Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Donggang Liu
2010 – today
- 2013
[j13]Qi Dong, Donggang Liu, Peng Ning: Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Trans. Embedded Comput. Syst. 12(3): 73 (2013)
[c28]Xiaowei Mei, Donggang Liu, Kun Sun, Dingbang Xu: On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties. IPDPS 2013: 1112-1121- 2012
[j12]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang: SimFuzz: Test case similarity directed deep fuzzing. Journal of Systems and Software 85(1): 102-111 (2012)
[j11]Qi Dong, Donggang Liu: Using Auxiliary Sensors for Pairwise Key Establishment in WSN. ACM Trans. Embedded Comput. Syst. 11(3): 59 (2012)
[j10]Kiran Mehta, Donggang Liu, Matthew Wright: Protecting Location Privacy in Sensor Networks against a Global Eavesdropper. IEEE Trans. Mob. Comput. 11(2): 320-336 (2012)
[c27]Kartik Siddhabathula, Qi Dong, Donggang Liu, Matthew Wright: Fast jamming detection in sensor networks. ICC 2012: 934-938
[c26]Na Li, Mayank Raj, Donggang Liu, Matthew Wright, Sajal K. Das: Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks. ICDCN 2012: 309-324
[c25]Donggang Liu, Joshua Raymer, Andy Fox: Efficient and timely jamming detection in wireless sensor networks. MASS 2012: 335-343- 2011
[j9]Donggang Liu, Qi Dong: Hardening Embedded Networking Devices Against Side-Channel Attacks. Ad Hoc & Sensor Wireless Networks 12(1-2): 103-124 (2011)
[c24]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn: A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278
[r4]Donggang Liu: Broadcast Authentication from a Conditional Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 168-170
[r3]
[r2]Donggang Liu: Probabilistic Key Sharing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 978-980
[r1]Donggang Liu: Secure Localization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1119-1121- 2010
[j8]Donggang Liu: Efficient and distributed access control for sensor networks. Wireless Networks 16(8): 2151-2167 (2010)
[c23]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang: Detecting vulnerabilities in C programs using trace-based testing. DSN 2010: 241-250
[c22]Dazhi Zhang, Donggang Liu: DataGuard: Dynamic data attestation in wireless sensor networks. DSN 2010: 261-270
[c21]Qi Dong, Donggang Liu: Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. ICDCS 2010: 428-437
2000 – 2009
- 2009
[j7]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das: Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476-1488 (2009)
[c20]Donggang Liu: Protecting Neighbor Discovery Against Node Compromises in Sensor Networks. ICDCS 2009: 579-588
[c19]
[c18]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das: Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. PerCom Workshops 2009: 1-6
[c17]Qi Dong, Donggang Liu: Resilient Cluster Leader Election for Wireless Sensor Networks. SECON 2009: 1-9- 2008
[j6]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4) (2008)
[j5]Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2) (2008)
[c16]Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Chenho Kung: Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324
[c15]Qi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12- 2007
[b1]Donggang Liu, Peng Ning: Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209
[j4]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
[c14]
[c13]
[c12]Kiran Mehta, Donggang Liu, Matthew Wright: Location Privacy in Sensor Networks Against a Global Eavesdropper. ICNP 2007: 314-323
[c11]
[c10]Qi Dong, Donggang Liu: Using Auxiliary Sensors for Pairwise Key Establishment in WSN. Networking 2007: 251-262
[p1]Peng Ning, Donggang Liu, Wenliang Du: Secure and Resilient Localization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 161-184- 2006
[e1]Sencun Zhu, Donggang Liu (Eds.): Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-554-1- 2005
[j3]Donggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005)
[j2]
[c9]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
[c8]Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
[c7]Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
[c6]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
[c5]Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20- 2004
[j1]Donggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004)- 2003
[c4]Donggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61
[c3]Donggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240
[c2]
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:57 CEST by the dblp team



