Wenliang Du
Wenliang Du
Email verificata su ecs.syr.edu - Home page
TitoloCitata daAnno
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
22422005
A key management scheme for wireless sensor networks using deployment knowledge
W Du, J Deng, YS Han, S Chen, PK Varshney
IEEE INFOCOM 2004 1, 2004
12512004
Algorithms and theory of computation handbook
MJ Atallah
CRC press, 1998
787*1998
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
5152001
Deriving private information from randomized data
Z Huang, W Du, B Chen
Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005
4692005
Building decision tree classifier on private data
W Du, Z Zhan
Proceedings of the IEEE international conference on Privacy, security and …, 2002
4602002
Droidapiminer: Mining api-level features for robust malware detection in android
Y Aafer, W Du, H Yin
International conference on security and privacy in communication systems …, 2013
4512013
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on Algorithms and Data Structures, 165-179, 2001
3642001
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 11, 2008
3612008
Using randomized response techniques for privacy-preserving data mining
W Du, Z Zhan
Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003
3582003
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
Proceedings of the 4th international symposium on Information processing in …, 2005
3432005
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
3422001
Privacy-preserving collaborative filtering using randomized perturbation techniques
H Polat, W Du
Third IEEE International Conference on Data Mining, 625-628, 2003
3242003
Privacy-preserving multivariate statistical analysis: Linear regression and classification
W Du, YS Han, S Chen
Proceedings of the 2004 SIAM international conference on data mining, 222-233, 2004
3132004
An efficient scheme for authenticating public keys in sensor networks
W Du, R Wang, P Ning
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
2662005
A key predistribution scheme for sensor networks using deployment knowledge
W Du, J Deng, YS Han, PK Varshney
IEEE Transactions on dependable and secure computing 3 (1), 62-77, 2006
2632006
LAD: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
2622005
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
D Liu, P Ning, W Du
25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005
2522005
A witness-based approach for data fusion assurance in wireless sensor networks
W Du, J Deng, YS Han, PK Varshney
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
2512003
SVD-based collaborative filtering with privacy
H Polat, W Du
Proceedings of the 2005 ACM symposium on Applied computing, 791-795, 2005
2332005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20