BibTeX records: Cliff Wang

download as .bib file

@article{DBLP:journals/iotj/WangWW23,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading
                  Processes in Fog},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {13},
  pages        = {11669--11682},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3245100},
  doi          = {10.1109/JIOT.2023.3245100},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangPWW23,
  author       = {Jie Wang and
                  Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {11},
  pages        = {8320--8335},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2023.3262311},
  doi          = {10.1109/TWC.2023.3262311},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/WangPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Ferguson-Walter23,
  author       = {Kimberly Ferguson{-}Walter and
                  Sunny Fugate and
                  Cliff Wang and
                  Matt Bishop},
  editor       = {Tung X. Bui},
  title        = {Introduction to the Minitrack on Cyber Deception and Cyberpsychology
                  for Defense},
  booktitle    = {56th Hawaii International Conference on System Sciences, {HICSS} 2023,
                  Maui, Hawaii, USA, January 3-6, 2023},
  pages        = {845},
  publisher    = {ScholarSpace},
  year         = {2023},
  url          = {https://hdl.handle.net/10125/102734},
  timestamp    = {Thu, 16 Feb 2023 16:52:47 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Ferguson-Walter23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/WangWWS22,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang and
                  Min Song},
  title        = {Spectrum Activity Surveillance: Modeling and Analysis From Perspectives
                  of Surveillance Coverage and Culprit Detection},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {5},
  pages        = {1829--1846},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2020.3032434},
  doi          = {10.1109/TMC.2020.3032434},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/WangWWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OkhraviW22,
  author       = {Hamed Okhravi and
                  Cliff Wang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{MTD} '22: 9th {ACM} Workshop on Moving Target Defense},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3539--3540},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563358},
  doi          = {10.1145/3548606.3563358},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OkhraviW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/FugateBWF22,
  author       = {Sunny Fugate and
                  Matt Bishop and
                  Cliff Wang and
                  Kimberly Ferguson{-}Walter},
  title        = {Introduction to the Minitrack on Cyber Deception and Cyberpsychology
                  for Defense},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/79607},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/FugateBWF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022mtd,
  editor       = {Hamed Okhravi and
                  Cliff Wang},
  title        = {Proceedings of the 9th {ACM} Workshop on Moving Target Defense, {MTD}
                  2022, Los Angeles, CA, USA, 7 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560828},
  doi          = {10.1145/3560828},
  isbn         = {978-1-4503-9878-7},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2022mtd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoLW21,
  author       = {Shangqing Zhao and
                  Zhuo Lu and
                  Cliff Wang},
  title        = {Measurement Integrity Attacks Against Network Tomography: Feasibility
                  and Defense},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2617--2630},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2958934},
  doi          = {10.1109/TDSC.2019.2958934},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/BishopWFF21,
  author       = {Matt Bishop and
                  Cliff Wang and
                  Kimberly Ferguson{-}Walter and
                  Sunny Fugate},
  title        = {Introduction to the Minitrack on Cyber Deception and Cyber Psychology
                  for Defense},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/70852},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/BishopWFF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangWW20,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling and Analysis of Conflicting Information Propagation in a
                  Finite Time Horizon},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {3},
  pages        = {972--985},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.2976972},
  doi          = {10.1109/TNET.2020.2976972},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZhaoLW20,
  author       = {Shangqing Zhao and
                  Zhuo Lu and
                  Cliff Wang},
  title        = {How Can Randomized Routing Protocols Hide Flow Information in Wireless
                  Networks?},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {19},
  number       = {11},
  pages        = {7224--7236},
  year         = {2020},
  url          = {https://doi.org/10.1109/TWC.2020.3009839},
  doi          = {10.1109/TWC.2020.3009839},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/ZhaoLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OkhraviW20,
  author       = {Hamed Okhravi and
                  Cliff Wang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {MTD'20: 7th {ACM} Workshop on Moving Target Defense},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2137--2138},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3416244},
  doi          = {10.1145/3372297.3416244},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OkhraviW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Ferguson-Walter20,
  author       = {Kimberly Ferguson{-}Walter and
                  Sunny Fugate and
                  Cliff Wang},
  title        = {Introduction to the Minitrack on Cyber Deception for Defense},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/63964},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/Ferguson-Walter20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/20/JCSS2020,
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adaptive Autonomous Secure Cyber Systems},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1},
  doi          = {10.1007/978-3-030-33432-1},
  isbn         = {978-3-030-33431-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/JCSS2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020mtd,
  editor       = {Hamed Okhravi and
                  Cliff Wang},
  title        = {Proceedings of the 7th {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2020, Virtual Event, USA, November 9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411496},
  doi          = {10.1145/3411496},
  isbn         = {978-1-4503-8085-0},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020mtd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-14497,
  author       = {Zhuo Lu and
                  Cliff Wang and
                  Shangqing Zhao},
  title        = {Cyber Deception for Computer and Network Security: Survey and Challenges},
  journal      = {CoRR},
  volume       = {abs/2007.14497},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14497},
  eprinttype    = {arXiv},
  eprint       = {2007.14497},
  timestamp    = {Mon, 03 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/AWHW2019,
  author       = {Ehab Al{-}Shaer and
                  Jinpeng Wei and
                  Kevin W. Hamlen and
                  Cliff Wang},
  title        = {Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation
                  of HoneyThings},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-02110-8},
  doi          = {10.1007/978-3-030-02110-8},
  isbn         = {978-3-030-02109-2},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/AWHW2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangWW19,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {{SAS:} Modeling and Analysis of Spectrum Activity Surveillance in
                  Wireless Overlay Networks},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2143--2151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737585},
  doi          = {10.1109/INFOCOM.2019.8737585},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/11830,
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6},
  doi          = {10.1007/978-3-030-30719-6},
  isbn         = {978-3-030-30718-9},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/11830.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WangL18,
  author       = {Cliff Wang and
                  Zhuo Lu},
  title        = {Cyber Deception: Overview and the Road Ahead},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {2},
  pages        = {80--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1870866},
  doi          = {10.1109/MSP.2018.1870866},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PambudiWW18,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel
                  Hopping Capability},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1385--1393},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486208},
  doi          = {10.1109/INFOCOM.2018.8486208},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PambudiWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LuW17,
  author       = {Zhuo Lu and
                  Cliff Wang},
  title        = {Enabling Network Anti-Inference via Proactive Strategies: {A} Fundamental
                  Perspective},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {1},
  pages        = {43--55},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2016.2553666},
  doi          = {10.1109/TNET.2016.2553666},
  timestamp    = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LuW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PambudiWW17,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based
                  Social Networks},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8255073},
  doi          = {10.1109/GLOCOM.2017.8255073},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PambudiWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangWW17,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling and Strategy Design for Spectrum Monitoring over a Geographical
                  Region},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254113},
  doi          = {10.1109/GLOCOM.2017.8254113},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/PambudiWW17,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {On the Root Cause of Dropout-Induced Contraction Process in D2D-Based
                  Mobile Social Networks},
  booktitle    = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCCN.2017.8038389},
  doi          = {10.1109/ICCCN.2017.8038389},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/PambudiWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhaoLW17,
  author       = {Shangqing Zhao and
                  Zhuo Lu and
                  Cliff Wang},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating
                  in Network Tomography},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {172--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.23},
  doi          = {10.1109/ICDCS.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhaoLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17,
  author       = {Massimiliano Albanese and
                  Nancy J. Cooke and
                  Gonz{\'{a}}lez Coty and
                  David Hall and
                  Christopher G. Healey and
                  Sushil Jajodia and
                  Peng Liu and
                  Michael D. McNeese and
                  Peng Ning and
                  Douglas S. Reeves and
                  V. S. Subrahmanian and
                  Cliff Wang and
                  John Yen},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Computer-Aided Human Centric Cyber Situation Awareness},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_1},
  doi          = {10.1007/978-3-319-61152-5\_1},
  timestamp    = {Mon, 03 Jan 2022 21:52:37 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017feast,
  editor       = {Taesoo Kim and
                  Cliff Wang and
                  Dinghao Wu},
  title        = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software
                  Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3141235},
  isbn         = {978-1-4503-5395-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2017feast.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/10030,
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5},
  doi          = {10.1007/978-3-319-61152-5},
  isbn         = {978-3-319-61151-8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/10030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LuWW16,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {On the Evolution and Impact of Mobile Botnets in Wireless Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {15},
  number       = {9},
  pages        = {2304--2316},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMC.2015.2492545},
  doi          = {10.1109/TMC.2015.2492545},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LuWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0005W16,
  author       = {Peng Liu and
                  Cliff Wang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{MTD} 2016: Third {ACM} Workshop on Moving Target Defense},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1868--1869},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990483},
  doi          = {10.1145/2976749.2990483},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0005W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PambudiWW16,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {How Robust Is a D2D-Based Messaging Service?},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841877},
  doi          = {10.1109/GLOCOM.2016.7841877},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PambudiWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PambudiWW16a,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {On the Resilience of D2D-Based Social Networking Service against Random
                  Failures},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842061},
  doi          = {10.1109/GLOCOM.2016.7842061},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PambudiWW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangWW16,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Divide and Conquer: Leveraging Topology in Control of Epidemic Information
                  Dynamics},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841747},
  doi          = {10.1109/GLOCOM.2016.7841747},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PambudiWW16,
  author       = {Sigit Aryo Pambudi and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling and estimating the structure of D2D-based mobile social networks},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7511491},
  doi          = {10.1109/ICC.2016.7511491},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PambudiWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangWW16,
  author       = {Jie Wang and
                  Wenye Wang and
                  Cliff Wang},
  title        = {How the anti-rumor kills the rumor: Conflicting information propagation
                  in networks},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7511492},
  doi          = {10.1109/ICC.2016.7511492},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/GuanKWG16,
  author       = {Yong Guan and
                  Sneha Kumar Kasera and
                  Cliff Wang and
                  Ryan M. Gerdes},
  editor       = {Cliff Wang and
                  Ryan M. Gerdes and
                  Yong Guan and
                  Sneha Kumar Kasera},
  title        = {Introduction},
  booktitle    = {Digital Fingerprinting},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6601-1\_1},
  doi          = {10.1007/978-1-4939-6601-1\_1},
  timestamp    = {Fri, 30 Jun 2017 10:25:53 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/GuanKWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/LuWW16,
  author       = {Zhuo Lu and
                  Cliff Wang and
                  Mingkui Wei},
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {A Proactive and Deceptive Perspective for Role Detection and Concealment
                  in Wireless Networks},
  booktitle    = {Cyber Deception, Building the Scientific Foundation},
  pages        = {99--116},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3\_5},
  doi          = {10.1007/978-3-319-32699-3\_5},
  timestamp    = {Wed, 25 Sep 2019 17:41:11 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/LuWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/GuanKWG16a,
  author       = {Yong Guan and
                  Sneha Kumar Kasera and
                  Cliff Wang and
                  Ryan M. Gerdes},
  editor       = {Cliff Wang and
                  Ryan M. Gerdes and
                  Yong Guan and
                  Sneha Kumar Kasera},
  title        = {Conclusion},
  booktitle    = {Digital Fingerprinting},
  pages        = {177--181},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6601-1\_9},
  doi          = {10.1007/978-1-4939-6601-1\_9},
  timestamp    = {Fri, 30 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/GuanKWG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/JSSW2016,
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Deception, Building the Scientific Foundation},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3},
  doi          = {10.1007/978-3-319-32699-3},
  isbn         = {978-3-319-32697-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/JSSW2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WGGK2016,
  editor       = {Cliff Wang and
                  Ryan M. Gerdes and
                  Yong Guan and
                  Sneha Kumar Kasera},
  title        = {Digital Fingerprinting},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6601-1},
  doi          = {10.1007/978-1-4939-6601-1},
  isbn         = {978-1-4939-6599-1},
  timestamp    = {Fri, 30 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WGGK2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016mtd,
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272},
  doi          = {10.1145/2995272},
  isbn         = {978-1-4503-4570-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016mtd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/LuWW15,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling and Evaluating Denial of Service Attacks for Wireless and
                  Mobile Applications},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23288-1},
  doi          = {10.1007/978-3-319-23288-1},
  isbn         = {978-3-319-23287-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/LuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KottAW15,
  author       = {Alexander Kott and
                  David S. Alberts and
                  Cliff Wang},
  title        = {Will Cybersecurity Dictate the Outcome of Future Wars?},
  journal      = {Computer},
  volume       = {48},
  number       = {12},
  pages        = {98--101},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.359},
  doi          = {10.1109/MC.2015.359},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KottAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuWW15,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications
                  under Jamming},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {31--44},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2316795},
  doi          = {10.1109/TDSC.2014.2316795},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuMW15,
  author       = {Zhuo Lu and
                  Lisa M. Marvel and
                  Cliff Wang},
  editor       = {George Cybenko and
                  Dijiang Huang},
  title        = {To Be Proactive or Not: {A} Framework to Model Cyber Maneuvers for
                  Critical Path Protection in MANETs},
  booktitle    = {Proceedings of the Second {ACM} Workshop on Moving Target Defense,
                  {MTD} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {85--93},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808475.2808479},
  doi          = {10.1145/2808475.2808479},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuW15,
  author       = {Zhuo Lu and
                  Cliff Wang},
  title        = {Network anti-inference: {A} fundamental perspective on proactive strategies
                  to counter flow inference},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {280--288},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218392},
  doi          = {10.1109/INFOCOM.2015.7218392},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LuWW15,
  author       = {Zhuo Lu and
                  Cliff Wang and
                  Mingkui Wei},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {On detection and concealment of critical roles in tactical wireless
                  networks},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {909--914},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357561},
  doi          = {10.1109/MILCOM.2015.7357561},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/LuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/56,
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1},
  doi          = {10.1007/978-3-319-14039-1},
  isbn         = {978-3-319-14038-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/56.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KottAW15,
  author       = {Alexander Kott and
                  David S. Alberts and
                  Cliff Wang},
  title        = {War of 2050: a Battle for Information, Communications, and Computer
                  Security},
  journal      = {CoRR},
  volume       = {abs/1512.00360},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.00360},
  eprinttype    = {arXiv},
  eprint       = {1512.00360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KottAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/RigganSW14,
  author       = {Benjamin S. Riggan and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {Fundamentals of Sketch-Based Passwords - {A} General Framework},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13629-5},
  doi          = {10.1007/978-3-319-13629-5},
  isbn         = {978-3-319-13628-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/RigganSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LuWW14,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical
                  Wireless Applications},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {8},
  pages        = {1746--1759},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2013.146},
  doi          = {10.1109/TMC.2013.146},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LuWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuWW14,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {How can botnets cause storms? Understanding the evolution and impact
                  of mobile botnets},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {1501--1509},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848085},
  doi          = {10.1109/INFOCOM.2014.6848085},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Preview},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_1},
  doi          = {10.1007/978-3-319-11391-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14a,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Concluding Thoughts},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {323--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_15},
  doi          = {10.1007/978-3-319-11391-3\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/securecloud2014,
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Secure Cloud Computing},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8},
  doi          = {10.1007/978-1-4614-9278-8},
  isbn         = {978-1-4614-9277-1},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014spsm,
  editor       = {Cliff Wang and
                  Dijiang Huang and
                  Kapil Singh and
                  Zhenkai Liang},
  title        = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones
                  {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November
                  03 - 07, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2666620},
  isbn         = {978-1-4503-3155-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014spsm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/62,
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3},
  doi          = {10.1007/978-3-319-11391-3},
  isbn         = {978-3-319-11390-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/62.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013cycar,
  editor       = {Ahmad{-}Reza Sadeghi and
                  Cliff Wang and
                  Herv{\'{e}} Seudie},
  title        = {CyCAR'13, Proceedings of the 2013 {ACM} Workshop on Security, Privacy
                  and Dependability for CyberVehicles, Co-located with {CCS} 2013, November
                  4, 2013, Berlin, Germany},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2517968},
  isbn         = {978-1-4503-2487-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013cycar.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/100,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8},
  doi          = {10.1007/978-1-4614-5416-8},
  isbn         = {978-1-4614-5415-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LuWW12,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {Modeling and Performance Evaluation of Backoff Misbehaving Nodes in
                  {CSMA/CA} Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {8},
  pages        = {1331--1344},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.164},
  doi          = {10.1109/TMC.2011.164},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/LuWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuWW12,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Hiding traffic with camouflage: Minimizing message delay in the smart
                  grid under jamming},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {3066--3070},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195760},
  doi          = {10.1109/INFCOM.2012.6195760},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuWW11,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {From jammer to gambler: Modeling and detection of jamming attacks
                  against time-critical traffic},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1871--1879},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934989},
  doi          = {10.1109/INFCOM.2011.5934989},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/54,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9},
  doi          = {10.1007/978-1-4614-0977-9},
  isbn         = {978-1-4614-0976-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/54.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuNDLW10,
  author       = {An Liu and
                  Peng Ning and
                  Huaiyu Dai and
                  Yao Liu and
                  Cliff Wang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Defending DSSS-based broadcast communication against insider jammers
                  via delayed seed-disclosure},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {367--376},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920315},
  doi          = {10.1145/1920261.1920315},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LuWW10,
  author       = {Zhuo Lu and
                  Cliff Wang and
                  Wenye Wang},
  title        = {On the Impact of Backoff Misbehaving Nodes in {IEEE} 802.11 Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502302},
  doi          = {10.1109/ICC.2010.5502302},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LuWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuWW10,
  author       = {Zhuo Lu and
                  Wenye Wang and
                  Cliff Wang},
  title        = {On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless
                  Networks},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {1819--1827},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462002},
  doi          = {10.1109/INFCOM.2010.5462002},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/46,
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8},
  doi          = {10.1007/978-1-4419-0140-8},
  isbn         = {978-1-4419-0139-2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/46.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ChangSW08,
  author       = {Chih{-}Chieh Geoff Chang and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {Secure target localisation in sensor networks using relaxation labelling},
  journal      = {Int. J. Sens. Networks},
  volume       = {4},
  number       = {3},
  pages        = {172--184},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSNET.2008.022110},
  doi          = {10.1504/IJSNET.2008.022110},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ChangSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNLWD08,
  author       = {Donggang Liu and
                  Peng Ning and
                  An Liu and
                  Cliff Wang and
                  Wenliang Du},
  title        = {Attack-Resistant Location Estimation in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {22:1--22:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380570},
  doi          = {10.1145/1380564.1380570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/36,
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  publisher    = {Springer},
  year         = {2008},
  isbn         = {978-0-387-68768-1},
  timestamp    = {Wed, 19 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/36.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChangSW07,
  author       = {Chih{-}Chieh Geoff Chang and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {A New Relaxation Labeling Architecture for Secure Localization in
                  Sensor Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {3076--3081},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.511},
  doi          = {10.1109/ICC.2007.511},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChangSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChangSW07a,
  author       = {Chih{-}Chieh Geoff Chang and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {Secure Tracking in Sensor Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {3082--3087},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.512},
  doi          = {10.1109/ICC.2007.512},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChangSW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SunNW07,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Time Synchronization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {347--367},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_15},
  doi          = {10.1007/978-0-387-46276-9\_15},
  timestamp    = {Mon, 15 Jun 2020 07:44:16 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SunNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/27,
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1},
  doi          = {10.1007/978-0-387-44599-1},
  isbn         = {978-0-387-32720-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/27.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/30,
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9},
  doi          = {10.1007/978-0-387-46276-9},
  isbn         = {978-0-387-32721-1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/30.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4807,
  author       = {Michael Baer and
                  Ricky Charlet and
                  Wes Hardaker and
                  Robert Story and
                  Cliff Wang},
  title        = {IPsec Security Policy Database Configuration {MIB}},
  journal      = {{RFC}},
  volume       = {4807},
  pages        = {1--71},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4807},
  doi          = {10.17487/RFC4807},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SunNW06,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  title        = {Secure and resilient clock synchronization in wireless sensor networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {2},
  pages        = {395--408},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2005.861396},
  doi          = {10.1109/JSAC.2005.861396},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SunNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunPNW06,
  author       = {Kun Sun and
                  Pai Peng and
                  Peng Ning and
                  Cliff Wang},
  title        = {Secure Distributed Cluster Formation in Wireless Sensor Networks},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.46},
  doi          = {10.1109/ACSAC.2006.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunPNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunNW06,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {TinySeRSync: secure and resilient time synchronization in wireless
                  sensor networks},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {264--277},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180439},
  doi          = {10.1145/1180405.1180439},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/ChangSW06,
  author       = {Chih{-}Chieh Geoff Chang and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {Robust Localization of Multiple Events in Sensor Networks},
  booktitle    = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
                  Trustworthy Computing {(SUTC} 2006), 5-7 June 2006, Taichung, Taiwan},
  pages        = {168--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.117},
  doi          = {10.1109/SUTC.2006.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sutc/ChangSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunNW05,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  title        = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {3},
  pages        = {177--189},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.36},
  doi          = {10.1109/TDSC.2005.36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SunNW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/LeeSW05,
  author       = {Cheolha Pedro Lee and
                  Wesley E. Snyder and
                  Cliff Wang},
  title        = {Supervised Multispectral Image Segmentation using Active Contours},
  booktitle    = {Proceedings of the 2005 {IEEE} International Conference on Robotics
                  and Automation, {ICRA} 2005, April 18-22, 2005, Barcelona, Spain},
  pages        = {4242--4247},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ROBOT.2005.1570772},
  doi          = {10.1109/ROBOT.2005.1570772},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/LeeSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4008,
  author       = {R. Rohit and
                  Pyda Srisuresh and
                  Rajiv Raghunarayan and
                  Nalinaksh Pai and
                  Cliff Wang},
  title        = {Definitions of Managed Objects for Network Address Translators {(NAT)}},
  journal      = {{RFC}},
  volume       = {4008},
  pages        = {1--64},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4008},
  doi          = {10.17487/RFC4008},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4058,
  author       = {Alper E. Yegin and
                  Yoshihiro Ohba and
                  Reinaldo Penno and
                  George Tsirtsis and
                  Cliff Wang},
  title        = {Protocol for Carrying Authentication for Network Access {(PANA)} Requirements},
  journal      = {{RFC}},
  volume       = {4058},
  pages        = {1--19},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4058},
  doi          = {10.17487/RFC4058},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4058.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/WangSSW94,
  author       = {Cliff Wang and
                  Lori Small and
                  Wesley E. Snyder and
                  Rodney Williams},
  title        = {Edge detection in gated cardiac nuclear medicine images},
  booktitle    = {Seventh Annual {IEEE} Symposium on Computer-Based Medical Systems
                  (CBMS'94), June 10-12, 1994, Winston-Salem, NC, {USA}},
  pages        = {28--33},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CBMS.1994.315981},
  doi          = {10.1109/CBMS.1994.315981},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/cbms/WangSSW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics