If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

  • 6986 Citations
  • 39 h-Index
  • 69 Conference contribution
  • 24 Article
  • 2 Chapter
Filter
Conference contribution
2019

TruZ-view: Developing trustZone user interface for mobile oS using delegation integration model

Ying, K., Thavai, P. & Du, W., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 1-12 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
User interfaces
Application programs
Mobile devices
2018
3 Citations (Scopus)

TruZ-Droid: Integrating TrustZone with mobile operating system

Ying, K., Ahlawat, A., Alsharifi, B., Jiang, Y., Thavai, P. & Du, W., Jun 10 2018, MobiSys 2018 - Proceedings of the 16th ACM International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 14-27 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Application programming interfaces (API)
Mobile devices
Servers
Hardware
2016
1 Citation (Scopus)

Intentio ex machina: Android intent access control via an extensible application hook

Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hooks
Access Control
Access control
Firewall
Communication
2015
12 Citations (Scopus)

Fine-grained access control for HTML5-based mobile applications in android

Jin, X., Wang, L., Luo, T. & Du, W., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 7807. p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile Applications
Access Control
Access control
JavaScript
Middleware
18 Citations (Scopus)

Hare hunting in the wild android: A study on the threat of hanging attribute references

Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Defects
Electronic mail
Industrial plants
Hazards
2014
6 Citations (Scopus)

Attacks on Android clipboard

Zhang, X. & Du, W., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8550 LNCS. p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Attack
Injection
Manipulation
JavaScript
88 Citations (Scopus)

Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Mobile devices
36 Citations (Scopus)

Compac: Enforce component-level access control in Android

Wang, Y., Hariharan, S., Zhao, C., Liu, J. & Du, W., 2014, CODASPY 2014 - Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 25-36 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
2013
34 Citations (Scopus)

AFrame: Isolating advertisements from mobile applications in android

Zhang, X., Ahlawat, A. & Du, W., 2013, ACM International Conference Proceeding Series. p. 9-18 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Display devices
23 Citations (Scopus)

A physical layer authentication scheme for countering primary user emulation attack

Borle, K. M., Chen, B. & Du, W., Oct 18 2013, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. p. 2935-2939 5 p. 6638195

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cognitive radio
Degradation
264 Citations (Scopus)

DroidAPIMiner: Mining API-level features for robust malware detection in android

Aafer, Y., Du, W. & Yin, H., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Springer Verlag, Vol. 127 LNICST. p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Classifiers
Application programs
Android (operating system)
Malware
2 Citations (Scopus)

Mediums: Visual integrity preserving framework

Luo, T., Jin, X. & Du, W., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Access control
Containers
Servers
Display devices
40 Citations (Scopus)

On the effectiveness of API-level access control using bytecode rewriting in Android

Hao, H., Singh, V. & Du, W., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Access control
Static analysis
18 Citations (Scopus)

Touchjacking attacks on Web in Android, iOS, and Windows Phone

Luo, T., Jin, X., Ananthanarayanan, A. & Du, W., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7743 LNCS. p. 227-243 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7743 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Attack
Black Box
User Interface
User interfaces
2012
2 Citations (Scopus)

SCUTA: A server-side access control system for web applications

Tan, X., Du, W., Luo, T. & Soundararaj, K. D., 2012, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. p. 71-82 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Servers
Control systems
Security of data
Websites
2011
104 Citations (Scopus)

Attacks on WebView in the Android system

Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., 2011, ACM International Conference Proceeding Series. p. 343-352 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Application programming interfaces (API)
Smartphones
Websites
6 Citations (Scopus)

Automatic reputation computation through document analysis: A social network approach

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H. A., Wang, L. & Jin, X., 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex networks
4 Citations (Scopus)

Contego: Capability-based access control for web browsers (Short paper)

Luo, T. & Du, W., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6740 LNCS. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
Access Control
Access control
Websites
Vulnerability
44 Citations (Scopus)

Cryptographic link signatures for spectrum usage authentication in cognitive radio

Tan, X., Borle, K., Du, W. & Chen, B., 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Authentication
Telecommunication links
Radio receivers
Modulation
12 Citations (Scopus)

PHY-based cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multiplexing
Wireless networks
Network protocols
4 Citations (Scopus)

Position paper: Why are there so many vulnerabilities in web applications?

Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S. J., 2011, Proceedings New Security Paradigms Workshop. p. 83-93 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trusted computing

Re-designing the web's access control system (Extended abstract)

Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6818 LNCS. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Control System
Control systems
Security of data
4 Citations (Scopus)

Secret sharing via noisy broadcast channels

Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, IEEE International Symposium on Information Theory - Proceedings. p. 1955-1959 5 p. 6033894

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Channel
Secret Sharing
Secret Sharing Scheme
Scenarios
Coding
2010
18 Citations (Scopus)

Bureaucratic protocols for secure two-party sorting, selection, and permuting

Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sorting
Networks (circuits)
25 Citations (Scopus)

ESCUDO: A fine-grained protection model for web browsers

Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., 2010, Proceedings - International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Access control
Websites
10 Citations (Scopus)

K-anonymous association rule hiding

Zhu, Z. & Du, W., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Heuristic algorithms
Experiments
1 Citation (Scopus)

Understanding privacy risk of publishing decision trees

Zhu, Z. & Du, W., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6166 LNCS. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Decision tree
Privacy
Maximum Entropy
Quantify
2009
14 Citations (Scopus)

Deriving private information from association rule mining results

Zhu, Z., Wang, G. & Du, W., 2009, Proceedings - International Conference on Data Engineering. p. 18-29 12 p. 4812388

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Data mining
Data privacy
Entropy
Experiments
4 Citations (Scopus)

On the approximability of geometric and geographic generalization and the min-max bin covering problem

Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5664 LNCS. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Covering Problem
Approximability
Bins
Min-max
Attribute
2008
9 Citations (Scopus)

Inference analysis in privacy-preserving data re-publishing

Wang, G., Zhu, Z., Du, W. & Teng, Z., 2008, Proceedings - IEEE International Conference on Data Mining, ICDM. p. 1079-1084 6 p. 4781228

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Entropy
Experiments
39 Citations (Scopus)

OptRR: Optimizing randomized response schemes for privacy-preserving data mining

Huang, Z. & Du, W., 2008, Proceedings - International Conference on Data Engineering. p. 705-714 10 p. 4497479

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Multiobjective optimization
44 Citations (Scopus)

Privacy-MaxEnt: Integrating background knowledge in privacy quantification

Du, W., Teng, Z. & Zhu, Z., 2008, Proceedings of the ACM SIGMOD International Conference on Management of Data. p. 459-472 14 p. 1376665

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Data privacy
77 Citations (Scopus)

Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

Hyun, S., Ning, P., Liu, A. & Du, W., 2008, Proceedings - 2008 International Conference on Information Processing in Sensor Networks, IPSN 2008. p. 445-456 12 p. 4505494

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Military operations
Sensor nodes
Telecommunication links
Data acquisition
2007
12 Citations (Scopus)

A hybrid multi-group privacy-preserving approach for building decision trees

Teng, Z. & Du, W., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4426 LNAI. p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision Trees
Privacy
Privacy Preserving
Random Allocation
Decision trees
27 Citations (Scopus)

Containing denial-of-service attacks in broadcast authentication in sensor networks

Wang, R., Du, W. & Ning, P., 2007, Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. 71-79 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key cryptography
Sensor nodes
Authentication
Sensor networks
Broadcasting
9 Citations (Scopus)

Effects of inconsistently masked data using RPT on CF with privacy

Polat, H. & Du, W., 2007, Proceedings of the ACM Symposium on Applied Computing. p. 649-653 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Perturbation techniques
Industry
1 Citation (Scopus)

Searching for better randomized response schemes for privacy-preserving data mining

Huang, Z., Du, W. & Teng, Z., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4702 LNAI. p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving Data Mining
Randomized Response
Data Mining
Privacy
Data mining
3 Citations (Scopus)

SEED: A suite of instructional laboratories for computer SEcurity EDucation

Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Education
education
Students
evaluation
2006
44 Citations (Scopus)

Achieving private recommendations using randomized response techniques

Polat, H. & Du, W., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3918 LNAI. p. 637-646 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Randomized Response Technique
Collaborative filtering
Privacy
Recommendations
Collaborative Filtering
8 Citations (Scopus)

Comparisons of K-anonymization and randomization schemes under linking attacks

Teng, Z. & Du, W., 2006, Proceedings - IEEE International Conference on Data Mining, ICDM. p. 1091-1096 6 p. 4053159

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Diversify sensor nodes to improve resilience against node compromise

Alarifi, A. & Du, W., 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 101-112 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor nodes
Sensor networks
Reverse engineering
Sensors
Hardware
2005
97 Citations (Scopus)

A beacon-less location discovery scheme for wireless sensor networks

Fang, L., Du, W. & Ning, P., 2005, Proceedings - IEEE INFOCOM. Makki, K. & Knightly, E. (eds.). Vol. 1. p. 161-171 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensors
Global positioning system
Maximum likelihood estimation
Sensor nodes
142 Citations (Scopus)

An efficient scheme for authenticating public keys in sensor networks

Du, W., Wang, R. & Ning, P., 2005, Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). p. 58-67 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key cryptography
Sensor networks
Authentication
Hash functions
Sensor nodes
197 Citations (Scopus)

Attack-resistant location estimation in sensor networks

Liu, D., Ning, P. & Du, W., 2005, 2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005. Vol. 2005. p. 99-106 8 p. 1440904

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensor networks
Authentication
Network protocols
Sensors
Experiments
262 Citations (Scopus)

Deriving private information from randomized data

Huang, Z., Du, W. & Chen, B., 2005, Proceedings of the ACM SIGMOD International Conference on Management of Data. Widom, J., Ozcan, F. & Chirkova, R. (eds.). p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Principal component analysis
Data mining
142 Citations (Scopus)

Detecting malicious beacon nodes for secure location discovery in wireless sensor networks

Liu, D., Ning, P. & Du, W., 2005, Proceedings - International Conference on Distributed Computing Systems. Institute of Electrical and Electronics Engineers Inc., p. 609-619 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensors
Base stations
Sensor networks
Global positioning system
139 Citations (Scopus)

Group-based key pre-distribution in wireless sensor networks

Liu, D., Ning, P. & Du, W., 2005, WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security. p. 11-20 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Sensors
Sensor nodes
Sensor networks
84 Citations (Scopus)

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L. & Ning, P., 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. Vol. 2005. 1419861

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Global positioning system
Sensors
Intrusion detection
Sensor nodes
26 Citations (Scopus)

Privacy-preserving collaborative filtering on vertically partitioned data

Polat, H. & Du, W., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3721 LNAI. p. 651-658 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3721 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Collaborative Filtering
Privacy
Privacy Preserving
Data privacy
31 Citations (Scopus)

Privacy-preserving top-N recommendation on horizontally partitioned data

Polat, H. & Du, W., 2005, Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005. Vol. 2005. p. 725-731 7 p. 1517942

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Collaborative filtering
Electronic commerce
Byproducts
Experiments