2013
80Mediums: visual integrity preserving framework. Tongbo Luo, Xing Jin, Wenliang Du. CODASPY 2013, 309-316. Web SearchBibTeXDownload
2012
79Touchjacking Attacks on Web in Android, iOS, and Windows Phone. Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du. FPS 2012, 227-243. Web SearchBibTeXDownload
78Cooperative Key Generation in Wireless Networks. Lifeng Lai, Yingbin Liang, Wenliang Du. IEEE Journal on Selected Areas in Communications (30): 1578-1588 (2012). Web SearchBibTeXDownload
77Social Network Based Reputation Computation and Document Classification. JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin. J. UCS (18): 532-553 (2012). Web SearchBibTeXDownload
76SCUTA: a server-side access control system for web applications. Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj. SACMAT 2012, 71-82. Web SearchBibTeXDownload
75Containing bogus packet insertion attacks for broadcast authentication in sensor networks. Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning. TOSN (8): 20 (2012). Web SearchBibTeXDownload
2011
74Attacks on WebView in the Android system. Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin. ACSAC 2011, 343-352. Web SearchBibTeXDownload
73Automatic Reputation Computation through Document Analysis: A Social Network Approach. JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin. ASONAM 2011, 559-560. Web SearchBibTeXDownload
72Re-designing the Web's Access Control System - (Extended Abstract). Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu. DBSec 2011, 4-11. Web SearchBibTeXDownload
71SEED: Hands-On Lab Exercises for Computer Security Education. Wenliang Du. IEEE Security & Privacy (9): 70-73 (2011). Web SearchBibTeXDownload
70Secret sharing via noisy broadcast channels. Lifeng Lai, Yingbin Liang, Wenliang Du, Shlomo Shamai. ISIT 2011, 1955-1959. Web SearchBibTeXDownload
69Position paper: why are there so many vulnerabilities in web applications?. Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin. NSPW 2011, 83-94. Web SearchBibTeXDownload
68Contego: Capability-Based Access Control for Web Browsers - (Short Paper). Tongbo Luo, Wenliang Du. TRUST 2011, 231-238. Web SearchBibTeXDownload
67Cryptographic link signatures for spectrum usage authentication in cognitive radio. Xi Tan, Kapil Borle, Wenliang Du, Biao Chen. WISEC 2011, 79-90. Web SearchBibTeXDownload
2010
66Private predictions on hidden Markov models. Huseyin Polat, Wenliang Du, Sahin Renckes, Yusuf Oysal. Artif. Intell. Rev. (34): 53-72 (2010). Web SearchBibTeXDownload
65Bureaucratic protocols for secure two-party sorting, selection, and permuting. Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu. ASIACCS 2010, 226-237. Web SearchBibTeXDownload
64K-anonymous association rule hiding. Zutao Zhu, Wenliang Du. ASIACCS 2010, 305-309. Web SearchBibTeXDownload
63Understanding Privacy Risk of Publishing Decision Trees. Zutao Zhu, Wenliang Du. DBSec 2010, 33-48. Web SearchBibTeXDownload
62ESCUDO: A Fine-Grained Protection Model for Web Browsers. Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin. ICDCS 2010, 231-240. Web SearchBibTeXDownload
2009
61Deriving Private Information from Association Rule Mining Results. Zutao Zhu, Guan Wang, Wenliang Du. ICDE 2009, 18-29. Web SearchBibTeXDownload
60A hybrid multi-group approach for privacy-preserving data mining. Zhouxuan Teng, Wenliang Du. Knowl. Inf. Syst. (19): 133-157 (2009). Web SearchBibTeXDownload
59ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning. TOSN (6) (2009). Web SearchBibTeXDownload
58On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker. WADS 2009, 242-253. Web SearchBibTeXDownload
2008
57SEED: A Suite of Instructional Laboratories for Computer Security Education. Wenliang Du, Ronghua Wang. ACM Journal of Educational Resources in Computing (8) (2008). Web SearchBibTeXDownload
56Attack-Resistant Location Estimation in Wireless Sensor Networks. Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du. ACM Trans. Inf. Syst. Secur. (11) (2008). Web SearchBibTeXDownload
55OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. Zhengli Huang, Wenliang Du. ICDE 2008, 705-714. Web SearchBibTeXDownload
54Inference Analysis in Privacy-Preserving Data Re-publishing. Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng. ICDM 2008, 1079-1084. Web SearchBibTeXDownload
53Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. Sangwon Hyun, Peng Ning, An Liu, Wenliang Du. IPSN 2008, 445-456. Web SearchBibTeXDownload
52Privacy-preserving top-N recommendation on distributed data. Huseyin Polat, Wenliang Du. JASIST (59): 1093-1108 (2008). Web SearchBibTeXDownload
51Privacy-MaxEnt: integrating background knowledge in privacy quantification. Wenliang Du, Zhouxuan Teng, Zutao Zhu. SIGMOD Conference 2008, 459-472. Web SearchBibTeXDownload
50Group-based key predistribution for wireless sensor networks. Donggang Liu, Peng Ning, Wenliang Du. TOSN (4) (2008). Web SearchBibTeXDownload
49Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Peng Ning, An Liu, Wenliang Du. TOSN (4) (2008). Web SearchBibTeXDownload
2007
48Stateful DDoS attacks and targeted filtering. Shigang Chen, Yong Tang, Wenliang Du. J. Network and Computer Applications (30): 823-840 (2007). Web SearchBibTeXDownload
47Containing denial-of-service attacks in broadcast authentication in sensor networks. Ronghua Wang, Wenliang Du, Peng Ning. MobiHoc 2007, 71-79. Web SearchBibTeXDownload
46A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. Zhouxuan Teng, Wenliang Du. PAKDD 2007, 296-307. Web SearchBibTeXDownload
45Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. Zhengli Huang, Wenliang Du, Zhouxuan Teng. PKDD 2007, 487-497. Web SearchBibTeXDownload
44Effects of inconsistently masked data using RPT on CF with privacy. Huseyin Polat, Wenliang Du. SAC 2007, 649-653. Web SearchBibTeXDownload
43Secure and Resilient Localization in Wireless Sensor Networks. Peng Ning, Donggang Liu, Wenliang Du. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007, 161-184. Web SearchBibTeXDownload
42A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks. Lei Fang, Wenliang Du, Peng Ning. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007, 33-55. Web SearchBibTeXDownload
41SEED: a suite of instructional laboratories for computer SEcurity EDucation. Wenliang Du, Zhouxuan Teng, Ronghua Wang. SIGCSE 2007, 486-490. Web SearchBibTeXDownload
2006
40A novel approach for computer security education using Minix instructional operating system. Wenliang Du, Mingdong Shang, Haizhi Xu. Computers & Security (25): 190-200 (2006). Web SearchBibTeXDownload
39Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. Zhouxuan Teng, Wenliang Du. ICDM 2006, 1091-1096. Web SearchBibTeXDownload
38A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney. IEEE Trans. Dependable Sec. Comput. (3): 62-77 (2006). Web SearchBibTeXDownload
37LAD: Localization anomaly detection for wireless sensor networks. Wenliang Du, Lei Fang, Peng Ning. J. Parallel Distrib. Comput. (66): 874-886 (2006). Web SearchBibTeXDownload
36Achieving Private Recommendations Using Randomized Response Techniques. Huseyin Polat, Wenliang Du. PAKDD 2006, 637-646. Web SearchBibTeXDownload
35Diversify sensor nodes to improve resilience against node compromise. Abdulrahman Alarifi, Wenliang Du. SASN 2006, 101-112. Web SearchBibTeXDownload
2005
34A pairwise key predistribution scheme for wireless sensor networks. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili. ACM Trans. Inf. Syst. Secur. (8): 228-258 (2005). Web SearchBibTeXDownload
33Searching for High-Value Rare Events with Uncheatable Grid Computing. Wenliang Du, Michael T. Goodrich. ACNS 2005, 122-137. Web SearchBibTeXDownload
32Oblivious signature-based envelope. Ninghui Li, Wenliang Du, Dan Boneh. Distributed Computing (17): 293-302 (2005). Web SearchBibTeXDownload
31Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. Donggang Liu, Peng Ning, Wenliang Du. ICDCS 2005, 609-619. Web SearchBibTeXDownload
30Risk-Based Routing Protocol for Wireless Ad-hoc Networks. Abdulrahman Alarifi, Wenliang Du. ICWN 2005, 161-165. Web SearchBibTeX
29A beacon-less location discovery scheme for wireless sensor networks. Lei Fang, Wenliang Du, Peng Ning. INFOCOM 2005, 161-171. Web SearchBibTeXDownload
28LAD: Localization Anomaly Detection forWireless Sensor Networks. Wenliang Du, Lei Fang, Peng Ning. IPDPS 2005. Web SearchBibTeXDownload
27Attack-resistant location estimation in sensor networks. Donggang Liu, Peng Ning, Wenliang Du. IPSN 2005, 99-106. Web SearchBibTeXDownload
26An efficient scheme for authenticating public keys in sensor networks. Wenliang Du, Ronghua Wang, Peng Ning. MobiHoc 2005, 58-67. Web SearchBibTeXDownload
25Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. Huseyin Polat, Wenliang Du. PKDD 2005, 651-658. Web SearchBibTeXDownload
24SVD-based collaborative filtering with privacy. Huseyin Polat, Wenliang Du. SAC 2005, 791-795. Web SearchBibTeXDownload
23Deriving Private Information from Randomized Data. Zhengli Huang, Wenliang Du, Biao Chen. SIGMOD Conference 2005, 37-48. Web SearchBibTeXDownload
22Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. Huseyin Polat, Wenliang Du. Web Intelligence 2005, 725-731. Web SearchBibTeXDownload
21Group-based key pre-distribution in wireless sensor networks. Donggang Liu, Peng Ning, Wenliang Du. Workshop on Wireless Security 2005, 11-20. Web SearchBibTeXDownload
2004
20Detecting Exploit Code Execution in Loadable Kernel Modules. Haizhi Xu, Wenliang Du, Steve J. Chapin. ACSAC 2004, 101-110. Web SearchBibTeXDownload
19Uncheatable Grid Computing. Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan. ICDCS 2004, 4-11. Web SearchBibTeXDownload
18A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney. INFOCOM 2004. Web SearchBibTeXDownload
17Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. Haizhi Xu, Wenliang Du, Steve J. Chapin. RAID 2004, 21-38. Web SearchBibTeXDownload
16Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. Wenliang Du, Yunghsiang S. Han, Shigang Chen. SDM 2004. Web SearchBibTeXDownload
2003
15A pairwise key pre-distribution scheme for wireless sensor networks. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney. ACM Conference on Computer and Communications Security 2003, 42-51. Web SearchBibTeXDownload
14A witness-based approach for data fusion assurance in wireless sensor networks. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney. GLOBECOM 2003, 1435-1439. Web SearchBibTeXDownload
13Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. Huseyin Polat, Wenliang Du. ICDM 2003, 625-628. Web SearchBibTeXDownload
12Using randomized response techniques for privacy-preserving data mining. Wenliang Du, Zhijun Zhan. KDD 2003, 505-510. Web SearchBibTeXDownload
11Oblivious signature-based envelope. Ninghui Li, Wenliang Du, Dan Boneh. PODC 2003, 182-189. Web SearchBibTeXDownload
10Secure and private sequence comparisons. Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du. WPES 2003, 39-44. Web SearchBibTeXDownload
2002
9A practical approach to solve Secure Multi-party Computation problems. Wenliang Du, Zhijun Zhan. NSPW 2002, 127-135. Web SearchBibTeXDownload
2001
8Privacy-Preserving Cooperative Statistical Analysis. Wenliang Du, Mikhail J. Atallah. ACSAC 2001, 102-110. Web SearchBibTeXDownload
7Privacy-Preserving Cooperative Scientific Computations. Wenliang Du, Mikhail J. Atallah. CSFW 2001, 273-294. Web SearchBibTeXDownload
6Protocols for Secure Remote Database Access with Approximate Matching. Wenliang Du, Mikhail J. Atallah. E-Commerce Security and Privacy 2001, 87-111. Web SearchBibTeXDownload
5Secure multi-party computation problems and their applications: a review and open problems. Wenliang Du, Mikhail J. Atallah. NSPW 2001, 13-22. Web SearchBibTeXDownload
4Secure Multi-party Computational Geometry. Mikhail J. Atallah, Wenliang Du. WADS 2001, 165-179. Web SearchBibTeXDownload
2000
3Testing for Software Vulnerability Using Environment Perturbation. Wenliang Du, Aditya P. Mathur. DSN 2000, 603-612. Web SearchBibTeXDownload
1999
2Security Relevancy Analysis on the Registry of Windows NT 4.0. Wenliang Du, Praerit Garg, Aditya P. Mathur. ACSAC 1999, 331-338. Web SearchBibTeXDownload
1996
1A Formalism for Architectural Modeling of Distributed Real-Time Systems. Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist. SEKE 1996, 408-417. Web SearchBibTeX
from DBLP and Google Scholar
References
1. ^ The ACM SIGMOD/PODS Conference: Vancouver, 2008 - Program: Overview - Retrieved 2009-11-21 - details
Developed by the Database Group at the University of Wisconsin and Yahoo! Research