Wenliang Du
Wenliang Du
Verified email at - Homepage
Cited by
Cited by
A pairwise key predistribution scheme for wireless sensor networks
W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili
ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005
A key management scheme for wireless sensor networks using deployment knowledge
W Du, J Deng, YS Han, S Chen, PK Varshney
IEEE INFOCOM 2004 1, 2004
Droidapiminer: Mining api-level features for robust malware detection in android
Y Aafer, W Du, H Yin
Security and Privacy in Communication Networks: 9th International ICST …, 2013
Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah
Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001
Building decision tree classifier on private data
W Du, Z Zhan
Deriving private information from randomized data
Z Huang, W Du, B Chen
Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005
Privacy-preserving multivariate statistical analysis: Linear regression and classification
W Du, YS Han, S Chen
Proceedings of the 2004 SIAM international conference on data mining, 222-233, 2004
Secure multi-party computational geometry
MJ Atallah, W Du
Workshop on Algorithms and Data Structures, 165-179, 2001
Privacy-preserving collaborative filtering using randomized perturbation techniques
H Polat, W Du
Third IEEE international conference on data mining, 625-628, 2003
Using randomized response techniques for privacy-preserving data mining
W Du, Z Zhan
Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003
Privacy-preserving cooperative statistical analysis
W Du, MJ Atallah
Seventeenth Annual Computer Security Applications Conference, 102-110, 2001
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
An efficient scheme for authenticating public keys in sensor networks
W Du, R Wang, P Ning
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
SVD-based collaborative filtering with privacy
H Polat, W Du
Proceedings of the 2005 ACM symposium on Applied computing, 791-795, 2005
Lad: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
Attacks on WebView in the Android system
T Luo, H Hao, W Du, Y Wang, H Yin
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
A key predistribution scheme for sensor networks using deployment knowledge
W Du, J Deng, YS Han, PK Varshney
IEEE Transactions on dependable and secure computing 3 (1), 62-77, 2006
Privacy-Preserving Cooperative Scientific Computations.
W Du, MJ Atallah
csfw 1, 273, 2001
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
D Liu, P Ning, W Du
25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20