Weichao Wang
Professor
Department of SIS
University of North Carolina at Charlotte
|
|
COPYRIGHT: The copyright of the
following materials belongs to corresponding
publishers. They are provided only for research and
educational use that does not conflict
to the interests of the publishers.
Detection of Service Level Agreement (SLA)
Violations in Memory Management in Virtual Machines,
in "Security, Privacy and Reliability
in Computer Communications and Networks", edited by
Dr. Kewei Sha, Dr. Aaron Striegel, and Dr. Min Song, pp 107--138, River Publishers, 2017.
X. Xie, W. Wang,
and T. Qin.
|
Elementary Student Experiences from Digital Safety Immersion Summer Program,
Educational Media International, Volume 61(3), August, 2024.
F. Martin, D. Mushi, J. Bacak, W. Wang, L. Ahlgrim-Delzell, and D. Polly.
[Link] |
Elementary Teacher Experiences on Digital Safety Professional Development and Facilitation of an Immersion Summer Camp,
Journal of Technology and Teacher Education, Volume 32, Number 2, 2024.
F. Martin, D. Mushi, S. Long, J. Bacak, D. Polly, W. Wang, and L. Ahlgrim-Delzell.
[Link] |
Examining Technologies Used in K-12 School Districts: A Proposed Framework for Classifying Educational Technologies,
Journal of Educational Technology Systems, 51(3), 282-302, 2023.
J. Bacak, J. Wagner, F. Martin, E. Byker, L. Ahlgrim-Delzell, and W. Wang.
[Link] |
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense,
IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 6, pp. 4853-4867, Nov.-Dec. 2023.
G. Mani, M. Haliem, B. Bhargava, I. Manickam, K. Kochpatcharin, M. Kim, E. Vugrin, W. Wang, C. Jenkins, P. Angin, and M. Yu.
[Link] |
Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts,
Journal of Cybersecurity Education, Research and Practice, vol 2023, no. 1, 2023.
F. Martin, J. Bacak, E. Byker, W. Wang, J. Wagner, and L. Ahlgrim-Delzell.
[Link] |
Teacher and School Concerns and Actions on Elementary School Children Digital Safety,
Tech Trends, in press, 2022.
F. Martin, J. Bacak, D. Polly, W. Wang, L. Ahlgrim-Delzell.
[Link] |
Toward cross-platform immersive visualization for indoor navigation and collaboration with augmented reality,
in Springer Journal of Visualization, 2022.
A. Ayyanchira, E. Mahfoud, W. Wang, and A. Lu.
[Link] |
Elementary educator perceptions of student digital safety based on technology use in the classroom,
Computers in the Schools, 2022.
J. Bacak, F. Martin, L. Ahlgrim-Delzell, D. Polly, and W. Wang
[Link] |
A Comprehensive Survey on Data Provenance: State-of-the-art Approaches and Their Deployments
for IoT Security Enforcement,
IOS Journal of Computer Security, vol. 29, no. 4, pp. 423-446, 2021.
Md. Morshed Alam and W. Wang
[Link] |
Privacy-Preserving Participant Grouping for Mobile Social Sensing over Edge Clouds,
in IEEE Transactions on Network Science and Engineering, Vol 8, Issue 2, pp 865 -- 880, 2021.
Ting Li, Z. Qiu, L. Cao, D. Cheng, W. Wang, X. Shi, and Yu Wang.
[Link] |
Examining Parents Perception on Elementary School Children Digital Safety,
in Taylor & Francis Educational Media International, April, 2021.
F. Martin, T. Gezer, J. Anderson, D. Polly, and W. Wang
[Link] |
Proof of Outsourced Encryption: Cross Verification of Security Service Level Agreement,
in Springer CCF Transactions on Networking, November, 2020, pp 229--244.
S. Alasmari, W. Wang, T. Qin, and Y. Wang. (This is an extension of our IDSC 2019
paper. The newly added materials are labeled in the footnote.)
[Link] |
Examining K-12 Educator Experiences from Digital Citizenship Professional Development,
in Journal of Research on Technology in Education, October 2020.
F. Martin, T. Gezer, W. Wang, T. Petty, and C. Wang.
[Link] |
Encryption-free Data Transmission and Hand-over
in Two-tier Body Area Networks,
Elsevier Computer Methods and Programs in Biomedicine (CiteScore 2019 = 7.5), volume 192, August 2020.
W. Wang, Tuanfa Qin, and Yu Wang.
[Link] |
Dynamic Participant Selection for Large-Scale Mobile Crowd Sensing,
IEEE Transactions on Mobile Computing (TMC), vol 18, pp 2842--2855, 2019. Hanshang Li, Ting Li, W. Wang,
and Yu Wang.
[Link] |
Encryption-free Authentication and Integrity Protection in Body Area Networks
through Physical Unclonable Functions,
Elsevier Smart Health (CiteScore 2019 = 1.4), vol 12, pp 66--81, 2019. W. Wang, X. Shi, and T. Qin.
[Link] |
Middle School Students' Social Media Use,
Educational Technology and Society, 21 (1), 213--224, 2018. F. Martin, C. Wang, T. Petty, W. Wang,
and P. WIlkins.
[PDF] |
Detecting Primary User Emulation Attacks in
Cognitive Radio Networks via Physical Layer Network Coding, in International
Journal of Ubiquitous Systems and Pervasive Networks (JUSPN), volume 5, issue 1,
pages 1--8, 2014. X. Xie and W. Wang.
[PDF] |
Node Localization through Physical Layer Network
Coding: Bootstrap, Security, and Accuracy,
in Elsevier Ad Hoc Networks, volume 10, issue 7,
pages 1267--1277, 2012. Z. Li and W. Wang.
[PDF] |
Forced Collision: Detecting Wormhole
Attacks with Physical Layer Network Coding,
in Elsevier Tsinghua Science and Technology, special issue on Wireless Mobile
Computing and Networking, volume 16, number 5, pages 505--519, October 2011.
Z. Li, D. Pu, W. Wang, and A. Wyglinski.
[PDF] |
3D Digital Legos for Teaching Security Protocols,
in IEEE Transactions on Learning Technologies (TLT),
Vol. 4, No. 2, pages 125--137, April--June, 2011.
L. Yu, L. Harrison, A. Lu, Z. Li, and
W. Wang.
[PDF]
|
Sybil Attack Detection
through Global Topology Pattern Visualization
,
Information Visualization Journal (IVS), vol. 10, no. 1, pages 32--46, January 2011.
A. Lu, W. Wang, A. Dynate, and X. Hu.
[PDF]
|
Visualization of Wormholes in Underwater Sensor Networks:
A Distributed Approach
, International Journal of Security and Networks (IJSN), Volume 3, No. 1,
pp 10--23, 2008.
W. Wang, J. Kong, B. Bhargava, and M. Gerla.
[PDF]
|
Stateless Key Distribution for Secure Intra and
Inter-group Multicast in Mobile
Wireless Networks, Elsevier Computer Networks,
Volume 51, Issue 15, pp 4303--4321, Oct. 2007.
W. Wang and T. Stransky.
[PDF]
|
Interactive Wormhole Detection and Evaluation
,
Information Visualization Journal (IVS), Volume 6, Issue 1, pages 3--17, Jan. 2007.
W. Wang and A. Lu.
[PDF]
|
Wireless networking security:
open issues in trust, management,
interoperation, and measurement,
International Journal of Security and Networks (IJSN),
vol. 1, no. 1/2, pp. 84--94, 2006.
J. Evans, W. Wang, and B. Ewy.
[PDF]
|
Trust-Based Privacy Preservation for Peer-to-peer Data Sharing,
IEEE Transactions on Systems, Man and Cybernetics
(Part A, Systems and Humans),
vol. 36, issue 3, pp. 498-502, May 2006.
Y. Lu, W. Wang, D. Xu, and B. Bhargava.
|
Defending against Wormhole Attacks in Mobile Ad Hoc Networks,
Wireless Communications and
Mobile Computing (WCMC),
vol. 6, issue 4, pp. 483-503, June 2006.
W. Wang,
B. Bhargava,
Y. Lu, and
X. Wu.
[PDF]
|
Integrating Heterogeneous Wireless Technologies: A Cellular-assisted Mobile Ad Hoc Network
in Kluwer Mobile Networks and Applications (MONET), Special Issue on Integration of Heterogeneous Wireless
Technologies, (9)393-408, 2004.
B. Bhargava,
X. Wu,
Y. Lu, and
W. Wang.
[PDF]
|
Secure Wireless Network with Movable Base Stations
in IEICE Transactions on Communications, IEICE/IEEE Joint Special Issue on Assurance Systems and Networks,
Vol. E86-B, No. 10, pp. 2922-2930, 2003.
Y. Lu,
B. Bhargava,
W. Wang,
Y. Zhong, and
X. Wu.
[PDF]
|
Conference and Workshop (bib file)
A Review of Motion Data Privacy in Virtual Reality,
in Proceedings of the IEEE International Conference on Meta Computing (ICMC), 2024.
Depeng Xu, W. Wang, and Aidong Lu.
|
IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms,
accepted to appear in IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2024, Boston, MA.
Md. Morshed Alam, A B M Rahman, and W. Wang.
|
Platform for Information Sharing, Prioritization, and Aggregation for Firefighters and Incident Command,
in IEEE SoutheastCon, 2024, Atlanta, GA.
W. Wang, Aidong Lu, Aixi Zhou, and Wei Zhao.
|
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action
IoT Attacks, in IEEE Wireless Communications and Networking Conference (WCNC), 2024,
Dubai, UAE.
Md Morshed Alam, Israt Jahan, and W. Wang.
|
Evaluating Elementary Student Experiences from Digital Safety Immersion Summer Camp,
in European Association for Research on Learning and Instruction (EARLI), 2023, Thessaloniki, Greece.
Florence Martin, D. Mushi, J. Bacak, and W. Wang.
|
Educational Technology Security Professional Development for K-12 Personnel,
in 2023 NICE K12 Cybersecurity Education Conference, 2023.
Florence Martin, Min Zhuang, Erik Byker, W. Wang, Julie Bacak, Lynn Ahlgrim-Delzell.
|
Digital Safety Immersion Camp Resources for Elementary School Students,
in 2023 NICE K12 Cybersecurity Education Conference, 2023.
Florence Martin, Julie Bacak, Siyu Long, W. Wang, Drew Polly, Doreen Mushi, Lynn Ahlgrim-Delzell.
|
Protection of Network Security Selector Secrecy in Outsourced Network Testing,
in International Conference on Computer Communications and Networks (ICCCN), invited paper, 2023.
Sultan Alasmari, W. Wang, Aidong Lu, and Yu Wang.
|
Examination of Security Technologies, Practices, Challenges, and Wishlists in K-12 School Districts,
in the American Educational Research Association (AERA) Annual Meeting, 2023.
Florence Martin, Julie Bacak, Erik Byker, W. Wang, Jonathan Wagner, and Lynn Alhgrim-Delzell.
|
PaWLA: PPG-based Weight Lifting Assessment,
in IEEE International Performance Computing and Communications Conference (IPCCC), 2022.
A B M Rahman, Pu Wang, W. Wang, and Yu Wang.
|
Examining Technologies Used in K-12 School Districts: An Analysis of School District Websites,
in the Association for Educational Communications and Technology (AECT) International Convention, 2022.
Jonathan Wagner, Florence Martin, Julie Bacak, Erik Byker, W. Wang.
|
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms,
in the IEEE Wireless Communications and Networking Conference (WCNC), 2022.
Md Morshed Alam, Md Sajidul Islam Sajid, W. Wang, and Jinpeng Wei.
|
Incentivisation of Outsourced Network Testing: View from Platform Perspective,
short paper in the International Conference on Information Systems Security and Privacy (ICISSP), 2022.
S. Alasmari, W. Wang, and Yu Wang.
|
Teacher Concerns and Actions on Elementary School Children Digital Safety,
in American Educational Research Association (AERA) Annual Meeting, 2022.
Florence Martin, Julie Bacak, Lynn Ahlgrim-Delzell, Drew Polly, and W. Wang.
|
Creating a Safer Digital World for Elementary Learner: Lessons Learned from Elementary Educators,
in Society for Information Techology and Teacher Education, 2022.
Julie Bacak, Florence Martin, Lynn Ahlgrim-Delzell, Drew Polly, and W. Wang.
|
Examining Parents Perception on Elementary School Children Digital Safety,
in Association for Educational Communications and Technology (AECT) Convention, 2021.
Florence Martin, Tuba Gezer, Jimmeka Anderson, Drew Polly, and W. Wang.
|
Cross-Platform Immersive Visualization and Navigation with Augmented Reality,
in International Symposium on Visual Information Communication and Interaction
(VINCI), 2021.
Akshay Murari, Elias Mahfoud, W. Wang, and Aidong Lu.
|
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing,
in International Conference on Communication and Network Security (ICCNS), 2020.
Sultan Alasmari, W. Wang, and Yu Wang.
|
Examining Digital Citizenship Experiences of K-12 Educators,
in Association for Educational Communications and Technology (AECT) Convention, 2020.
Florence Martin, Tuba Gezer, W. Wang, Teresa Petty
and Chuang Wang.
|
Towards AI-Assisted Smart Training Platform for Future Manufacturing Workforce,
in AAAI Spring Symposium Series, Artificial Intelligence in Manufacturing, 2020.
W. Wang, X. Wu, P. Wang, M. Maybury, and A. Lu.
|
Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption,
in IEEE Conference on Dependable and Secure Computing (IDSC), 2019.
S. Alasmari, W. Wang, T. Qin, and Y. Wang.
|
Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense,
IEEE International Conference on Communications (ICC), 2019.
L. Xie, W. Wang, and Y. Wang.
|
Integrating Security Education into Future Advanced Manufacturing Workforce Training,
accepted by Annual Conference on Academic Research in Education (CARE), 2019.
W. Wang, W. Williams, C. Wang, and A. Browne.
|
Mixed-Reality Platform for Coordination and Situation Awareness in Smart Buildings,
accepted by Asia-Pacific Services Computing Conference (APSCC), 2018.
E. Mahfoud, W. Wang, and A. Lu.
|
Malware Detection in Virtual Machines through Introspection of System Calls,
accepted by Asia-Pacific Services Computing Conference (APSCC), 2018.
X. Xie, W. Wang, Y. Wang, and A. Lu.
|
Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions,
accepted by International Workshop on
Security, Privacy, and Trustworthiness in Medical Cyber Physical System (MedSPT), associated with
IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.
Penglin Dong, W. Wang, Xinghua Shi, and Tuanfa Qin.
|
Lightweight Mutual Authentication among Sensors in Body Area Networks through Physical Unclonable Functions,
in IEEE International Conference on Communications (ICC), 2017.
Liping Xie, W. Wang, Xinghua Shi, and
Tuanfa Qin.
[PDF] |
Scalable Privacy-Preserving Participant Selection in Mobile Crowd Sensing,
in IEEE International Conference on Pervasive Computing and Communications (PerCom), 2017.
Ting Li, Taeho Jung, Hanshang Li, Lijuan Cao, W. Wang, Xiang-Yang Li, and
Yu Wang.
[PDF] |
Optimizing Content Delivery in ICN Networks by the Supply Chain Model,
in IEEE International Performance Computing and Communications Conference (IPCCC), 2016.
Zhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li, and W. Wang.
[PDF] |
Lightweight Detection of On-body Sensor Impersonator in Body Area Networks (BAN),
in International Workshop on
Security, Privacy, and Trustworthiness in Medical Cyber Physical System (MedSPT), associated with
IEEE Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.
Liping Xie, W. Wang, and Tuanfa Qin.
[PDF] |
Enhancing Participant Selection through Caching in Mobile Crowd Sensing,
in IEEE/ACM International Symposium on Quality of Service (IWQoS), 2016.
Hanshang Li, Ting Li, Fan Li, W. Wang, and Yu Wang.
(Full paper accept rate: 20.6%)
[PDF] |
An Experiment Platform for Security Education in Advanced Manufacturing Systems:
Infrastructure and Materials,
in The Colloquium for Information Systems Security Education (CISSE), 2016.
W. Wang, Wesley Williams, and Aidan Browne.
[PDF] |
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware,
in ACM International Workshop on Security in Cloud Computing (SCC), associated
with ACM AsiaCCS, 2016.
X. Xie and W. Wang.
[PDF] |
Towards Mobile Immersive Analysis: A Study of Applications,
in IEEE VR2016 Workshop on Immersive Analytics, 2016.
A. Lu, J. Huang, S. Zhang, C. Wang, and W. Wang.
[PDF] |
Security Education for Smart Grid: Materials, Experiments, and Evaluation,
in The Colloquium for Information Systems Security Education (CISSE), 2015.
W. Wang, Chuang Wang, Le Xie, Wenzhan Song, and Yi Pan.
[PDF] |
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines,
in International Conference on Computer Communications and Networks (ICCCN), 2015.
X. Xie and W. Wang.
[PDF] |
Secure Cloud Manufacturing: Research Challenges and a Case Study,
in IFIP Workshop on Emerging Ideas and Trends
in Engineering of Cyber-Physical Systems (EITEC), in CPS Week, Seattle, WA, April 2015.
W. Wang, Yu Wang, Wesley Williams, and Aidan Browne.
[PDF] |
Integrated Learning Environment for Smart Grid Security,
in International Conference on Advanced Communications and Computation (INFOCOMP), 2014.
Kewen Wang, Yi Pan, Wenzhan Song, W. Wang, and Le Xie.
[PDF] |
Rootkit Detection on Virtual Machines through Deep Information Extraction
at Hypervisor level, in International Workshop on Security and Privacy in
Cloud computing (SPCC), in conjunction with IEEE CNS 2013.
Xiongwei Xie and W. Wang.
[PDF]
|
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical
Layer Network Coding, in International Workshop on Communications
and sensor Networks (ComSense), in conjunction with EUSPN 2013.
X. Xie and W. Wang.
[PDF]
|
Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing,
in Workshop on Privacy, Security and Trust in Mobile and Wireless Systems,
in conjunction with ICCCN 2013.
R. Owens and W. Wang.
[PDF]
|
Towards the Attacker's View of Protocol Narrations (or, How to Compile
Security Protocols),
in ACM AsiaCCS, Seoul, Korea, 2012.
Z. Li and W. Wang. (Full paper accept rate: 21%)
[PDF]
|
Non-interactive OS Fingerprinting through Memory De-duplication Technique in Virtual Machines,
in IEEE International Performance Computing and Communications Conference (IPCCC), Orlando, FL 2011.
R. Owens and W. Wang. (Accept Rate: 36/129 =27.9%)
[PDF]
|
Fingerprinting Large Data Sets Through Memory De-duplication Technique in Virtual Machines,
in IEEE Military Communications Conference
(MILCOM 2011), Baltimore, MD 2011.
R. Owens and W. Wang.
[PDF]
|
Non-normalizable Functions: a New Method to Generate Metamorphic Malware,
in IEEE Military Communications Conference
(MILCOM 2011), Baltimore, MD 2011.
R. Owens and W. Wang.
[PDF]
|
Towards Effective Collaborative Analysis for
Distributed Intrusion Detection,
in IASTED International
Conference on Human-Computer Interaction (HCI), 2011.
X. Hu, H. Song, L. Harrison, A. Lu, J. Gao,
and W. Wang.
[PDF]
|
Rethinking about Guessing Attacks,
in ACM AsiaCCS, Hong Kong, 2011.
Z. Li and W. Wang.
(Accept Rate: 35/217 =16.1%)
[PDF]
|
Rethinking about Type-flaw Attacks,
in IEEE Global Communications Conference
(GLOBECOM 2010).
Z. Li and W. Wang.
[PDF]
|
Node Localization in Wireless Networks Through
Physical Layer Network Coding,
in IEEE Globol Communications Conference
(GLOBECOM 2010).
Z. Li, D. Pu, W. Wang,
and A. Wyglinski.
[PDF]
|
Secure Software Attestation for Military Telesurgical
Robot Systems,
in IEEE Military Communications Conference
(MILCOM 2010), San Jose, CA 2010.
K. Coble, W. Wang, B. Chu, and
Z. Li.
[PDF]
|
Deciding recognizability under Dolev-Yao intruder model,
in Information Security Conference (ISC), Boca Raton,
FL, 2010.
Z. Li and W. Wang.
(Accept Rate: 22/134 =16.4%)
.
[PDF]
|
Secure Online Scientific Visualization of Atmospheric Nucleation Processes,
in International Conference on Networking and
Distributed Computing (ICNDC 2010).
H. Song, W. Wang,
J. Gao, A. Lu, and L. Huang.
[PDF]
|
Detecting Network Abnormalities via Dual-Domain Exploration,
in International Symposium on Visualization
for Cyber Security (VizSec 2010).
L. Harrison, X. Hu, X. Ying, A. Lu,
W. Wang, and X. Wu.
[PDF]
|
Detecting Sybil Nodes in Wireless Networks with
Physical Layer Network Coding,
in Proceedings of IEEE/IFIP International Conference on
Dependable Systems and Networks (DSN), pp. 21--30, Chicago,
IL, 2010.
W. Wang, D. Pu, and A. Wyglinski.
(Accept Rate = 23%)
[PDF]
|
Secure and Efficient Access to Outsourced Data,
in ACM Cloud Computing Security Workshop (CCSW),
in conjunction with ACM CCS 2009.
W. Wang, Z. Li, R. Owens, and B. Bhargava.
[PDF]
|
Defending against Collaborative Packet Drop Attacks on MANETs,
in IEEE Workshop on Dependable Network Computing and Mobile
Systems (DNCMS 2009), in conjunction with IEEE SRDS 2009.
W. Wang, B. Bhargava, and M. Linderman.
|
Using Deductive Knowledge to
Improve Cryptographic Protocol Verification,
in IEEE Military Communications Conference (MILCOM 2009), Boston, October 2009.
Zhiwei Li and W. Wang.
[PDF]
|
Building a Dark PicoNet upon
Bluetooth Interfaces of Computers,
in IEEE Military Communications Conference (MILCOM 2009), Boston, October 2009.
Rodney Owens and W. Wang.
[PDF]
|
Achieving Configurable
Location Privacy in Location Based Routing for MANET,
in Proceedings of IEEE Military Communications Conference (MILCOM 2008),
San Diego, November 2008.
W. Wang and C. Cui.
[PDF]
|
A Digital Lego Set and Exercises
for Teaching Security Protocols,
in Proceedings of
Colloquium for Information Systems Security Education (CISSE), pp 26-33, Dallas, June 2008.
W. Wang, A. Lu, L. Yu, and Z. Li.
[PDF] |
Secure Group-based Information Sharing
in Mobile Ad Hoc Networks,
in Proceedings of
IEEE International Conference on Communications (ICC), Beijing, China, May 2008.
W. Wang, and Yu Wang.
[PDF] |
Homogeneous Security in Heterogeneous Networks:
Towards a Generic Security Management Protocol,
in Proceedings of Military Communications
Conference (MilCom), 2007.
Justin P. Rohrer, W. Wang,
and James P.G. Sterbenz.
[PDF]
|
HiFi-WiN: Hybrid Integrated Fiber-Wireless Networking for Broadband Metropolitan Area Access,
in Proceedings of the 2007 Virginia Tech Symposium on Wireless Personal Communications, June 2007.
Vinaykumar Muralidharan, Alexander M. Wyglinski, and Weichao Wang.
|
Visualization Assisted Detection of Sybil
Attacks in Wireless
Networks,
in Proceedings of
ACM Workshop on Visualization for Computer
Security (VizSEC), pages 51--60,
in conjunction with ACM CCS, 2006.
W. Wang,
and A. Lu.
[PDF]
|
Interactive Wormhole Detection in Large Scale Wireless
Networks,
in Proceedings of
IEEE Symposium on Visual Analytics Science and Technology (VAST),
pages 99--106, 2006.
W. Wang, and A. Lu.
[PDF]
|
Key Distribution and Update for Secure Inter-group Multicast Communication
in Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), in conjunction with ACM CCS, 2005.
W. Wang, and B. Bhargava.
[PDF]
|
Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks
in Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom, 2005.
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and
B. Bhargava.
[PDF]
|
Visualization of Wormholes in Sensor Networks
in Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom'04,
October, 2004.
W. Wang, and
B. Bhargava.
[PDF]
|
On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks
in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom'03),
Dallas-Fort Worth, Texas, March, 2003.
W. Wang,
Y. Lu, and
B. Bhargava.
[PDF]
|
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom'03),
Dallas-Fort Worth, Texas, March, 2003.
Y. Lu,
W. Wang, and
B. Bhargava.
[PDF]
|
On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol
in Proceedings of International Conference on Telecommunications (ICT'03), February, 2003.
W. Wang,
Y. Lu, and
B. Bhargava.
[PDF]
|
Hierarchical Structure for Supporting Movable Base Stations in Wireless Networks
in Proceedings of International Conference on Telecommunications (ICT'03), February, 2003.
Y. Lu,
W. Wang, and
B. Bhargava.
[PDF]
|
Trust-Based Privacy Preservation for Peer-to-peer Media Streaming
in Proceedings of NSF/NSA/AFRL Workshop on Secure Knowledge Management (SKM), September, 2004.
Y. Lu,
W. Wang, D. Xu, and
B. Bhargava.
|
Short Papers and Posters
Elementary School Learner Comic-Based Digital Storytelling on Digital Safety,
in Proceedings of the International Conference of the Learning Sciences (ICLS), pp. 2127-2128, 2024.
D. Mushi, S. Long, F. Martin, and W. Wang.
|
Monitoring Applications Used in K-12 During the Pandemic: Safety Through Datafication,
accepted to appear in poster session of the American Educational Research Association (AERA) Annual Meeting, Philadelphia,
April 11-14, 2024.
D. Culbreth, C. Meral, F. Martin, R. Davis, W. Wang, S. Foxx, and C. Edwards.
|
Teacher Experiences from Professional Development and Facilitating a Summer Camp on Digital Safety,
in Roundtable session of the American Educational Research Association (AERA) Annual Meeting, Philadelphia,
April 11-14, 2024.
F. Martin, D. Mushi, S. Long, J. Bacak, W. Wang, D. Polly, and L. Ahlgrim-Delzell.
|
Effectiveness of Edtech Security Professional Development for K-12 Teachers, Technology Facilitators and School Administrators,
accepted to appear in Roundtable session of the American Educational Research Association (AERA) Annual Meeting, Philadelphia,
April 11-14, 2024.
F. Martin, M. Zhuang, J. Bacak, W. Wang, E. Byker, L. Ahlgrim-Delzell.
|
Tools and Web Services for Smart Grid Security Education,
in poster session of the International IBM Cloud Academy Conference (ICA CON), Atlanta, Georgia,
May 8-9, 2014.
Kewen Wang, Yi Pan, Wenzhan Song, W. Wang, and Le Xie.
|
A Simulation Environment for Smart Grid Security Education,
in poster session of the Colloquium for Informatio Systems Security Education (CISSE), San Diego, CA,
June 16-18, 2014.
W. Wang, Wenzhan Song, Yi Pan, and Le Xie.
|
An Integrated Instructional and Experimental
Infrastructure for Security Education in Mission Critical Operations (MCO),
in RoundTable session of the Colloquium for Informatio Systems Security Education (CISSE), San Diego, CA,
June 16-18, 2014.
W. Wang, Wesley Williams, Deborah Sharer, and Aidan Browne.
|
Bootstrapping Node Localization through Physical Layer Network Coding in Ad Hoc Networks
in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Poster Session,
April, 2012. Zhiwei Li and W. Wang.
|
Detecting Wormhole Attacks in Ad Hoc Networks without Clock Synchronization Assumption
in ACM Workshop on Wireless Security (WiSe), Poster Session, in conjunction with MobiCom, September, 2003.
W. Wang,
B. Bhargava,
Y. Lu, and
X. Wu.
|
Intruder Identification in Mobile Ad Hoc Networks
in 1st Annual e-Enterprise Research Colloquium and Poster Session, Purdue University, March, 2003.
B. Bhargava,
W. Wang, and
Y. Lu.
|
Location Privacy in Geographical Routing for Mobile Ad Hoc Networks
in Proceedings of NSF/NSA/AFRL Workshop on Secure Knowledge Management (SKM), September, 2004.
W. Wang, and
B. Bhargava.
|
|