


default search action
Lingyu Wang 0001
Other persons with the same name
- Lingyu Wang — disambiguation page
- Lingyu Wang 0002 — Nanyang Technological University, Singapore
- Lingyu Wang 0003 — Chinese Academy of Science, Beijing, China
2020 – today
- 2025
- [j61]Hugo Kermabon-Bobinnec
, Sima Bagheri, Mahmood Gholipourchoubeh
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Makan Pourzandi:
PerfSPEC: Performance Profiling-Based Proactive Security Policy Enforcement for Containers. IEEE Trans. Dependable Secur. Comput. 22(2): 919-938 (2025) - 2024
- [j60]Momen Oqaily
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Yosr Jarraya
, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2799-2817 (2024) - [j59]Sudershan Lakshmanan Thirunavukkarasu
, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya
, Makan Pourzandi
, Lingyu Wang
:
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV). IEEE Trans. Dependable Secur. Comput. 21(4): 2964-2981 (2024) - [j58]Sima Bagheri
, Hugo Kermabon-Bobinnec
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Lingyu Wang
, Yosr Jarraya
, Boubakr Nour
, Makan Pourzandi
:
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters. IEEE Trans. Inf. Forensics Secur. 19: 8204-8219 (2024) - [j57]Onur Duman
, Azadeh Tabiban
, Lingyu Wang
, Mourad Debbabi
:
Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks. IEEE Trans. Instrum. Meas. 73: 1-20 (2024) - [c104]Mahmood Gholipourchoubeh
, Hugo Kermabon-Bobinnec
, Suryadipta Majumdar
, Yosr Jarraya
, Lingyu Wang
, Boubakr Nour
, Makan Pourzandi
:
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters. CODASPY 2024: 79-90 - [c103]Onur Duman
, Mengyuan Zhang
, Lingyu Wang
, Mourad Debbabi
:
SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. DIMVA 2024: 483-502 - [c102]Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar, Makan Pourzandi:
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences. NDSS 2024 - [c101]Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. USENIX Security Symposium 2024 - 2023
- [j56]Saed Alrabaee
, Mourad Debbabi
, Lingyu Wang:
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features. ACM Comput. Surv. 55(2): 19:1-19:41 (2023) - [j55]Shangyu Xie
, Meisam Mohammady
, Han Wang
, Lingyu Wang
, Jaideep Vaidya
, Yuan Hong
:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing. IEEE Trans. Knowl. Data Eng. 35(1): 1-15 (2023) - [c100]Momen Oqaily
, Suryadipta Majumdar
, Lingyu Wang
, Mohammad Ekramul Kabir
, Yosr Jarraya
, A. S. M. Asadujjaman
, Makan Pourzandi
, Mourad Debbabi
:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c99]Md. Nazmul Hoq, Jia Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi
:
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring. ESORICS (2) 2023: 123-144 - [c98]Sima Bagheri, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Makan Pourzandi:
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters. ICC 2023: 777-782 - 2022
- [j54]Abdullah Qasem, Paria Shirani
, Mourad Debbabi
, Lingyu Wang, Bernard Lebel, Basile L. Agba:
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies. ACM Comput. Surv. 54(2): 25:1-25:42 (2022) - [j53]Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. IEEE Trans. Dependable Secur. Comput. 19(2): 1018-1035 (2022) - [j52]Suryadipta Majumdar
, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [c97]Yuan Hong, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. CCS 2022: 3535-3537 - [c96]A. S. M. Asadujjaman
, Mohammad Ekramul Kabir, Hinddeep Purohit
, Suryadipta Majumdar, Lingyu Wang, Yosr Jarraya, Makan Pourzandi:
5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions. CloudCom 2022: 162-169 - [c95]Hugo Kermabon-Bobinnec
, Mahmood Gholipourchoubeh
, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
ProSPEC: Proactive Security Policy Enforcement for Containers. CODASPY 2022: 155-166 - [c94]Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar:
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV). ESORICS (3) 2022: 466-489 - [c93]Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong:
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract). ICDE 2022: 1549-1550 - [c92]Onur Duman
, Lingyu Wang, Minh Au, Marthe Kassouf, Mourad Debbabi
:
Hardening Substations against Supply Chain Attacks Under Operational Constraints. ISGT 2022: 1-5 - [c91]Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang:
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). NDSS 2022 - [c90]Azadeh Tabiban
, Heyang Zhao, Yosr Jarraya, Makan Pourzandi
, Lingyu Wang
:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. NordSec 2022: 346-367 - [e6]Yuan Hong, Lingyu Wang:
Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9873-2 [contents] - [i4]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi
, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - 2021
- [j51]Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j50]Gagandeep Singh Chawla, Mengyuan Zhang
, Suryadipta Majumdar
, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j49]Momen Oqaily
, Yosr Jarraya, Meisam Mohammady
, Suryadipta Majumdar
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j48]Meisam Mohammady
, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c89]A. S. M. Asadujjaman
, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - 2020
- [b7]Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - [j47]Saed Alrabaee
, Mourad Debbabi
, Lingyu Wang
:
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA. IEEE Trans. Inf. Forensics Secur. 15: 3051-3066 (2020) - [c88]Meisam Mohammady, Shangyu Xie, Yuan Hong
, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c87]Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c86]Azadeh Tabiban
, Yosr Jarraya, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [c85]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [i3]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b6]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j46]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j45]Saed Alrabaee, Mourad Debbabi
, Lingyu Wang:
On the feasibility of binary authorship characterization. Digit. Investig. 28 Supplement: S3-S11 (2019) - [j44]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j43]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j42]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. J. Comput. Secur. 27(6): 613-648 (2019) - [j41]Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. EAI Endorsed Trans. Security Safety 5(17): e5 (2019) - [j40]Mina Khalili, Mengyuan Zhang
, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Trans. Security Safety 5(18): e1 (2019) - [j39]Mengyuan Zhang
, Xavier de Carné de Carnavalet
, Lingyu Wang
, Ahmed Ragab
:
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. IEEE Trans. Inf. Forensics Secur. 14(9): 2315-2330 (2019) - [j38]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [c84]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang
, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c83]Mengyuan Zhang
, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c82]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c81]Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi
:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. ESORICS (2) 2019: 47-67 - [c80]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c79]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang
, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - [c78]Onur Duman
, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi
:
Modeling Supply Chain Attacks in IEC 61850 Substations. SmartGridComm 2019: 1-6 - [e5]Jianying Zhou, Robert H. Deng
, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - 2018
- [j37]Alireza Shameli-Sendi, Michel R. Dagenais, Lingyu Wang:
Realtime intrusion risk assessment model based on attack and service dependency graphs. Comput. Commun. 116: 253-272 (2018) - [j36]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j35]Wenyu Qu, Wei Huo, Lingyu Wang:
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. EAI Endorsed Trans. Security Safety 5(16): e5 (2018) - [j34]Suryadipta Majumdar
, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [j33]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
:
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries. ACM Trans. Priv. Secur. 21(2): 8:1-8:34 (2018) - [c77]Lingyu Wang, Mengyuan Zhang
, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. From Database to Cyber Security 2018: 450-469 - [c76]Meisam Mohammady, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c75]Taous Madi, Mengyuan Zhang
, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c74]Azadeh Tabiban
, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi
:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. CNS 2018: 1-7 - [c73]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [c72]Paria Shirani, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi
, Lingyu Wang, Aiman Hanna:
BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices. DIMVA 2018: 114-138 - [c71]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. ESORICS (1) 2018: 26-47 - [c70]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c69]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [i2]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j32]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi
:
Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 (2014) S94-S103]. Digit. Investig. 21: 89 (2017) - [j31]Yuan Hong
, Wen Ming Liu, Lingyu Wang:
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status. IEEE Trans. Inf. Forensics Secur. 12(9): 2227-2241 (2017) - [c68]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [c67]Paria Shirani, Lingyu Wang, Mourad Debbabi
:
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape. DIMVA 2017: 301-324 - [c66]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c65]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [c64]Onur Duman
, Mengyuan Zhang
, Lingyu Wang, Mourad Debbabi
:
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks. SmartGridComm 2017: 108-114 - [e4]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi
, Joaquín García-Alfaro
:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - [i1]Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. CoRR abs/1701.02711 (2017) - 2016
- [b4]Wen Ming Liu, Lingyu Wang:
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications. Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, pp. 1-142 - [j30]Saed Alrabaee, Lingyu Wang, Mourad Debbabi
:
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). Digit. Investig. 18 Supplement: S11-S22 (2016) - [j29]Djedjiga Mouheb
, Dima Alhadidi, Mariam Nouh
, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [j28]Baojiang Cui, Fuwei Wang
, Yongle Hao, Lingyu Wang:
A taint based approach for automatic reverse engineering of gray-box file formats. Soft Comput. 20(9): 3563-3578 (2016) - [j27]Baojiang Cui, Zheli Liu, Lingyu Wang:
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans. Computers 65(8): 2374-2385 (2016) - [j26]Mengyuan Zhang
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [c63]Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. CODASPY 2016: 195-206 - [c62]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c61]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - [c60]Mickael Emirkanian-Bouchard, Lingyu Wang:
Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. FPS 2016: 117-134 - [c59]Saed Alrabaee, Paria Shirani, Mourad Debbabi
, Lingyu Wang:
On the Feasibility of Malware Authorship Attribution. FPS 2016: 256-272 - [c58]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - 2015
- [b3]Djedjiga Mouheb
, Mourad Debbabi
, Makan Pourzandi, Lingyu Wang, Mariam Nouh
, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j25]Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. Digit. Investig. 12 Supplement 1: S61-S71 (2015) - [j24]Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi
:
BinComp: A stratified approach to compiler provenance Attribution. Digit. Investig. 14 Supplement 1: S146-S155 (2015) - [j23]Wen Ming Liu, Lingyu Wang, Lei Zhang, Shunzhi Zhu:
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. J. Comput. Secur. 23(2): 131-165 (2015) - [c57]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - 2014
- [b2]Lingyu Wang, Massimiliano Albanese
, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j22]Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi
:
OBA2: An Onion approach to Binary code Authorship Attribution. Digit. Investig. 11(Supplement 1): S94-S103 (2014) - [j21]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j20]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren
, Shunzhi Zhu, Mourad Debbabi
:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - [j19]Zhen Xu, Cong Wang
, Kui Ren
, Lingyu Wang, Bingsheng Zhang
:
Proof-Carrying Cloud Computation: The Case of Convex Optimization. IEEE Trans. Inf. Forensics Secur. 9(11): 1790-1803 (2014) - [c56]Yuan Hong, Jaideep Vaidya, Haibing Lu, Lingyu Wang:
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure. DBSec 2014: 179-194 - [c55]Lingyu Wang, Mengyuan Zhang
, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - 2013
- [c54]Wen Ming Liu, Lingyu Wang, Kui Ren
, Mourad Debbabi
:
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications. CloudCom (1) 2013: 679-686 - [c53]Massimiliano Albanese
, Sushil Jajodia
, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c52]Zhen Xu, Cong Wang
, Qian Wang
, Kui Ren
, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. INFOCOM 2013: 610-614 - [c51]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c50]William Nzoukou, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
A Unified Framework for Measuring a Network's Mean Time-to-Compromise. SRDS 2013: 215-224 - [e3]Lingyu Wang, Basit Shafiq:
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9 [contents] - 2012
- [j18]Yong Zeng
, Lingyu Wang:
Secure collaboration in design and supply chain management. Comput. Ind. 63(6): 543-544 (2012) - [j17]Yong Zeng
, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker:
Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Comput. Ind. 63(6): 545-556 (2012) - [j16]Da Yong Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng
:
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J. Intell. Manuf. 23(4): 1351-1364 (2012) - [c49]Wen Ming Liu, Lingyu Wang:
Privacy streamliner: a two-stage approach to improving algorithm efficiency. CODASPY 2012: 193-204 - [c48]Wen Ming Liu, Lingyu Wang, Kui Ren
, Pengsu Cheng, Mourad Debbabi
:
k-Indistinguishable Traffic Padding in Web Applications. Privacy Enhancing Technologies 2012: 79-99 - [c47]Pengsu Cheng, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40 - 2011
- [j15]Da Yong Zhang, Yong Zeng
, Lingyu Wang, Hongtao Li, Yuanfeng Geng:
Modeling and evaluating information leakage caused by inferences in supply chains. Comput. Ind. 62(3): 351-363 (2011) - [j14]Noman Mohammed, Hadi Otrok
, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. IEEE Trans. Dependable Secur. Comput. 8(1): 89-103 (2011) - [c46]Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Mourad Debbabi
:
Privacy-preserving traffic padding in web-based applications. WPES 2011: 131-136 - 2010
- [j13]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring Security Risk of Networks Using Attack Graphs. Int. J. Next Gener. Comput. 1(1) (2010) - [j12]Bo Zhu, Kui Ren
, Lingyu Wang, Mourad Debbabi
:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010) - [j11]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. IEEE Trans. Inf. Forensics Secur. 5(2): 324-336 (2010) - [j10]Bo Zhu, Sanjeev Setia, Sushil Jajodia
, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010) - [c45]Pengsu Cheng, Lingyu Wang, Tao Long:
Compressing Attack Graphs Through Reference Encoding. CIT 2010: 1026-1031 - [c44]Mariam Nouh
, Raha Ziarati, Djedjiga Mouheb
, Dima Alhadidi, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c43]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587 - [c42]Djedjiga Mouheb
, Dima Alhadidi, Mariam Nouh
, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - [c41]Wen Ming Liu, Lingyu Wang, Lei Zhang:
k-jump strategy for preserving privacy in micro-data disclosure. ICDT 2010: 104-115 - [c40]Hamad Binsalleeh
, Thomas C. Ormerod
, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi
, Lingyu Wang:
On the analysis of the Zeus botnet crimeware toolkit. PST 2010: 31-38 - [c39]Thomas C. Ormerod
, Lingyu Wang, Mourad Debbabi
, Amr M. Youssef, Hamad Binsalleeh
, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. SECURWARE 2010: 195-200 - [c38]Djedjiga Mouheb
, Chamseddine Talhi, Mariam Nouh
, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
- [j9]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Patrick C. K. Hung:
Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) - [j8]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini
, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. J. Comput. Secur. 17(1): 5-42 (2009) - [j7]Chamseddine Talhi, Djedjiga Mouheb
, Vitor Lima, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [c37]Djedjiga Mouheb
, Chamseddine Talhi, Vitor Lima, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Weaving security aspects into UML 2.0 design models. AOM@AOSD 2009: 7-12 - [c36]Yiming Wang, Lingyu Wang, Benjamin C. M. Fung
:
Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5 - [c35]Serguei A. Mokhov
, Jian Li, Lingyu Wang:
Simple Dynamic Key Management in SQL Randomization. NTMS 2009: 1-5 - [c34]Lei Zhang, Lingyu Wang, Sushil Jajodia
, Alexander Brodsky:
L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 - [c33]Djedjiga Mouheb
, Chamseddine Talhi, Azzam Mourad
, Vitor Lima, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - [c32]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb
, Mourad Debbabi
, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. SSV 2009: 143-160 - 2008
- [j6]Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31(4): 708-721 (2008) - [j5]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases. J. Comput. Secur. 16(4): 419-437 (2008) - [c31]Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli:
Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 - [c30]Feng Chen, Lingyu Wang, Jinshu Su
:
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212 - [c29]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring network security using dynamic bayesian network. QoP 2008: 23-30 - [c28]Serguei A. Mokhov
, Farid Rassai, Lee Wei Huynh, Lingyu Wang:
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 423-429 - [c27]Serguei A. Mokhov
, Lee Wei Huynh, Lingyu Wang:
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. TeNe 2008: 449-455 - [c26]Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli:
Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 - [c25]Marcel Frigault, Lingyu Wang:
Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 - [c24]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky:
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 - [c23]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia:
An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 - [c22]Bo Zhu, Kui Ren
, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 - [c21]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Mourad Debbabi
:
A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 - [c20]Tania Islam, Lingyu Wang:
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5 - [c19]Shuai Liu, Wei Li, Lingyu Wang:
Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing. NTMS 2008: 1-5 - [c18]Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang:
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 - [c17]Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 - [c16]Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 - [p2]Lingyu Wang, Sushil Jajodia:
Security in Data Warehouses and OLAP Systems. Handbook of Database Security 2008: 191-212 - 2007
- [b1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180 - [j4]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries. J. Comput. Secur. 15(4): 417-445 (2007) - [c15]Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu:
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 - [c14]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Toward measuring network security using attack graphs. QoP 2007: 49-54 - [c13]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 - [c12]Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
An Efficient and Truthful Leader IDS Election Mechanism for MANET. WiMob 2007: 78 - [p1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 - 2006
- [j3]Lingyu Wang, Anyi Liu, Sushil Jajodia:
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Comput. Commun. 29(15): 2917-2933 (2006) - [j2]Lingyu Wang, Steven Noel, Sushil Jajodia:
Minimum-cost network hardening using attack graphs. Comput. Commun. 29(18): 3812-3824 (2006) - [c11]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 - [c10]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 - 2005
- [c9]Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 - 2004
- [j1]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-based inference control in data cubes. J. Comput. Secur. 12(5): 655-692 (2004) - [c8]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
A logic-based framework for attribute based access control. FMSE 2004: 45-55 - [c7]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Securing OLAP Data Cubes Against Privacy Breaches. S&P 2004: 161- - [e2]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. IFIP 148, Kluwer 2004, ISBN 1-4020-8144-8 [contents] - [e1]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 [contents] - 2003
- [c6]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 - 2002
- [c5]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Auditing Interval-Based Inference. CAiSE 2002: 553-567 - [c4]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Towards Secure XML Federations. DBSec 2002: 117-131 - [c3]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 - [c2]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 - [c1]Yingjiu Li, Lingyu Wang, Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-12 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
