D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 58 Citations 18,026 151 World Ranking 2352 National Ranking 1271

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Programming language

Wenliang Du spends much of his time researching Computer network, Key distribution in wireless sensor networks, Wireless sensor network, Computation and Computer security. In his work, Principal component analysis, Scheme and Property is strongly intertwined with Key, which is a subfield of Computer network. Wenliang Du interconnects Node, Network security, Encryption and Key distribution in the investigation of issues within Key distribution in wireless sensor networks.

In his research, Overhead and Distributed computing is intimately related to Mobile wireless sensor network, which falls under the overarching field of Encryption. His study in Wireless sensor network is interdisciplinary in nature, drawing from both Sensor node and Authentication. The study incorporates disciplines such as Classifier, Android and Database in addition to Computer security.

His most cited work include:

  • A pairwise key pre-distribution scheme for wireless sensor networks (1077 citations)
  • A pairwise key predistribution scheme for wireless sensor networks (952 citations)
  • A key management scheme for wireless sensor networks using deployment knowledge (878 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Computer network, Wireless sensor network, Android and Key distribution in wireless sensor networks. His Computer security research integrates issues from World Wide Web and The Internet. His Computer network research focuses on Key distribution, Authentication, Node, Public-key cryptography and Encryption.

His work deals with themes such as Signature, Overhead, Distributed computing and Resilience, which intersect with Encryption. In his study, Network packet and Assisted GPS is inextricably linked to Sensor node, which falls within the broad field of Wireless sensor network. A large part of his Key distribution in wireless sensor networks studies is devoted to Mobile wireless sensor network.

He most often published in these fields:

  • Computer security (44.26%)
  • Computer network (25.41%)
  • Wireless sensor network (19.67%)

What were the highlights of his more recent work (between 2013-2020)?

  • Computer security (44.26%)
  • Android (17.21%)
  • World Wide Web (12.30%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Android, World Wide Web, Mobile device and Access control. His research links HTML5 with Computer security. His Android research is multidisciplinary, relying on both Static analysis, Usability, Malware and Personalization.

His Malware research includes themes of Knn classifier and False positive rate, Artificial intelligence. His research integrates issues of Exploit and Information assurance in his study of World Wide Web. His studies in Access control integrate themes in fields like restrict and Threat model.

Between 2013 and 2020, his most popular works were:

  • Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation (108 citations)
  • Compac: enforce component-level access control in android (53 citations)
  • DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android (50 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • The Internet

His primary scientific interests are in Android, Computer security, Malware, Static analysis and Mobile device. His work carried out in the field of Android brings together such families of science as Exploit, Machine learning, Information sensitivity and Software portability. His studies deal with areas such as World Wide Web and Personalization as well as Exploit.

His research integrates issues of Knn classifier, Android malware and False positive rate, Artificial intelligence in his study of Machine learning. The various areas that Wenliang Du examines in his Information sensitivity study include Usability, Operating system and Mobile operating system. His Software portability research incorporates themes from Cross-site scripting, HTML5, Code injection, Barcode and Scripting language.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A pairwise key predistribution scheme for wireless sensor networks

Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
ACM Transactions on Information and System Security (2005)

2467 Citations

A pairwise key pre-distribution scheme for wireless sensor networks

Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
computer and communications security (2003)

1678 Citations

A key management scheme for wireless sensor networks using deployment knowledge

Wenliang Du;Jing Deng;Y.S. Han;Shigang Chen.
international conference on computer communications (2004)

1391 Citations

DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

Yousra Aafer;Wenliang Du;Heng Yin.
international conference on security and privacy in communication systems (2013)

781 Citations

DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

Yousra Aafer;Wenliang Du;Heng Yin.
international conference on security and privacy in communication systems (2013)

690 Citations

Secure multi-party computation problems and their applications: a review and open problems

Wenliang Du;Mikhail J. Atallah.
new security paradigms workshop (2001)

639 Citations

Building decision tree classifier on private data

Wenliang Du;Zhijun Zhan.
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14 (2002)

580 Citations

Deriving private information from randomized data

Zhengli Huang;Wenliang Du;Biao Chen.
international conference on management of data (2005)

570 Citations

Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification

Wenliang Du;Yunghsiang S. Han;Shigang Chen.
siam international conference on data mining (2004)

448 Citations

Secure Multi-party Computational Geometry

Mikhail J. Atallah;Wenliang Du.
workshop on algorithms and data structures (2001)

440 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wenliang Du

Jaideep Vaidya

Jaideep Vaidya

Rutgers, The State University of New Jersey

Publications: 38

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 33

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 29

Mikhail J. Atallah

Mikhail J. Atallah

Purdue University West Lafayette

Publications: 29

Peng Ning

Peng Ning

Google (United States)

Publications: 27

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 26

Murat Kantarcioglu

Murat Kantarcioglu

The University of Texas at Dallas

Publications: 25

Michael T. Goodrich

Michael T. Goodrich

University of California, Irvine

Publications: 24

Xintao Wu

Xintao Wu

University of Arkansas at Fayetteville

Publications: 23

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 23

Kui Ren

Kui Ren

Zhejiang University

Publications: 23

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 23

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 22

Sheng Zhong

Sheng Zhong

Nanjing University

Publications: 22

Yuguang Fang

Yuguang Fang

City University of Hong Kong

Publications: 22

Liusheng Huang

Liusheng Huang

University of Science and Technology of China

Publications: 22

Trending Scientists

Evangelos S. Eleftheriou

Evangelos S. Eleftheriou

IBM Research - Zurich

Kai Petersen

Kai Petersen

Blekinge Institute of Technology

Venkat R. Subramanian

Venkat R. Subramanian

The University of Texas at Austin

David N. Silverman

David N. Silverman

University of Florida

Scott A. Mabury

Scott A. Mabury

University of Toronto

Gang Zheng

Gang Zheng

University of Toronto

Giancarlo Cravotto

Giancarlo Cravotto

University of Turin

Hugo K. Christenson

Hugo K. Christenson

University of Leeds

Jordi Catalan

Jordi Catalan

Spanish National Research Council

L. Scott Mills

L. Scott Mills

University of Montana

Simon M. Hughes

Simon M. Hughes

King's College London

Paul Schnitzler

Paul Schnitzler

University Hospital Heidelberg

Peter Wallbrink

Peter Wallbrink

Commonwealth Scientific and Industrial Research Organisation

Michael Bang Petersen

Michael Bang Petersen

Aarhus University

Rodney H. Falk

Rodney H. Falk

Brigham and Women's Hospital

Roger Bouillon

Roger Bouillon

KU Leuven

Something went wrong. Please try again later.