Lingyu Wang

ORCID: 0000-0002-7441-7541
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Software Engineering Research
  • Software-Defined Networks and 5G
  • Access Control and Trust
  • Digital and Cyber Forensics
  • Galaxies: Formation, Evolution, Phenomena
  • Smart Grid Security and Resilience
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Adversarial Robustness in Machine Learning
  • Astronomy and Astrophysical Research
  • Data Quality and Management
  • Cloud Computing and Resource Management
  • Mobile Ad Hoc Networks
  • Software Reliability and Analysis Research
  • Privacy, Security, and Data Protection
  • Advanced Database Systems and Queries
  • Stellar, planetary, and galactic studies

Shanghai Jiao Tong University
2025

Concordia University
2015-2024

Concordia University
2006-2024

SRON Netherlands Institute for Space Research
2019-2024

University of Groningen
2019-2024

Southeast University
2024

Xi'an University of Architecture and Technology
2023

University of Milan
2022

Polytechnique Montréal
2022

University of Pittsburgh
2022

The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent leaks in the cloud. A key challenge to designing such encryption schemes lies efficient management keys. desired flexibility any group selected documents demands keys be used for documents. However, this also implies necessity securely distributing a large number both and search, those will have store received keys, submit an equally keyword...

10.1109/tc.2015.2389959 article EN IEEE Transactions on Computers 2015-01-08

Attribute based access control (ABAC) grants accesses to services on the attributes possessed by requester. Thus, ABAC differs from traditional discretionary model replacing subject a set of and object in matrix. The former is appropriate an identity-less system like Internet where subjects are identified their characteristics, such as those substantiated certificates. These can be modeled attribute sets. latter because most users not privy method names residing remote servers. sets service...

10.1145/1029133.1029140 article EN 2004-10-29

Given the increasing dependence of our societies on networked information systems, overall security these systems should be measured and improved. Existing metrics have generally focused measuring individual vulnerabilities without considering their combined effects. Our previous work tackle this issue by exploring causal relationships between encoded in an attack graph. However, evolving nature networks has largely been ignored. In paper, we propose a Dynamic Bayesian Networks (DBNs)-based...

10.1145/1456362.1456368 article EN 2008-10-27

10.1016/j.comcom.2006.06.018 article EN Computer Communications 2006-07-19

Given the increasing dependence of our societies on information systems, overall security these systems should be measured and improved. Existing work generally focuses measuring individual vulnerabilities instead their combined effects. Recent research has explored application attack graphs probabilistic metrics to address this challenge. However, such usually assumes independently distributed combines them in an arbitrary manner. They cannot more realistic cases, as exploiting one...

10.1109/compsac.2008.88 article EN 2008-01-01

By enabling a direct comparison of different security solutions with respect to their relative effectiveness, network metric may provide quantifiable evidences assist practitioners in securing computer networks. However, research on metrics has been hindered by difficulties handling zero-day attacks exploiting unknown vulnerabilities. In fact, the risk vulnerabilities considered as something unmeasurable due less predictable nature software flaws. This causes major difficulty metrics,...

10.1109/tdsc.2013.24 article EN IEEE Transactions on Dependable and Secure Computing 2013-06-11

Diversity has long been regarded as a security mechanism for improving the resilience of software and networks against various attacks. More recently, diversity found new applications in cloud computing security, moving target defense, robustness network routing. However, most existing efforts rely on intuitive imprecise notions diversity, few models are mostly designed single system running diverse replicas or variants. At higher abstraction level, global property entire network, its effect...

10.1109/tifs.2016.2516916 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2016-01-12

In measuring the overall security of a network, crucial issue is to correctly compose measure individual components. Incorrect compositions may lead misleading results. For example, network with less vulnerabilities or more diversified configuration not necessarily secure. To obtain correct measures, we need first understand interplay between how can be combined by attackers in advancing an intrusion. Such understanding becomes possible recent advances modeling using attack graphs. Based on...

10.1145/1314257.1314273 article EN 2007-10-29

In this paper, we study leader election in the presence of selfish nodes for intrusion detection mobile ad hoc networks (MANETs). To balance resource consumption among all and prolong lifetime an MANET, with most remaining resources should be elected as leaders. However, there are two main obstacles achieving goal. First, without incentives serving others, a node might behave selfishly by lying about its avoiding being elected. Second, electing optimal collection leaders to minimize overall...

10.1109/tdsc.2009.22 article EN IEEE Transactions on Dependable and Secure Computing 2009-06-25

Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number sensors in network. In node replication attack, take advantage credentials compromised surreptitiously introduce replicas into Without effective efficient detection mechanism, these be used launch variety attacks undermine many applications protocols. this paper, we present novel distributed approach called Localized Multicast for detecting attacks. The...

10.1109/tmc.2010.40 article EN IEEE Transactions on Mobile Computing 2010-03-19

A critical aspect of malware forensics is authorship analysis. The successful outcome such analysis usually determined by the reverse engineer's skills and volume complexity code under To assist engineers in a tedious error-prone task, it desirable to develop reliable automated tools for supporting practice attribution. In recent work, machine learning was used rank select syntax-based features as n-grams flow graphs. experimental results showed that top ranked were unique each author, which...

10.1016/j.diin.2014.03.012 article EN cc-by-nc-nd Digital Investigation 2014-04-13

The capability of efficiently recognizing reused functions for binary code is critical to many digital forensics tasks, especially considering the fact that modern malware typically contain a significant amount borrowed from open source software packages. Such will not only improve efficiency reverse engineering, but also reduce odds common libraries leading false correlations between unrelated bases. In this paper, we propose SIGMA, technique identifying in by matching traces novel...

10.1016/j.diin.2015.01.011 article EN cc-by-nc-nd Digital Investigation 2015-03-01

The smart grid frequently collects consumers' fine-grained power usage data through meters to facilitate various applications, such as billing, load monitoring, regional statistics, and demand response. However, the meter reading streams may also pose severe privacy threats consumers by leaking their appliances' ON/OFF status. In this paper, we first quantitatively measure information leakage with respect specific status from any stream, define a novel notion bound leakage. addition, propose...

10.1109/tifs.2017.2704904 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2017-05-16

We study stellar and black hole mass assembly in a sample of 42 infrared-luminous galaxy mergers at z<0.3 by combining results from radiative transfer modelling with archival measures molecular gas mass. The ratios mass, to each other are consistent those massive gas-rich galaxies z<0.3. advanced may show increased ratios, the transition AGN ellipticals implying substantial growth over course merger. Star formation rates enhanced relative local main sequence, factors ~100 starburst ~1.8...

10.1093/mnras/stac980 article EN Monthly Notices of the Royal Astronomical Society 2022-04-14

Galaxy morphology is a powerful diagnostic to assess the realism of cosmological hydrodynamical simulations. Determining simulated galaxies requires generation synthetic images through 3D radiative transfer post-processing that properly accounts for different stellar populations and interstellar dust attenuation. We use SKIRT code generate TNG50-SKIRT Atlas, UV near-infrared broadband image atlas complete stellar-mass selected sample 1154 extracted from TNG50 simulation at z = 0. The have...

10.1051/0004-6361/202348418 article EN cc-by Astronomy and Astrophysics 2024-01-08
Coming Soon ...