@inproceedings{Xie-Rootkit-13, title={Rootkit Detection on Virtual Machines through Deep Information Extraction at Hypervisor level}, booktitle={International Workshop on Security and Privacy in Cloud computing (SPCC), in conjunction with IEEE CNS}, year={2013}, author={Xiongwei Xie and W. Wang} } @inproceedings{Xie-Detect-13, title={Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding}, booktitle={International Workshop on Communications and sensor Networks, in conjunction with EUSPN}, year={2013}, author={X. Xie and W. Wang} } @inproceedings{Owens-Preserve-13, title={Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing}, booktitle={Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, in conjunction with ICCCN}, year={2013}, author={R. Owens and W. Wang} } @inproceedings{Li-Towards-12, title={Towards the Attacker's View of Protocol Narrations (or, How to Compile Security Protocols)}, booktitle={ACM AsiaCCS}, year={2012}, author={Z. Li and W. Wang} } @inproceedings{Owens-Inter-11, title={Non-interactive OS Fingerprinting through Memory De-duplication Technique in Virtual Machines}, booktitle={IEEE International Performance Computing and Communications Conference (IPCCC)}, year={2011}, author={R. Owens and W. Wang} } @inproceedings{Owens-Finger-11, title={Fingerprinting Large Data Sets Through Memory De-duplication Technique in Virtual Machines}, booktitle={IEEE Military Communications Conference (MILCOM)}, year={2011}, author={R. Owens and W. Wang} } @inproceedings{Owens-Norm-11, title={Non-normalizable Functions: a New Method to Generate Metamorphic Malware}, booktitle={IEEE Military Communications Conference (MILCOM)}, year={2011}, author={R. Owens and W. Wang} } @inproceedings{Hu-Towards-11, title={Towards Effective Collaborative Analysis for Distributed Intrusion Detection}, booktitle={IASTED International Conference on Human-Computer Interaction (HCI)}, year={2011}, author={X. Hu and H. Song and L. Harrison and A. Lu and J. Gao and W. Wang} } @inproceedings{Li-Rethink-11, title={Rethinking about Guessing Attacks}, booktitle={ACM AsiaCCS}, year={2011}, author={Z. Li and W. Wang} } @inproceedings{Li-Rethink-10, title={Rethinking about Type-flaw Attacks}, booktitle={IEEE Global Communications Conference (GLOBECOM)}, year={2010}, author={Z. Li and W. Wang} } @inproceedings{Li-Node-10, title={Node Localization in Wireless Networks Through Physical Layer Network Coding}, booktitle={IEEE Globol Communications Conference (GLOBECOM)}, year={2010}, author={Z. Li and D. Pu and W. Wang and A. Wyglinski} } @inproceedings{Coble-Secure-10, title={Secure Software Attestation for Military Telesurgical Robot Systems}, booktitle={IEEE Military Communications Conference (MILCOM)}, year={2010}, author={K. Coble and W. Wang and B. Chu and Z. Li} } @inproceedings{Li-Decide-10, title={Deciding recognizability under Dolev-Yao intruder model}, booktitle={Information Security Conference (ISC)}, year={2010}, author={Z. Li and W. Wang} } @inproceedings{Song-Secure-10, title={Secure Online Scientific Visualization of Atmospheric Nucleation Processes}, booktitle={International Conference on Networking and Distributed Computing (ICNDC)}, year={2010}, author={H. Song and W. Wang and J. Gao and A. Lu and L. Huang} } @inproceedings{Harrison-Detect-10, title={Detecting Network Abnormalities via Dual-Domain Exploration}, booktitle={International Symposium on Visualization for Cyber Security (VizSec)}, year={2010}, author={L. Harrison and X. Hu and X. Ying and A. Lu and W. Wang and X. Wu} } @inproceedings{Wang-Detect-10, title={Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding}, booktitle={Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, pages={21--30}, year={2010}, author={W. Wang and D. Pu and A. Wyglinski} } @inproceedings{Wang-Secure-09, title={Secure and Efficient Access to Outsourced Data}, booktitle={ACM Cloud Computing Security Workshop (CCSW), in conjunction with ACM CCS}, year={2009}, author={W. Wang and Z. Li and R. Owens and B. Bhargava} } @inproceedings{Wang-Defend-09, title={Defending against Collaborative Packet Drop Attacks on MANETs}, booktitle={IEEE Workshop on Dependable Network Computing and Mobile Systems (DNCMS), in conjunction with IEEE SRDS}, year={2009}, author={W. Wang and B. Bhargava and M. Linderman} } @inproceedings{Li-Using-09, title={Using Deductive Knowledge to Improve Cryptographic Protocol Verification}, booktitle={IEEE Military Communications Conference (MILCOM)}, year={2009}, author={Zhiwei Li and W. Wang} } @inproceedings{Owens-Build-09, title={Building a Dark PicoNet upon Bluetooth Interfaces of Computers}, booktitle={IEEE Military Communications Conference (MILCOM)}, year={2009}, author={Rodney Owens and W. Wang} } @inproceedings{Wang-Achieve-08, title={Achieving Configurable Location Privacy in Location Based Routing for MANET}, booktitle={Proceedings of IEEE Military Communications Conference (MILCOM)}, year={2008}, author={W. Wang and C. Cui} } @inproceedings{Wang-Digi-08, title={A Digital Lego Set and Exercises for Teaching Security Protocols}, booktitle={Proceedings of Colloquium for Information Systems Security Education (CISSE)}, pages={26--33}, year={2008}, author={W. Wang and A. Lu and L. Yu and Z. Li} } @inproceedings{Wang-Secure-08, title={Secure Group-based Information Sharing in Mobile Ad Hoc Networks}, booktitle={Proceedings of IEEE International Conference on Communications (ICC)}, year={2008}, author={W. Wang and Yu Wang} } @inproceedings{Rohrer-Homo-07, title={Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol}, booktitle={Proceedings of Military Communications Conference (MilCom)}, year={2007}, author={J. Rohrer and W. Wang and J. Sterbenz} } @inproceedings{Mural-HiFi-07, title={HiFi-WiN: Hybrid Integrated Fiber-Wireless Networking for Broadband Metropolitan Area Access}, booktitle={Proceedings of Virginia Tech Symposium on Wireless Personal Communications}, year={2007}, author={V. Muralidharan and A. Wyglinski and Weichao Wang} } @inproceedings{Wang-Visua-06, title={Visualization Assisted Detection of Sybil Attacks in Wireless Networks}, booktitle={Proceedings of ACM Workshop on Visualization for Computer Security (VizSEC), in conjunction with ACM CCS}, pages={51--60}, year={2006}, author={W. Wang and A. Lu} } @inproceedings{Wang-Inter-06, title={Interactive Wormhole Detection in Large Scale Wireless Networks}, booktitle={Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST)}, pages={99--106}, year={2006}, author={W. Wang and A. Lu} } @inproceedings{Wang-Key-05, title={Key Distribution and Update for Secure Inter-group Multicast Communication}, booktitle={Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), in conjunction with ACM CCS}, year={2005}, author={W. Wang and B. Bhargava} } @inproceedings{Kong-Low-05, title={Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks}, booktitle={Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom}, year={2005}, author={J. Kong and Z. Ji and W. Wang and M. Gerla and R. Bagrodia and B. Bhargava} } @inproceedings{Wang-Visual-04, title={Visualization of Wormholes in Sensor Networks}, booktitle={Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom}, year={2004}, author={W. Wang and B. Bhargava} } @inproceedings{Wang-Security-03, title={On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks}, booktitle={Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)}, year={2003}, author={W. Wang and Y. Lu and B. Bhargava} } @inproceedings{Lu-Study-03, title={Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks}, booktitle={Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)}, year={2003}, author={Y. Lu and W. Wang and B. Bhargava} } @inproceedings{Wang-Vulner-03, title={On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol}, booktitle={Proceedings of International Conference on Telecommunications (ICT)}, year={2003}, author={W. Wang and Y. Lu and B. Bhargava} } @inproceedings{Lu-Hierar-03, title={Hierarchical Structure for Supporting Movable Base Stations in Wireless Networks}, booktitle={Proceedings of International Conference on Telecommunications (ICT)}, year={2003}, author={Y. Lu and W. Wang and B. Bhargava} } @inproceedings{Lu-Trust-04, title={Trust-Based Privacy Preservation for Peer-to-peer Media Streaming}, booktitle={Proceedings of NSF/NSA/AFRL Workshop on Secure Knowledge Management (SKM)}, year={2004}, author={Y. Lu and W. Wang and D. Xu and B. Bhargava} } |