D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 8,851 67 World Ranking 7863 National Ranking 3666

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Computer network
  • The Internet

Helen J. Wang spends much of her time researching Computer network, Computer security, Operating system, Distributed computing and Volume. She combines subjects such as Wireless and Scalability with her study of Computer network. Her Computer security research incorporates themes from Protocol stack and Android.

Her study in the field of Reverse engineering also crosses realms of TRACE. Her Distributed computing research integrates issues from Overlay network and Pastry. The various areas that she examines in her Volume study include Control, Interface and Database.

Her most cited work include:

  • Online aggregation (942 citations)
  • Distributing streaming media content using cooperative networking (843 citations)
  • SecondNet: a data center network virtualization architecture with bandwidth guarantees (557 citations)

What are the main themes of her work throughout her whole career to date?

Computer security, World Wide Web, Computer network, Web page and Data mining are her primary areas of study. Her work in the fields of Computer security, such as Exploit, intersects with other areas such as Permission. Her research investigates the connection between World Wide Web and topics such as Access control that intersect with issues in Server and Authorization.

Helen J. Wang has included themes like Scalability, Distributed computing, Mesh networking and Wireless mesh network in her Computer network study. Her studies in Scalability integrate themes in fields like Virtual network and Multiple description coding. Helen J. Wang works mostly in the field of Data mining, limiting it down to topics relating to Troubleshooting and, in certain cases, Technical support, State, Overlay network and Key.

She most often published in these fields:

  • Computer security (28.57%)
  • World Wide Web (24.18%)
  • Computer network (21.98%)

What were the highlights of her more recent work (between 2012-2017)?

  • Augmented reality (5.49%)
  • Human–computer interaction (4.40%)
  • Multimedia (6.59%)

In recent papers she was focusing on the following fields of study:

Her primary areas of study are Augmented reality, Human–computer interaction, Multimedia, World Wide Web and Abstraction. Helen J. Wang has researched Augmented reality in several fields, including Role-based access control, Computer access control, Access control, Certificate and Key. Her studies examine the connections between Multimedia and genetics, as well as such issues in Rendering, with regards to Web content, JavaScript, Gesture, User privacy and Operating system.

Her World Wide Web research is multidisciplinary, incorporating elements of Computer security, Android and Software deployment. Her Exploit and Discretionary access control study, which is part of a larger body of work in Computer security, is frequently linked to Permission, bridging the gap between disciplines. Her Information sensitivity research incorporates elements of Overhead, Face, Set, Granularity and Visualization.

Between 2012 and 2017, her most popular works were:

  • Enabling fine-grained permissions for augmented reality applications with recognizers (64 citations)
  • World-Driven Access Control for Continuous Sensing (62 citations)
  • Lightweight server support for browser-based CSRF protection (30 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Distributing streaming media content using cooperative networking

Venkata N. Padmanabhan;Helen J. Wang;Philip A. Chou;Kunwadee Sripanidkulchai.
network and operating system support for digital audio and video (2002)

1338 Citations

Online aggregation

Joseph M. Hellerstein;Peter J. Haas;Helen J. Wang.
international conference on management of data (1997)

1298 Citations

SecondNet: a data center network virtualization architecture with bandwidth guarantees

Chuanxiong Guo;Guohan Lu;Helen J. Wang;Shuang Yang.
conference on emerging network experiment and technology (2010)

804 Citations

Policy-enabled handoffs across heterogeneous wireless networks

H.J. Wang;R.H. Katz;J. Giese.
workshop on mobile computing systems and applications (1999)

719 Citations

Permission re-delegation: attacks and defenses

Adrienne Porter Felt;Helen J. Wang;Alexander Moshchuk;Steven Hanna.
usenix security symposium (2011)

716 Citations

Resilient peer-to-peer streaming

V.N. Padmanabhan;H.J. Wang;P.A. Chou.
international conference on network protocols (2003)

659 Citations

Shield: vulnerability-driven network filters for preventing known vulnerability exploits

Helen J. Wang;Chuanxiong Guo;Daniel R. Simon;Alf Zugenmaier.
acm special interest group on data communication (2004)

447 Citations

Discoverer: automatic protocol reverse engineering from network traces

Weidong Cui;Jayanthkumar Kannan;Helen J. Wang.
usenix security symposium (2007)

436 Citations

An evaluation of scalable application-level multicast built using peer-to-peer overlays

M. Castro;M. B. Jones;A.-M. Kermarrec;A. Rowstron.
international conference on computer communications (2003)

399 Citations

Enabling security in cloud storage SLAs with CloudProof

Raluca Ada Popa;Jacob R. Lorch;David Molnar;Helen J. Wang.
usenix annual technical conference (2011)

361 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Helen J. Wang

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 40

Baochun Li

Baochun Li

University of Toronto

Publications: 34

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 31

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 31

Joseph M. Hellerstein

Joseph M. Hellerstein

University of California, Berkeley

Publications: 31

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 29

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 28

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 25

Bernd Girod

Bernd Girod

Stanford University

Publications: 24

Yi-Min Wang

Yi-Min Wang

Microsoft (United States)

Publications: 23

Ion Stoica

Ion Stoica

University of California, Berkeley

Publications: 23

Jiangchuan Liu

Jiangchuan Liu

Simon Fraser University

Publications: 23

Surajit Chaudhuri

Surajit Chaudhuri

Microsoft (United States)

Publications: 23

Benjamin Livshits

Benjamin Livshits

Imperial College London

Publications: 22

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 22

Alfredo Cuzzocrea

Alfredo Cuzzocrea

University of Calabria

Publications: 22

Trending Scientists

Brad Hutchings

Brad Hutchings

Brigham Young University

Tarun Khanna

Tarun Khanna

Harvard University

Lothar Reichel

Lothar Reichel

Kent State University

Masud Behnia

Masud Behnia

Macquarie University

Gerald Earle Jellison Jr

Gerald Earle Jellison Jr

Oak Ridge National Laboratory

Hailin Peng

Hailin Peng

Peking University

Joost A. M. Raeymaekers

Joost A. M. Raeymaekers

Nord University

Myron P. Zalucki

Myron P. Zalucki

University of Queensland

Daniel Hegglin

Daniel Hegglin

University of Zurich

Frances M. Sladek

Frances M. Sladek

University of California, Riverside

Ronald A. Li

Ronald A. Li

University of Hong Kong

René D. Garreaud

René D. Garreaud

University of Chile

Remco Polman

Remco Polman

Queensland University of Technology

Walter J. Hogan

Walter J. Hogan

Medical College of Wisconsin

Valorie A. Crooks

Valorie A. Crooks

Simon Fraser University

Mehran Kamrava

Mehran Kamrava

Georgetown University

Something went wrong. Please try again later.