Lingyu Wang
Orcid: 0000-0002-7441-7541Affiliations:
- Concordia University, Montreal, Canada
According to our database1,
Lingyu Wang
authored at least 175 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks.
IEEE Trans. Instrum. Meas., 2024
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters.
IEEE Trans. Inf. Forensics Secur., 2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
IEEE Trans. Knowl. Data Eng., 2023
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features.
ACM Comput. Surv., 2023
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems.
IEEE Trans. Dependable Secur. Comput., 2022
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies.
ACM Comput. Surv., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020
IEEE Trans. Inf. Forensics Secur., 2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019
ACM Trans. Priv. Secur., 2019
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security.
IEEE Trans. Inf. Forensics Secur., 2019
Monitoring and Improving Managed Security Services inside a Security Operation Center.
EAI Endorsed Trans. Security Safety, 2019
Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019
Decoupling coding habits from functionality for effective binary authorship attribution.
J. Comput. Secur., 2019
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
J. Comput. Secur., 2019
Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Comput. Commun., 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
<i>FOSSIL</i>: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
EAI Endorsed Trans. Security Safety, 2018
Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
J. Comput. Secur., 2018
Realtime intrusion risk assessment model based on attack and service dependency graphs.
Comput. Commun., 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Computer Security, 2018
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Inf. Forensics Secur., 2017
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digit. Investig., 2017
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications
Advances in Information Security 68, Springer, ISBN: 978-3-319-42644-0, 2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Computers, 2016
Soft Comput., 2016
Innov. Syst. Softw. Eng., 2016
<i>BinGold</i>: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs).
Digit. Investig., 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
<i>k</i>-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure.
J. Comput. Secur., 2015
Digit. Investig., 2015
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digit. Investig., 2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Springer, ISBN: 978-3-319-16106-8, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014
IEEE Trans. Inf. Forensics Secur., 2014
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Digit. Investig., 2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection.
J. Intell. Manuf., 2012
Secure collaboration in global design and supply chain environment: Problem analysis and literature review.
Comput. Ind., 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Secur. Comput., 2011
Comput. Ind., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Secur. Commun. Networks, 2010
Int. J. Next Gener. Comput., 2010
Proceedings of the Software Engineering Research, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Database Theory, 2010
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010
<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
J. Object Technol., 2009
Evaluating privacy threats in released database views by symmetric indistinguishability.
J. Comput. Secur., 2009
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the NTMS 2009, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
J. Comput. Secur., 2008
Comput. Commun., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the NTMS 2008, 2008
Proceedings of the NTMS 2008, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
J. Comput. Secur., 2007
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007
2006
Comput. Commun., 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005
2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
Proceedings of the Computer Security, 2003
2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Foundations of Information and Knowledge Systems, 2002
Proceedings of the Computer Security, 2002
Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002