


Остановите войну!
for scientists:


default search action
Lingyu Wang 0001
Person information

- affiliation: Concordia University, Montreal, Canada
Other persons with the same name
- Lingyu Wang — disambiguation page
- Lingyu Wang 0002 — Nanyang Technological University, Singapore
- Lingyu Wang 0003 — Chinese Academy of Science, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j56]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j55]Shangyu Xie
, Meisam Mohammady
, Han Wang
, Lingyu Wang
, Jaideep Vaidya
, Yuan Hong
:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing. IEEE Trans. Knowl. Data Eng. 35(1): 1-15 (2023) - [c98]Momen Oqaily
, Suryadipta Majumdar
, Lingyu Wang
, Mohammad Ekramul Kabir
, Yosr Jarraya
, A. S. M. Asadujjaman
, Makan Pourzandi
, Mourad Debbabi
:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c97]Sima Bagheri, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Makan Pourzandi:
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters. ICC 2023: 777-782 - 2022
- [j54]Abdullah Qasem, Paria Shirani
, Mourad Debbabi, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. ACM Comput. Surv. 54(2): 25:1-25:42 (2022) - [j53]Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [j52]Suryadipta Majumdar
, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [c96]Yuan Hong, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. CCS 2022: 3535-3537 - [c95]Hugo Kermabon-Bobinnec
, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
ProSPEC: Proactive Security Policy Enforcement for Containers. CODASPY 2022: 155-166 - [c94]Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar:
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV). ESORICS (3) 2022: 466-489 - [c93]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract). ICDE 2022: 1549-1550 - [c92]Onur Duman, Lingyu Wang, Minh Au, Marthe Kassouf, Mourad Debbabi:
Hardening Substations against Supply Chain Attacks Under Operational Constraints. ISGT 2022: 1-5 - [c91]Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang:
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). NDSS 2022 - [c90]Azadeh Tabiban
, Heyang Zhao, Yosr Jarraya, Makan Pourzandi
, Lingyu Wang
:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. NordSec 2022: 346-367 - [e6]Yuan Hong, Lingyu Wang:
Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9873-2 [contents] - [i4]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - 2021
- [j51]Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j50]Gagandeep Singh Chawla, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j49]Momen Oqaily
, Yosr Jarraya, Meisam Mohammady
, Suryadipta Majumdar
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j48]Meisam Mohammady
, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c89]A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - 2020
- [b7]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j47]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [c88]Meisam Mohammady, Shangyu Xie, Yuan Hong
, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c87]Alaa Oqaily, Sudershan L. T, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c86]Azadeh Tabiban
, Yosr Jarraya, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [c85]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [i3]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b6]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j46]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j45]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j44]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j43]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j42]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j41]Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. EAI Endorsed Trans. Security Safety 5(17): e5 (2019) - [j40]Mina Khalili, Mengyuan Zhang
, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Trans. Security Safety 5(18): e1 (2019) - [j39]Mengyuan Zhang
, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. IEEE Trans. Inf. Forensics Secur. 14(9): 2315-2330 (2019) - [j38]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [c84]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang
, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c83]Mengyuan Zhang
, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c82]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c81]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c80]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c79]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c78]Onur Duman
, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e5]Jianying Zhou, Robert H. Deng
, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - 2018
- [j37]Alireza Shameli-Sendi, Michel R. Dagenais, Lingyu Wang:
Realtime intrusion risk assessment model based on attack and service dependency graphs. Comput. Commun. 116: 253-272 (2018) - [j36]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j35]Wenyu Qu, Wei Huo, Lingyu Wang:
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. EAI Endorsed Trans. Security Safety 5(16): e5 (2018) - [j34]Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j33]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [c77]Lingyu Wang, Mengyuan Zhang
, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. From Database to Cyber Security 2018: 450-469 - [c76]Meisam Mohammady, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c75]Taous Madi, Mengyuan Zhang
, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c74]Azadeh Tabiban
, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c73]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [c72]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c71]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c70]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c69]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [i2]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j32]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j31]Yuan Hong
, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. IEEE Trans. Inf. Forensics Secur. 12(9): 2227-2241 (2017) - [c68]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [c67]Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c66]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c65]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c64]Onur Duman
, Mengyuan Zhang
, Lingyu Wang, Mourad Debbabi:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [e4]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi
, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - [i1]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - 2016
- [b4]Wen Ming Liu, Lingyu Wang:
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications. Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, pp. 1-142 - [j30]Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18 Supplement: S11-S22 (2016) - [j29]Djedjiga Mouheb
, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [j28]Baojiang Cui, Fuwei Wang, Yongle Hao, Lingyu Wang:
A taint based approach for automatic reverse engineering of gray-box file formats. Soft Comput. 20(9): 3563-3578 (2016) - [j27]Baojiang Cui, Zheli Liu, Lingyu Wang:
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans. Computers 65(8): 2374-2385 (2016) - [j26]Mengyuan Zhang
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [c63]Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. CODASPY 2016: 195-206 - [c62]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c61]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - [c60]Mickael Emirkanian-Bouchard, Lingyu Wang:
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. FPS 2016: 117-134 - [c59]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c58]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - 2015
- [b3]Djedjiga Mouheb
, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j25]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12 Supplement 1: S61-S71 (2015) - [j24]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14 Supplement 1: S146-S155 (2015) - [j23]Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. J. Comput. Secur. 23(2): 131-165 (2015) - [c57]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - 2014
- [b2]Lingyu Wang, Massimiliano Albanese
, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j22]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(Supplement 1): S94-S103 (2014) - [j21]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j20]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren
, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [j19]Zhen Xu, Cong Wang
, Kui Ren
, Lingyu Wang, Bingsheng Zhang
:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. IEEE Trans. Inf. Forensics Secur. 9(11): 1790-1803 (2014) - [c56]Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. DBSec 2014: 179-194 - [c55]Lingyu Wang, Mengyuan Zhang
, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - 2013
- [c54]Wen Ming Liu, Lingyu Wang, Kui Ren
, Mourad Debbabi:
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. CloudCom (1) 2013: 679-686 - [c53]Massimiliano Albanese
, Sushil Jajodia
, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c52]Zhen Xu, Cong Wang
, Qian Wang
, Kui Ren
, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c51]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c50]William Nzoukou, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
A Unified Framework for Measuring a Network's Mean Time-to-Compromise. SRDS 2013: 215-224 - [e3]Lingyu Wang, Basit Shafiq:
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9 [contents] - 2012
- [j18]Yong Zeng
, Lingyu Wang:
Secure collaboration in design and supply chain management. Comput. Ind. 63(6): 543-544 (2012) - [j17]Yong Zeng
, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker:
Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Comput. Ind. 63(6): 545-556 (2012) - [j16]Da Yong Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng
:
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J. Intell. Manuf. 23(4): 1351-1364 (2012) - [c49]Wen Ming Liu, Lingyu Wang:
Privacy streamliner: a two-stage approach to improving algorithm efficiency. CODASPY 2012: 193-204 - [c48]Wen Ming Liu, Lingyu Wang, Kui Ren
, Pengsu Cheng, Mourad Debbabi:
k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99 - [c47]