The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wenliang Du: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenliang Du, Michael T. Goodrich
    Searching for High-Value Rare Events with Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:122-137 [Conf]
  2. Wenliang Du, Mikhail J. Atallah
    Privacy-Preserving Cooperative Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:102-112 [Conf]
  3. Wenliang Du, Praerit Garg, Aditya P. Mathur
    Security Relevancy Analysis on the Registry of Windows NT 4.0. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:331-340 [Conf]
  4. Haizhi Xu, Wenliang Du, Steve J. Chapin
    Detecting Exploit Code Execution in Loadable Kernel Modules. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:101-110 [Conf]
  5. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
    A pairwise key pre-distribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:42-51 [Conf]
  6. Wenliang Du, Mikhail J. Atallah
    Privacy-Preserving Cooperative Scientific Computations. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:273-294 [Conf]
  7. Wenliang Du, Aditya P. Mathur
    Testing for Software Vulnerability Using Environment Perturbation. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:603-612 [Conf]
  8. Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan
    Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:4-11 [Conf]
  9. Donggang Liu, Peng Ning, Wenliang Du
    Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:609-619 [Conf]
  10. Huseyin Polat, Wenliang Du
    Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:625-628 [Conf]
  11. Zhouxuan Teng, Wenliang Du
    Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:1091-1096 [Conf]
  12. Abdulrahman Alarifi, Wenliang Du
    Risk-Based Routing Protocol for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:161-165 [Conf]
  13. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney
    A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  14. Lei Fang, Wenliang Du, Peng Ning
    A beacon-less location discovery scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:161-171 [Conf]
  15. Wenliang Du, Lei Fang, Peng Ning
    LAD: Localization Anomaly Detection forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  16. Donggang Liu, Peng Ning, Wenliang Du
    Attack-resistant location estimation in sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:99-106 [Conf]
  17. Wenliang Du, Zhijun Zhan
    Using randomized response techniques for privacy-preserving data mining. [Citation Graph (0, 0)][DBLP]
    KDD, 2003, pp:505-510 [Conf]
  18. Wenliang Du, Ronghua Wang, Peng Ning
    An efficient scheme for authenticating public keys in sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:58-67 [Conf]
  19. Wenliang Du, Mikhail J. Atallah
    Secure multi-party computation problems and their applications: a review and open problems. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:13-22 [Conf]
  20. Huseyin Polat, Wenliang Du
    Achieving Private Recommendations Using Randomized Response Techniques. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2006, pp:637-646 [Conf]
  21. Huseyin Polat, Wenliang Du
    Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    PKDD, 2005, pp:651-658 [Conf]
  22. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:182-189 [Conf]
  23. Haizhi Xu, Wenliang Du, Steve J. Chapin
    Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:21-38 [Conf]
  24. Huseyin Polat, Wenliang Du
    SVD-based collaborative filtering with privacy. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:791-795 [Conf]
  25. Huseyin Polat, Wenliang Du
    Effects of inconsistently masked data using RPT on CF with privacy. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:649-653 [Conf]
  26. Abdulrahman Alarifi, Wenliang Du
    Diversify sensor nodes to improve resilience against node compromise. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:101-112 [Conf]
  27. Wenliang Du, Yunghsiang S. Han, Shigang Chen
    Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]
  28. Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist
    A Formalism for Architectural Modeling of Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    SEKE, 1996, pp:408-417 [Conf]
  29. Wenliang Du, Zhouxuan Teng, Ronghua Wang
    SEED: a suite of instructional laboratories for computer SEcurity EDucation. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:486-490 [Conf]
  30. Zhengli Huang, Wenliang Du, Biao Chen
    Deriving Private Information from Randomized Data. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2005, pp:37-48 [Conf]
  31. Mikhail J. Atallah, Wenliang Du
    Secure Multi-party Computational Geometry. [Citation Graph (0, 0)][DBLP]
    WADS, 2001, pp:165-179 [Conf]
  32. Huseyin Polat, Wenliang Du
    Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:725-731 [Conf]
  33. Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du
    Secure and private sequence comparisons. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:39-44 [Conf]
  34. Wenliang Du, Mingdong Shang, Haizhi Xu
    A novel approach for computer security education using Minix instructional operating system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:190-200 [Journal]
  35. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal]
  36. Wenliang Du, Lei Fang, Peng Ning
    LAD: Localization anomaly detection for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:7, pp:874-886 [Journal]
  37. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
    A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:62-77 [Journal]
  38. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili
    A pairwise key predistribution scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:228-258 [Journal]
  39. Zhouxuan Teng, Wenliang Du
    A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:296-307 [Conf]
  40. Zhengli Huang, Wenliang Du, Zhouxuan Teng
    Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    PKDD, 2007, pp:487-497 [Conf]
  41. Shigang Chen, Yong Tang, Wenliang Du
    Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal]

  42. Bureaucratic protocols for secure two-party sorting, selection, and permuting. [Citation Graph (, )][DBLP]


  43. K-anonymous association rule hiding. [Citation Graph (, )][DBLP]


  44. Understanding Privacy Risk of Publishing Decision Trees. [Citation Graph (, )][DBLP]


  45. ESCUDO: A Fine-Grained Protection Model for Web Browsers. [Citation Graph (, )][DBLP]


  46. OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. [Citation Graph (, )][DBLP]


  47. Deriving Private Information from Association Rule Mining Results. [Citation Graph (, )][DBLP]


  48. Inference Analysis in Privacy-Preserving Data Re-publishing. [Citation Graph (, )][DBLP]


  49. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  50. Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]


  51. Privacy-MaxEnt: integrating background knowledge in privacy quantification. [Citation Graph (, )][DBLP]


  52. On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. [Citation Graph (, )][DBLP]


  53. Group-based key pre-distribution in wireless sensor networks. [Citation Graph (, )][DBLP]


  54. On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002