| Wenliang Du's Publications |
Zhouxuan Teng and Wenliang Du.
A Hybrid Multi-Group Privacy Preserving Approach for Building Decision Trees.
In Knowledge and Information Systems (KAIS), Springer London, August 2008.
Huseyin Polat, Wenliang Du, Sahin Renckes, and Yusuf Oysal.
Private predictions on hidden Markov models.
In the Artificial Intelligence Review,
Volume 34 Issue 1, June 2010.
Huseyin Polat and Wenliang Du.
Privacy-Preserving Top-N Recommendation on Distributed Data.
In the Journal of the American Society for Information
Science and Technology, Volume 59, Issue 7, Pages 1093 - 1108. March, 2008.
Huseyin Polat and Wenliang Du.
Privacy-Preserving Collaborative Filtering.
In the International Journal of Electronic Commerce (IJEC),
pages 9-35. Volume 9, Number 4, Summer 2005.
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod Varshney,
Jonathan Katz, and Aram Khalili.
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks.
In The ACM Transactions on Information and System Security (TISSEC),
Volume 8, Issue 2, May 2005. Pages 228-258.
(Bib).
This paper is an extended version of the CCS'03 paper.
Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney.
A Key Predistribution Scheme for Sensor Networks Using Deployment
Knowledge.
In IEEE Transactions on Dependable and Secure Computing,
Volume 3, Number 2, January-March 2006. Pages 62-77.
This paper is an extended version of the INFOCOM'04 paper.
Wenliang Du, Lei Fang and Peng Ning.
LAD: Localization Anomaly Detection for Wireless Sensor Networks.
In The Journal of Parallel and Distributed Computing (JPDC).
Volume 66, Issue 7, July 2006. Pages 874-886.
This paper is the journal verision of the IPDPS'05 paper.
Kaiqi Xiong, Ronghua Wang, Wenliang Du, and Peng Ning,
Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks.
In ACM Transactions on Sensor Networks,
Volume 8 Issue 3, July 2012.
Peng Ning, An Liu, and Wenliang Du.
Mitigating DoS Attacks against Broadcast Authentication in
Wireless Sensor Networks.
In ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008.
Donggang Liu, Peng Ning, and Wenliang Du.
Group-Based Key Pre-Distribution in Wireless Sensor Networks.
In ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 2,
pages 11:1--11:30, March 2008.
Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du,
Attack-Resistant Location Estimation in Wireless Sensor Networks.
In ACM Transactions in Information and Systems Security (TISSEC),
Vol. 11, No. 4, pages 1--39, July 2008.
Ronghua Wang, Wenliang Du, Xiaogang Liu, and Peng Ning.
ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in
Sensor Networks. In
ACM Transactions on Sensor Networks, Vol. 6, No. 1, Article 9,
pages 1--29, December 2009.
Wenliang Du, Lei Fang, Peng Ning.
Beaconless Location Discovery in Wireless Sensor Networks.
In Cliff Wang, Radha Poovendran, Sumit Roy (Eds),
Secure Localization and Time Synchronization for Wireless Sensor and
Ad Hoc Networks, Springer, 2007.
Peng Ning, Donggang Liu, Wenliang Du.
Secure and Resilient Location Discovery in Wireless Sensor Networks.
In Cliff Wang, Radha Poovendran, Sumit Roy (Eds),
Secure Localization and Time Synchronization for Wireless Sensor and
Ad Hoc Networks, Springer, 2007.
Wenliang Du.
The SEED Project: Providing Hands-on Lab Exercises
for Computer Security Education. In IEEE Security and Privacy Magazine,
September/October, 2011. Invited paper.
Wenliang Du and Ronghua Wang.
SEED: A Suite of Instructional Laboratories for Computer Security
Education. In The ACM Journal on
Educational Resources in Computing (JERIC), Volume 8, Issue 1,
March 2008.
Wenliang Du, Mingdong Shang, and Haizhi Xu.
A Novel Approach for Computer Security Education using Minix
Instructional Operating System.
In Computer & Security, Volume 25, Issue 3, 2006. Pages 190-200.
Kapil M. Borle, Biao Chen, and Wenliang Du.
Physical Layer Spectrum Usage Authentication In Cognitive Radio: Analysis and Implementation.
In IEEE Transactions on Information Forensics & Security,
Vol. 10, No. 10, October 2015.
Ninghui Li, Wenliang Du, and Dan Boneh.
Oblivious Signature-based Envelope (Journal Version).
In Distributed Computing, Vol. 17, No. 4, 2005. Pages 293-302.
Publisher: Springer-Verlag.
(Bib).
Shigang Chen, Yong Tang, and Wenliang Du.
Stateful DDoS Attacks and Targeted Filtering.
Accepted by Journal of Network and Computer Applications,
Special Issue on Distributed Denial of Service and Intrusion Detection,
2005/2006.
Wenliang Du and Mikhail J. Atallah.
Protocols for Secure Remote Database Access with Approximate Matching.
In Recent Advances in Secure and Private E-Commerce,
Kluwer Academic Publishers, 2001.
Wenliang Du.
A Study of Several Specific Secure Two-party Computation Problems
(PDF).
Department of Computer Sciences, Purdue University, 2001.
Wenliang Du and Aditya P. Mathur.
Testing for Software Vulnerability Using Environment Perturbation.
In Quality and Reliability Engineering International, Volume 18 Issue 3, 2002.
Special Issue: Secure, Reliable Computer and Network Systems. Page 261-272.