Wenliang Du

Affiliations:
  • Syracuse University, USA


According to our database1, Wenliang Du authored at least 110 papers between 1996 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to cybersecurity education and research".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Efficient Decoder for End-to-End Oriented Object Detection in Remote Sensing Images.
CoRR, 2023

2022
The SEED Internet Emulator and Its Applications in Cybersecurity Education.
CoRR, 2022

SEED Internet Emulator: An Open-Source Tool for Network and Cybersecurity Courses.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

SEED emulator: an internet emulator for research and education.
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

2021
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework.
Proceedings of the Intelligent Computing, 2021

2019
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy.
CoRR, 2019

TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
TruZ-Droid: Integrating TrustZone with Mobile Operating System.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

2017
Lunar DEM Super-resolution reconstruction via sparse representation.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016

Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Hey, You, Get Off of My Image: Detecting Data Residue in Android Images.
Proceedings of the Computer Security - ESORICS 2016, 2016

Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation.
IEEE Trans. Inf. Forensics Secur., 2015

Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Secur. Priv., 2015

SEED Labs: Using Hands-on Lab Exercises for Computer Security Education (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Systematic Security Evaluation of Android's Multi-User Framework.
CoRR, 2014

Code Injection Attacks on HTML5-based Mobile Apps.
CoRR, 2014

New hands-on labs on browser security (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Attacks on Android Clipboard.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Compac: enforce component-level access control in android.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.
Proceedings of the Security and Privacy in Communication Networks, 2013

Fine-Grained Access Control for HTML5-Based Mobile Applications in Android.
Proceedings of the Information Security, 16th International Conference, 2013

A physical layer authentication scheme for countering primary user emulation attack.
Proceedings of the IEEE International Conference on Acoustics, 2013

A novel edge tracking approach for cornea in optical coherence tomography anterior chamber images.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Mediums: visual integrity preserving framework.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

On the effectiveness of API-level access control using bytecode rewriting in Android.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

AFrame: isolating advertisements from mobile applications in Android.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012

Social Network Based Reputation Computation and Document Classification.
J. Univers. Comput. Sci., 2012

Cooperative Key Generation in Wireless Networks.
IEEE J. Sel. Areas Commun., 2012

SCUTA: a server-side access control system for web applications.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Touchjacking Attacks on Web in Android, iOS, and Windows Phone.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
SEED: Hands-On Lab Exercises for Computer Security Education.
IEEE Secur. Priv., 2011

Cryptographic link signatures for spectrum usage authentication in cognitive radio.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Contego: Capability-Based Access Control for Web Browsers - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Position paper: why are there so many vulnerabilities in web applications?
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Secret sharing via noisy broadcast channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Re-designing the Web's Access Control System - (Extended Abstract).
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Automatic Reputation Computation through Document Analysis: A Social Network Approach.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

PHY-based cooperative key generation in wireless networks.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Attacks on WebView in the Android system.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Private predictions on hidden Markov models.
Artif. Intell. Rev., 2010

ESCUDO: A Fine-Grained Protection Model for Web Browsers.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Understanding Privacy Risk of Publishing Decision Trees.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

K-anonymous association rule hiding.
Proceedings of the 5th ACM Symposium on Information, 2010

Bureaucratic protocols for secure two-party sorting, selection, and permuting.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2009

A hybrid multi-group approach for privacy-preserving data mining.
Knowl. Inf. Syst., 2009

On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem.
Proceedings of the Algorithms and Data Structures, 11th International Symposium, 2009

Deriving Private Information from Association Rule Mining Results.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.
ACM Trans. Sens. Networks, 2008

Group-based key predistribution for wireless sensor networks.
ACM Trans. Sens. Networks, 2008

Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

SEED: A Suite of Instructional Laboratories for Computer Security Education.
ACM J. Educ. Resour. Comput., 2008

Privacy-preserving top-<i>N</i> recommendation on distributed data.
J. Assoc. Inf. Sci. Technol., 2008

Privacy-MaxEnt: integrating background knowledge in privacy quantification.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

Inference Analysis in Privacy-Preserving Data Re-publishing.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining.
Proceedings of the 24th International Conference on Data Engineering, 2008

2007
Secure and Resilient Localization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Stateful DDoS attacks and targeted filtering.
J. Netw. Comput. Appl., 2007

SEED: a suite of instructional laboratories for computer SEcurity EDucation.
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007

Effects of inconsistently masked data using RPT on CF with privacy.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007

A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Containing denial-of-service attacks in broadcast authentication in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge.
IEEE Trans. Dependable Secur. Comput., 2006

LAD: Localization anomaly detection for wireless sensor networks.
J. Parallel Distributed Comput., 2006

A novel approach for computer security education using Minix instructional operating system.
Comput. Secur., 2006

Diversify sensor nodes to improve resilience against node compromise.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Achieving Private Recommendations Using Randomized Response Techniques.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur., 2005

Privacy-Preserving Collaborative Filtering.
Int. J. Electron. Commer., 2005

Oblivious signature-based envelope.
Distributed Comput., 2005

Group-based key pre-distribution in wireless sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Deriving Private Information from Randomized Data.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005

SVD-based collaborative filtering with privacy.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data.
Proceedings of the Knowledge Discovery in Databases: PKDD 2005, 2005

An efficient scheme for authenticating public keys in sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Attack-resistant location estimation in sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

LAD: Localization Anomaly Detection forWireless Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A beacon-less location discovery scheme for wireless sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Searching for High-Value Rare Events with Uncheatable Grid Computing.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Uncheatable Grid Computing.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Detecting Exploit Code Execution in Loadable Kernel Modules.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Secure and private sequence comparisons.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Using randomized response techniques for privacy-preserving data mining.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003

A witness-based approach for data fusion assurance in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003

A pairwise key pre-distribution scheme for wireless sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A practical approach to solve Secure Multi-party Computation problems.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

2001
Protocols for Secure Remote Database Access with Approximate Matching.
Proceedings of the E-Commerce Security and Privacy, 2001

Secure Multi-party Computational Geometry.
Proceedings of the Algorithms and Data Structures, 7th International Workshop, 2001

Secure multi-party computation problems and their applications: a review and open problems.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Privacy-Preserving Cooperative Scientific Computations.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Privacy-Preserving Cooperative Statistical Analysis.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Testing for Software Vulnerability Using Environment Perturbation.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Security Relevancy Analysis on the Registry of Windows NT 4.0.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1996
A Formalism for Architectural Modeling of Distributed Real-Time Systems.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering, 1996


  Loading...