Helen J. Wang
Affiliations:- Microsoft Research
According to our database1,
Helen J. Wang
authored at least 54 papers
between 1997 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2017
Design and in-situ evaluation of a mixed-initiative approach to information organization.
J. Assoc. Inf. Sci. Technol., 2017
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 2011 USENIX Annual Technical Conference, 2011
2010
Commun. ACM, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
SecondNet: a data center network virtualization architecture with bandwidth guarantees.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 5th International Conference on Mobile Systems, 2007
Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Strider: a black-box, state-based approach to change and configuration management and support.
Sci. Comput. Program., 2004
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004
Shield: vulnerability-driven network filters for preventing known vulnerability exploits.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
2002
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002
2001
Proceedings of the 4th International Workshop on Wireless Mobile Multimedia, 2001
A personal communication service creation model for Internet-based unified communication systems.
Proceedings of the IEEE International Conference on Communications, 2001
2000
IEEE Wirel. Commun., 2000
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000
1999
Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications (WMCSA '99), 1999
1997