Lingyu Wang

According to our database1, Lingyu Wang authored at least 118 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Threat Modeling for Cloud Infrastructures.
ICST Trans. Security Safety, 2019

2018
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2018

FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries.
ACM Trans. Priv. Secur., 2018

User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Information Forensics and Security, 2018

Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
Journal of Computer Security, 2018

On Leveraging Coding Habits for Effective Binary Authorship Attribution.
Proceedings of the Computer Security, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.
Proceedings of the From Database to Cyber Security, 2018

2017
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status.
IEEE Trans. Information Forensics and Security, 2017

Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103].
Digital Investigation, 2017

Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Network Security Metrics
Springer, ISBN: 978-3-319-66504-7, 2017

2016
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications
Advances in Information Security 68, Springer, ISBN: 978-3-319-42644-0, 2016

Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Information Forensics and Security, 2016

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage.
IEEE Trans. Computers, 2016

A taint based approach for automatic reverse engineering of gray-box file formats.
Soft Comput., 2016

Aspect-oriented modeling framework for security hardening.
ISSE, 2016

Towards Metric-Driven, Application-Specific Visualization of Attack Graphs.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

On the Feasibility of Malware Authorship Attribution.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Threat Modeling for Cloud Data Center Infrastructures.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure.
Journal of Computer Security, 2015

BinComp: A stratified approach to compiler provenance Attribution.
Digital Investigation, 2015

SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code.
Digital Investigation, 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Network Hardening - An Automated Approach to Improving Network Security
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014

Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Information Forensics and Security, 2014

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Sec. Comput., 2014

PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications.
IEEE Trans. Dependable Sec. Comput., 2014

OBA2: An Onion approach to Binary code Authorship Attribution.
Digital Investigation, 2014

Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
A Unified Framework for Measuring a Network's Mean Time-to-Compromise.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Proceedings of the SECRYPT 2013, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection.
J. Intelligent Manufacturing, 2012

Secure collaboration in global design and supply chain environment: Problem analysis and literature review.
Computers in Industry, 2012

Secure collaboration in design and supply chain management.
Computers in Industry, 2012

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

k-Indistinguishable Traffic Padding in Web Applications.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Privacy streamliner: a two-stage approach to improving algorithm efficiency.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
IEEE Trans. Dependable Sec. Comput., 2011

Modeling and evaluating information leakage caused by inferences in supply chains.
Computers in Industry, 2011

Privacy-preserving traffic padding in web-based applications.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Providing witness anonymity under peer-to-peer settings.
IEEE Trans. Information Forensics and Security, 2010

PCM: a privacy-preserving detection mechanism in mobile ad hoc networks.
Security and Communication Networks, 2010

Measuring Security Risk of Networks Using Attack Graphs.
IJNGC, 2010

Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

On the analysis of the Zeus botnet crimeware toolkit.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

k-jump strategy for preserving privacy in micro-data disclosure.
Proceedings of the Database Theory, 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Compressing Attack Graphs Through Reference Encoding.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Usability of Security Specification Approaches for UML Design: A Survey.
Journal of Object Technology, 2009

Evaluating privacy threats in released database views by symmetric indistinguishability.
Journal of Computer Security, 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Electr. Notes Theor. Comput. Sci., 2009

Privacy-preserving data publishing for cluster analysis.
Data Knowl. Eng., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

L-Cover: Preserving Diversity by Anonymity.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Simple Dynamic Key Management in SQL Randomization.
Proceedings of the NTMS 2009, 2009

Preserving Privacy for Location-Based Services with Continuous Queries.
Proceedings of IEEE International Conference on Communications, 2009

2008
Security in Data Warehouses and OLAP Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Implementing interactive analysis of attack graphs using relational databases.
Journal of Computer Security, 2008

A game-theoretic intrusion detection model for mobile ad hoc networks.
Computer Communications, 2008

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing.
Proceedings of the NTMS 2008, 2008

A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph.
Proceedings of the NTMS 2008, 2008

A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.
Proceedings of the Data and Applications Security XXII, 2008

An Attack Graph-Based Probabilistic Security Metric.
Proceedings of the Data and Applications Security XXII, 2008

Preserving Privacy in E-health Systems Using Hippocratic Databases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Measuring Network Security Using Bayesian Network-Based Attack Graphs.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

Measuring network security using dynamic bayesian network.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Securing Telehealth Applications in a Web-Based e-Health Portal.
Proceedings of the The Third International Conference on Availability, 2008

2007
Preserving Privacy in On-line Analytical Processing Data Cubes.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Parity-based inference control for multi-dimensional range sum queries.
Journal of Computer Security, 2007

An Efficient and Truthful Leader IDS Election Mechanism for MANET.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Measuring the Overall Security of Network Configurations Using Attack Graphs.
Proceedings of the Data and Applications Security XXI, 2007

Toward measuring network security using attack graphs.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Preserving Privacy in On-Line Analytical Processing (OLAP)
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007

2006
Minimum-cost network hardening using attack graphs.
Computer Communications, 2006

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Computer Communications, 2006

Indistinguishability: The Other Aspect of Privacy.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Interactive Analysis of Attack Graphs Using Relational Queries.
Proceedings of the Data and Applications Security XX, 2006

2005
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005

2004
Cardinality-based inference control in data cubes.
Journal of Computer Security, 2004

Securing OLAP Data Cubes Against Privacy Breaches.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

A logic-based framework for attribute based access control.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

2002
Preventing Interval-Based Inference by Random Data Perturbation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Cardinality-Based Inference Control in Sum-Only Data Cubes.
Proceedings of the Computer Security, 2002

Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002


  Loading...