Wenliang Du
Affiliations:- Syracuse University, USA
According to our database1,
Wenliang Du
authored at least 110 papers
between 1996 and 2022.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to cybersecurity education and research".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cis.syr.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
CoRR, 2022
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022
2021
Proceedings of the Intelligent Computing, 2021
2019
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy.
CoRR, 2019
TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
2017
Proceedings of the 10th International Congress on Image and Signal Processing, 2017
2016
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Secur. Priv., 2015
SEED Labs: Using Hands-on Lab Exercises for Computer Security Education (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
A novel edge tracking approach for cornea in optical coherence tomography anterior chamber images.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
On the effectiveness of API-level access control using bytecode rewriting in Android.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012
J. Univers. Comput. Sci., 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
IEEE Secur. Priv., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Automatic Reputation Computation through Document Analysis: A Social Network Approach.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2009
Knowl. Inf. Syst., 2009
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem.
Proceedings of the Algorithms and Data Structures, 11th International Symposium, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2008
ACM Trans. Sens. Networks, 2008
ACM Trans. Sens. Networks, 2008
ACM Trans. Inf. Syst. Secur., 2008
ACM J. Educ. Resour. Comput., 2008
J. Assoc. Inf. Sci. Technol., 2008
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, 2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
J. Parallel Distributed Comput., 2006
A novel approach for computer security education using Minix instructional operating system.
Comput. Secur., 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Knowledge Discovery in Databases: PKDD 2005, 2005
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
2001
Proceedings of the E-Commerce Security and Privacy, 2001
Proceedings of the Algorithms and Data Structures, 7th International Workshop, 2001
Secure multi-party computation problems and their applications: a review and open problems.
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1996
A Formalism for Architectural Modeling of Distributed Real-Time Systems.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering, 1996