H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 9,498 62 World Ranking 6328 National Ranking 3112

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Computer network
  • The Internet

Helen J. Wang spends much of her time researching Computer network, Computer security, Operating system, Distributed computing and Volume. She combines subjects such as Wireless and Scalability with her study of Computer network. Her Computer security research incorporates themes from Protocol stack and Android.

Her study in the field of Reverse engineering also crosses realms of TRACE. Her Distributed computing research integrates issues from Overlay network and Pastry. The various areas that she examines in her Volume study include Control, Interface and Database.

Her most cited work include:

  • Online aggregation (942 citations)
  • Distributing streaming media content using cooperative networking (843 citations)
  • SecondNet: a data center network virtualization architecture with bandwidth guarantees (557 citations)

What are the main themes of her work throughout her whole career to date?

Computer security, World Wide Web, Computer network, Web page and Data mining are her primary areas of study. Her work in the fields of Computer security, such as Exploit, intersects with other areas such as Permission. Her research investigates the connection between World Wide Web and topics such as Access control that intersect with issues in Server and Authorization.

Helen J. Wang has included themes like Scalability, Distributed computing, Mesh networking and Wireless mesh network in her Computer network study. Her studies in Scalability integrate themes in fields like Virtual network and Multiple description coding. Helen J. Wang works mostly in the field of Data mining, limiting it down to topics relating to Troubleshooting and, in certain cases, Technical support, State, Overlay network and Key.

She most often published in these fields:

  • Computer security (28.57%)
  • World Wide Web (24.18%)
  • Computer network (21.98%)

What were the highlights of her more recent work (between 2012-2017)?

  • Augmented reality (5.49%)
  • Human–computer interaction (4.40%)
  • Multimedia (6.59%)

In recent papers she was focusing on the following fields of study:

Her primary areas of study are Augmented reality, Human–computer interaction, Multimedia, World Wide Web and Abstraction. Helen J. Wang has researched Augmented reality in several fields, including Role-based access control, Computer access control, Access control, Certificate and Key. Her studies examine the connections between Multimedia and genetics, as well as such issues in Rendering, with regards to Web content, JavaScript, Gesture, User privacy and Operating system.

Her World Wide Web research is multidisciplinary, incorporating elements of Computer security, Android and Software deployment. Her Exploit and Discretionary access control study, which is part of a larger body of work in Computer security, is frequently linked to Permission, bridging the gap between disciplines. Her Information sensitivity research incorporates elements of Overhead, Face, Set, Granularity and Visualization.

Between 2012 and 2017, her most popular works were:

  • Enabling fine-grained permissions for augmented reality applications with recognizers (64 citations)
  • World-Driven Access Control for Continuous Sensing (62 citations)
  • Lightweight server support for browser-based CSRF protection (30 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Distributing streaming media content using cooperative networking

Venkata N. Padmanabhan;Helen J. Wang;Philip A. Chou;Kunwadee Sripanidkulchai.
network and operating system support for digital audio and video (2002)

1335 Citations

Online aggregation

Joseph M. Hellerstein;Peter J. Haas;Helen J. Wang.
international conference on management of data (1997)

1213 Citations

SecondNet: a data center network virtualization architecture with bandwidth guarantees

Chuanxiong Guo;Guohan Lu;Helen J. Wang;Shuang Yang.
conference on emerging network experiment and technology (2010)

778 Citations

Permission re-delegation: attacks and defenses

Adrienne Porter Felt;Helen J. Wang;Alexander Moshchuk;Steven Hanna.
usenix security symposium (2011)

703 Citations

Policy-enabled handoffs across heterogeneous wireless networks

H.J. Wang;R.H. Katz;J. Giese.
workshop on mobile computing systems and applications (1999)

685 Citations

Resilient peer-to-peer streaming

V.N. Padmanabhan;H.J. Wang;P.A. Chou.
international conference on network protocols (2003)

653 Citations

Shield: vulnerability-driven network filters for preventing known vulnerability exploits

Helen J. Wang;Chuanxiong Guo;Daniel R. Simon;Alf Zugenmaier.
acm special interest group on data communication (2004)

442 Citations

Discoverer: automatic protocol reverse engineering from network traces

Weidong Cui;Jayanthkumar Kannan;Helen J. Wang.
usenix security symposium (2007)

422 Citations

An evaluation of scalable application-level multicast built using peer-to-peer overlays

M. Castro;M. B. Jones;A.-M. Kermarrec;A. Rowstron.
international conference on computer communications (2003)

397 Citations

Enabling security in cloud storage SLAs with CloudProof

Raluca Ada Popa;Jacob R. Lorch;David Molnar;Helen J. Wang.
usenix annual technical conference (2011)

353 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Helen J. Wang

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 40

Baochun Li

Baochun Li

University of Toronto

Publications: 34

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 31

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 31

Joseph M. Hellerstein

Joseph M. Hellerstein

University of California, Berkeley

Publications: 31

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 29

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 28

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 25

Bernd Girod

Bernd Girod

Stanford University

Publications: 24

Yi-Min Wang

Yi-Min Wang

Microsoft (United States)

Publications: 23

Jiangchuan Liu

Jiangchuan Liu

Simon Fraser University

Publications: 23

Ion Stoica

Ion Stoica

University of California, Berkeley

Publications: 23

Surajit Chaudhuri

Surajit Chaudhuri

Microsoft (United States)

Publications: 23

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 22

Hai Jin

Hai Jin

Huazhong University of Science and Technology

Publications: 22

Benjamin Livshits

Benjamin Livshits

Imperial College London

Publications: 22

Something went wrong. Please try again later.