Wenliang Du
Wenliang Du
Email verificata su ecs.syr.edu - Home page
Titolo
Citata da
Citata da
Anno
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
22942005
A key management scheme for wireless sensor networks using deployment knowledge
W Du, J Deng, YS Han, S Chen, PK Varshney
IEEE INFOCOM 2004 1, 2004
12942004
Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton
CRC press, 2009
822*2009
Droidapiminer: Mining api-level features for robust malware detection in android
Y Aafer, W Du, H Yin
International conference on security and privacy in communication systems …, 2013
5662013
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
5572001
Building decision tree classifier on private data
W Du, Z Zhan
5092002
Deriving private information from randomized data
Z Huang, W Du, B Chen
Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005
5082005
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on Algorithms and Data Structures, 165-179, 2001
3892001
Using randomized response techniques for privacy-preserving data mining
W Du, Z Zhan
Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003
3832003
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008
3712008
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
3672001
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
3612005
Privacy-preserving collaborative filtering using randomized perturbation techniques
H Polat, W Du
Third IEEE International Conference on Data Mining, 625-628, 2003
3502003
Privacy-preserving multivariate statistical analysis: Linear regression and classification
W Du, YS Han, S Chen
Proceedings of the 2004 SIAM international conference on data mining, 222-233, 2004
3492004
Lad: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
2792005
An efficient scheme for authenticating public keys in sensor networks
W Du, R Wang, P Ning
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
2772005
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
D Liu, P Ning, W Du
25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005
2752005
A key predistribution scheme for sensor networks using deployment knowledge
W Du, J Deng, YS Han, PK Varshney
IEEE Transactions on dependable and secure computing 3 (1), 62-77, 2006
2702006
A witness-based approach for data fusion assurance in wireless sensor networks
W Du, J Deng, YS Han, PK Varshney
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
2652003
Privacy-preserving cooperative scientific computations
W Du, MJ Atallah
csfw, 0273, 2001
2522001
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20