Lingyu Wang, Ph.D. - Publications

Affiliations: 
2006 George Mason University, Washington, DC 
Area:
Computer Science

30 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Duman O, Zhang M, Wang L, Debbabi M, Atallah R, Lebel B. Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3009931  0.305
2020 Oqaily M, Jarraya Y, Mohammady M, Majumdar S, Pourzandi M, Wang L, Debbabi M. SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957488  0.344
2019 Khalili M, Zhang M, Borbor D, Wang L, Scarabeo N, Zamor M. Monitoring and Improving Managed Security Services inside a Security Operation Center Eai Endorsed Transactions On Security and Safety. 5: 157413. DOI: 10.4108/Eai.8-4-2019.157413  0.335
2019 Zhang M, Carnavalet XdCd, Wang L, Ragab A. Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security Ieee Transactions On Information Forensics and Security. 14: 2315-2330. DOI: 10.1109/Tifs.2019.2895963  0.312
2019 Zhang M, Wang L, Jajodia S, Singhal A. Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2889086  0.336
2019 Alrabaee S, Debbabi M, Wang L. On the feasibility of binary authorship characterization Digital Investigation. 28. DOI: 10.1016/J.Diin.2019.01.028  0.301
2019 Borbor D, Wang L, Jajodia S, Singhal A. Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks Computer Communications. 145: 96-112. DOI: 10.1016/J.Comcom.2019.06.004  0.323
2018 Shameli-Sendi A, Dagenais M, Wang L. Realtime intrusion risk assessment model based on attack and service dependency graphs Computer Communications. 116: 253-272. DOI: 10.1016/J.Comcom.2017.12.003  0.34
2017 Majumdar S, Madi T, Wang Y, Jarraya Y, Pourzandi M, Wang L, Debbabi M. User-Level Runtime Security Auditing for the Cloud Ieee Transactions On Information Forensics and Security. 13: 1185-1199. DOI: 10.1109/Tifs.2017.2779444  0.345
2017 Hong Y, Liu WM, Wang L. Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status Ieee Transactions On Information Forensics and Security. 12: 2227-2241. DOI: 10.1109/Tifs.2017.2704904  0.334
2016 Zhang M, Wang L, Jajodia S, Singhal A, Albanese M. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks Ieee Transactions On Information Forensics and Security. 11: 1071-1086. DOI: 10.1109/Tifs.2016.2516916  0.374
2016 Cui B, Liu Z, Wang L. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Ieee Transactions On Computers. 65: 2374-2385. DOI: 10.1109/Tc.2015.2389959  0.362
2016 Alrabaee S, Wang L, Debbabi M. BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs) Digital Investigation. 18. DOI: 10.1016/J.Diin.2016.04.002  0.309
2016 Mouheb D, Alhadidi D, Nouh M, Debbabi M, Wang L, Pourzandi M. Aspect-oriented modeling framework for security hardening Innovations in Systems and Software Engineering. 12: 41-67. DOI: 10.1007/S11334-015-0263-5  0.337
2015 Alrabaee S, Shirani P, Wang L, Debbabi M. SIGMA: A semantic integrated graph matching approach for identifying reused functions in binary code Digital Investigation. 12: S61-S71. DOI: 10.1016/J.Diin.2015.01.011  0.302
2014 Xu Z, Wang C, Ren K, Wang L, Zhang B. Proof-carrying cloud computation: The case of convex optimization Ieee Transactions On Information Forensics and Security. 9: 1790-1803. DOI: 10.1109/Tifs.2014.2352457  0.33
2014 Liu WM, Wang L, Cheng P, Ren K, Zhu S, Debbabi M. PPTP: Privacy-preserving traffic padding in web-based applications Ieee Transactions On Dependable and Secure Computing. 11: 538-552. DOI: 10.1109/Tdsc.2014.2302308  0.37
2014 Wang L, Jajodia S, Singhal A, Cheng P, Noel S. K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities Ieee Transactions On Dependable and Secure Computing. 11: 30-44. DOI: 10.1109/Tdsc.2013.24  0.367
2014 Alrabaee S, Saleem N, Preda S, Wang L, Debbabi M. OBA2: An onion approach to binary code authorship attribution Digital Investigation. 11. DOI: 10.1016/J.Diin.2014.03.012  0.306
2012 Zeng Y, Wang L, Deng X, Cao X, Khundker N. Secure collaboration in global design and supply chain environment: Problem analysis and literature review Computers in Industry. 63: 545-556. DOI: 10.1016/J.Compind.2012.05.001  0.313
2010 Zhu B, Setia S, Jajodia S, Wang L. Providing Witness Anonymity Under Peer-to-Peer Settings Ieee Transactions On Information Forensics and Security. 5: 324-336. DOI: 10.1109/Tifs.2010.2041821  0.315
2010 Zhu B, Ren K, Wang L, Debbabi M. PCM: A privacy-preserving detection mechanism in mobile ad hoc networks Security and Communication Networks. 3: 167-184. DOI: 10.1002/Sec.122  0.331
2009 Talhi C, Mouheb D, Lima V, Debbabi M, Wang L, Pourzandi M. Usability of security specification approaches for UML design: A survey Journal of Object Technology. 8: 1-20. DOI: 10.5381/Jot.2009.8.6.A1  0.316
2009 Yao C, Wang L, Wang XS, Bettini C, Jajodia S. Evaluating privacy threats in released database views by symmetric indistinguishability Journal of Computer Security. 17: 5-42. DOI: 10.3233/Jcs-2009-0317  0.318
2009 Lima V, Talhi C, Mouheb D, Debbabi M, Wang L, Pourzandi M. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages Electronic Notes in Theoretical Computer Science. 254: 143-160. DOI: 10.1016/J.Entcs.2009.09.064  0.345
2008 Wang L, Yao C, Singhal A, Jajodia S. Implementing interactive analysis of attack graphs using relational databases Journal of Computer Security. 16: 419-437. DOI: 10.3233/Jcs-2008-0327  0.343
2007 Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401  0.524
2006 Wang L, Noel S, Jajodia S. Minimum-cost network hardening using attack graphs Computer Communications. 29: 3812-3824. DOI: 10.1016/J.Comcom.2006.06.018  0.327
2006 Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Computer Communications. 29: 2917-2933. DOI: 10.1016/J.Comcom.2006.04.001  0.302
2004 Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692. DOI: 10.3233/Jcs-2004-12501  0.538
Show low-probability matches.