default search action
Wenliang Du
Person information
- affiliation: Syracuse University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2001
- [b1]Wenliang Du:
A study of several specific secure two -party computation problems. Purdue University, USA, 2001
Journal Articles
- 2015
- [j21]Jelena Mirkovic, Melissa Dark, Wenliang Du, Giovanni Vigna, Tamara Denning:
Evaluating Cybersecurity Education Interventions: Three Case Studies. IEEE Secur. Priv. 13(3): 63-69 (2015) - [j20]Kapil M. Borle, Biao Chen, Wenliang Du:
Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation. IEEE Trans. Inf. Forensics Secur. 10(10): 2225-2235 (2015) - 2012
- [j19]Lifeng Lai, Yingbin Liang, Wenliang Du:
Cooperative Key Generation in Wireless Networks. IEEE J. Sel. Areas Commun. 30(8): 1578-1588 (2012) - [j18]JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin:
Social Network Based Reputation Computation and Document Classification. J. Univers. Comput. Sci. 18(4): 532-553 (2012) - [j17]Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning:
Containing bogus packet insertion attacks for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 8(3): 20:1-20:30 (2012) - 2011
- [j16]Wenliang Du:
SEED: Hands-On Lab Exercises for Computer Security Education. IEEE Secur. Priv. 9(5): 70-73 (2011) - 2010
- [j15]Huseyin Polat, Wenliang Du, Sahin Renckes, Yusuf Oysal:
Private predictions on hidden Markov models. Artif. Intell. Rev. 34(1): 53-72 (2010) - 2009
- [j14]Zhouxuan Teng, Wenliang Du:
A hybrid multi-group approach for privacy-preserving data mining. Knowl. Inf. Syst. 19(2): 133-157 (2009) - [j13]Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning:
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 6(1): 9:1-9:29 (2009) - 2008
- [j12]Huseyin Polat, Wenliang Du:
Privacy-preserving top-N recommendation on distributed data. J. Assoc. Inf. Sci. Technol. 59(7): 1093-1108 (2008) - [j11]Wenliang Du, Ronghua Wang:
SEED: A Suite of Instructional Laboratories for Computer Security Education. ACM J. Educ. Resour. Comput. 8(1): 3:1-3:24 (2008) - [j10]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [j9]Peng Ning, An Liu, Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Networks 4(1): 1:1-1:35 (2008) - [j8]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key predistribution for wireless sensor networks. ACM Trans. Sens. Networks 4(2): 11:1-11:30 (2008) - 2007
- [j7]Shigang Chen, Yong Tang, Wenliang Du:
Stateful DDoS attacks and targeted filtering. J. Netw. Comput. Appl. 30(3): 823-840 (2007) - 2006
- [j6]Wenliang Du, Mingdong Shang, Haizhi Xu:
A novel approach for computer security education using Minix instructional operating system. Comput. Secur. 25(3): 190-200 (2006) - [j5]Wenliang Du, Lei Fang, Peng Ning:
LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distributed Comput. 66(7): 874-886 (2006) - [j4]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Dependable Secur. Comput. 3(1): 62-77 (2006) - 2005
- [j3]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. Distributed Comput. 17(4): 293-302 (2005) - [j2]Huseyin Polat, Wenliang Du:
Privacy-Preserving Collaborative Filtering. Int. J. Electron. Commer. 9(4): 9-35 (2005) - [j1]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili:
A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005)
Conference and Workshop Papers
- 2022
- [c82]Wenliang Du, Honghao Zeng, Kyungrok Won:
SEED emulator: an internet emulator for research and education. HotNets 2022: 101-107 - [c81]Wenliang Du:
SEED Internet Emulator: An Open-Source Tool for Network and Cybersecurity Courses. SIGCSE (2) 2022: 1180 - 2021
- [c80]Ammar S. Salman, Wenliang (Kevin) Du:
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework. SAI (3) 2021: 868-884 - 2019
- [c79]Kailiang Ying, Priyank Thavai, Wenliang Du:
TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model. CODASPY 2019: 1-12 - 2018
- [c78]Kailiang Ying, Amit Ahlawat, Bilal Alsharifi, Yuexin Jiang, Priyank Thavai, Wenliang Du:
TruZ-Droid: Integrating TrustZone with Mobile Operating System. MobiSys 2018: 14-27 - 2017
- [c77]Chunqiu Liu, Wenliang Du, Xiaolin Tian:
Lunar DEM Super-resolution reconstruction via sparse representation. CISP-BMEI 2017: 1-5 - 2016
- [c76]Carter Yagemann, Wenliang Du:
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook. ESORICS (1) 2016: 383-400 - [c75]Xiao Zhang, Yousra Aafer, Kailiang Ying, Wenliang Du:
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images. ESORICS (1) 2016: 401-421 - [c74]Xiao Zhang, Kailiang Ying, Yousra Aafer, Zhenshen Qiu, Wenliang Du:
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. NDSS 2016 - [c73]Yousra Aafer, Xiao Zhang, Wenliang Du:
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis. USENIX Security Symposium 2016: 1153-1168 - 2015
- [c72]Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace:
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. CCS 2015: 1248-1259 - [c71]Wenliang Du:
SEED Labs: Using Hands-on Lab Exercises for Computer Security Education (Abstract Only). SIGCSE 2015: 704 - 2014
- [c70]Xing Jin, Xunchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri:
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. CCS 2014: 66-77 - [c69]Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du:
Compac: enforce component-level access control in android. CODASPY 2014: 25-36 - [c68]Xiao Zhang, Wenliang Du:
Attacks on Android Clipboard. DIMVA 2014: 72-91 - [c67]Wenliang Du, Li Yang, Joseph Migga Kizza, Xiaohong Yuan:
New hands-on labs on browser security (abstract only). SIGCSE 2014: 717 - 2013
- [c66]Xiao Zhang, Amit Ahlawat, Wenliang Du:
AFrame: isolating advertisements from mobile applications in Android. ACSAC 2013: 9-18 - [c65]Hao Hao, Vicky Singh, Wenliang Du:
On the effectiveness of API-level access control using bytecode rewriting in Android. AsiaCCS 2013: 25-36 - [c64]Tongbo Luo, Xing Jin, Wenliang Du:
Mediums: visual integrity preserving framework. CODASPY 2013: 309-316 - [c63]Wenliang Du, Xiaolin Tian, Yankui Sun:
A novel edge tracking approach for cornea in optical coherence tomography anterior chamber images. EMBC 2013: 1434-1437 - [c62]Kapil M. Borle, Biao Chen, Wenliang Du:
A physical layer authentication scheme for countering primary user emulation attack. ICASSP 2013: 2935-2939 - [c61]Xing Jin, Lusha Wang, Tongbo Luo, Wenliang Du:
Fine-Grained Access Control for HTML5-Based Mobile Applications in Android. ISC 2013: 309-318 - [c60]Yousra Aafer, Wenliang Du, Heng Yin:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. SecureComm 2013: 86-103 - 2012
- [c59]Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du:
Touchjacking Attacks on Web in Android, iOS, and Windows Phone. FPS 2012: 227-243 - [c58]Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj:
SCUTA: a server-side access control system for web applications. SACMAT 2012: 71-82 - 2011
- [c57]Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin:
Attacks on WebView in the Android system. ACSAC 2011: 343-352 - [c56]Lifeng Lai, Yingbin Liang, Wenliang Du:
PHY-based cooperative key generation in wireless networks. Allerton 2011: 662-669 - [c55]JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin:
Automatic Reputation Computation through Document Analysis: A Social Network Approach. ASONAM 2011: 559-560 - [c54]Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu:
Re-designing the Web's Access Control System - (Extended Abstract). DBSec 2011: 4-11 - [c53]Lifeng Lai, Yingbin Liang, Wenliang Du, Shlomo Shamai:
Secret sharing via noisy broadcast channels. ISIT 2011: 1955-1959 - [c52]Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin:
Position paper: why are there so many vulnerabilities in web applications? NSPW 2011: 83-94 - [c51]Tongbo Luo, Wenliang Du:
Contego: Capability-Based Access Control for Web Browsers - (Short Paper). TRUST 2011: 231-238 - [c50]Xi Tan, Kapil M. Borle, Wenliang Du, Biao Chen:
Cryptographic link signatures for spectrum usage authentication in cognitive radio. WISEC 2011: 79-90 - 2010
- [c49]Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu:
Bureaucratic protocols for secure two-party sorting, selection, and permuting. AsiaCCS 2010: 226-237 - [c48]Zutao Zhu, Wenliang Du:
K-anonymous association rule hiding. AsiaCCS 2010: 305-309 - [c47]Zutao Zhu, Wenliang Du:
Understanding Privacy Risk of Publishing Decision Trees. DBSec 2010: 33-48 - [c46]Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin:
ESCUDO: A Fine-Grained Protection Model for Web Browsers. ICDCS 2010: 231-240 - 2009
- [c45]Zutao Zhu, Guan Wang, Wenliang Du:
Deriving Private Information from Association Rule Mining Results. ICDE 2009: 18-29 - [c44]Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker:
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. WADS 2009: 242-253 - 2008
- [c43]Zhengli Huang, Wenliang Du:
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. ICDE 2008: 705-714 - [c42]Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng:
Inference Analysis in Privacy-Preserving Data Re-publishing. ICDM 2008: 1079-1084 - [c41]Sangwon Hyun, Peng Ning, An Liu, Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 - [c40]Wenliang Du, Zhouxuan Teng, Zutao Zhu:
Privacy-MaxEnt: integrating background knowledge in privacy quantification. SIGMOD Conference 2008: 459-472 - 2007
- [c39]Ronghua Wang, Wenliang Du, Peng Ning:
Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 - [c38]Zhouxuan Teng, Wenliang Du:
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees. PAKDD 2007: 296-307 - [c37]Zhengli Huang, Wenliang Du, Zhouxuan Teng:
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. PKDD 2007: 487-497 - [c36]Huseyin Polat, Wenliang Du:
Effects of inconsistently masked data using RPT on CF with privacy. SAC 2007: 649-653 - [c35]Wenliang Du, Zhouxuan Teng, Ronghua Wang:
SEED: a suite of instructional laboratories for computer SEcurity EDucation. SIGCSE 2007: 486-490 - 2006
- [c34]Zhouxuan Teng, Wenliang Du:
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. ICDM 2006: 1091-1096 - [c33]Huseyin Polat, Wenliang Du:
Achieving Private Recommendations Using Randomized Response Techniques. PAKDD 2006: 637-646 - [c32]Abdulrahman Alarifi, Wenliang Du:
Diversify sensor nodes to improve resilience against node compromise. SASN 2006: 101-112 - 2005
- [c31]Wenliang Du, Michael T. Goodrich:
Searching for High-Value Rare Events with Uncheatable Grid Computing. ACNS 2005: 122-137 - [c30]Donggang Liu, Peng Ning, Wenliang Du:
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 - [c29]Abdulrahman Alarifi, Wenliang Du:
Risk-Based Routing Protocol for Wireless Ad-hoc Networks. ICWN 2005: 161-165 - [c28]Lei Fang, Wenliang Du, Peng Ning:
A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 - [c27]Wenliang Du, Lei Fang, Peng Ning:
LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 - [c26]Donggang Liu, Peng Ning, Wenliang Du:
Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 - [c25]Wenliang Du, Ronghua Wang, Peng Ning:
An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 - [c24]Huseyin Polat, Wenliang Du:
Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. PKDD 2005: 651-658 - [c23]Huseyin Polat, Wenliang Du:
SVD-based collaborative filtering with privacy. SAC 2005: 791-795 - [c22]Zhengli Huang, Wenliang Du, Biao Chen:
Deriving Private Information from Randomized Data. SIGMOD Conference 2005: 37-48 - [c21]Huseyin Polat, Wenliang Du:
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. Web Intelligence 2005: 725-731 - [c20]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 - 2004
- [c19]Haizhi Xu, Wenliang Du, Steve J. Chapin:
Detecting Exploit Code Execution in Loadable Kernel Modules. ACSAC 2004: 101-110 - [c18]Wenliang Du, Jing Jia, Manish Mangal, Mummoorthy Murugesan:
Uncheatable Grid Computing. ICDCS 2004: 4-11 - [c17]Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney:
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004 - [c16]Haizhi Xu, Wenliang Du, Steve J. Chapin:
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. RAID 2004: 21-38 - [c15]Wenliang Du, Yunghsiang S. Han, Shigang Chen:
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. SDM 2004: 222-233 - 2003
- [c14]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks. CCS 2003: 42-51 - [c13]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A witness-based approach for data fusion assurance in wireless sensor networks. GLOBECOM 2003: 1435-1439 - [c12]Huseyin Polat, Wenliang Du:
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. ICDM 2003: 625-628 - [c11]Wenliang Du, Justin Zhijun Zhan:
Using randomized response techniques for privacy-preserving data mining. KDD 2003: 505-510 - [c10]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. PODC 2003: 182-189 - [c9]Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du:
Secure and private sequence comparisons. WPES 2003: 39-44 - 2002
- [c8]Wenliang Du, Justin Zhijun Zhan:
A practical approach to solve Secure Multi-party Computation problems. NSPW 2002: 127-135 - 2001
- [c7]Wenliang Du, Mikhail J. Atallah:
Privacy-Preserving Cooperative Statistical Analysis. ACSAC 2001: 102-110 - [c6]Wenliang Du, Mikhail J. Atallah:
Privacy-Preserving Cooperative Scientific Computations. CSFW 2001: 273-294 - [c5]Wenliang Du, Mikhail J. Atallah:
Secure multi-party computation problems and their applications: a review and open problems. NSPW 2001: 13-22 - [c4]Mikhail J. Atallah, Wenliang Du:
Secure Multi-party Computational Geometry. WADS 2001: 165-179 - 2000
- [c3]Wenliang Du, Aditya P. Mathur:
Testing for Software Vulnerability Using Environment Perturbation. DSN 2000: 603-612 - 1999
- [c2]Wenliang Du, Praerit Garg, Aditya P. Mathur:
Security Relevancy Analysis on the Registry of Windows NT 4.0. ACSAC 1999: 331-338 - 1996
- [c1]Yi Deng, Wenliang Du, Paul C. Attie, Michael Evangelist:
A Formalism for Architectural Modeling of Distributed Real-Time Systems. SEKE 1996: 408-417
Parts in Books or Collections
- 2007
- [p3]Lei Fang, Wenliang Du, Peng Ning:
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 33-55 - [p2]Peng Ning, Donggang Liu, Wenliang Du:
Secure and Resilient Localization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 161-184 - 2001
- [p1]Wenliang Du, Mikhail J. Atallah:
Protocols for Secure Remote Database Access with Approximate Matching. E-Commerce Security and Privacy 2001: 87-111
Editorship
- 2005
- [e1]Vijay Atluri, Peng Ning, Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-227-5 [contents]
Informal and Other Publications
- 2022
- [i5]Wenliang Du, Honghao Zeng:
The SEED Internet Emulator and Its Applications in Cybersecurity Education. CoRR abs/2201.03135 (2022) - 2019
- [i4]E. Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du:
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy. CoRR abs/1901.07732 (2019) - 2014
- [i3]E. Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du:
A Systematic Security Evaluation of Android's Multi-User Framework. CoRR abs/1410.7752 (2014) - [i2]Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du:
Code Injection Attacks on HTML5-based Mobile Apps. CoRR abs/1410.7756 (2014) - 2009
- [i1]Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker:
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. CoRR abs/0904.3756 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-26 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint