Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Donggang Liu
@inproceedings{DBLP:conf/ciss/RumeeLL17, author = {Sarker T. Ahmed Rumee and Donggang Liu and Yu Lei}, title = {MirrorDroid: {A} framework to detect sensitive information leakage in Android by duplicate program execution}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926086}, doi = {10.1109/CISS.2017.7926086}, timestamp = {Fri, 15 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/RumeeLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JunaidLK16, author = {Mohsin Junaid and Donggang Liu and David Chenho Kung}, title = {Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models}, journal = {Comput. Secur.}, volume = {59}, pages = {92--117}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.01.008}, doi = {10.1016/J.COSE.2016.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JunaidLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JunaidLK15, author = {Mohsin Junaid and Donggang Liu and David Chenho Kung}, title = {Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models}, journal = {CoRR}, volume = {abs/1506.05217}, year = {2015}, url = {http://arxiv.org/abs/1506.05217}, eprinttype = {arXiv}, eprint = {1506.05217}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JunaidLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhangLCKL14, author = {Dazhi Zhang and Donggang Liu and Christoph Csallner and David Chenho Kung and Yu Lei}, title = {A distributed framework for demand-driven software vulnerability detection}, journal = {J. Syst. Softw.}, volume = {87}, pages = {60--73}, year = {2014}, url = {https://doi.org/10.1016/j.jss.2013.08.033}, doi = {10.1016/J.JSS.2013.08.033}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhangLCKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/RajLLWD14, author = {Mayank Raj and Na Li and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Using data mules to preserve source location privacy in Wireless Sensor Networks}, journal = {Pervasive Mob. Comput.}, volume = {11}, pages = {244--260}, year = {2014}, url = {https://doi.org/10.1016/j.pmcj.2012.10.002}, doi = {10.1016/J.PMCJ.2012.10.002}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/RajLLWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RahmanWL14, author = {Nabila Rahman and Matthew K. Wright and Donggang Liu}, title = {Fast and energy-efficient technique for jammed region mapping in wireless sensor networks}, journal = {CoRR}, volume = {abs/1401.7002}, year = {2014}, url = {http://arxiv.org/abs/1401.7002}, eprinttype = {arXiv}, eprint = {1401.7002}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RahmanWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/DongLN13, author = {Qi Dong and Donggang Liu and Peng Ning}, title = {Providing DoS resistance for signature-based broadcast authentication in sensor networks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {12}, number = {3}, pages = {73:1--73:26}, year = {2013}, url = {https://doi.org/10.1145/2442116.2442123}, doi = {10.1145/2442116.2442123}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/DongLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/DongLW13, author = {Qi Dong and Donggang Liu and Matthew K. Wright}, title = {Mitigating jamming attacks in wireless broadcast systems}, journal = {Wirel. Networks}, volume = {19}, number = {8}, pages = {1867--1880}, year = {2013}, url = {https://doi.org/10.1007/s11276-013-0574-0}, doi = {10.1007/S11276-013-0574-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/DongLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/NaziLD13, author = {Azade Nazi and Donggang Liu and Sajal K. Das}, title = {Privacy Preserving Query Answering in Peer Data Management Systems}, booktitle = {33rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2013 Workshops), Philadelphia, PA, USA, 8-11 July, 2013}, pages = {64--69}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCSW.2013.46}, doi = {10.1109/ICDCSW.2013.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/NaziLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/MeiLSX13, author = {Xiaowei Mei and Donggang Liu and Kun Sun and Dingbang Xu}, title = {On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties}, booktitle = {27th {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2013, Cambridge, MA, USA, May 20-24, 2013}, pages = {1112--1121}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IPDPS.2013.15}, doi = {10.1109/IPDPS.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/MeiLSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RumeeL13, author = {Sarker T. Ahmed Rumee and Donggang Liu}, editor = {Yvo Desmedt}, title = {DroidTest: Testing Android Applications for Leakage of Private Information}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {341--353}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_24}, doi = {10.1007/978-3-319-27659-5\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/RumeeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhangLLKCNW12, author = {Dazhi Zhang and Donggang Liu and Yu Lei and David Chenho Kung and Christoph Csallner and Nathaniel Nystrom and Wenhua Wang}, title = {SimFuzz: Test case similarity directed deep fuzzing}, journal = {J. Syst. Softw.}, volume = {85}, number = {1}, pages = {102--111}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.07.028}, doi = {10.1016/J.JSS.2011.07.028}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhangLLKCNW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/DongL12, author = {Qi Dong and Donggang Liu}, title = {Using Auxiliary Sensors for Pairwise Key Establishment in {WSN}}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {11}, number = {3}, pages = {59:1--59:31}, year = {2012}, url = {https://doi.org/10.1145/2345770.2345771}, doi = {10.1145/2345770.2345771}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/DongL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/MehtaLW12, author = {Kiran Mehta and Donggang Liu and Matthew K. Wright}, title = {Protecting Location Privacy in Sensor Networks against a Global Eavesdropper}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {2}, pages = {320--336}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.32}, doi = {10.1109/TMC.2011.32}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/MehtaLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SiddhabathulaDLW12, author = {Kartik Siddhabathula and Qi Dong and Donggang Liu and Matthew K. Wright}, title = {Fast jamming detection in sensor networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {934--938}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363672}, doi = {10.1109/ICC.2012.6363672}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/SiddhabathulaDLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/LiRLWD12, author = {Na Li and Mayank Raj and Donggang Liu and Matthew K. Wright and Sajal K. Das}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {309--324}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_23}, doi = {10.1007/978-3-642-25959-3\_23}, timestamp = {Mon, 26 Jun 2023 20:44:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/LiRLWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/LiuRF12, author = {Donggang Liu and Joshua Raymer and Andy Fox}, title = {Efficient and timely jamming detection in wireless sensor networks}, booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012}, pages = {335--343}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MASS.2012.6502533}, doi = {10.1109/MASS.2012.6502533}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/LiuRF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/LiuD11, author = {Donggang Liu and Qi Dong}, title = {Hardening Embedded Networking Devices Against Side-Channel Attacks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {12}, number = {1-2}, pages = {103--124}, year = {2011}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-12-number-1-2-2011/ahswn-12-1-2-p-103-124/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/LiuD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WangLLKCZKK11, author = {Wenhua Wang and Yu Lei and Donggang Liu and David Chenho Kung and Christoph Csallner and Dazhi Zhang and Raghu Kacker and Rick Kuhn}, title = {A combinatorial approach to detecting buffer overflow vulnerabilities}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {269--278}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958225}, doi = {10.1109/DSN.2011.5958225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WangLLKCZKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Liu11, author = {Donggang Liu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Broadcast Authentication from a Conditional Perspective}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {168--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_629}, doi = {10.1007/978-1-4419-5906-5\_629}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Liu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Liu11a, author = {Donggang Liu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Node Clone Defense}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {844--846}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_634}, doi = {10.1007/978-1-4419-5906-5\_634}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Liu11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Liu11b, author = {Donggang Liu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Probabilistic Key Sharing}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {978--980}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_636}, doi = {10.1007/978-1-4419-5906-5\_636}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Liu11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Liu11c, author = {Donggang Liu}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Secure Localization}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1119--1121}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_640}, doi = {10.1007/978-1-4419-5906-5\_640}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Liu11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/Liu10, author = {Donggang Liu}, title = {Efficient and distributed access control for sensor networks}, journal = {Wirel. Networks}, volume = {16}, number = {8}, pages = {2151--2167}, year = {2010}, url = {https://doi.org/10.1007/s11276-010-0249-z}, doi = {10.1007/S11276-010-0249-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/Liu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangLLKCW10, author = {Dazhi Zhang and Donggang Liu and Yu Lei and David Chenho Kung and Christoph Csallner and Wenhua Wang}, title = {Detecting vulnerabilities in {C} programs using trace-based testing}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {241--250}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544310}, doi = {10.1109/DSN.2010.5544310}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangLLKCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangL10, author = {Dazhi Zhang and Donggang Liu}, title = {DataGuard: Dynamic data attestation in wireless sensor networks}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544307}, doi = {10.1109/DSN.2010.5544307}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/DongL10, author = {Qi Dong and Donggang Liu}, title = {Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing}, booktitle = {2010 International Conference on Distributed Computing Systems, {ICDCS} 2010, Genova, Italy, June 21-25, 2010}, pages = {428--437}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCS.2010.25}, doi = {10.1109/ICDCS.2010.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/DongL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HoLWD09, author = {Jun{-}Won Ho and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1476--1488}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.008}, doi = {10.1016/J.ADHOC.2009.04.008}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/HoLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Liu09, author = {Donggang Liu}, title = {Protecting Neighbor Discovery Against Node Compromises in Sensor Networks}, booktitle = {29th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada}, pages = {579--588}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDCS.2009.10}, doi = {10.1109/ICDCS.2009.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Liu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiuD09, author = {Donggang Liu and Qi Dong}, title = {Combating side-channel attacks using key management}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5161248}, doi = {10.1109/IPDPS.2009.5161248}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiuD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HoLWD09, author = {Jun{-}Won Ho and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks}, booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PERCOM.2009.4912865}, doi = {10.1109/PERCOM.2009.4912865}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HoLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/DongL09, author = {Qi Dong and Donggang Liu}, title = {Resilient Cluster Leader Election for Wireless Sensor Networks}, booktitle = {Proceedings of the Sixth Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2009, June 22-26, 2009, Rome, Italy}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/SAHCN.2009.5168966}, doi = {10.1109/SAHCN.2009.5168966}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/secon/DongL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNLWD08, author = {Donggang Liu and Peng Ning and An Liu and Cliff Wang and Wenliang Du}, title = {Attack-Resistant Location Estimation in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {22:1--22:39}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380570}, doi = {10.1145/1380564.1380570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiuND08, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Group-based key predistribution for wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {4}, number = {2}, pages = {11:1--11:30}, year = {2008}, url = {https://doi.org/10.1145/1340771.1340777}, doi = {10.1145/1340771.1340777}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiuND08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/ZhangWLLK08, author = {Dazhi Zhang and Wenhua Wang and Donggang Liu and Yu Lei and David Chenho Kung}, title = {Reusing Existing Test Cases for Security Testing}, booktitle = {19th International Symposium on Software Reliability Engineering {(ISSRE} 2008), 11-14 November 2008, Seattle/Redmond, WA, {USA}}, pages = {323--324}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISSRE.2008.55}, doi = {10.1109/ISSRE.2008.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/ZhangWLLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/OuyangLLFM08, author = {Yi Ouyang and Zhengyi Le and Donggang Liu and James Ford and Fillia Makedon}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Source location privacy against laptop-class attacks in sensor networks}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {5}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460884}, doi = {10.1145/1460877.1460884}, timestamp = {Fri, 11 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/OuyangLLFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongLN08, author = {Qi Dong and Donggang Liu and Peng Ning}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {2--12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352536}, doi = {10.1145/1352533.1352536}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DongLN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiuN07, author = {Donggang Liu and Peng Ning}, title = {Security for Wireless Sensor Networks}, series = {Advances in Information Security}, volume = {28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46781-8}, doi = {10.1007/978-0-387-46781-8}, isbn = {978-0-387-32723-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiuN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuYLSJ07, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, title = {Efficient security mechanisms for overlay multicast based content delivery}, journal = {Comput. Commun.}, volume = {30}, number = {4}, pages = {793--806}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2006.10.003}, doi = {10.1016/J.COMCOM.2006.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/Liu07, author = {Donggang Liu}, editor = {James Aspnes and Christian Scheideler and Anish Arora and Samuel Madden}, title = {Efficient and Distributed Access Control for Sensor Networks}, booktitle = {Distributed Computing in Sensor Systems, Third {IEEE} International Conference, {DCOSS} 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4549}, pages = {21--35}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73090-3\_2}, doi = {10.1007/978-3-540-73090-3\_2}, timestamp = {Wed, 09 Aug 2023 12:14:21 +0200}, biburl = {https://dblp.org/rec/conf/dcoss/Liu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Liu07, author = {Donggang Liu}, title = {Resilient Cluster Formation for Sensor Networks}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {40}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.131}, doi = {10.1109/ICDCS.2007.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Liu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/MehtaLW07, author = {Kiran Mehta and Donggang Liu and Matthew K. Wright}, title = {Location Privacy in Sensor Networks Against a Global Eavesdropper}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {314--323}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375862}, doi = {10.1109/ICNP.2007.4375862}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/MehtaLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/LiuD07, author = {Donggang Liu and Qi Dong}, title = {Detecting Misused Keys in Wireless Sensor Networks}, booktitle = {Proceedings of the 26th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New Orleans, Louisiana, {USA}}, pages = {272--280}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PCCC.2007.358904}, doi = {10.1109/PCCC.2007.358904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/LiuD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/DongL07, author = {Qi Dong and Donggang Liu}, editor = {Ian F. Akyildiz and Raghupathy Sivakumar and Eylem Ekici and Jaudelice Cavalcante de Oliveira and Janise McNair}, title = {Using Auxiliary Sensors for Pairwise Key Establishment in {WSN}}, booktitle = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International {IFIP-TC6} Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4479}, pages = {251--262}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72606-7\_22}, doi = {10.1007/978-3-540-72606-7\_22}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/DongL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/NingLD07, author = {Peng Ning and Donggang Liu and Wenliang Du}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Localization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {161--184}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_7}, doi = {10.1007/978-0-387-46276-9\_7}, timestamp = {Mon, 15 Jun 2020 07:44:16 +0200}, biburl = {https://dblp.org/rec/series/ais/NingLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sasn/2006, editor = {Sencun Zhu and Donggang Liu}, title = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-554-1}, timestamp = {Thu, 07 Dec 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNL05, author = {Donggang Liu and Peng Ning and Rongfang Li}, title = {Establishing pairwise keys in distributed sensor networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {41--77}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053287}, doi = {10.1145/1053283.1053287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiuN05, author = {Donggang Liu and Peng Ning}, title = {Improving key predistribution with deployment knowledge in static sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {1}, number = {2}, pages = {204--239}, year = {2005}, url = {https://doi.org/10.1145/1105688.1105691}, doi = {10.1145/1105688.1105691}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiuN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhuYLSJ05, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {40--55}, year = {2005}, url = {https://doi.org/10.1007/11496137\_4}, doi = {10.1007/11496137\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks}, booktitle = {25th International Conference on Distributed Computing Systems {(ICDCS} 2005), 6-10 June 2005, Columbus, OH, {USA}}, pages = {609--619}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCS.2005.21}, doi = {10.1109/ICDCS.2005.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Attack-resistant location estimation in sensor networks}, booktitle = {Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, {IPSN} 2005, April 25-27, 2005, UCLA, Los Angeles, California, {USA}}, pages = {99--106}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/IPSN.2005.1440904}, doi = {10.1109/IPSN.2005.1440904}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ipsn/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05, author = {Donggang Liu and Peng Ning and Sencun Zhu and Sushil Jajodia}, title = {Practical Broadcast Authentication in Sensor Networks}, booktitle = {2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}}, pages = {118--132}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MOBIQUITOUS.2005.49}, doi = {10.1109/MOBIQUITOUS.2005.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, editor = {Markus Jakobsson and Radha Poovendran}, title = {Group-based key pre-distribution in wireless sensor networks}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne, Germany, September 2, 2005}, pages = {11--20}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1080793.1080798}, doi = {10.1145/1080793.1080798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/wi/05/NingL05, author = {Peng Ning and Donggang Liu}, editor = {Ivan Stojmenovic}, title = {Broadcast Authentication and Key Management for Secure Sensor Networks}, booktitle = {Handbook of Sensor Networks: Algorithms and Architectures}, series = {Wiley series on parallel and distributed computing}, pages = {141--172}, publisher = {Wiley}, year = {2005}, url = {https://doi.org/10.1002/047174414x.ch5}, doi = {10.1002/047174414X.CH5}, timestamp = {Tue, 16 Jul 2019 13:42:29 +0200}, biburl = {https://dblp.org/rec/books/wi/05/NingL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LiuN04, author = {Donggang Liu and Peng Ning}, title = {Multilevel {\(\mathrm{\mu}\)}TESLA: Broadcast authentication for distributed sensor networks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {4}, pages = {800--836}, year = {2004}, url = {https://doi.org/10.1145/1027794.1027800}, doi = {10.1145/1027794.1027800}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/LiuN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuN03, author = {Donggang Liu and Peng Ning}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Establishing pairwise keys in distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {52--61}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948119}, doi = {10.1145/948109.948119}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuNS03, author = {Donggang Liu and Peng Ning and Kun Sun}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Efficient self-healing group key distribution with revocation capability}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {231--240}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948141}, doi = {10.1145/948109.948141}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuN03, author = {Donggang Liu and Peng Ning}, title = {Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/efficient-distribution-key-chain-commitments-broadcast-authentication-distributed-sensor/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/LiuN03, author = {Donggang Liu and Peng Ning}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Location-based pairwise key establishments for static sensor networks}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {72--82}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986869}, doi = {10.1145/986858.986869}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.