Wenliang Du's Publications

Web and Mobile System Security    Privacy-Preserving Data Publishing/Mining    Security Education   
Wireless Sensor Network    Privacy Preserving Computing   

    Web and Mobile System Security

  1. Xing Jin, Tongbo Luo, Derek G. Tsui, and Wenliang Du. XDS: Cross-Device Scripting Attacks on Smartphones through HTML5-based Apps Technical Report SYR-EECS-2014-02. See additional information from this web site.
  2. Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, and Wenliang Du. A Systematic Security Evaluation of Android's Multi-User Framework. In Proceedings of the Mobile Security Technologies (MoST) workshop, May 16, 2014.
  3. Xiao Zhang and Wenliang Du. Attacks on Android Clipboard. In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Egham, UK. July 10-11, 2014. (Bib)
  4. Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du. Compac: Enforce Component-Level Access Control in Android. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX, USA. March 3-5, 2014. (Bib)
  5. Xing Jin, Lusha Wang, Tongbo Luo, and Wenliang Du. Fine-Grained Access Control for HTML5-Based Mobile Applications in Android. A shorter version of this paper is published in Proceedings of the 16th Information Security Conference, Dallas, Texas. November 13-15, 2013. (Bib)
  6. Xiao Zhang, Amit Ahlawat, and Wenliang Du. AFrame: Isolating Advertisements from Mobile Applications in Android. In Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), New Orleans, Louisiana, USA. December 9-13, 2013. (Extended version) (Bib)
  7. Yousra Aafer, Wenliang Du, and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android . In Proceedings of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm). September 25-27, 2013 Sydney, Australia. (Bib)
  8. Hao Hao, Vicky Singh, and Wenliang Du. On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android. In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), May 7-10, 2013. Hangzhou, China. (Slides) (Bib)
  9. Tongbo Luo, Xing Jin, and Wenliang Du. Mediums: Visual Integrity Preserving Framework. In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), Feb 18-20, 2013. San Antonio, TX, USA.
  10. Tongbo Luo, Xing Jin, Ajai Ananthanarayana, and Wenliang Du. Touchjacking Attacks on Web in Android, iOS, and Windows Phone. In Proceedings of the 5th International Symposium on Foundations & Practice of Security, October 25-26, 2012. (Bib)
  11. Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, and Heng Yin. Attacks on WebView in the Android System. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, USA. December 5-9, 2011. (Bib)
  12. Xi Tan, Wenliang Du, Tongbo Luo, and Karthick Soundararaj. Scuta: A Server-Side Access Control System for Web Applications. In Proceedings of the 17th ACM SACMAT, June 20-22, 2012, Newark, USA. (Bib)
  13. Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo and Steve Chapin. Position Paper: Why Are There So Many Vulnerabilities in Web Applications?. In Proceedings of the New Security Paradigms Workshop (NSPW'11), Marin County, CA, USA. September 12-15, 2011. (Bib)
  14. Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, and Zutao Zhu. Re-designing the Web's Access Control System. Invited Talk. In Proceedings of the 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'11), Richmond, Virginia USA. July 11-13, 2011. (Bib)
  15. Tongbo Luo and Wenliang Du. Contego: Capability-Based Access Control for Web Browsers. In Proceedings of the 4th International Conference on Trust and Trustworthy Computing, Pittsburgh, PA, June 22-25, 2011. An extended version can be found from here. (Bib)
  16. Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, and Steve J. Chapin . Escudo: A Fine-grained Protection Model for Web Browsers. In ICDCS: The 30th International Conference on Distributed Computing Systems, Genoa, Italy, June 21-25, 2010. (Acceptance ratio 14.4%=84/585). (Bib)

    Privacy Preserving Data Publishing, Mining, and Analysis

  17. Zutao Zhu and Wenliang Du. Understanding Privacy Risk of Publishing Decision Trees. In 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2010). Rome, Italy. June 21-23, 2010.
  18. Guan Wang, Tongbo Luo, Michael Goodrich, Wenliang Du, and Zutao Zhu. Bureaucratic Protocols for Secure Two-Party Sorting, Selection, and Permuting. In the ACM Symposium on Information, Computer and Communications Security. Beijing, China, April 13-16, 2010.
  19. Zutao Zhu and Wenliang Du. K-anonymous Association Rule Hiding (short paper). In the ACM Symposium on Information, Computer and Communications Security. Beijing, China, April 13-16, 2010.
  20. Wenliang Du, David Eppstein, Michael Goodrich and George Lueker. On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem. In Algorithms and Data Structres Symposium (WADS), 21-23 Auguest, 2009. Banff Conference Centre, Banff, Alberta, Canada.
  21. Zutao Zhu, Guan Wang, and Wenliang Du. Deriving Private Information from Association Rule Mining Results. In the 25th IEEE International Conference on Data Engineering (ICDE), Shanghai, China, March 29 - April 4, 2009. (Acceptance ratio: 16.8% = 93/554).
  22. Guan Wang, Zutao Zhu, Wenliang Du, and Zhouxuan Teng. Inference Analysis in Privacy-Preserving Data Re-publishing. In the 8th IEEE International Conference on Data Mining (ICDM), Pisa, Italy, Dec. 15-19, 2008 (short paper). (Acceptance ratio: 20% = 144/724).
  23. Wenliang Du, Zhouxuan Teng, and Zutao Zhu. Privacy-MaxEnt: Integrating Background Knowledge in Privacy Quantification. In Proceedings of the ACM SIGMOD International Conference on Management of Data, June 9-12, 2008, Vancouver, BC, Canada. Pages 459-472. (Slides) (Bib). (Acceptance ratio: 17.9% = 78/435)
  24. Zhengli Huang and Wenliang Du. OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining. In the 24th IEEE International Conference on Data Engineering (ICDE), April 7-12, 2008, Cancun, Mexico. Pages 705-714. (Slides) (Bib).
  25. Zhengli Huang, Wenliang Du, and Zhouxuan Teng. Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining. In the 11th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD). September 17 - 21, 2007. Warsaw, Poland. Pages 487-497.
  26. Zhouxuan Teng and Wenliang Du. A Hybrid Multi-Group Privacy Preserving Approach for Building Decision Trees. In Knowledge and Information Systems (KAIS), Springer London, August 2008.
  27. Zhouxuan Teng and Wenliang Du. A Hybrid Multi-Group Privacy Preserving Approach for Building Decision Trees. In Proceedings of PAKDD. Best Paper Award. May 22-25, 2007. Pages 296-307. (Acceptance ratio 34 out of 730).
  28. Zhouxuan Teng and Wenliang Du. Comparisons of K-Anonymization and Randomization Schemes Under Linking Attacks. In Proceedings of The IEEE International Conference on Data Mining (ICDM). December 18-22, 2006, Hong Kong. Pages 1091-1096. (Acceptance ratio 20% of 800).
  29. Zhengli Huang, Wenliang Du, and Biao Chen. Deriving Private Information from Randomized Data. In Proceedings of the ACM SIGMOD Conference, June 14-16, 2005, Baltimore, Maryland, USA. Pages 37-48 (Acceptance ratio 15.3% = 66/431). (Slides) (Bib).
  30. Huseyin Polat, Wenliang Du, Sahin Renckes, and Yusuf Oysal. Private predictions on hidden Markov models. In the Artificial Intelligence Review, Volume 34 Issue 1, June 2010.
  31. Huseyin Polat and Wenliang Du. Privacy-Preserving Top-N Recommendation on Distributed Data. In the Journal of the American Society for Information Science and Technology, Volume 59, Issue 7, Pages 1093 - 1108. March, 2008.
  32. Huseyin Polat and Wenliang Du. Privacy-Preserving Collaborative Filtering. In the International Journal of Electronic Commerce (IJEC), pages 9-35. Volume 9, Number 4, Summer 2005.
  33. Huseyin Polat and Wenliang Du. Effects of Inconsistently Masked Data Using RPT on CF with Privacy. In the 22nd Annual ACM Symposium on Applied Computing, Track on E-commerce Technologies. Seoul, Korea, March 11-15, 2007.
  34. Huseyin Polat and Wenliang Du. Achieving Private Recommendations Using Randomized Response Techniques. In The 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), April 9-12, 2006, Singapore. Pages 637--646. (Acceptance ratio 20% =100/501).
  35. Huseyin Polat and Wenliang Du. Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (WI), September 19-22, 2005, France. Pages 725--731. (Acceptance ratio 18% of 328 submissions).
  36. Huseyin Polat and Wenliang Du. Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. In Proceedings of the 9th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD) (short paper). Porto, Portugal, October 3-7, 2005. Pages 651-658.
  37. Huseyin Polat and Wenliang Du. SVD-based Collaborative Filtering with Privacy. In The 20th ACM Symposium on Applied Computing, Track on E-commerce Technologies. Pages 791-795. Santa Fe, New Mexico, USA. March 13-17, 2005.
  38. Wenliang Du, Yunghsiang S. Han and Shigang Chen. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. In Proceedings of the 4th SIAM International Conference on Data Mining, Lake Buena Vista, Florida, April 22-24, 2004. Page 222-233. (Acceptance ratio 14.3% = 23/161).
  39. Huseyin Polat and Wenliang Du. Privacy-Preserving Collaborative Filtering using Randomized Perturbation Techniques. In Proceedings of The Third IEEE International Conference on Data Mining (ICDM), Melbourne, Florida, November 19-22, 2003. Page 625-628. (Slides)
  40. Wenliang Du and Zhijun Zhan. Using Randomized Response Techniques for Privacy-Preserving Data Mining. In Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington, DC, USA. August 24 - 27, 2003. Page 505-510.
  41. Zhijun Zhan and Wenliang Du. Privacy-Preserving Data Mining Using Multi-Group Randomized Response Techniques. Technical Report, June 2003.
  42. Wenliang Du and Zhijun Zhan. Building Decision Tree Classifier on Private Data. In Workshop on Privacy, Security, and Data Mining at The 2002 IEEE International Conference on Data Mining (ICDM'02) December 9, 2002, Maebashi City, Japan.

  43. Security in Wireless Sensor Networks

  44. Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod Varshney, Jonathan Katz, and Aram Khalili. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In The ACM Transactions on Information and System Security (TISSEC), Volume 8, Issue 2, May 2005. Pages 228-258. (Bib). This paper is an extended version of the CCS'03 paper.
  45. Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney. A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. In IEEE Transactions on Dependable and Secure Computing, Volume 3, Number 2, January-March 2006. Pages 62-77. This paper is an extended version of the INFOCOM'04 paper.
  46. Wenliang Du, Lei Fang and Peng Ning. LAD: Localization Anomaly Detection for Wireless Sensor Networks. In The Journal of Parallel and Distributed Computing (JPDC). Volume 66, Issue 7, July 2006. Pages 874-886. This paper is the journal verision of the IPDPS'05 paper.
  47. Kaiqi Xiong, Ronghua Wang, Wenliang Du, and Peng Ning, Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks. In ACM Transactions on Sensor Networks, Volume 8 Issue 3, July 2012.
  48. Peng Ning, An Liu, and Wenliang Du. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks. In ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008.
  49. Donggang Liu, Peng Ning, and Wenliang Du. Group-Based Key Pre-Distribution in Wireless Sensor Networks. In ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 2, pages 11:1--11:30, March 2008.
  50. Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du, Attack-Resistant Location Estimation in Wireless Sensor Networks. In ACM Transactions in Information and Systems Security (TISSEC), Vol. 11, No. 4, pages 1--39, July 2008.
  51. Ronghua Wang, Wenliang Du, Xiaogang Liu, and Peng Ning. ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks. In ACM Transactions on Sensor Networks, Vol. 6, No. 1, Article 9, pages 1--29, December 2009.
  52. Ronghua Wang, Wenliang Du, and Peng Ning. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks. In the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007. Pages 71-79.
  53. Abdulrahman Alarifi and Wenliang Du. Diversifying Sensor Nodes to Improve Resilience Against Node Compromise, In Proceedings of The 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2006. Pages 101-112.
  54. Wenliang Du, Ronghua Wang, and Peng Ning. An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In Proceedings of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 25-28, 2005. Urbana-Champaign, Illinois, USA. Pages 58-67. (Acceptance ratio 14.2% = 40/281) (Slides) (Bib).
  55. Wenliang Du, Lei Fang and Peng Ning. LAD: Localization Anomaly Detection for Wireless Sensor Networks. In The 19th International Parallel and Distributed Processing Symposium (IPDPS), Best Paper Award in the Algorithm track. April 4-8, 2005, Denver, Colorado, USA. (Slides) (Bib). This paper is invited to submit to The Journal of Parallel and Distributed Computing (JPDC).
  56. Lei Fang, Wenliang Du and Peng Ning. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks. In Proceedings of the IEEE INFOCOM'05, March 13-17, 2005, Miami, FL, USA. (Acceptance ratio 17.2% = 244/1419) (Slides) (Bib).
  57. Donggang Liu, Peng Ning, Wenliang Du, Group-Based Key Pre-Distribution in Wireless Sensor Networks, In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe), September 2005.
  58. Donggang Liu, Peng Ning and Wenliang Du. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. In Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS). Pages 609--619, June 2005.
  59. Donggang Liu, Peng Ning and Wenliang Du. Attack-Resistant Location Estimation in Sensor Networks. In Proceedings of The Fourth International Conference on Information Processing in Sensor Networks (IPSN). Pages 99--106, April 2005. Pages 99-106.
  60. Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of the IEEE INFOCOM'04, March 7-11, 2004, Hongkong. Pages 586-597. (Acceptance ratio 18.4% = 261/1420). (Bib).
  61. Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31, 2003. Pages 42-51. (Acceptance ratio 13.9% = 35/252). (Slides) (Bib).
  62. Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney. A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Networks. In IEEE 2003 Global Communications Conference (GLOBECOM). San Francisco, CA, USA. December 1-5, 2003 (Acceptance ratio 34.0% = 816/2400).
  63. Wenliang Du, Lei Fang, Ronghua Wang, and Shigang Chen. Key Pre-Distribution Using Sensor Pre-Deployment Knowledge. Peer reviewed poster session in ACM Workshop on Wireless Security (WiSe), in conjunction with ACM MobiCom 2003. San Diego, CA, USA. September 19, 2003.
  64. Wenliang Du, Lei Fang, Peng Ning. Beaconless Location Discovery in Wireless Sensor Networks. In Cliff Wang, Radha Poovendran, Sumit Roy (Eds), Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2007.
  65. Peng Ning, Donggang Liu, Wenliang Du. Secure and Resilient Location Discovery in Wireless Sensor Networks. In Cliff Wang, Radha Poovendran, Sumit Roy (Eds), Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Springer, 2007.

  66. Security Education

  67. Wenliang Du. The SEED Project: Providing Hands-on Lab Exercises for Computer Security Education. In IEEE Security and Privacy Magazine, September/October, 2011. Invited paper.
  68. Wenliang Du and Ronghua Wang. SEED: A Suite of Instructional Laboratories for Computer Security Education (Extended Version). In The ACM Journal on Educational Resources in Computing (JERIC), Volume 8, Issue 1, March 2008.
  69. Wenliang Du, Mingdong Shang, and Haizhi Xu. A Novel Approach for Computer Security Education using Minix Instructional Operating System. In Computer & Security, Volume 25, Issue 3, 2006. Pages 190-200.
  70. Wenliang Du. SEED: 25 Hands-on Labs for Information Assurance Education. A short topic presentation at the The Colloquium for Information Systems Security Education (CISSE). June 7-9, 2010. Baltimore, Maryland.
  71. Wenliang Du, Karthick Jayaraman, and Noreen B. Gaubatz. Enhancing Security Education with Hands-on Laboratory Exercises. In Proceedings of the 5th Annual Symposium on Information Assurance (ASIA '10). June 16-17, 2010, Albany, New York. Best Paper Award.
  72. Wenliang Du, Zhouxuan Teng, and Ronghua Wang. SEED: A Suite of Instructional Laboratories for Computer Security Education. In Proceedings of SIGCSE Technical Symposium on Computer Science Education. March 7-10, 2007, Covington, Kentucky, USA. Pages 486-490. (Acceptance ratio 34% = 108/316).
  73. Wenliang Du. Developing an Instructional Operating System for Computer Security Education . In 7th Colloquium for Information Systems Security Education (CISSE). June 3-5, 2003, Washington DC. 2003.

  74. Security in System, Networks, and Distributed Computing

  75. Ninghui Li, Wenliang Du, and Dan Boneh. Oblivious Signature-based Envelope (Journal Version). In Distributed Computing, Vol. 17, No. 4, 2005. Pages 293-302. Publisher: Springer-Verlag. (Bib).
  76. Xi Tan, Kapil Borle, Wenliang Du and Biao Chen. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio. In ACM Conference on Wireless Network Security, Hamburg, Germany, June 15-17, 2011.
  77. Wenliang Du and Michael T. Goodrich. Searching for High-Value Rare Events with Uncheatable Grid Computing. Accepted by the Applied Cryptography and Network Security (ACNS) Conference, June 7-10, 2005. New York City, New York, USA. (Acceptance ratio 22.4% = 35/156).
  78. Ninghui Li, Wenliang Du, and Dan Boneh. Oblivious Signature-based Envelope. In 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003). Boston, Massachusetts. July 13-16, 2003. Pages 182-189. (Acceptance ratio 16.3% = 34/208). (Slides) (Bib). This paper is invited to submit to Springer-Verlag's journal Distributed Computing.
  79. Wenliang Du, Jing Jia, Manish Mangal and Mummoorthy Murugesan. Uncheatable Grid Computing (Provisional patent were filed for the contents of this paper). In The 24th International Conference on Distributed Computing Systems (ICDCS'04), March 23-26, 2004, Tokyo, Japan. Pages 4-11. (Acceptance ratio 17.7% = 84/475) (Bib).
  80. Shigang Chen, Yong Tang, and Wenliang Du. Stateful DDoS Attacks and Targeted Filtering. Accepted by Journal of Network and Computer Applications, Special Issue on Distributed Denial of Service and Intrusion Detection, 2005/2006.
  81. Haizhi Xu, Wenliang Du, and Steve J. Chapin. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. In RAID: Seventh International Symposium on Recent Advances in Intrusion Detection. French Riviera, France. September 15-17, 2004 (Acceptance ratio 13.5%=16/118).
  82. Haizhi Xu, Steve J. Chapin, and Wenliang Du. Detecting Exploit Code Execution in Loadable Kernel Modules. In ACSAC'04: the 20th Annual Computer Security Applications Conference. Tucson, Arizona, USA. December 6-10, 2004. (Acceptance ratio 26%=35/134).

  83. Privacy Preserving Computing

  84. Mikhail J. Atallah, Florian Kerschbaum, and Wenliang Du. Secure and Private Sequence Comparisions. In the ACM Workshop on Privacy in Electronic Society. In association with the 10th ACM Conference on Computer and Communications Security, 2003.
  85. Wenliang Du and Zhijun Zhan. A Practical Approach to Solve Secure Multi-party Computation Problems. In New Security Paradigms Workshop 2002. September 23 - 26, 2002, Virginia Beach, Virginia, USA. Pages 127-135. (PDF)
  86. Wenliang Du and Mikhail J. Atallah. Privacy-Preserving Cooperative Statistical Analysis. In 2001 ACSAC: Annual Computer Security Applications Conference. December 10-14, 2001, New Orleans, Louisiana, USA. Pages 102-110. (PDF)
  87. Wenliang Du and Mikhail J. Atallah. Secure Multi-Party Computation Problems and their Applications: A Review and Open Problems. In New Security Paradigms Workshop 2001. September 11th - 13th, 2001, Cloudcroft, New Mexico, USA. Pages 11-20. (PDF)
  88. Mikhail J. Atallah and Wenliang Du. Secure Multi-Party Computational Geometry. In Lecture Notes in Computer Science, 2125, Springer Verlag. Proceedings of 7th International Workshop on Algorithms and Data Structures (WADS 2001), August, 8-10, 2001, Providence, Rhode Island, USA. Pages 165-179. (PDF)
  89. Wenliang Du and Mikhail J. Atallah. Privacy-Preserving Cooperative Scientific Computations. In 14th IEEE Computer Security Foundations Workshop, June 11-13 2001, Nova Scotia, Canada. Pages 273-282.
  90. Wenliang Du and Mikhail J. Atallah. Protocols for Secure Remote Database Access with Approximate Matching. 7th ACM Conference on Computer and Communications Security (ACMCCS 2000), The First Workshop on Security and Privacy in E-Commerce, Nov. 1-4 2000, Athens, Greece. (PDF)
  91. Wenliang Du and Mikhail J. Atallah. Protocols for Secure Remote Database Access with Approximate Matching. In Recent Advances in Secure and Private E-Commerce, Kluwer Academic Publishers, 2001.
  92. Wenliang Du. A Study of Several Specific Secure Two-party Computation Problems (PDF). Department of Computer Sciences, Purdue University, 2001.

  93. Security Testing

  94. Wenliang Du and Aditya P. Mathur. Testing for Software Vulnerability Using Environment Perturbation. In Quality and Reliability Engineering International, Volume 18 Issue 3, 2002. Special Issue: Secure, Reliable Computer and Network Systems. Page 261-272.
  95. Wenliang Du and Aditya P. Mathur. Testing for Software Vulnerability Using Environment Perturbation,  In Workshop On Dependability Versus Malicious Faults, International Conference on Dependable Systems and Networks (DSN 2000), pp. 603-612. June 25-28 2000, New York City, NY, USA. Pages 603-612. (PDF)
  96. Wenliang Du, Praerit Garg and Aditya P. Mathur. Security Relevancy Analysis On The Registry Of Windows NT 4.0,  In Proceeding of the 15th Annual Computer Security Applications Conference (ACSAC'99), pp. 331-340. December 6-10, 1999, Phoenix, Arizona, USA. Pages 331-340. (PDF)
  97. Wenliang Du and Aditya P. Mathur. Categorization of Software Errors that led to Security Breaches, In Proceeding of the 21st National Information Systems Security Conference (NISSC'98), Crystal City, VA, 1998. (PDF)
  98. Yi Deng, Wenliang Du, Paul C. Attie, and Michael Evangelist. A Formalism for Architectural Modeling of Concurrent Real-Time Systems, In Proceeding of the 8th International Conference on Software Engineering and Knowledge Engineering (SEKE'96).