A pairwise key predistribution scheme for wireless sensor networks W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005 | 2523 | 2005 |
A key management scheme for wireless sensor networks using deployment knowledge W Du, J Deng, YS Han, S Chen, PK Varshney IEEE INFOCOM 2004 1, 2004 | 1410 | 2004 |
Droidapiminer: Mining api-level features for robust malware detection in android Y Aafer, W Du, H Yin Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 975 | 2013 |
Secure multi-party computation problems and their applications: a review and open problems W Du, MJ Atallah Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001 | 716 | 2001 |
Building decision tree classifier on private data W Du, Z Zhan | 658 | 2002 |
Deriving private information from randomized data Z Huang, W Du, B Chen Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005 | 596 | 2005 |
Privacy-preserving multivariate statistical analysis: Linear regression and classification W Du, YS Han, S Chen Proceedings of the 2004 SIAM international conference on data mining, 222-233, 2004 | 525 | 2004 |
Privacy-preserving collaborative filtering using randomized perturbation techniques H Polat, W Du Third IEEE international conference on data mining, 625-628, 2003 | 460 | 2003 |
Secure multi-party computational geometry MJ Atallah, W Du Workshop on Algorithms and Data Structures, 165-179, 2001 | 456 | 2001 |
Using randomized response techniques for privacy-preserving data mining W Du, Z Zhan Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003 | 444 | 2003 |
Privacy-preserving cooperative statistical analysis W Du, MJ Atallah Seventeenth Annual Computer Security Applications Conference, 102-110, 2001 | 406 | 2001 |
Group-based key predistribution for wireless sensor networks D Liu, P Ning, W Du ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008 | 405 | 2008 |
Attack-resistant location estimation in sensor networks D Liu, P Ning, WK Du IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 394 | 2005 |
An efficient scheme for authenticating public keys in sensor networks W Du, R Wang, P Ning Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 312 | 2005 |
SVD-based collaborative filtering with privacy H Polat, W Du Proceedings of the 2005 ACM symposium on Applied computing, 791-795, 2005 | 312 | 2005 |
Lad: Localization anomaly detection for wireless sensor networks W Du, L Fang, P Ningi 19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005 | 309 | 2005 |
A key predistribution scheme for sensor networks using deployment knowledge W Du, J Deng, YS Han, PK Varshney IEEE Transactions on dependable and secure computing 3 (1), 62-77, 2006 | 303 | 2006 |
Attacks on WebView in the Android system T Luo, H Hao, W Du, Y Wang, H Yin Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 296 | 2011 |
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks D Liu, P Ning, W Du 25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005 | 292 | 2005 |
Privacy-Preserving Cooperative Scientific Computations. W Du, MJ Atallah csfw 1, 273, 2001 | 292 | 2001 |