• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    TruzCall: Secure VoIP Calling on Android using ARM TrustZone

    Ahlawat, A. & Du, W., Feb 2020, 2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020. Urien, P. & Piramuthu, S. (eds.). Institute of Electrical and Electronics Engineers Inc., 9042945. (2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

    Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • 2018

    TruZ-Droid: Integrating TrustZone with mobile operating system

    Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2016

    Harvesting inconsistent security configurations in custom android ROMs via differential analysis

    Aafer, Y., Zhang, X. & Du, W., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Hey, you, get off of my image: Detecting data residue in android images

    Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Intentio ex machina: Android intent access control via an extensible application hook

    Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2015

    Fine-grained access control for HTML5-based mobile applications in android

    Jin, X., Wang, L., Luo, T. & Du, W., 2015, Information Security - 16th International Conference, ISC 2013, Proceedings. Desmedt, Y. (ed.). Springer Verlag, p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Hare hunting in the wild android: A study on the threat of hanging attribute references

    Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • 2014

    Attacks on Android clipboard

    Zhang, X. & Du, W., Jan 1 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

    Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    106 Scopus citations
  • 2013

    AFrame: Isolating advertisements from mobile applications in android

    Zhang, X., Ahlawat, A. & Du, W., Dec 1 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • A physical layer authentication scheme for countering primary user emulation attack

    Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • DroidAPIMiner: Mining API-level features for robust malware detection in android

    Aafer, Y., Du, W. & Yin, H., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    355 Scopus citations
  • Mediums: Visual integrity preserving framework

    Luo, T., Jin, X. & Du, W., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • On the effectiveness of API-level access control using bytecode rewriting in Android

    Hao, H., Singh, V. & Du, W., May 27 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Scopus citations
  • Touchjacking attacks on Web in Android, iOS, and Windows Phone

    Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., 2013, Foundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • 2012

    SCUTA: A server-side access control system for web applications

    Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2011

    Attacks on WebView in the Android system

    Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    118 Scopus citations
  • Automatic reputation computation through document analysis: A social network approach

    Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Sep 19 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Contego: Capability-based access control for web browsers (Short paper)

    Luo, T. & Du, W., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Contego: Capability-based access control for web browsers

    Luo, T. & Du, W., 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Balacheff, B., Beres, Y., Sasse, A., McCune, J. M., Perrig, A. & Sadeghi, A-R. (eds.). Springer Verlag, p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Cryptographic link signatures for spectrum usage authentication in cognitive radio

    Tan, X., Borle, K., Du, W. & Chen, B., 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • PHY-based cooperative key generation in wireless networks

    Lai, L., Liang, Y. & Du, W., Dec 1 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Position paper: Why are there so many vulnerabilities in web applications?

    Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., Dec 1 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Re-designing the web's access control system (Extended abstract)

    Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secret sharing via noisy broadcast channels

    Lai, L., Liang, Y., Du, W. & Shamai, S., Oct 26 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2010

    Bureaucratic protocols for secure two-party sorting, selection, and permuting

    Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • ESCUDO: A fine-grained protection model for web browsers

    Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • K-anonymous association rule hiding

    Zhu, Z. & Du, W., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Understanding privacy risk of publishing decision trees

    Zhu, Z. & Du, W., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    Deriving private information from association rule mining results

    Zhu, Z., Wang, G. & Du, W., 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • On the approximability of geometric and geographic generalization and the min-max bin covering problem

    Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2008

    Inference analysis in privacy-preserving data re-publishing

    Wang, G., Zhu, Z., Du, W. & Teng, Z., 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1079-1084 6 p. 4781228. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • OptRR: Optimizing randomized response schemes for privacy-preserving data mining

    Huang, Z. & Du, W., 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 705-714 10 p. 4497479. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Privacy-MaxEnt: Integrating background knowledge in privacy quantification

    Du, W., Teng, Z. & Zhu, Z., Dec 10 2008, SIGMOD 2008: Proceedings of the ACM SIGMOD International Conference on Management of Data 2008. p. 459-472 14 p. 1376665. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Scopus citations
  • Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

    Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494. (Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    77 Scopus citations
  • 2007

    A hybrid multi-group privacy-preserving approach for building decision trees

    Teng, Z. & Du, W., 2007, Advances in Knowledge Discovery and Data Mining - 11th Pacific-Asia Conference, PAKDD 2007, Proceedings. Springer Verlag, p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Containing denial-of-service attacks in broadcast authentication in sensor networks

    Wang, R., Du, W. & Ning, P., 2007, MobiHoc'07: Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 71-79 9 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Effects of inconsistently masked data using RPT on CF with privacy

    Polat, H. & Du, W., Oct 18 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. p. 649-653 5 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Searching for better randomized response schemes for privacy-preserving data mining

    Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • SEED: A suite of instructional laboratories for computer SEcurity EDucation

    Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2006

    Achieving private recommendations using randomized response techniques

    Polat, H. & Du, W., 2006, Advances in Knowledge Discovery and Data Mining - 10th Pacific-Asia Conference, PAKDD 2006, Proceedings. p. 637-646 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Scopus citations
  • Comparisons of K-anonymization and randomization schemes under linking attacks

    Teng, Z. & Du, W., 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. p. 1091-1096 6 p. 4053159. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Diversify sensor nodes to improve resilience against node compromise

    Alarifi, A. & Du, W., 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 101-112 12 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • 2005

    Attack-resistant location estimation in sensor networks

    Liu, D., Ning, P. & Du, W. K., 2005, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005. p. 99-106 8 p. 1440904. (2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    204 Scopus citations
  • Group-based key pre-distribution in wireless sensor networks

    Liu, D., Ning, P. & Du, W., 2005, WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security. Association for Computing Machinery, p. 11-20 10 p. (WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    139 Scopus citations
  • LAD: Localization anomaly detection for wireless sensor networks

    Du, W., Fang, L. & Ning, P., Dec 1 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. p. 41a 1419861. (Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • Privacy-preserving collaborative filtering on vertically partitioned data

    Polat, H. & Du, W., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 651-658 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3721 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Privacy-preserving top-N recommendation on horizontally partitioned data

    Polat, H. & Du, W., 2005, Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005. p. 725-731 7 p. 1517942. (Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • Risk-based routing protocol for wireless ad-hoc networks

    Alarifi, A. & Du, W., Dec 1 2005, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05. p. 161-165 5 p. (Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution