• 7375 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution

Achieving private recommendations using randomized response techniques

Polat, H. & Du, W., Jul 14 2006, Advances in Knowledge Discovery and Data Mining - 10th Pacific-Asia Conference, PAKDD 2006, Proceedings. p. 637-646 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

AFrame: Isolating advertisements from mobile applications in android

Zhang, X., Ahlawat, A. & Du, W., Dec 1 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 9-18 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

37 Scopus citations

A hybrid multi-group privacy-preserving approach for building decision trees

Teng, Z. & Du, W., Dec 1 2007, Advances in Knowledge Discovery and Data Mining - 11th Pacific-Asia Conference, PAKDD 2007, Proceedings. p. 296-307 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4426 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

A physical layer authentication scheme for countering primary user emulation attack

Borle, K. M., Chen, B. & Du, W., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 2935-2939 5 p. 6638195. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Attack-resistant location estimation in sensor networks

Liu, D., Ning, P. & Du, W. K., Dec 1 2005, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005. p. 99-106 8 p. 1440904. (2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

200 Scopus citations

Attacks on Android clipboard

Zhang, X. & Du, W., Jan 1 2014, Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Proceedings. Springer Verlag, p. 72-91 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8550 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Attacks on WebView in the Android system

Luo, T., Hao, H., Du, W., Wang, Y. & Yin, H., Dec 1 2011, Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011. p. 343-352 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

114 Scopus citations

Automatic reputation computation through document analysis: A social network approach

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Sep 19 2011, Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011. p. 559-560 2 p. 5992663. (Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Bureaucratic protocols for secure two-party sorting, selection, and permuting

Wang, G., Luo, T., Goodrich, M. T., Du, W. & Zhu, Z., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 226-237 12 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Code injection attacks on HTML5-based mobile apps: Characterization, detection and mitigation

Jin, X., Hu, X., Ying, K., Du, W., Yin, H. & Peri, G. N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 66-77 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

103 Scopus citations

Comparisons of K-anonymization and randomization schemes under linking attacks

Teng, Z. & Du, W., Dec 1 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. p. 1091-1096 6 p. 4053159. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Containing denial-of-service attacks in broadcast authentication in sensor networks

Wang, R., Du, W. & Ning, P., Dec 1 2007, MobiHoc'07: Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 71-79 9 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

Contego: Capability-based access control for web browsers (Short paper)

Luo, T. & Du, W., Jun 27 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Contego: Capability-based access control for web browsers

Luo, T. & Du, W., Jan 1 2011, Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings. Springer Verlag, Vol. 6740 LNCS. p. 231-238 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Cryptographic link signatures for spectrum usage authentication in cognitive radio

Tan, X., Borle, K., Du, W. & Chen, B., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 79-90 12 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Deriving private information from association rule mining results

Zhu, Z., Wang, G. & Du, W., Jul 8 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 18-29 12 p. 4812388. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Detecting exploit code execution in loadable kernel modules

Xu, H., Du, W. & Chapin, S. J., Dec 1 2004, Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004. p. 101-110 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Diversify sensor nodes to improve resilience against node compromise

Alarifi, A. & Du, W., Dec 1 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 101-112 12 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

DroidAPIMiner: Mining API-level features for robust malware detection in android

Aafer, Y., Du, W. & Yin, H., Jan 1 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 86-103 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

321 Scopus citations

Effects of inconsistently masked data using RPT on CF with privacy

Polat, H. & Du, W., Oct 18 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. p. 649-653 5 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

ESCUDO: A fine-grained protection model for web browsers

Jayaraman, K., Du, W., Rajagopalan, B. & Chapin, S. J., Aug 27 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 231-240 10 p. 5541712. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

Fine-grained access control for HTML5-based mobile applications in android

Jin, X., Wang, L., Luo, T. & Du, W., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 7807. p. 309-318 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Group-based key pre-distribution in wireless sensor networks

Liu, D., Ning, P. & Du, W., Jan 1 2005, WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security. Association for Computing Machinery, p. 11-20 10 p. (WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

138 Scopus citations

Hare hunting in the wild android: A study on the threat of hanging attribute references

Aafer, Y., Zhang, N., Zhang, Z., Zhang, X., Chen, K., Wang, X., Zhou, X., Du, W. & Grace, M., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1248-1259 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Harvesting inconsistent security configurations in custom android ROMs via differential analysis

Aafer, Y., Zhang, X. & Du, W., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 1153-1168 16 p. (Proceedings of the 25th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Hey, you, get off of my image: Detecting data residue in android images

Zhang, X., Aafer, Y., Ying, K. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 401-421 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Inference analysis in privacy-preserving data re-publishing

Wang, G., Zhu, Z., Du, W. & Teng, Z., Dec 1 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1079-1084 6 p. 4781228. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Intentio ex machina: Android intent access control via an extensible application hook

Yagemann, C. & Du, W., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 383-400 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

K-anonymous association rule hiding

Zhu, Z. & Du, W., Jul 16 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 305-309 5 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L. & Ning, P., Dec 1 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. p. 41a 1419861. (Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

89 Scopus citations

Mediums: Visual integrity preserving framework

Luo, T., Jin, X. & Du, W., Mar 18 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 309-316 8 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

On the approximability of geometric and geographic generalization and the min-max bin covering problem

Du, W., Eppstein, D., Goodrich, M. T. & Lueker, G. S., Sep 14 2009, Algorithms and Data Structures - 11th International Symposium, WADS 2009, Proceedings. p. 242-253 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5664 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

On the effectiveness of API-level access control using bytecode rewriting in Android

Hao, H., Singh, V. & Du, W., May 27 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 25-36 12 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

OptRR: Optimizing randomized response schemes for privacy-preserving data mining

Huang, Z. & Du, W., Oct 1 2008, Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08. p. 705-714 10 p. 4497479. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

PHY-based cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., Dec 1 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011. p. 662-669 8 p. 6120231. (2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Position paper: Why are there so many vulnerabilities in web applications?

Du, W., Jayaraman, K., Tan, X., Luo, T. & Chapin, S., Dec 1 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 83-93 11 p. (Proceedings New Security Paradigms Workshop).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Privacy-MaxEnt: Integrating background knowledge in privacy quantification

Du, W., Teng, Z. & Zhu, Z., Dec 10 2008, SIGMOD 2008: Proceedings of the ACM SIGMOD International Conference on Management of Data 2008. p. 459-472 14 p. 1376665. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Privacy-preserving collaborative filtering on vertically partitioned data

Polat, H. & Du, W., Dec 1 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 651-658 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3721 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Privacy-preserving collaborative filtering using randomized perturbation techniques

Polat, H. & Du, W., Dec 1 2003, Proceedings - 3rd IEEE International Conference on Data Mining, ICDM 2003. p. 625-628 4 p. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

189 Scopus citations

Privacy-preserving cooperative statistical analysis

Du, W. & Atallah, M. J., Jan 1 2001, Proceedings - 17th Annual Computer Security Applications Conference, ACSAC 2001. IEEE Computer Society, p. 102-110 9 p. 991526. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2001-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

201 Scopus citations

Privacy-preserving top-N recommendation on horizontally partitioned data

Polat, H. & Du, W., Dec 1 2005, Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005. p. 725-731 7 p. 1517942. (Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Re-designing the web's access control system (Extended abstract)

Du, W., Tan, X., Luo, T., Jayaraman, K. & Zhu, Z., Jul 18 2011, Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Proceedings. p. 4-11 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk-based routing protocol for wireless ad-hoc networks

Alarifi, A. & Du, W., Dec 1 2005, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05. p. 161-165 5 p. (Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SCUTA: A server-side access control system for web applications

Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Searching for better randomized response schemes for privacy-preserving data mining

Huang, Z., Du, W. & Teng, Z., Dec 1 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Secret sharing via noisy broadcast channels

Lai, L., Liang, Y., Du, W. & Shamai, S., Oct 26 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Secure and Private Sequence Comparisons

Atallah, M. J., Kerschbaum, F. & Du, W., Dec 1 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P., Syverson, P., Samarati, P. & Syverson, P. (eds.). p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

127 Scopus citations

Secure multi-party computational geometry

Atallah, M. J. & Du, W., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2125. p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

186 Scopus citations

Security relevancy analysis on the registry of windows NT 4.0

Du, W., Garg, P. & Mathur, A. P., Jan 1 1999, Proceedings - 15th Annual Computer Security Applications Conference, ACSAC 1999. Association for Computing Machinery, p. 331-338 8 p. 816044. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. Part F133431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

SEED: A suite of instructional laboratories for computer SEcurity EDucation

Du, W., Teng, Z. & Wang, R., Oct 1 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations