Donggang Liu
Affiliations:- University of Texas at Arlington, USA
According to our database1,
Donggang Liu
authored at least 54 papers
between 2003 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models.
Comput. Secur., 2016
2014
Pervasive Mob. Comput., 2014
J. Syst. Softw., 2014
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks.
CoRR, 2014
2013
Providing DoS resistance for signature-based broadcast authentication in sensor networks.
ACM Trans. Embed. Comput. Syst., 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
2012
IEEE Trans. Mob. Comput., 2012
ACM Trans. Embed. Comput. Syst., 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Ad Hoc Sens. Wirel. Networks, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks.
Ad Hoc Networks, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
2008
ACM Trans. Sens. Networks, 2008
ACM Trans. Inf. Syst. Secur., 2008
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Comput. Commun., 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the IEEE International Conference on Network Protocols, 2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Advances in Information Security 28, Springer, ISBN: 978-0-387-32723-5, 2007
2005
ACM Trans. Sens. Networks, 2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Handbook of Sensor Networks: Algorithms and Architectures, 2005
2004
ACM Trans. Embed. Comput. Syst., 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003