Donggang Liu

According to our database1, Donggang Liu authored at least 58 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models.
Computers & Security, 2016

2015
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models.
CoRR, 2015

2014
Using data mules to preserve source location privacy in Wireless Sensor Networks.
Pervasive and Mobile Computing, 2014

A distributed framework for demand-driven software vulnerability detection.
Journal of Systems and Software, 2014

Fast and energy-efficient technique for jammed region mapping in wireless sensor networks.
CoRR, 2014

2013
Mitigating jamming attacks in wireless broadcast systems.
Wireless Networks, 2013

Providing DoS resistance for signature-based broadcast authentication in sensor networks.
ACM Trans. Embedded Comput. Syst., 2013

DroidTest: Testing Android Applications for Leakage of Private Information.
Proceedings of the Information Security, 16th International Conference, 2013

On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

Privacy Preserving Query Answering in Peer Data Management Systems.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper.
IEEE Trans. Mob. Comput., 2012

Using Auxiliary Sensors for Pairwise Key Establishment in WSN.
ACM Trans. Embedded Comput. Syst., 2012

SimFuzz: Test case similarity directed deep fuzzing.
Journal of Systems and Software, 2012

Efficient and timely jamming detection in wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Fast jamming detection in sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Secure Localization.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Probabilistic Key Sharing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Node Clone Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Broadcast Authentication from a Conditional Perspective.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hardening Embedded Networking Devices Against Side-Channel Attacks.
Ad Hoc & Sensor Wireless Networks, 2011

A combinatorial approach to detecting buffer overflow vulnerabilities.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Efficient and distributed access control for sensor networks.
Wireless Networks, 2010

Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Detecting vulnerabilities in C programs using trace-based testing.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

DataGuard: Dynamic data attestation in wireless sensor networks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks.
Ad Hoc Networks, 2009

Resilient Cluster Leader Election for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Combating side-channel attacks using key management.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Protecting Neighbor Discovery Against Node Compromises in Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Group-based key predistribution for wireless sensor networks.
TOSN, 2008

Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Source location privacy against laptop-class attacks in sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Reusing Existing Test Cases for Security Testing.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Secure and Resilient Localization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Efficient security mechanisms for overlay multicast based content delivery.
Computer Communications, 2007

Using Auxiliary Sensors for Pairwise Key Establishment in WSN.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Detecting Misused Keys in Wireless Sensor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Location Privacy in Sensor Networks Against a Global Eavesdropper.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Resilient Cluster Formation for Sensor Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Efficient and Distributed Access Control for Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2007

Security for Wireless Sensor Networks
Advances in Information Security 28, Springer, ISBN: 978-0-387-32723-5, 2007

2005
Improving key predistribution with deployment knowledge in static sensor networks.
TOSN, 2005

Establishing pairwise keys in distributed sensor networks.
ACM Trans. Inf. Syst. Secur., 2005

Group-based key pre-distribution in wireless sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Practical Broadcast Authentication in Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Attack-resistant location estimation in sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
Proceedings of the Applied Cryptography and Network Security, 2005

Broadcast Authentication and Key Management for Secure Sensor Networks.
Proceedings of the Handbook of Sensor Networks: Algorithms and Architectures, 2005

2004
Multilevel µTESLA: Broadcast authentication for distributed sensor networks.
ACM Trans. Embedded Comput. Syst., 2004

2003
Location-based pairwise key establishments for static sensor networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
Proceedings of the Network and Distributed System Security Symposium, 2003

Efficient self-healing group key distribution with revocation capability.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Establishing pairwise keys in distributed sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...