
Lingyu Wang 0001
Person information
- affiliation: Concordia University, Montreal, Canada
Other persons with the same name
- Lingyu Wang — disambiguation page
- Lingyu Wang 0002 — Nanyang Technological University, Singapore
- Lingyu Wang 0003 — Chinese Academy of Science, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [b7]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j47]Saed Alrabaee
, Mourad Debbabi, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [c85]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c84]Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [c83]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [i3]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b6]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j46]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j45]Saed Alrabaee, Mourad Debbabi, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28(Supplement): S3-S11 (2019) - [j44]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j43]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j42]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j41]Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. EAI Endorsed Trans. Security Safety 5(17): e5 (2019) - [j40]Mina Khalili, Mengyuan Zhang, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Trans. Security Safety 5(18): e1 (2019) - [j39]Mengyuan Zhang
, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. IEEE Trans. Inf. Forensics Secur. 14(9): 2315-2330 (2019) - [j38]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [c82]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c81]Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c80]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c79]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c78]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c77]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c76]Onur Duman, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e5]Jianying Zhou, Robert H. Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - 2018
- [j37]Alireza Shameli Sendi, Michel Dagenais, Lingyu Wang:
Realtime intrusion risk assessment model based on attack and service dependency graphs. Comput. Commun. 116: 253-272 (2018) - [j36]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j35]Wenyu Qu, Wei Huo, Lingyu Wang:
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. EAI Endorsed Trans. Security Safety 5(16): e5 (2018) - [j34]Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j33]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [c75]Lingyu Wang, Mengyuan Zhang, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. From Database to Cyber Security 2018: 450-469 - [c74]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c73]Taous Madi, Mengyuan Zhang, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c72]Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c71]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [c70]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c69]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c68]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c67]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [i2]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j32]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j31]Yuan Hong
, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. IEEE Trans. Inf. Forensics Secur. 12(9): 2227-2241 (2017) - [c66]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [c65]Paria Shirani, Lingyu Wang, Mourad Debbabi:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c64]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c63]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c62]Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [e4]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - [i1]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - 2016
- [b4]Wen Ming Liu, Lingyu Wang:
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications. Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, pp. 1-142 - [j30]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [j29]Baojiang Cui, Fuwei Wang, Yongle Hao, Lingyu Wang:
A taint based approach for automatic reverse engineering of gray-box file formats. Soft Comput. 20(9): 3563-3578 (2016) - [j28]Baojiang Cui, Zheli Liu, Lingyu Wang:
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans. Computers 65(8): 2374-2385 (2016) - [j27]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [c61]Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. CODASPY 2016: 195-206 - [c60]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c59]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - [c58]Mickael Emirkanian-Bouchard, Lingyu Wang:
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. FPS 2016: 117-134 - [c57]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c56]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - 2015
- [b3]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j26]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12(Supplement-1): S61-S71 (2015) - [j25]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14(1): S146-S155 (2015) - [j24]Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. J. Comput. Secur. 23(2): 131-165 (2015) - [c55]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - 2014
- [b2]Lingyu Wang, Massimiliano Albanese
, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j23]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(1): S94-S103 (2014) - [j22]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j21]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren
, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [j20]Zhen Xu, Cong Wang
, Kui Ren
, Lingyu Wang, Bingsheng Zhang
:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. IEEE Trans. Inf. Forensics Secur. 9(11): 1790-1803 (2014) - [c54]Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. DBSec 2014: 179-194 - [c53]Lingyu Wang, Mengyuan Zhang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - 2013
- [c52]Wen Ming Liu, Lingyu Wang, Kui Ren
, Mourad Debbabi:
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. CloudCom (1) 2013: 679-686 - [c51]Massimiliano Albanese
, Sushil Jajodia
, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c50]Zhen Xu, Cong Wang
, Qian Wang
, Kui Ren
, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c49]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c48]William Nzoukou, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
A Unified Framework for Measuring a Network's Mean Time-to-Compromise. SRDS 2013: 215-224 - [e3]Lingyu Wang, Basit Shafiq:
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9 [contents] - 2012
- [j19]Yong Zeng, Lingyu Wang:
Secure collaboration in design and supply chain management. Comput. Ind. 63(6): 543-544 (2012) - [j18]Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker:
Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Comput. Ind. 63(6): 545-556 (2012) - [j17]Da Yong Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng:
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J. Intell. Manuf. 23(4): 1351-1364 (2012) - [c47]Wen Ming Liu, Lingyu Wang:
Privacy streamliner: a two-stage approach to improving algorithm efficiency. CODASPY 2012: 193-204 - [c46]Wen Ming Liu, Lingyu Wang, Kui Ren
, Pengsu Cheng, Mourad Debbabi:
k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99 - [c45]Pengsu Cheng, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40 - 2011
- [j16]Da Yong Zhang, Yong Zeng, Lingyu Wang, Hongtao Li, Yuanfeng Geng:
Modeling and evaluating information leakage caused by inferences in supply chains. Comput. Ind. 62(3): 351-363 (2011) - [j15]Noman Mohammed, Hadi Otrok
, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [c44]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Mourad Debbabi:
Privacy-preserving traffic padding in web-based applications. WPES 2011: 131-136 - 2010
- [j14]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring Security Risk of Networks Using Attack Graphs. Int. J. Next Gener. Comput. 1(1) (2010) - [j13]Bo Zhu, Kui Ren
, Lingyu Wang, Mourad Debbabi:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010) - [j12]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. IEEE Trans. Inf. Forensics Secur. 5(2): 324-336 (2010) - [j11]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010) - [c43]Pengsu Cheng, Lingyu Wang, Tao Long:
Compressing Attack Graphs Through Reference Encoding. CIT 2010: 1026-1031 - [c42]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c41]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587 - [c40]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - [c39]Wen Ming Liu, Lingyu Wang, Lei Zhang:
k-jump strategy for preserving privacy in micro-data disclosure. ICDT 2010: 104-115 - [c38]Hamad Binsalleeh, Thomas Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang:
On the analysis of the Zeus botnet crimeware toolkit. PST 2010: 31-38 - [c37]Thomas Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. SECURWARE 2010: 195-200 - [c36]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
- [j10]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Patrick C. K. Hung:
Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) - [j9]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. Electron. Notes Theor. Comput. Sci. 254: 143-160 (2009) - [j8]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini
, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. J. Comput. Secur. 17(1): 5-42 (2009) - [j7]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [c35]Yiming Wang, Lingyu Wang, Benjamin C. M. Fung
:
Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5 - [c34]Serguei A. Mokhov
, Jian Li, Lingyu Wang:
Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5 - [c33]Lei Zhang, Lingyu Wang, Sushil Jajodia
, Alexander Brodsky:
L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 - [c32]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad
, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - 2008
- [j6]Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [j5]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases. J. Comput. Secur. 16(4): 419-437 (2008) - [c31]Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 - [c30]Feng Chen, Lingyu Wang, Jinshu Su
:
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212 - [c29]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring network security using dynamic bayesian network. QoP 2008: 23-30 - [c28]Serguei A. Mokhov
, Farid Rassai, Lee Wei Huynh, Lingyu Wang:
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 423-429 - [c27]Serguei A. Mokhov
, Lee Wei Huynh, Lingyu Wang:
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 449-455 - [c26]Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli:
Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 - [c25]Marcel Frigault, Lingyu Wang:
Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 - [c24]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky:
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 - [c23]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia:
An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 - [c22]Bo Zhu, Kui Ren
, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 - [c21]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Mourad Debbabi:
A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 - [c20]Tania Islam, Lingyu Wang:
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5 - [c19]Shuai Liu, Wei Li, Lingyu Wang:
Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5 - [c18]Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang:
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 - [c17]