Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Lingyu Wang
Author information
- Concordia University
Other persons with the same name
- Lingyu Wang 0002 — Nanyang Technological University, Singapore
- Lingyu Wang 0003 — Chinese Academy of Science, Beijing, China
2010 – today
- 2013
[c47]Zhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang: Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614
[e3]Lingyu Wang, Basit Shafiq (Eds.): Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9- 2012
[j18]Yong Zeng, Lingyu Wang: Secure collaboration in design and supply chain management. Computers in Industry 63(6): 543-544 (2012)
[j17]Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker: Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry 63(6): 545-556 (2012)
[c46]Wen Ming Liu, Lingyu Wang: Privacy streamliner: a two-stage approach to improving algorithm efficiency. CODASPY 2012: 193-204
[c45]Wen Ming Liu, Lingyu Wang, Kui Ren, Pengsu Cheng, Mourad Debbabi: k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99
[c44]Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal: Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40- 2011
[j16]Da Yong Zhang, Yong Zeng, Lingyu Wang, Hongtao Li, Yuanfeng Geng: Modeling and evaluating information leakage caused by inferences in supply chains. Computers in Industry 62(3): 351-363 (2011)
[j15]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Sec. Comput. 8(1): 89-103 (2011)
[c43]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Mourad Debbabi: Privacy-preserving traffic padding in web-based applications. WPES 2011: 131-136- 2010
[j14]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring Security Risk of Networks Using Attack Graphs. IJNGC 1(1) (2010)
[j13]Bo Zhu, Kui Ren, Lingyu Wang, Mourad Debbabi: PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Security and Communication Networks 3(2-3): 167-184 (2010)
[j12]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang: Providing witness anonymity under peer-to-peer settings. IEEE Transactions on Information Forensics and Security 5(2): 324-336 (2010)
[j11]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang: Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010)
[c42]Pengsu Cheng, Lingyu Wang, Tao Long: Compressing Attack Graphs Through Reference Encoding. CIT 2010: 1026-1031
[c41]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153
[c40]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel: k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587
[c39]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199
[c38]Wen Ming Liu, Lingyu Wang, Lei Zhang: k-jump strategy for preserving privacy in micro-data disclosure. ICDT 2010: 104-115
[c37]Hamad Binsalleeh, Thomas Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang: On the analysis of the Zeus botnet crimeware toolkit. PST 2010: 31-38
[c36]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
[j10]Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009)
[j9]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electr. Notes Theor. Comput. Sci. 254: 143-160 (2009)
[j8]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009)
[j7]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: Usability of Security Specification Approaches for UML Design: A Survey. Journal of Object Technology 8(6): 102-122 (2009)
[c35]Yiming Wang, Lingyu Wang, Benjamin C. M. Fung: Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5
[c34]Serguei A. Mokhov, Jian Li, Lingyu Wang: Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5
[c33]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171
[c32]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi: An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222- 2008
[j6]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008)
[j5]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008)
[c31]Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9
[c30]
[c29]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30
[c28]Serguei A. Mokhov, Farid Rassai, Lee Wei Huynh, Lingyu Wang: The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 423-429
[c27]Serguei A. Mokhov, Lee Wei Huynh, Lingyu Wang: The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 449-455
[c26]Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697
[c25]Marcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703
[c24]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204
[c23]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296
[c22]Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363
[c21]Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51
[c20]Tania Islam, Lingyu Wang: A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5
[c19]
[c18]
[c17]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821
[c16]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612
[p2]Lingyu Wang, Sushil Jajodia: Security in Data Warehouses and OLAP Systems. Handbook of Database Security 2008: 191-212- 2007
[b1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180
[j4]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
[c15]Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193
[c14]Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54
[c13]Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112
[c12]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78
[p1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380- 2006
[j3]Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006)
[j2]Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006)
[c11]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132
[c10]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17- 2005
[c9]Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266- 2004
[j1]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
[c8]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
[c7]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
[e2]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.): Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. Kluwer 2004, ISBN 1-4020-8144-8
[e1]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.): Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. Kluwer 2004, ISBN 1-4020-8142-1- 2003
[c6]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115- 2002
[c5]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
[c4]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
[c3]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
[c2]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
[c1]Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:15 CEST by the dblp team



