. 254: 143-160 (2009)
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009)
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Usability of Security Specification Approaches for UML Design: A Survey. Journal of Object Technology 8(6): 102-122 (2009)
2008
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703
35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFeng Chen, Lingyu Wang, Jinshu Su: An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBenjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTania Islam, Lingyu Wang: A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShuai Liu, Wei Li, Lingyu Wang: Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNoman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008)
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008)
2007
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
2006
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006)
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006)
2005
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266
2004
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004
10no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
7no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
2003
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
2002
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170

Coauthor Index

1Claudio Bettini [40]
2Prabir Bhattacharya [19] [24] [25] [26]
3Alexander Brodsky [35] [44]
4Feng Chen [33]
5Frédéric Cuppens [10] [11]
6Mourad Debbabi [19] [24] [25] [26] [31] [39] [41] [43]
7Yves Deswarte [10] [11]
8Rachida Dssouli [37] [38]
9Marcel Frigault [28] [36]
10Benjamin C. M. Fung [31] [42] [46]
11Yuan Hong [37] [38]
12Patrick C. K. Hung [42]
13Tania Islam [30] [34]
14Sushil Jajodia [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [20] [21] [23] [28] [34] [35] [40] [44]
15Wei Li [27] [29]
16Yingjiu Li [1] [2] [5] [6] [17]
17Jian Li [45]
18Vitor Lima [39] [41] [43]
19Anyi Liu [12] [14]
20Qian Liu [37] [38]
21Shuai Liu [29]
22Tao Long [34]
23Shuo Lu [37] [38]
24Noman Mohammed [19] [24] [25] [26]
25Serguei A. Mokhov [45]
26Djedjiga Mouheb [39] [41] [43]
27Azzam Mourad [43]
28Steven Noel [13]
29Hadi Otrok [19] [24] [25] [26]
30Makan Pourzandi [39] [41] [43]
31Kui Ren [32]
32Anoop Singhal [16] [20] [21] [23] [28] [34]
33Jinshu Su [33]
34Chamseddine Talhi [39] [41] [43]
35Ke Wang [31] [42]
36Xiaoyang Sean Wang [5] [15] [40]
37Yiming Wang [46]
38Duminda Wijesekera [3] [4] [6] [7] [8] [9] [17] [18]
39Xuxin Xu [22]
40Chao Yao [15] [16] [23] [40]
41Amr M. Youssef [22]
42Lei Zhang [27] [35] [44]
43Bo Zhu [22] [27] [32]
44Sencun Zhu [2]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)