Wenliang Du spends much of his time researching Computer network, Key distribution in wireless sensor networks, Wireless sensor network, Computation and Computer security. In his work, Principal component analysis, Scheme and Property is strongly intertwined with Key, which is a subfield of Computer network. Wenliang Du interconnects Node, Network security, Encryption and Key distribution in the investigation of issues within Key distribution in wireless sensor networks.
In his research, Overhead and Distributed computing is intimately related to Mobile wireless sensor network, which falls under the overarching field of Encryption. His study in Wireless sensor network is interdisciplinary in nature, drawing from both Sensor node and Authentication. The study incorporates disciplines such as Classifier, Android and Database in addition to Computer security.
His main research concerns Computer security, Computer network, Wireless sensor network, Android and Key distribution in wireless sensor networks. His Computer security research integrates issues from World Wide Web and The Internet. His Computer network research focuses on Key distribution, Authentication, Node, Public-key cryptography and Encryption.
His work deals with themes such as Signature, Overhead, Distributed computing and Resilience, which intersect with Encryption. In his study, Network packet and Assisted GPS is inextricably linked to Sensor node, which falls within the broad field of Wireless sensor network. A large part of his Key distribution in wireless sensor networks studies is devoted to Mobile wireless sensor network.
His primary areas of study are Computer security, Android, World Wide Web, Mobile device and Access control. His research links HTML5 with Computer security. His Android research is multidisciplinary, relying on both Static analysis, Usability, Malware and Personalization.
His Malware research includes themes of Knn classifier and False positive rate, Artificial intelligence. His research integrates issues of Exploit and Information assurance in his study of World Wide Web. His studies in Access control integrate themes in fields like restrict and Threat model.
His primary scientific interests are in Android, Computer security, Malware, Static analysis and Mobile device. His work carried out in the field of Android brings together such families of science as Exploit, Machine learning, Information sensitivity and Software portability. His studies deal with areas such as World Wide Web and Personalization as well as Exploit.
His research integrates issues of Knn classifier, Android malware and False positive rate, Artificial intelligence in his study of Machine learning. The various areas that Wenliang Du examines in his Information sensitivity study include Usability, Operating system and Mobile operating system. His Software portability research incorporates themes from Cross-site scripting, HTML5, Code injection, Barcode and Scripting language.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
ACM Transactions on Information and System Security (2005)
A pairwise key pre-distribution scheme for wireless sensor networks
Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
computer and communications security (2003)
A key management scheme for wireless sensor networks using deployment knowledge
Wenliang Du;Jing Deng;Y.S. Han;Shigang Chen.
international conference on computer communications (2004)
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
Yousra Aafer;Wenliang Du;Heng Yin.
international conference on security and privacy in communication systems (2013)
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
Yousra Aafer;Wenliang Du;Heng Yin.
international conference on security and privacy in communication systems (2013)
Secure multi-party computation problems and their applications: a review and open problems
Wenliang Du;Mikhail J. Atallah.
new security paradigms workshop (2001)
Building decision tree classifier on private data
Wenliang Du;Zhijun Zhan.
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14 (2002)
Deriving private information from randomized data
Zhengli Huang;Wenliang Du;Biao Chen.
international conference on management of data (2005)
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Wenliang Du;Yunghsiang S. Han;Shigang Chen.
siam international conference on data mining (2004)
Secure Multi-party Computational Geometry
Mikhail J. Atallah;Wenliang Du.
workshop on algorithms and data structures (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Google (United States)
Purdue University West Lafayette
Syracuse University
University of California, Riverside
University of California, Irvine
University of Florida
University of California, Davis
The Ohio State University
Syracuse University
Singapore University of Technology and Design
IBM Research - Zurich
Blekinge Institute of Technology
The University of Texas at Austin
University of Florida
University of Toronto
University of Toronto
University of Turin
University of Leeds
Spanish National Research Council
University of Montana
King's College London
University Hospital Heidelberg
Commonwealth Scientific and Industrial Research Organisation
Aarhus University
Brigham and Women's Hospital
KU Leuven