Research 

Research Interests

Security and Privacy. Specifically, SDN/NFV/cloud security, security metrics, and privacy.

Professional Activities

Assistant Editor, Computers & Security, October 2020 - now.
Associate Editor, Annals of Telecommunications (ANTE), January 2020 - now.
Associate Editor, IEEE Transactions on Dependable and Secure Computing (TDSC), January 2019 - December 2022.
PC Member, The 2nd Annual IEEE International Conference on Metaverse Computing, Networking, and Applications (IEEE MetaCom 2024), Hong Kong, China, August 12-15, 2024.
PC Member, The 21st International Conference on Security and Cryptography (SECRYPT 2024), Dijon, France, 8-10 July, 2024.
PC Member, The 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024), Porto, Portugal, 19-21 June, 2024.
PC Member, The IEEE Conference on Communications and Network Security (CNS 2023), Orlando, FL, USA, 2–5 October, 2023.
PC Member, The 37th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2023), Sophia Antipolis, France, July 19-21, 2023.
PC Member, The 38th International Conference on ICT Systems Security and Privacy Protection (SEC 2023), Poznań, Poland, June 14-16, 2023.
PC Member, The 5th Workshop on Cloud Security and Privacy (Cloud S&P 2023), Kyoto, Japan, 19-22 June, 2023.
PC Member, The 25th International Conference on Information and Communications Security (ICICS 2023), Tianjin, China, Nov 18-20, 2023.
PC Member, The 5th International Conference on Science of Cyber Security (SciSec 2023), Melbourne, Australia, 11-14 July, 2023.
PC Member, The International Conference on Metaverse Computing, Networking and Applications (MetaCom 2023), Kyoto, Japan, June 26-28, 2023.
PC Member, The 32nd Web Conference - Security, Privacy, and Trust track (WWW 2023), Austin, Texas, USA, April 30-May 4, 2023.
Guest Editor, Cybersecurity Journal - Special Issue on New Advanced Techniques in Secure Data AnalysisFrontiers in Communications and Networks, 2023.
PC Co-Chair of WPES'22, Cloud S&P'19, FPS'16, STPSA'14, DBSec'13, STPSA'13, STPSA'12, STPSA'11.
Organization Chair of FPS'14.

WPES'22, CRiSIS'22, CNS'22, DBSec'22, SciSec'22, PST'22, SECRYPT'22, Cloud S&P'22, SEC'22, ESORICS'22, IWoSeMC'22, ICICS'22, ICC'22, CRiSIS'21, CNS'21, WPES'21, DBSec'21, ICICS'21, IWoSeMC'21, SciSec'21, Cloud S&P'21, SEC'21, ESORICS'21, SECRYPT'21, ICC'21, GraMSec'20, CloudCom'20, SECRYPT'20, ICICS'20, DBSec'20, CLOUD S&P'20, ESORICS'20, SEC'20, CNS'20, ICC'20, ACNS 2020, IWoSeMC-20, ICICS'19, CloudCom'19, CSS'19, DSC'19, AICCSA'19, TrustCom'19, CRiSIS'19, SECRYPT'19, ASIA'19, SciSec'19, SEC'19, ESORICS'19, DBSec'19, STPSA'19, ICC'19, FPS'18, CRiSIS'18, STPSA'18, DBSec'18, SPC'18, CloudCom'18, ESORICS'18, NetSoft'18, ICC'18, ESORICS'17, FPS'17, ICISS'17, CRiSIS'17, GraMSec'17, SECRYPT'17, DBSec'17, SCC'17, ICC'17, GraMSec'16, DBSec'16, CSS'16, SECRYPT'16, AuthTech'16, SEC'16, DASC'15, CyberSecurity'15, SocialSec'15, ICPADS'15, GraMSec'15, IEEE ISI'15, IFIP SEC'15, SECRYPT'15, DBSec'15, ESORICS'15, CSS'15, CPSS'15, ISPEC'15, ATC-2014, SSS'14, TrustCom'14, SECRYPT'14, ESORICS'14, DBSec'14, CyberSecurity'14, NSS'14, SeceS'14, GLOBECOM'14, GraMSec'14, ISPEC'14, ATC'13, ICCVE'13, CSS'13, CloudCom'13, CNS-SPCC'13, PETS'13, ISI'13, GLOBECOM'13, PARIS'12, ICCS'12, ISC'12, CloudCom'12, ISI'12, SECRYPT'12, TrustCom'12, GPC'12, ISSPA'12, DBSec'12, NSS'12, WPES'11, DASC'11, STPSA'11, SDPS'11, WTA'11, TrustCom'11, CCNC'11, IDC'11, NSS'11, SeceS'11, ISC'11, GLOBECOM'11, SECRYPT'11, DBSec'11, STA'11, NTMS'11, STPSA'10,DMNC'10,VTC'10-Fall,SECRYPT'10,ISI'10,GLOBECOM'10,ISDPE'10,NTMS'09, ISC'09, EUC'09, PST'09, WiMob'09, SECRYPT'09, STPSA'09, N2S'09, DBSec'09, ICC'09, SVANET'08, NTMS'08, PST'08, WiMob'08, ESORICS'08, STPSA'08, SEC'08, STPSA'07, WIA'07, STD3S'06, ICEC'06.



Reviewer of ACM Transactions on Information and System Security (ACM TISSEC), Journal of Computer Security (JCS), Journal of Computer and System Science (JCSS), IEEE Transactions on Knowledge and Data Engineering(TKDE), IEEE Transactions on Services Computing (TSC), International Journal of Cooperative Information Systems (IJCIS), Journal of Database Management (JDM), Journal of Systems and Software (JSS), Journal of Autonomous Agents and Multi-Agent Systems(JAAMAS), The Computer Journal (COMPJ), Wireless Personal Communications (WPC), Computer Communications (COMCOM), Data & Knowledge Engineering (DKE), IET Information Security (IET-IFS), Wiley Security and Communication Networks (SCN), IEEE Security & Privacy, Wireless Personal Communications (WPC), Telecommunication Systems Journal (TSJ), Computers & Security, IEEE Systems Journal, VLDB Journal, IEEE Transactions on Mobile Computing (TMC), ACM Computing Survey, Journal of Information Security and Applications (JISA), Communications of the ACM (CACM), ACM Transactions on Internet Technology (TOIT), IEEE Communications Letters, IEEE Transactions on Reliability, IET Information Security, IEEE Transactions on Network and Service Management (TNSM).

External reviewer, The Natural Sciences and Engineering Research Council of Canada (NSERC), 2009-2021.
External reviewer, European Coordinated Research on Long-term Challenges in Information and Communication Sciences & Technologies ERA-Net (CHIST-ERA), 2015.
External reviewer, Hong Kong Research Grants Council (RGC), 2016-2019.
Review panelist, The National Science Foundation (NSF), 2010-2011.

Publications

@DBLP 
@Google Scholar

(This page contains the preprint versions of the articles. The articles are limited to personal use only. You may find the official versions and the copyright notices from the publishers' websites.  The symbol * indicates the co-author is my student)
Book and Book Chapters
  1. Suryadipta Majumdar, Paria Shirani, Lingyu Wang (Eds.): “Innovations in Digital Forensics”, World Scientific Series in Digital Forensics and Cybersecurity, Volume 2, July, 2023.
  2. Lingyu Wang, “Network Hardening,” in Encyclopedia of Cryptography, Security and Privacy, Sushil Jajodia, Pierangela Samarati, Moti Yung, editors, Springer, Berlin, Heidelberg, 2023.
  3. Yuan Hong, Lingyu Wang (Eds.): Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9873-2.
  4. Saed Alrabaee*, Mourad Debbabi, Paria Shirani*, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna, “Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting,” Springer, 2020, 978-3-030-34237-1, pp. 1-233.
         Book Cover
  1. Jianying Zhou, Robert H. Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang (Eds.): Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2.
  2. Suryadipta Majumdar*, Taous Madi*, Yushun Wang*, Azadeh Tabiban*, Momen Oqaily*, Amir Alimohammadifar*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Cloud Security Auditing,” Springer, 2019, ISBN 978-3-030-23127-9.
         Network Security Metrics
  1. Lingyu Wang, Mengyuan Zhang, Anoop Singhal,“Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks,” in From Database to Cyber Security, Pierangela Samarati, Indrajit Ray, Indrakshi Ray, editors, Springer, 2018.
  2. Lingyu Wang, Sushil Jajodia, Anoop Singhal (Eds.), “Network Security Metrics,” Springer, 2017, ISBN 978-3-319-66504-7, 206 pages.
         Network Security Metrics
  1. Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro (Eds.): 9th International Symposium on Foundations and Practice of Security, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Lecture Notes in Computer Science 10128, Springer, 2017, ISBN 978-3-319-51965-4.
  2. Wen Ming Liu*, Lingyu Wang, “Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications,” Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, 142 pages.
          Preserving Privacy Against Side-Channel Leaks
  1. Wen Ming Liu*, Lingyu Wang, “Side Channel Attacks and Defenses on Cloud Traffic,” in Cloud Computing Security: Foundations and Challenges, John R. Vacca, editor, CRC Press, 2016.
  2. Djedjiga Mouheb*, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati*, Dima Alhadidi, Chamseddine Talhi, Vitor Lima*, “Aspect-Oriented Security Hardening of UML Design Models,” Springer, 2015, ISBN 978-3-319-16105-1, 219 pages.
          network hardening
  1. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia: Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, 60 pages.
          network hardening
  1. Lingyu Wang, Basit Shafiq (Eds.): Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings. Lecture Notes in Computer Science 7964, Springer 2013, ISBN 978-3-642-39255-9.
  2. Lingyu Wang, Sushil Jajodia, “An Approach to Preventing, Correlating, and Predicting Multi-Step Network Attacks,” in Intrusion Detection Systems, Roberto Di Pietro, Luigi V. Mancini, editors, Springer, Berlin, 2008.
  3. Lingyu Wang, Sushil Jajodia, “Security in Data Warehouses and OLAP Systems,” in The Handbook of Database Security: Applications and Trends, Michael Gertz, Sushil Jajodia, editors, Springer, Berlin, 2007.
  4. Lingyu Wang, Sushil Jajodia,“Vulnerability-Centric Alert Correlationa,” in Information Assurance: Survivability and Security in Networked Systems, David Tipper, Prashant Krishnamurthy, Yi Qian, James B. D. Joshi, editors, Morgan Kaufmann Publishers, 2007.
  5. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera,“Preserving Privacy in On-line Analytical Processing (OLAP),” ISBN:0-387-46273-2, Springer, Berlin, 2007, 190 Pages. 
      b00k
  1. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Preserving Privacy in On-Line Analytical Processing Data Cubes,” in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia, editors, Springer, Berlin,2007, pages 357-382.
  2. Yves Deswarte, Frederic Cuppens, Sushil Jajodia, LingyuWang, eds., Security and Protection in Information Processing Systems, ISBN 1-4020-8142-1, Kluwer Academic Publishers, Boston, 2004, 562pages.
  3. Yves Deswarte, Frederic Cuppens, Sushil Jajodia, LingyuWang, eds., Information Security Management, Education, and Privacy, ISBN 1-4020-8144-8, Kluwer Academic Publishers, Boston, 2004, 328 pages.
Refereed Journal Papers
  1. Momen Oqaily*, Mohammad Ekramul Kabir*, Suryadipta Majumdar,Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi, “iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning,” IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted. [PDF]  [Bibtex]
  2. Sudershan Lakshmanan*, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, “Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV),” IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted. [PDF]  [Bibtex]
  3. Shangyu Xie, Meisam Mohammady*, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong, “A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing,” IEEE Transactions on Knowledge and Data Engineering (TKDE), Accepted, 2021. [PDF]  [Bibtex]
  4. Suryadipta Majumdar*, Gagandeep Singh Chawla*, Amir Alimohammadifar*, Taous Madi*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi, “ProSAS: Proactive Security Auditing System for Clouds,” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 4, pages 2517 - 2534, 2022.. [PDF]  [Bibtex]
  5. Meisam Mohammady*, Momen Oqaily*, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi, “A Multi-view Approach to Preserve Both Privacy and Utility in Network Trace Anonymization,” ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 3, pages 14:1-14:36, 2021.  [PDF]  [Bibtex]
  6. Abdullah Qasem, Paria Shirani*, Mourad Debbabi, Lingyu Wang, Bernard Lebel and Basile L. Agba, “Automatic Vulnerability Detection in Embedded Device Firmware and Binary Code: Survey and Layered Taxonomies,” ACM Computing Surveys (CSUR), vol 54, no. 2, pages 1–42, 2022.  [PDF]  [Bibtex]
  7. Gagandeep Singh Chawla*, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “VMGuard: State-based Proactive Verification of Virtual Network Isolation with Application to NFV,” IEEE Trans. on Dependable and Secure Computing (TDSC), vol. 18, no. 4, pages 1553-1567, 2021.  [PDF]  [Bibtex]
  8. Onur Duman*, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi, Ribal Atallah, Bernard Lebel, “Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems,” IEEE Trans. on Dependable and Secure Computing (TDSC), vol. 19, no. 2, pages 1018-1035 , 2022.  [PDF]  [Bibtex]
  9. Saed Alrabaee*, Mourad Debbabi and Lingyu Wang, “CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA,” IEEE Trans. onInformation Forensics and Security (TIFS), Vol. 15, pages 3051-3066, 2020.  [PDF]  [Bibtex]  
  10. Momen Oqaily*, Yosr Jarraya, Meisam Mohammady*, Suryadipta Majumdar*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing,” IEEE Trans. on Dependable and Secure Computing (TDSC), vol. 18, no. 5, pages 2486–2505, 2019.  [PDF]  [Bibtex]  
  11. Saed Alrabaee*, Paria Shirani*, Lingyu Wang, Mourad Debbabi and Aiman Hanna, “Decoupling Coding Habits from Functionality for Effective Binary Authorship Attribution,” Journal of Computer Security, vol. 27, no. 6, pages 613-648, 2019.  [PDF]  [Bibtex]
  12. Daniel Borbor*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks,” Computer Communications, vol. 145, September 2019, pages 96-112.  [PDF]  [Bibtex]   
  13. Nawaf Alhebaishi*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Mitigating the Insider Threat of Remote Administrators in Clouds throughMaintenance Task Assignments,” Journal of Computer Security (Special Issue on DBSec'18), vol. 27, no. 4, pp. 427-458, 2019.  [PDF]  [Bibtex]   
  14. Saed Alrabaee*, Mourad Debbabi, Lingyu Wang, “On the Feasibility of Binary Authorship Characterization,” Digital Investigation, Vol. 28, Supplement, 7 April 2019, pages S3–S11. (DFRWS-EU'19 Best  Paper Award) [PDF]  [Bibtex]   
  15. Mina Khalili*, Mengyuan Zhang*, Daniel Borbor*, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor, “Monitoring and Improving Managed Security Services inside a Security Operation Center,”  EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 18, January 2019.  [PDF]  [Bibtex
  16. Mengyuan Zhang*, Xavier de Carné de Carnavalet, Lingyu Wang, Ahmed Ragab, “Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security,”  IEEE Trans. onInformation Forensics and Security (TIFS), vol. 14 , no. 9 , Sept. 2019, pages 2315 - 2330.   [PDF]  [Bibtex
  17. Nawaf Alhebaishi*, Lingyu Wang, Anoop Singhal, “Threat Modeling for Cloud Infrastructures,”  EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 17, December 2018.  [PDF]  [Bibtex
  18. Mengyuan Zhang*, Lingyu Wang, Sushil Jajodia, Anoop Singhal, “Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks,”  IEEE Trans. on Dependable and Secure Computing (TDSC), Accepted.  [PDF]  [Bibtex
  19. Wenyu Qu, Wei Huo*, Lingyu Wang, “Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications,”  EAI Endorsed Transactions on Security and Safety, Vol. 5, No. 16, December 2018.  [PDF]  [Bibtex
  20. Suryadipta Majumdar*, Azadeh Tabiban*, Yosr Jarraya, Momen Oqaily*, Amir Alimohammadifar*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Learning Probabilistic Dependencies among Events for Proactive Security Auditing in Clouds,” Journal of Computer Security (Special Issue on ESORICS'17), Vol. 27, No. 2, March 2019, pages 165-202. [PDF]  [Bibtex
  21. Taous Madi*, Amir Alimohammadifar*, Yosr Jarraya, Suryadipta Majumdar*, Yushun Wang*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack”, ACM Transactions on Privacy and Security (TOPS), Vol. 22, No. 1, December 2018, pages 1:1-1:35.  [PDF]  [Bibtex
  22. Daniel Borbor*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Surviving unpatchable vulnerabilities through heterogeneous network hardening options,” Journal of Computer Security, Vol. 26, No. 6, October 2018, pages 761-789. [PDF]  [Bibtex
  23. Saed Alrabaee*, Paria Shirani*, Lingyu Wang and Mourad Debbabi, “FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries,” ACM Transactions on Privacy and Security (TOPS), Vol. 21, No. 2, February 2018, pages 8:1-8:34. [PDF]  [Bibtex
  24. Suryadipta Majumdar*, Taous Madi*, Yushun Wang*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “User-Level Runtime Security Auditing for the Cloud,” IEEE Transactions on Information Forensics and Security (TIFS), Vol. 13, No. 5, January 2018, pages 1185-1199. [PDF]  [Bibtex
  25. Alireza Shameli-Sendi, Michel Dagenaisb, Lingyu Wang, “Realtime Intrusion Risk Assessment Model based on Attack and Service Dependency Graphs,” Computer Communications, Vol. 116, January 2018, pages 253-272.  
  26. Yuan Hong, Wen Ming Liu*, Lingyu Wang, “Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status,”  IEEE Transactions on Information Forensics and Security (TIFS), Vol. 12, No. 9, September 2017, pages 2227 - 2241. [PDF]  [Bibtex
  27. Saed Alrabaee*, Lingyu Wang, Mourad Debbabi, “BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs),” Digital Investigation, Vol. 18, Supplement, 7 August 2016, pages S11–S22. [PDF]  [Bibtex]   
  28. Mengyuan Zhang*, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, “Network Diversity: A Security Metric for Evaluating the Resilience of Networks against Zero-Day Attacks,”  IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 5, 2016, pages 1071–1086. [PDF]  [Bibtex]   
  29. Djedjiga Mouheb*, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Aspect-oriented modeling framework for security hardening,”  Innovations in Systems and Software Engineering (ISSE), Vol. 12, No. 1, March 2016, pages 41–67.    [Bibtex
  30. Ashkan Rahimian, Paria Shirani*, Saed Alrabaee*, Lingyu Wang, Mourad Debbabi, “BinComp: A Practical Approach to Compiler Provenance Attribution,” Digital Investigation, Vol. 14, No. 1, 2015, pages S146–S155.  [PDF]  [Bibtex
  31. Baojiang Cui, Fuwei Wang, Yongle Hao, Lingyu Wang,  “A taint based approach for automatic reverse engineering of gray-box file formats,” Soft Computing, September 2016, Volume 20, Issue 9, pp 3563–3578.  
  32. Baojiang Cui, Zheli Liu, Lingyu Wang, “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,” IEEE Transactions on Computers, Vol. 65, No. 8, 2016, pages 2374-2385.  
  33. Saed Alrabaee*, Paria Shirani*, Lingyu Wang, Mourad Debbabi, “SIGMA: A Semantic Integrated Graph Matching Approach for Identifying Reused Functions in Binary Code,” Digital Investigation, Vol. 12, Supplement 1, March 2015, pages S61–S71.    [PDF]  [Bibtex
  34. Wen Ming Liu*, Lingyu Wang, Lei Zhang, Shunzhi Zhu, “k-Jump: a Strategy to Design Publicly-Known Algorithms for Privacy Preserving Micro-Data Disclosure,” Journal of Computer Security, Vol. 23, No. 2, pages 131-165, 2015.   [PDF]  [Bibtex]
  35. Zhen Xu, Cong Wang, Kui Ren, and Lingyu Wang, “Proof-carrying Cloud Computation: the Case of Convex Optimization,” IEEE Transactions on Information Forensics and Security (TIFS), Vol. 9, No. 11, November 2014, pages 1790-1803.    [PDF]  [Bibtex] 
  36. Wen Ming Liu*, Lingyu Wang, Pengsu Cheng*, Kui Ren, Shunzhi Zhu and Mourad Debbabi, “PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications,” IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 11, No. 6, December 2014, pages 538–552.  [PDF]  [Bibtex] 
  37. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng*, Steven Noel, k-Zero day safety:  A network security metric for measuring the risk of unknown vulnerabilities,” IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 11, No. 1, 2014, pages 30-44.  [PDF]  [Bibtex]  
  38. Yong Zeng, Lingyu Wang (Eds.), “Secure collaboration in design and supply chain management (Special issue),” Computers in Industry, Volume 63, Number 6 (2012), 543-544.
  39. Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, Nafisa Khundker*, “Secure collaboration in global design and supply chain environment: Problem analysis and literature review,” Computers in Industry, Volume 63, Number 6 (2012), pages 545-556.  [PDF]  [Bibtex]  
  40. Da Yong Zhang*, Xinlin Cao, Lingyu Wang, Yong Zeng, “Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection,” Journal of Intelligent Manufacturing, Volume 23, Number 4 (2012), pages 1351-1364.   [PDF]  [Bibtex]  
  41. Da Yong Zhang*, Yong Zeng, Lingyu Wang, Hongtao Li, Yuanfeng Geng, “Modeling and evaluating information leakage caused by inferences in supply chains”, Computers in Industry, Vol. 62, No. 3, April 2011, pages 351-363.  [PDF]  [Bibtex]  
  42. Bo Zhu, Sanjeev Setia, Sushil Jajodia, and Lingyu Wang, “Providing Witness Anonymity under Peer-to-Peer Settings,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, 2010, pages 324-336.  
  43. Noman Mohammed*, Hadi Otrok, Lingyu Wang, Mourad Debbabi, and Prabir Bhattacharya, “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET,” IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 8, No. 1, 2011, pages 89-103.  [PDF]  [Bibtex]
  44. Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring security risks of networks using attack graphs," International Journal of Next-Generation Computing, Vol. 1, No. 1, July 2010, pages 113-123.  [PDF]  [Bibtex]
  45. Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, and Lingyu Wang, “Localized Multicast: Efficient and Distributed Replica Detection in Large-scale Sensor Networks,” IEEE Transactions on Mobile Computing (TMC), Vol. 8, No. 7, 2010, pages 913-926.
  46. Bo Zhu, Kui Ren, Lingyu Wang, and Mourad Debbabi, “PCM: A Privacy-Preserving Detection Mechanism in Mobile Ad Hoc Networks”, Wiley Security and Communication Networks (SCN), Volume 3, Issue 2-3, pages 167–184, 2010.    
  47. B. C. M. Fung, K. Wang, L. Wang, and P. C. K. Hung, “Privacy-preserving data publishing for cluster analysis,” Data & Knowledge Engineering (DKE), Vol. 68, No. 6, pages 552-575.
  48. Chao Yao, Lingyu Wang, X. Sean Wang, Claudio Bettini, Sushil Jajodia, “Evaluating privacy threats in released database views by symmetric indistinguishability,” Journal of Computer Security, Vol. 17, No. 1, pages 5-42.  [PDF]  [Bibtex]
  49. Chamseddine Talhi, Djedjiga Mouheb*, Vitor Nunes de Lima*, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Usability of Security Specication Approaches for UML Design: A Survey,” Journal of Object Technology, Vol. 8, No. 6, pages 102-122, 2009.
  50. Vitor Lima*, Djedjiga Mouheb*, Chamseddine Talhi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages,” Proc. The 4th International Workshop on Systems Software Verification (SSV 2009), Electronic Notes in Theoretical Computer Science (ENTCS), Vol. 254, pages 143-160.
  51. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia, “Implementing interactive analysis of attack graphs using relational databases,” Journal of Computer Security, Vol. 16, No. 4, 2008, pages 419-436.   [PDF]  [Bibtex]
  52. Hadi Otrok, Noman Mohammed*, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya, “A game-theoretic intrusion detection model for mobile ad-hoc networks,” Computer Communications, Special Issue on Algorithmic and Theoretical Aspects of Wireless Ad Hoc and Sensor Networks, Vol. 31, No. 4, 2007, pages 708-721.   [PDF]  [Bibtex]
  53. Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera, “Parity-based inference control for multi-dimensional range sum queries,” Journal of Computer Security, Vol. 15, No. 4, 2007, pages 417-445.   [PDF]  [Bibtex]
  54. Lingyu Wang, Steven Noel, Sushil Jajodia, “Minimum-cost network hardening using attack graphs,” Computer Communications, Volume 29, Issue 18 , 28 November 2006, Pages 3812-3824.   [PDF]  [Bibtex]
  55. Lingyu Wang, Anyi Liu, Sushil Jajodia, “Using attack graphs for correlating, hypothesizing, and predicting network intrusion alerts,” Computer Communications, Vol. 29, No. 15, 2006, pages 2917-2933.   [PDF]  [Bibtex]  [Slides]
  56. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Cardinality-based inference control in data cubes,” Journal of Computer Security, Vol. 12, No. 5, 2004, pages 655-692.   [PDF]  [Bibtex]

Refereed Conference and Workshop Papers
  1. Mahmood Gholipourchoubeh*, Hugo Kermabon-Bobinnec*, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, “CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters,” Proc.the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024), Porto, Portugal, June 19 – 21, 2024 (Acceptance ratio 34/160≈21%)..   [PDF]  [Bibtex]
  2. Hugo Kermabon-Bobinnec*, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar and Makan Pourzandi, “Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences,” Proc. the Network and Distributed System Security Symposium (NDSS 2024), San Diego, USA, February 26 - March 1, 2024 (Acceptance ratio 140/694≈20.2%).  [PDF]  [Bibtex]
  3. Md Nazmul Hoq, Jia Wei Yao*, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Makan Pourzandi, Amine Boukhtouta and Mourad Debbabi, “Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring,” Proc. the 28th European Symposium on Research in Computer Security (ESORICS 2024), The Hague, The Netherlands, September 25-29, 2023  (Acceptance ratio 18.5%).  [PDF]  [Bibtex]
  4. Sima Bagheri*, Hugo Kermabon-Bobinnec*, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, “Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters,” Proc. the IEEE International Conference on Communications (ICC 2023), Rome, Italy,28 May – 01 June, 2023.   [PDF]  [Bibtex]
  5. Momen Oqaily*, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir*, Yosr Jarraya, A S M Asadujjaman*, Makan Pourzandi and Mourad Debbabi, “A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds,” Proc. the 13th ACM Conference on Data and Application Security and Privacy (CODASPY 2023),Charlotte, US, April 24 - 26, 2023.   [PDF]  [Bibtex]
  6. A S M Asadujjaman*, Mohammad Ekramul Kabir*, Hinddeep Purohit, Suryadipta Majumdar, Lingyu Wang, Yosr Jarraya and Makan Pourzandi, “5 GFIVer: Functional Integrity Verification for 5 G Cloud-Native Network Functions,” Proc. the 13th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2022), Bangkok, Thailand,December 13-16, 2022.   [PDF]  [Bibtex]
  7. Azadeh Tabiban*, Heyang Zhao, Yosr Jarraya, Makan Pourzandi and Lingyu Wang, “VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack,” Proc. the 27th Nordic Conference on Secure IT Systems (NordSec 2022), Reykjavik, Iceland, November 30 - December 2, 2022 (Acceptance ratio 20/89≈22.5%).   [PDF]  [Bibtex]
  8. Alaa Oqaily*, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar, “MLFM: Machine Learning Meets Formal Method for Efficient Security Verification in Network Functions Virtualization (NFV),” Proc. the 27th European Symposium on Research in Computer Security (ESORICS 2022), Copenhagen, Denmark, September 26-30, 2022 (Acceptance ratio 104/562≈18.5%).   [PDF]  [Bibtex]
  9. Shangyu Xie, Meisam Mohammady*, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong, “A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract),” Proc. the 38th IEEE International Conference on Data Engineering (ICDE 2022), Kuala Lumpur, Malaysia, May 9-12, 2022. 
  10. Hugo Kermabon-Bobinnec*, Mahmood Gholipourchoubeh*, Sima Bagheri*, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi and Lingyu Wang,“ProSPEC: Proactive Security Policy Enforcement for Containers,” Proc. the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore-Washington DC Area, USA, April 24-26, 2022 (Acceptance ratio 30/111≈27%).   [PDF]  [Bibtex]
  11. Azadeh Tabiban*, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang, “ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Function Virtualization (NFV),” Proc. the Network and Distributed System Security Symposium (NDSS 2022), San Diego, 27 February - 3 March, 2022 (Acceptance ratio 83/513≈16.2%).  [PDF]  [Bibtex]
  12. Onur Duman*, Lingyu Wang, Minh Auy, Marthe Kassoufy, Mourad Debbabi, “Hardening Substations against Supply Chain Attacks Under Operational Constraints,” Proc. the 13th Conference on Innovative Smart Grid Technologies (ISGT 2022), Washington DC, USA, February 21 - 24, 2022.  [PDF]  [Bibtex]
  13. Shangyu Xie, Meisam Mohammady*, Han Wang, Lingyu Wang, Jaideep Vaidya and Yuan Hong, “Poster: A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing,” Proc. the 38th IEEE International Conference on Data Engineering (ICDE 2022), (Virtual) Kuala Lumpur, Malaysia, May 9-12, 2022.  [Bibtex]
  14. A S M Asadujjaman*, Momen Oqaily*, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains,” Proc. the 9th IEEE Conference on Communications and Network Security (CNS 2021), Online, October 4 - 6, 2021 (Acceptance ratio 32/113≈28%).  [PDF]  [Bibtex]
  15. Alaa Oqaily*, Sudershan Lakshmanan Thirunavukkarasu*,Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi, “NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack,” in Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2020), Bangkok, Thailand, December 14-17, 2020.  [PDF]  [Bibtex]
  16. Meisam Mohammady*, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, “R^2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions,” in Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20), Orlando, USA, November 9-13, 2020 (Acceptance ratio 121/715≈16.9%). [PDF]  [Bibtex]
  17. Nawaf Alhebaishi*, Lingyu Wang and Sushil Jajodia, “Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV),”  Proc. 34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2020), Springer-Verlag Lecture Notes in Computer Science (LNCS), Regensburg, Germany, June 25 - 27, 2020.  [PDF]  [Bibtex]
  18. Azadeh Tabiban*, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack”, Proc. The 8th IEEE Conference on Communications and Network Security  (CNS 2020), Avignon, France, 29 June - 1 July, 2020.   [PDF]   [Bibtex]
  19. Sudershan Lakshmanan Thirunavukkarasu*, Mengyuan Zhang, Alaa Oqaily*, Gagandeep Singh Chawla*, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, “Modeling NFV Deployment to Identify the Cross-level Inconsistency Vulnerabilities”, Proc. The 11th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2019), Sydney, Australia, December 11-13, 2019.   [PDF]  [Bibtex]
  20. Suryadipta Majumdar, Azadeh Tabiban*, Meisam Mohammady*, Alaa Oqaily*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Multi-Level Proactive Security Auditing for Cloud”, Proc. the IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, November 18-20, 2019.   [PDF]  [Bibtex]
  21. Onur Duman*, Mohsen Ghafouri, Marthe Kassouf, Ribal Atallah, Lingyu Wang, Mourad Debbabi, “Modeling Supply Chain Attacks in IEC 61850 Substations,” Proc. the 2019 IEEE International Conference on Smart Grid Communications (SmartGridComm 2019): Cyber Security and Privacy, Beijing, China, 21-24 October, 2019.  [PDF]  [Bibtex]
  22. Saed Alrabaee*, El Mouatez Karbab, Lingyu Wang and Mourad Debbabi, “BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning,”  Proc. the 24th European Symposium on Research in Computer Security (ESORICS 2019), Luxembourg, September 23-27, 2019 (Acceptance ratio 67/344≈19.5%).  [PDF]  [Bibtex]
  23. Suryadipta Majumdar*, Azadeh Tabiban*, Meisam Mohammady*, Alaa Oqaily*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement,”  Proc. the 24th European Symposium on Research in Computer Security (ESORICS 2019), Luxembourg, September 23-27, 2019 (Acceptance ratio 67/344≈19.5%).  [PDF]  [Bibtex]
  24. Momen Oqaily*, Yosr Jarraya, Mengyuan Zhang*, Lingyu Wang, Makan Pourzandi and Mourad Debbabi, “iCAT: An Interactive Customizable Anonymization Tool,”  Proc. the 24th European Symposium on Research in Computer Security (ESORICS 2019), Luxembourg, September 23-27, 2019 (Acceptance ratio 67/344≈19.5%).  [PDF]  [Bibtex]
  25. Mengyuan Zhang*, Yue Xin*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “CASFinder: Detecting Common Attack Surface,”  Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2019), Charleston, SC, USA - July 15-17, 2019 (Best Paper Award). [PDF]  [Bibtex]
  26. Suryadipta Majumdar*, Taous Madi*, Yosr Jarrayay, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Cloud Security Auditing: Major Approaches and Existing Challenges, Proc. The 11th International Symposium on Foundations & Practice of Security  (FPS 2018), November 13-15, 2018, Montreal, Canada.  [PDF]  [Bibtex]
  27. Taous Madi*, Mengyuan Zhang*, Yosr Jarrayay, Amir Alimohammadifar*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, QuantiC: Distance Metrics for Evaluating Multi-tenancy Threats in Public Clouds, Proc. The 10th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2018), Nicosia, Cyprus, December 10-13, 2018 (Acceptance ratio 18/9120%).  [PDF]  [Bibtex]
  28. Meisam Mohammady*, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi and Mourad Debbabi, “Preserving Both Privacy and Utility in Network Trace Anonymization,” in Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS '18), Toronto, Canada, Oct 15-19, 2018 (Acceptance ratio 134/809≈17%)[PDF]  [Bibtex]
  29. Amir Alimohammadifar*, Suryadipta Majumdar*, Taous Madi*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Stealthy Probing-based Verification (SPV): An Active Approach to Defending Software Defined Networks against Topology Poisoning Attacks,”   Proc. the 23rd European Symposium on Research in Computer Security (ESORICS 2018), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10493, Barcelona, Spain, September 3-7, 2018 (Acceptance ratio 56/283≈20%).   [PDF]  [Bibtex]
  30. Saed Alrabaee*, Paria Shirani*, Lingyu Wang, Mourad Debbabi and Aiman Hanna, “On Leveraging Coding Habits for Effective Binary Authorship Attribution,”   Proc. the 23rd European Symposium on Research in Computer Security (ESORICS 2018), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10493, Barcelona, Spain, September 3-7, 2018 (Acceptance ratio 56/283≈20%).   [PDF]  [Bibtex]
  31. Nawaf Alhebaishi*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds,”  Proc. 32nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2018) , Springer-Verlag Lecture Notes in Computer Science (LNCS), Bergamo, Italy, July 16-18, 2018 (Acceptance ratio 16/50≈32%) (Best Student Paper Award). [PDF]  [Bibtex]
  32. Paria Shirani*, Leo Collard, Basile L. Agba, Bernard Lebel, Mourad Debbabi, Lingyu Wang, Aiman Hanna, “Scalable Approach to Detecting Vulnerable Functions in Firmware Images of Smart Grid IEDs,” Proc. the 15th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2018), Campus Paris-Saclay, France, June 28-29, 2018 (Acceptance ratio 18/59≈31%). [PDF]  [Bibtex]
  33. Azadeh Tabiban*, Suryadipta Majumdar*, Lingyu Wang and Mourad Debbabi, “PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds,” Proc. the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC 2018), Beijing, China, May 30-June 1, 2018.  [PDF]  [Bibtex]
  34. Onur Duman*, Mengyuan Zhang*, Lingyu Wang, Mourad Debbabi, “Measuring the Security Posture of IEC 61850 Substations with Redundancy Against Zero Day Attacks,”   Proc. the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm 2017): Cyber Security and Privacy, Dresden, Germany, October 23-26, 2017.   [PDF]  [Bibtex]
  35. Suryadipta Majumdar*, Yosr Jarraya, Momen Oqaily*, Amir Alimohammadifar*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “LeaPS: Learning-Based Proactive Security Auditing for Clouds,”   Proc. the 22nd European Symposium on Research in Computer Security (ESORICS 2017), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10493, Oslo, Norway, September 11-15, 2017 (Acceptance ratio 54/340≈16%).  [PDF]  [Bibtex]
  36. Paria Shirani*, Lingyu Wang, Mourad Debbabi, “BinShape: Scalable and Robust Binary Library Function Identification Using Diverse Features,” Proc. the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'17), Bonn, Germany, July 6-7, 2017 (Acceptance ratio 18/67≈27%). [PDF]  [Bibtex]
  37. Daniel Borbor*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Securing Networks against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options,”  Proc. 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2017) , Springer-Verlag Lecture Notes in Computer Science (LNCS), Philadelphia, PA, USA, July 19-21, 2017. [PDF]  [Bibtex]
  38. Yushun Wang*, Taous Madi*, Suryadipta Majumdar*, Yosr Jarraya, Amir Alimohammadifar*, Makan Pourzandi, Lingyu Wang, Mourad Debbabi, “TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation,” The Network and Distributed System Security Symposium (NDSS 2017), San Diego, USA, February 26-March 1, 2017 (Acceptance ratio 68/423≈16%). [PDF]  [Bibtex]
  39. Suryadipta Majumdar*, Yosr Jarraya, Taous Madi*, Amir Alimohammadifar*, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, “Proactive Verification of Security Compliance for Clouds through Pre-Computation: Application to OpenStack,”   Proc. the 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 9878, Heraklion, Greece, September 26-30, 2016, pages 47-66 (Acceptance ratio 60/285≈21%).  [PDF]  [Bibtex]
  40. Daniel Borbor*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Diversifying Network Services under Cost Constraints for Better Resilience against Unknown Attacks,”  Proc. 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2016) , Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 9766, Trento, Italy, July 18-21, 2016, pages 295-312.  [PDF]  [Bibtex]
  41. Taous Madi*, Suryadipta Majumdar*, Yushun Wang*, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, "Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack", Proc. The 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New Orleans, USA, March 09-11, 2016 (Acceptance ratio 22/11519%). [PDF]  [Bibtex]
  42. Nawaf Alhebaishi*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, “Threat Modeling for Cloud Data Center Infrastructures,” The 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10128, Québec city, QC, Canada, 24-26 October 2016, pages 302-319.  [Bibtex]
  43. Mickael Emirkanian-Bouchard* and Lingyu Wang, “Towards Metric-Driven, Application-Specific Visualization of Attack Graphs,” The 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10128, Québec city, QC, Canada, 24-26 October 2016, pages 117-134.  [Bibtex]
  44. Saed Alrabaee*, Paria Shirani*, Mourad Debbabi and Lingyu Wang, “On the Feasibility of Malware Authorship Attribution,” The 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 10128, Québec city, QC, Canada, 24-26 October 2016, pages 256-272.  [Bibtex]
  45. Suryadipta Majumdar*, Taous Madi*, Yushun Wang*, Yosr Jarrayay, Makan Pourzandi, Lingyu Wang and Mourad Debbabi, Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack, Proc. The 7th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2015), Vancouver, Canada, November 30-December 3, 2015 (Acceptance ratio 48/18925%).  [PDF]  [Bibtex]
  46. Lingyu Wang, Mengyuan Zhang*, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks, Proc. 19th European Symposium on Research in Computer Security (ESORICS 2014), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 8713, Wroclaw, Poland, September 7-11, 2014, pages 494-511 (Acceptance ratio 58/23425%). [PDF]  [Bibtex] [Slides]
  47. Yuan Hong, Jaideep Vaidya, Haibing Lu and Lingyu Wang, “Collaboratively Solving Traveling Salesman Problem with Limited Disclosure,” in Proceedings of the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2014), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 8566, July 14-16, 2014, Vienna, Austria.
  48. Wen Ming Liu*, Lingyu Wang, Kui Ren and Mourad Debbabi, Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications, Proc.The 5th IEEE International Conference and on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK, December 2-5, 2013 (Acceptance ratio 11/6018%).  [PDF]  [Bibtex] [Slides]
  49. William Nzoukou Tankou*, Lingyu Wang, Sushil Jajodia and Anoop Singhal, A unified framework for measuring a network's mean time-to-compromise, Proc. 32nd IEEE International Symposium on Reliable Distributed Systems (SRDS 2013), Braga, Portugal, September 30 - October 3, 2013. [PDF]  [Bibtex] [Slides]
  50. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang, An efficient approach to assessing the risk of zero-day vulnerabilities, Proc. 10th International Conference on Security and Cryptpgraphy (SECRYPT 2013), Reykjavik, Iceland, July 29-31, 2013 (Best Paper Award)[PDF]  [Bibtex] 
  51. Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Lingyu Wang, Proof-carrying Cloud Computation: the Case of Convex Optimization,” Proc. IEEE INFOCOM mini-conference, 2013 (Acceptance ratio 25%). 
  52. Pengsu Cheng*, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Aggregating CVSS base scores for semantics-rich network security metrics,” Proc. 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, California, October 8-11, 2012 (Acceptance Ratio 28/11425%). [PDF]  [Bibtex] [Slides]
  53. Wen Ming Liu*, Lingyu Wang, Kui Ren, Pengsu Cheng* and Mourad Debbabi, “k-Indistinguishable Traffic Padding in Web Applications,” Proc. The 12th Privacy Enhancing Technologies Symposium (PETS 2012), July 11–13, 2012, Vigo, Spain, pages 79-99 (Acceptance Ratio 16/7222%). [PDF]  [Bibtex] [Slides]
  54. Wen Ming Liu*, Lingyu Wang, “Privacy Streamliner: A Two-Stage Approach to Improving Algorithm Efficiency,” Proc. The 2nd ACM Conference on Data and Applications Security (CODASPY 2012), Feb 7-9, 2012 (Acceptance Ratio 21/11319%). [PDF]  [Bibtex]  [Slides]
  55. Quan Ye, Xuan Sun, Lingyu Wang, Yong Zeng, Clément Fortin, “Inference of confidential parameters using internal structures: a case study of aircraft pylon and engine assembly,” Proc.The Society for Design and Process Science (SDPS 2011), Jeju Island, Korea, June 12-16, 2011, pages 366-371.
  56. Wen Ming Liu*, Lingyu Wang, Pengsu Cheng*, Mourad Debbabi, “Privacy-Preserving Traffic Padding in Web-Based Applications,” Proc. Workshop on Privacy in the Electronic Society (WPES 2011), October 11, 2011. (Short Paper).
  57. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel, “k-Zero day safety: Measuring the security risk of networks against unknown attacks,” Proc. 15th European Symposium on Research in Computer Security (ESORICS 2010), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 6345, 20-22 September, 2010, pages 573-587 (Acceptance ratio 42/20121%). [PDF] [Full Version] [Bibtex] [Slides]
  58. Wen Ming Liu*, Lingyu Wang, Lei Zhang, “K-Jump Strategy for Privacy Preserving Micro-Data Disclosure,” Proc. 13th International Conference on Database Theory (ICDT 2010), March 22-26, 2010, ACM Press, pages 104-115.  [PDF]  [Bibtex]  [Slides]
  59. Djedjiga Mouheb*, Chamseddine Talhi, Mariam Nouh, Vitor Lima*, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML,” Proc. 8th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2010), May 24 - 26, 2010, pages 197-213.
  60. Djedjiga Mouheb*, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework,” 7th International Workshop on Formal Aspects of Component Software (FACS 2010), pages 182-199, 2010.
  61. Mariam Nouh, Raha Ziarati*, Djedjiga Mouheb*, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Aspect Weaver: A Model Transformation Approach for UML Models,” Proc. 20th International Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2010), November 7 - 10, 2010.
  62. Pengsu Cheng*, Lingyu Wang, Tao Long*, “Compressing Attack Graphs through Reference Encoding,” Proc. 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2010), June 29-July 1, 2010, pages 1026-1031 (Acceptance ratio 45/115).  [PDF]  [Bibtex]
  63. Thomas Ormerod*, Lingyu Wang, Mourad Debbabi, Amr Youssef, Hamad Binsalleeh, Amine Boukhtouta, and Prosenjit Sinha, “Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat,” Proc. 4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010), July 18-25, 2010, pages 195-200.
  64. Hamad Binsalleeh, Thomas Ormerod*, Amine Boukhtouta, Prosenjit Sinha, Amr Youssef, Mourad Debbabi, Lingyu Wang, “On the Analysis of the Zeus Botnet Crimeware Toolkit,” Proc. 8th Annual Conference on Privacy, Security and Trust (PST 2010), August 17-19, 2010, pages 195-200 (Best Paper Award).
  65. Serguei A. Mokhov, Jian Li, Lingyu Wang, “Simple Dynamic Key Management in SQL Randomization,”  Proc. The 3rd IFIP International Conference on New Technologies, Mobility and Security  (NTMS 2009), December 20 - 23, 2009, pages 458-462  (Acceptance ratio 64/200).
  66. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky, “L-Cover: Preserving Diversity by Anonymity,” Proc. 6th VLDB Workshop on Secure Data Management (SDM 2009), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 5776, August 28, 2009, pages 158-171.  [PDF]  [Bibtex]
  67. Djedjiga Mouheb*, Chamseddine Talhi, M. Azzam, Vitor Lima*, Mourad Debbabi, Lingyu Wang, Makan Pourzandi,  “An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation,” Proc. The 8th International Conference on Software Methodologies, Tools and Techniques (SOMET 2009), September 23 - 25, 2009, pages 203-222.
  68. Djedjiga Mouheb*, Chamseddine Talhi, Vitor Lima*, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “Weaving Security Aspects into UML 2.0 Design Models,” Proc. The 13th Aspect Oriented Modeling Workshop (AOM 2009), March 2, 2009, ACM Press, pages 7-12.
  69. Yiming Wang*, Lingyu Wang, B. C. M. Fung, “Preserving Privacy for Location-Based Services with Continuous Queries,”  Proc. The IEEE International Conference on Communications - Communication and Information Systems Security Symposium (ICC 2009), June 14-18, 2009.
  70. Tania Islam*, Lingyu Wang, “A Heuristic Approach to Reducing the Cost of Network Hardening Using Attack Graph,”  Proc. The 2nd IFIP International Conference on New Technologies, Mobility and Security  (NTMS 2008),  November 5 - 7, 2008, IEEE Press. 
  71. Shuai Liu*, Wei Li*, Lingyu Wang, “Towards Efficient Over-encryption in Outsourced Databases Using Secret Sharing,”  Proc. The 2nd IFIP International Conference on New Technologies, Mobility and Security  (NTMS 2008), November 5 - 7, 2008, IEEE Press.
  72. Marcel Frigault*, Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring network security using Dynamic Bayesian network," Proc. 4th ACM Workshop on Quality of Protection (QoP), October 27, 2008, pages 23-30.  [PDF]  [Bibtex]
  73. Hadi Otrok, Noman Mohammed*, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya, “A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs,” Proc. International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPri_WiMob 2008), October 12, 2008, IEEE Press, pages 608-612.
  74. Feng Chen, Lingyu Wang, Jinshu Su, “An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs,” Proc. The Fourth International Conference on Information Assurance and Security (IAS 2008), September 8-10, 2008, IEEE Press, pages 209 - 212. 
  75. Serguei A. Mokhov, Farid Rassai, Lee Wei Huynh, Lingyu Wang, “The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement,” Proc. International Conference on Telecommunications and Networking (TeNe 2008), December 5-13, 2008, pages 423-429.
  76. Serguei A. Mokhov, Lee Wei Huynh, Lingyu Wang, “The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement,” Proc. International Conference on Telecommunications and Networking (TeNe 2008), December 5-13, 2008, pages: 449-455.
  77. Marcel Frigault*, Lingyu Wang, “Measuring Network Security Using Bayesian Network-Based Attack Graphs,”  Proc. The 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2008), July 28 - August 1, 2008, pages 698-703. 
  78. Hong Yuan*, Shuo Lu*, Qian Liu*, Lingyu Wang, Rachida Dssouli, “Preserving Privacy in e-Health Systems Using Hippocratic Database,” Proc. The 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2008), July 28 - August 1, 2008, pages 692-697.
  79. Lingyu Wang, Tania Islam*, Tao Long*, Anoop Singhal, and Sushil Jajodia, “An Attack Graph-Based Probabilistic Security Metric,”  Proc. 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008) , Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 5094, July 13-16, 2008, pages 283-296.  [PDF]  [Bibtex]
  80. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky, “Exclusive Strategy for Generalization Algorithms in Micro-Data Disclosure,” Proc. 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008), Springer-Verlag Lecture Notes in Computer Science (LNCS), Vol. 5094, July 13-16, 2008, pages 190-204.  [PDF]  [Bibtex]
  81. Wei Li*, Lingyu Wang, Bo Zhu, Lei Zhang, “An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations,” Proc. 23rd International Information Security Conference (SEC 2008), September 8-10, 2008, pages 189-203 (Acceptance ratio 42/143).
  82. B. C. M. Fung, K. Wang, L. Wang, and M. Debbabi, “A Framework for Privacy-Preserving Cluster Analysis,” Proc. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2008), Springer-Verlag Lecture Notes in Computer Science (LNCS), 2008, To appear (Acceptance ratio 22%).
  83. Da Yong Zhang*, Lingyu Wang, Yong Zeng, “Secure Collaborative Product Development: a Literature Review,” Proc. 5th International Conference on Product Lifecycle Management (PLM 2008), July 9-11, 2008, To appear.
  84. Bo Zhu, Kui Ren, Lingyu Wang, “Anonymous Misbehavior Detection in Mobile Ad Hoc Networks,” Proc. 1st IEEE International Workshop on Wireless Security and Privacy (WiSP 2008), June 20, 2008, pages 358-363.
  85. Djedjiga Mouheb*, Mourad Debbabi, Lingyu Wang, Makan Pourzandi, “UML-Based Approaches for the Development of Secure Software and Systems: A Comparative Study,” Proc. 2nd Workshop on Practice and Theory of IT Security (PTITS 2008), January 23, 2008, pages 15-20.
  86. Noman Mohammed*, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya, “A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET,” Proc. of the IEEE Wireless Communications and Networking Conference (WCNC 2008), March 31-April 4, 2008, pages 2816-2821.
  87. Qian Liu*, Shuo Lu*, Hong Yuan*, Lingyu Wang, Rachida Dssouli, “Securing Telehealth Applications in a Web-Based e-Health Portal,” Proc. 3rd International Conference on Availability, Reliability and Security (ARES 2008), IEEE Press, March 4-7, 2008, pages 3-9.
  88. Shuo Lu*, Hong Yuan*, Qian Liu*, Lingyu Wang, Rachida Dssouli, “Access Control in e-Health Portal Systems,” Proc. 4th International Conference on Innovations in Information Technology (Innovations 2007), IEEE Press, November 18-20, 2007, pages 88-92.
  89. Hong Yuan*, Shuo Lu*, Qian Liu*, Lingyu Wang, Rachida Dssouli, “A Hierarchical Approach to the Specification of Privacy Preferences,” Proc. 4th International Conference on Innovations in Information Technology (Innovations 2007), IEEE Press, November 18-20, 2007, pages 660-664.
  90. Lingyu Wang, Anoop Singhal, Sushil Jajodia, “Toward Measuring Network Security Using Attack Graphs,” Proc. 3rd International Workshop on Quality of Protection (QoP 2007), Oct 29, 2007, pages 49-54.
  91. Hadi Otrok, Noman Mohammed*, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya, “An Efficient And Truthful Leader IDS Election Mechanism for MANET,” Proc. of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), October 8 - 10, 2007, pages 78.
  92. Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring the overall security of network configurations using attack graphs," Proc.21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007), Springer Lecture Notes in Computer Science, Vol. 4602, Steve Barker and Gail-Joon Ahn, eds., Redondo Beach, CA, July 8-11, 2007, pages 98-112 (Acceptance ratio 18/44).
  93. Xuxin Xu*, Lingyu Wang, Amr Youssef, Bo Zhu, “Preventing collusion attacks on the one-way function tree (OFT) scheme,” Proc. 5 th International Conference on Applied Cryptography and Network Security (ACNS 2007), Springer-Verlag Lecture Notes in Computer Science, Vol. 4521, pages 177-193 (Acceptance ratio 31/260), June 5-8, 2007.  [PDF]  [Bibtex]
  94. Chao Yao, Lingyu Wang, X. Sean Wang, Sushil Jajodia, “Indistinguishability: the other aspect of privacy,” Proc. 3rd VLDB Workshop on Secure Data Management (SDM 2006), Springer Lecture Notes in Computer Science, Vol. 4165, September 10-11, 2006, pages 1-17.  [PDF]  [Bibtex]
  95. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia, “Interactive Analysis of Attack Graphs Using Relational Queries,” Proc. 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), Springer-Verlag Lecture Notes in Computer Science, Vol. 4127, July 2006, pages 119-132 (Acceptance ratio 22/55).
  96. Lingyu Wang, Anyi Liu, Sushil Jajodia, “An efficient and unified approach to correlating, hypothesizing, and predicting network intrusion alerts,” Proc. 10th European Symposium on Research in Computer Security (ESORICS 2005), September 2005, pages 247-266 (Acceptance ratio 26/158).
  97. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symposium on Security and Privacy (S&P 2004), May 2004, pages 161-175 (Acceptance ratio 19/180).   [PDF]  [Bibtex]
  98. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “A logic-based framework for attribute based access control, ” Proc. 2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), October 2004, pages 45-55 (Acceptance ratio 9/25).  [PDF]  [Bibtex]
  99. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia, “Precisely answering multidimensional range queries without privacy breaches,” Proc. 8th European Symposium on Research in Computer Security (ESORICS 2003), October 2003, pages 100-115 (Acceptance ratio 19/114).
  100. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Towards secure XML federations, ” Proc. 17th IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 2003), August 2003, pages 117-131 (Acceptance ratio 25/50).
  101. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Cardinality-based inference control in sum-only data cubes, ” Proc. 7th European Symposium on Research in Computer Security (ESORICS 2002), October 2002, pages 55-71 (Acceptance ratio 16/83).
  102. Yingjiu Li, Lingyu Wang, X. Sean Wang, Sushil Jajodia, “Auditing interval-based inference, ” Proc. 14th Conference on Advanced Information Systems Engineering (CAiSE 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2348, May 2002, pages 553-568 (Acceptance ratio 42/173).
  103. Yingjiu Li, Lingyu Wang, Sushil Jajodia, “Preventing interval-based inference by random data perturbation, ” Proc. 1st Workshop on Privacy Enhancing Technologies (PET 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2482, April 2002, pages 160-170 (Acceptance ratio 16/47).
  104. Yingjiu Li, Senchun Zhu, Lingyu Wang, Sushil Jajodia, “A privacy-enhanced microaggregation method, ” Proc. 2nd Symposium on Foundations of Information and Knowledge Systems (FoIKS 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2284, February 2002, pages 148-159 (Acceptance ratio 15/55).
Patents
  1. Sushil Jajodia, Lingyu Wang, Anoop Singhal, Interactive analysis of attack graphs using relational queries, US Patent 8,566,269, 2013-10-22.
  2. Sushil Jajodia, Lingyu Wang, Steven Noel, Anoop Singhal, K-zero day safety, US Patent 8,918,884, 2014-12-23.
  3. Amir Alimohammadifar, Lingyu Wang, Yosr Jarraya, Makan Pourzandi, Mourad Debbabi, “Network link verification, US Patent 11509565, 2022/11/22.
  4. Momen Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Mourad Debbabi, Privacy-preserving data verification, US Patent 11314884, 2022/4/26.
  5. Meisam Mohammady, Yosr Jarraya, Lingyu Wang, Mourad Debbabi, Makan Pourzandi, Partition-based prefix preserving anonymization approach for network traces containing IP addresses, US Patent 11316831, 2022/4/26.

Sponsors


Canada Foundation for Innovation (CFI)
Ericsson
Fonds de recherche du Québec – Nature et technologies (FRQNT)
Prompt Québec
Mitacs
National Institute of Standards and Technology (NIST)
Natural Sciences and Engineering Research Council of Canada (NSERC)




My academic lineage (on Dr. Jajodia's homepage). My Erdös number is 3. @Mathematics Genealogy.