A pairwise key predistribution scheme for wireless sensor networks W Du, J Deng, YS Han, PK Varshney, J Katz, A Khalili ACM Transactions on Information and System Security (TISSEC) 8 (2), 228-258, 2005 | 2475 | 2005 |
A key management scheme for wireless sensor networks using deployment knowledge W Du, J Deng, YS Han, S Chen, PK Varshney IEEE INFOCOM 2004 1, 2004 | 1384 | 2004 |
Droidapiminer: Mining api-level features for robust malware detection in android Y Aafer, W Du, H Yin Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 866 | 2013 |
Secure multi-party computation problems and their applications: a review and open problems W Du, MJ Atallah Proceedings of the 2001 workshop on New security paradigms, 13-22, 2001 | 664 | 2001 |
Building decision tree classifier on private data W Du, Z Zhan | 626 | 2002 |
Deriving private information from randomized data Z Huang, W Du, B Chen Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005 | 582 | 2005 |
Privacy-preserving multivariate statistical analysis: Linear regression and classification W Du, YS Han, S Chen Proceedings of the 2004 SIAM international conference on data mining, 222-233, 2004 | 486 | 2004 |
Secure multi-party computational geometry MJ Atallah, W Du Algorithms and Data Structures: 7th International Workshop, WADS 2001 …, 2001 | 444 | 2001 |
Privacy-preserving collaborative filtering using randomized perturbation techniques H Polat, W Du Third IEEE international conference on data mining, 625-628, 2003 | 441 | 2003 |
Using randomized response techniques for privacy-preserving data mining W Du, Z Zhan Proceedings of the ninth ACM SIGKDD international conference on Knowledge …, 2003 | 422 | 2003 |
Privacy-preserving cooperative statistical analysis W Du, MJ Atallah Seventeenth Annual Computer Security Applications Conference, 102-110, 2001 | 396 | 2001 |
Group-based key predistribution for wireless sensor networks D Liu, P Ning, W Du ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008 | 388 | 2008 |
Attack-resistant location estimation in sensor networks D Liu, P Ning, WK Du IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 382 | 2005 |
An efficient scheme for authenticating public keys in sensor networks W Du, R Wang, P Ning Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 307 | 2005 |
Lad: Localization anomaly detection for wireless sensor networks W Du, L Fang, P Ningi 19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005 | 303 | 2005 |
A key predistribution scheme for sensor networks using deployment knowledge W Du, J Deng, YS Han, PK Varshney IEEE Transactions on dependable and secure computing 3 (1), 62-77, 2006 | 292 | 2006 |
Privacy-Preserving Cooperative Scientific Computations. W Du, MJ Atallah csfw 1, 273, 2001 | 288 | 2001 |
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks D Liu, P Ning, W Du 25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005 | 287 | 2005 |
SVD-based collaborative filtering with privacy H Polat, W Du Proceedings of the 2005 ACM symposium on Applied computing, 791-795, 2005 | 286 | 2005 |
A witness-based approach for data fusion assurance in wireless sensor networks W Du, J Deng, YS Han, PK Varshney GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 277 | 2003 |