Calculated based on number of publications stored in Pure and citations from Scopus
19992022

Research activity per year

Filter
Conference contribution

Search results

  • 2005

    LAD: Localization anomaly detection for wireless sensor networks

    Du, W., Fang, L. & Ning, P., 2005, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005. p. 41a 1419861. (Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005; vol. 2005).

    Research output: Chapter in Book/Entry/PoemConference contribution

    99 Scopus citations
  • Privacy-preserving collaborative filtering on vertically partitioned data

    Polat, H. & Du, W., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 651-658 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3721 LNAI).

    Research output: Chapter in Book/Entry/PoemConference contribution

    34 Scopus citations
  • Privacy-preserving top-N recommendation on horizontally partitioned data

    Polat, H. & Du, W., 2005, Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005. p. 725-731 7 p. 1517942. (Proceedings - 2005 IEEE/WIC/ACM InternationalConference on Web Intelligence, WI 2005; vol. 2005).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    41 Scopus citations
  • Risk-based routing protocol for wireless ad-hoc networks

    Alarifi, A. & Du, W., 2005, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05. p. 161-165 5 p. (Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05).

    Research output: Chapter in Book/Entry/PoemConference contribution

  • 2004

    Detecting exploit code execution in loadable kernel modules

    Xu, H., Du, W. & Chapin, S. J., 2004, Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004. p. 101-110 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Entry/PoemConference contribution

    3 Scopus citations
  • 2003

    Privacy-preserving collaborative filtering using randomized perturbation techniques

    Polat, H. & Du, W., 2003, Proceedings - 3rd IEEE International Conference on Data Mining, ICDM 2003. p. 625-628 4 p. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Entry/PoemConference contribution

    241 Scopus citations
  • Secure and Private Sequence Comparisons

    Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    153 Scopus citations
  • 2001

    Privacy-preserving cooperative statistical analysis

    Du, W. & Atallah, M. J., 2001, Proceedings - 17th Annual Computer Security Applications Conference, ACSAC 2001. IEEE Computer Society, p. 102-110 9 p. 991526. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2001-January).

    Research output: Chapter in Book/Entry/PoemConference contribution

    Open Access
    262 Scopus citations
  • Secure multi-party computational geometry

    Atallah, M. J. & Du, W., 2001, Algorithms and Data Structures - 7th International Workshop, WADS 2001, Proceedings. Dehne, F., Sack, J.-R. & Tamassia, R. (eds.). Springer Verlag, p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).

    Research output: Chapter in Book/Entry/PoemConference contribution

    248 Scopus citations
  • 2000

    Testing for software vulnerability using environment perturbation

    Du, W. & Mathur, A. P., 2000, Proceedings of the 2002 International Conference on Dependable Systems and Networks. p. 603-612 10 p. (Proceedings of the 2002 International Conference on Dependable Systems and Networks).

    Research output: Chapter in Book/Entry/PoemConference contribution

    38 Scopus citations
  • 1999

    Security relevancy analysis on the registry of windows NT 4.0

    Du, W., Garg, P. & Mathur, A. P., 1999, Proceedings - 15th Annual Computer Security Applications Conference, ACSAC 1999. Association for Computing Machinery, p. 331-338 8 p. 816044. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. Part F133431).

    Research output: Chapter in Book/Entry/PoemConference contribution

    4 Scopus citations