Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wen Ming Liu
@article{DBLP:journals/tifs/HongLW17, author = {Yuan Hong and Wen Ming Liu and Lingyu Wang}, title = {Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2227--2241}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2704904}, doi = {10.1109/TIFS.2017.2704904}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/LiuW16, author = {Wen Ming Liu and Lingyu Wang}, title = {Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications}, series = {Advances in Information Security}, volume = {68}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42644-0}, doi = {10.1007/978-3-319-42644-0}, isbn = {978-3-319-42642-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/HongVLL16, author = {Yuan Hong and Jaideep Vaidya and Haibing Lu and Wen Ming Liu}, title = {Accurate and efficient query clustering via top ranked search results}, journal = {Web Intell.}, volume = {14}, number = {2}, pages = {119--138}, year = {2016}, url = {https://doi.org/10.3233/WEB-160335}, doi = {10.3233/WEB-160335}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wias/HongVLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiuWZZ15, author = {Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi Zhu}, title = {\emph{k}-jump: {A} strategy to design publicly-known algorithms for privacy preserving micro-data disclosure}, journal = {J. Comput. Secur.}, volume = {23}, number = {2}, pages = {131--165}, year = {2015}, url = {https://doi.org/10.3233/JCS-140514}, doi = {10.3233/JCS-140514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiuWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuWCRZD14, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Kui Ren and Shunzhi Zhu and Mourad Debbabi}, title = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {538--552}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302308}, doi = {10.1109/TDSC.2014.2302308}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiuWRD13, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Mourad Debbabi}, title = {Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {679--686}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.96}, doi = {10.1109/CLOUDCOM.2013.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/LiuWRD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiuW12, author = {Wen Ming Liu and Lingyu Wang}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Privacy streamliner: a two-stage approach to improving algorithm efficiency}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {193--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133626}, doi = {10.1145/2133601.2133626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/LiuWRCD12, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {k-Indistinguishable Traffic Padding in Web Applications}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {79--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_5}, doi = {10.1007/978-3-642-31680-7\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/LiuWRCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LiuWCD11, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Mourad Debbabi}, editor = {Yan Chen and Jaideep Vaidya}, title = {Privacy-preserving traffic padding in web-based applications}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {131--136}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046573}, doi = {10.1145/2046556.2046573}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/LiuWCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdt/LiuWZ10, author = {Wen Ming Liu and Lingyu Wang and Lei Zhang}, editor = {Luc Segoufin}, title = {k-jump strategy for preserving privacy in micro-data disclosure}, booktitle = {Database Theory - {ICDT} 2010, 13th International Conference, Lausanne, Switzerland, March 23-25, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {104--115}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1804669.1804684}, doi = {10.1145/1804669.1804684}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdt/LiuWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiuY09, author = {Wen Ming Liu and Amr M. Youssef}, title = {On the Existence of (10, 2, 7, 488) Resilient Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {1}, pages = {411--412}, year = {2009}, url = {https://doi.org/10.1109/TIT.2008.2008140}, doi = {10.1109/TIT.2008.2008140}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.