|
Search the dblp DataBase
Wenliang Du:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wenliang Du, Michael T. Goodrich
Searching for High-Value Rare Events with Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:122-137 [Conf]
- Wenliang Du, Mikhail J. Atallah
Privacy-Preserving Cooperative Statistical Analysis. [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:102-112 [Conf]
- Wenliang Du, Praerit Garg, Aditya P. Mathur
Security Relevancy Analysis on the Registry of Windows NT 4.0. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:331-340 [Conf]
- Haizhi Xu, Wenliang Du, Steve J. Chapin
Detecting Exploit Code Execution in Loadable Kernel Modules. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:101-110 [Conf]
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf]
- Wenliang Du, Mikhail J. Atallah
Privacy-Preserving Cooperative Scientific Computations. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:273-294 [Conf]
- Wenliang Du, Aditya P. Mathur
Testing for Software Vulnerability Using Environment Perturbation. [Citation Graph (0, 0)][DBLP] DSN, 2000, pp:603-612 [Conf]
- Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan
Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:4-11 [Conf]
- Donggang Liu, Peng Ning, Wenliang Du
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:609-619 [Conf]
- Huseyin Polat, Wenliang Du
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. [Citation Graph (0, 0)][DBLP] ICDM, 2003, pp:625-628 [Conf]
- Zhouxuan Teng, Wenliang Du
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. [Citation Graph (0, 0)][DBLP] ICDM, 2006, pp:1091-1096 [Conf]
- Abdulrahman Alarifi, Wenliang Du
Risk-Based Routing Protocol for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP] ICWN, 2005, pp:161-165 [Conf]
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP] INFOCOM, 2004, pp:- [Conf]
- Lei Fang, Wenliang Du, Peng Ning
A beacon-less location discovery scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2005, pp:161-171 [Conf]
- Wenliang Du, Lei Fang, Peng Ning
LAD: Localization Anomaly Detection forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IPDPS, 2005, pp:- [Conf]
- Donggang Liu, Peng Ning, Wenliang Du
Attack-resistant location estimation in sensor networks. [Citation Graph (0, 0)][DBLP] IPSN, 2005, pp:99-106 [Conf]
- Wenliang Du, Zhijun Zhan
Using randomized response techniques for privacy-preserving data mining. [Citation Graph (0, 0)][DBLP] KDD, 2003, pp:505-510 [Conf]
- Wenliang Du, Ronghua Wang, Peng Ning
An efficient scheme for authenticating public keys in sensor networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2005, pp:58-67 [Conf]
- Wenliang Du, Mikhail J. Atallah
Secure multi-party computation problems and their applications: a review and open problems. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:13-22 [Conf]
- Huseyin Polat, Wenliang Du
Achieving Private Recommendations Using Randomized Response Techniques. [Citation Graph (0, 0)][DBLP] PAKDD, 2006, pp:637-646 [Conf]
- Huseyin Polat, Wenliang Du
Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP] PKDD, 2005, pp:651-658 [Conf]
- Ninghui Li, Wenliang Du, Dan Boneh
Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP] PODC, 2003, pp:182-189 [Conf]
- Haizhi Xu, Wenliang Du, Steve J. Chapin
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:21-38 [Conf]
- Huseyin Polat, Wenliang Du
SVD-based collaborative filtering with privacy. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:791-795 [Conf]
- Huseyin Polat, Wenliang Du
Effects of inconsistently masked data using RPT on CF with privacy. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:649-653 [Conf]
- Abdulrahman Alarifi, Wenliang Du
Diversify sensor nodes to improve resilience against node compromise. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:101-112 [Conf]
- Wenliang Du, Yunghsiang S. Han, Shigang Chen
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. [Citation Graph (0, 0)][DBLP] SDM, 2004, pp:- [Conf]
- Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist
A Formalism for Architectural Modeling of Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP] SEKE, 1996, pp:408-417 [Conf]
- Wenliang Du, Zhouxuan Teng, Ronghua Wang
SEED: a suite of instructional laboratories for computer SEcurity EDucation. [Citation Graph (0, 0)][DBLP] SIGCSE, 2007, pp:486-490 [Conf]
- Zhengli Huang, Wenliang Du, Biao Chen
Deriving Private Information from Randomized Data. [Citation Graph (0, 0)][DBLP] SIGMOD Conference, 2005, pp:37-48 [Conf]
- Mikhail J. Atallah, Wenliang Du
Secure Multi-party Computational Geometry. [Citation Graph (0, 0)][DBLP] WADS, 2001, pp:165-179 [Conf]
- Huseyin Polat, Wenliang Du
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP] Web Intelligence, 2005, pp:725-731 [Conf]
- Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du
Secure and private sequence comparisons. [Citation Graph (0, 0)][DBLP] WPES, 2003, pp:39-44 [Conf]
- Wenliang Du, Mingdong Shang, Haizhi Xu
A novel approach for computer security education using Minix instructional operating system. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:190-200 [Journal]
- Ninghui Li, Wenliang Du, Dan Boneh
Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal]
- Wenliang Du, Lei Fang, Peng Ning
LAD: Localization anomaly detection for wireless sensor networks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2006, v:66, n:7, pp:874-886 [Journal]
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:62-77 [Journal]
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili
A pairwise key predistribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:228-258 [Journal]
- Zhouxuan Teng, Wenliang Du
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. [Citation Graph (0, 0)][DBLP] PAKDD, 2007, pp:296-307 [Conf]
- Zhengli Huang, Wenliang Du, Zhouxuan Teng
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. [Citation Graph (0, 0)][DBLP] PKDD, 2007, pp:487-497 [Conf]
- Shigang Chen, Yong Tang, Wenliang Du
Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP] J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal]
Bureaucratic protocols for secure two-party sorting, selection, and permuting. [Citation Graph (, )][DBLP]
K-anonymous association rule hiding. [Citation Graph (, )][DBLP]
Understanding Privacy Risk of Publishing Decision Trees. [Citation Graph (, )][DBLP]
ESCUDO: A Fine-Grained Protection Model for Web Browsers. [Citation Graph (, )][DBLP]
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. [Citation Graph (, )][DBLP]
Deriving Private Information from Association Rule Mining Results. [Citation Graph (, )][DBLP]
Inference Analysis in Privacy-Preserving Data Re-publishing. [Citation Graph (, )][DBLP]
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]
Privacy-MaxEnt: integrating background knowledge in privacy quantification. [Citation Graph (, )][DBLP]
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. [Citation Graph (, )][DBLP]
Group-based key pre-distribution in wireless sensor networks. [Citation Graph (, )][DBLP]
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem [Citation Graph (, )][DBLP]
Search in 0.039secs, Finished in 0.041secs
|