default search action
Wenke Lee
2020 – today
- 2024
- [j26]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats. Autom. 159: 111353 (2024) - [j25]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach. IEEE Trans. Autom. Control. 69(10): 6684-6699 (2024) - [j24]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games. IEEE Trans. Autom. Control. 69(11): 7824-7831 (2024) - [j23]Matthew Lau, Ismaïla Seck, Athanasios P. Meliopoulos, Wenke Lee, Eugène Ndiaye:
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection. Trans. Mach. Learn. Res. 2024 (2024) - [c186]Matthew Lau, Fahad Alsaeed, Kayla Thames, Nano Suresettakul, Saman A. Zonouz, Wenke Lee, Athanasios P. Meliopoulos:
Physics-Assisted Explainable Anomaly Detection in Power Systems. ECAI 2024: 4748-4755 - [c185]Matthew Lau, Leyan Pan, Stefan Davidov, Athanasios P. Meliopoulos, Wenke Lee:
Geometric Implications of Classification on Reducing Open Space Risk. Tiny Papers @ ICLR 2024 - [c184]Feng Xiao, Zhongfu Su, Guangliang Yang, Wenke Lee:
Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation. SP 2024: 296-311 - [c183]Joey Allen, Zheng Yang, Feng Xiao, Matthew Landen, Roberto Perdisci, Wenke Lee:
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web. USENIX Security Symposium 2024 - [c182]Yupeng Yang, Yongheng Chen, Rui Zhong, Jizhou Chen, Wenke Lee:
Towards Generic Database Management System Fuzzing. USENIX Security Symposium 2024 - [i20]Matthew Lau, Haoran Wang, Alec Helbling, Matthew Hull, Shengyun Peng, Martin Andreoni, Willian T. Lunardi, Wenke Lee:
Non-Robust Features are Not Always Useful in One-Class Classification. CoRR abs/2407.06372 (2024) - [i19]Chaofan Shou, Yuanyu Ke, Yupeng Yang, Qi Su, Or Dadosh, Assaf Eli, David Benchimol, Doudou Lu, Daniel Tong, Dex Chen, Zoey Tan, Jacob Chia, Koushik Sen, Wenke Lee:
BACKRUNNER: Mitigating Smart Contract Attacks in the Real World. CoRR abs/2409.06213 (2024) - [i18]Tian-Yi Zhou, Matthew Lau, Jizhou Chen, Wenke Lee, Xiaoming Huo:
Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice. CoRR abs/2409.08521 (2024) - [i17]Leyan Pan, Vijay Ganesh, Jacob D. Abernethy, Chris Esposo, Wenke Lee:
Can Transformers Reason Logically? A Study in SAT Solving. CoRR abs/2410.07432 (2024) - 2023
- [j22]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [c181]Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee:
Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. SP 2023: 20-37 - [c180]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. USENIX Security Symposium 2023: 823-840 - [c179]Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee:
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. USENIX Security Symposium 2023: 1325-1342 - [c178]Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee:
VulChecker: Graph-based Vulnerability Localization in Source Code. USENIX Security Symposium 2023: 6557-6574 - [c177]Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee:
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks. USENIX Security Symposium 2023: 6701-6718 - [i16]Moses Ike, Kandy Phan, Anwesh Badapanda, Matthew Landen, Keaton Sadoski, Wanda Guo, Asfahan Shah, Saman A. Zonouz, Wenke Lee:
Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process. CoRR abs/2311.18539 (2023) - [i15]Matthew Lau, Ismaïla Seck, Athanasios P. Meliopoulos, Wenke Lee, Eugène Ndiaye:
Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection. CoRR abs/2312.01541 (2023) - 2022
- [j21]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. ACM Comput. Surv. 54(1): 7:1-7:41 (2022) - [c176]Matthew Landen, Key-whan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee:
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. ACSAC 2022: 13-27 - [c175]ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee:
DeView: Confining Progressive Web Applications by Debloating Web APIs. ACSAC 2022: 881-895 - [c174]Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee:
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. CCS 2022: 2975-2988 - [i14]Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee:
SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. CoRR abs/2211.14642 (2022) - 2021
- [j20]Carter Yagemann, Simon Pak Ho Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. IEEE Secur. Priv. 19(6): 58-65 (2021) - [j19]Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - [c173]Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee:
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. AsiaCCS 2021: 629-643 - [c172]Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. AsiaCCS 2021: 759-773 - [c171]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. CCS 2021: 320-336 - [c170]Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. CCS 2021: 3337-3351 - [c169]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. NDSS 2021 - [c168]Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. SP 2021: 642-658 - [c167]Erkam Uzun, Simon P. Chung, Vladimir Kolesnikov, Alexandra Boldyreva, Wenke Lee:
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search. USENIX Security Symposium 2021: 911-928 - [c166]Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. USENIX Security Symposium 2021: 1989-2006 - [c165]Feng Xiao, Jianwei Huang, Yichang Xiong, Guangliang Yang, Hong Hu, Guofei Gu, Wenke Lee:
Abusing Hidden Properties to Attack the Node.js Ecosystem. USENIX Security Symposium 2021: 2951-2968 - [c164]Evan Downing, Yisroel Mirsky, Kyuhong Park, Wenke Lee:
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction. USENIX Security Symposium 2021: 3469-3486 - [c163]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. WWW 2021: 2733-2744 - [i13]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. CoRR abs/2102.09764 (2021) - [i12]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - 2020
- [j18]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats. IEEE Trans. Autom. Control. 65(12): 5248-5263 (2020) - [c162]Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
On the Feasibility of Automating Stock Market Manipulation. ACSAC 2020: 277-290 - [c161]Wenke Lee:
Machine Learning and Security: The Good, The Bad, and The Ugly. CCS 2020: 1-2 - [c160]Chenxiong Qian, Hyungjoon Koo, ChangSeok Oh, Taesoo Kim, Wenke Lee:
Slimium: Debloating the Chromium Browser with Feature Subsetting. CCS 2020: 461-476 - [c159]Joey Allen, Zheng Yang, Matthew Landen, Raghav Bhat, Harsh Grover, Andrew Chang, Yang Ji, Roberto Perdisci, Wenke Lee:
Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System. CCS 2020: 787-802 - [c158]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CCS 2020: 955-970 - [c157]Dinuka Sahabandu, Joey Allen, Shana Moothedath, Linda Bushnell, Wenke Lee, Radha Poovendran:
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach. ICCPS 2020: 9-19 - [i11]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Measuring and Preventing Supply Chain Attacks on Package Managers. CoRR abs/2002.01139 (2020) - [i10]Yisroel Mirsky, Wenke Lee:
The Creation and Detection of Deepfakes: A Survey. CoRR abs/2004.11138 (2020) - [i9]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CoRR abs/2006.02398 (2020) - [i8]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach. CoRR abs/2006.12327 (2020) - [i7]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CoRR abs/2007.00076 (2020) - [i6]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats. CoRR abs/2007.12327 (2020)
2010 – 2019
- 2019
- [c156]Dinuka Sahabandu, Shana Moothedath, Linda Bushnell, Radha Poovendran, Joey Allen, Wenke Lee, Andrew Clark:
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching. ACC 2019: 2289-2296 - [c155]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers. CDC 2019: 567-574 - [c154]Shruti Misra, Shana Moothedath, Hossein Hosseini, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge. CDC 2019: 4053-4060 - [c153]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. GameSec 2019: 417-438 - [c152]Carter Yagemann, Salmin Sultana, Li Chen, Wenke Lee:
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. ISC 2019: 341-359 - [c151]Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee:
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. NDSS 2019 - [c150]Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. USENIX Security Symposium 2019: 1733-1750 - 2018
- [c149]Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee:
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. ACSAC 2018: 210-221 - [c148]Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. CCS 2018: 1120-1136 - [c147]Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. CCS 2018: 1470-1486 - [c146]Dinuka Sahabandu, Baicen Xiao, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CDC 2018: 1136-1143 - [c145]Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
Multi-stage Dynamic Information Flow Tracking Game. GameSec 2018: 80-101 - [c144]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c143]Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee:
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. NDSS 2018 - [c142]Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, Wenke Lee:
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. USENIX Security Symposium 2018: 393-410 - [c141]Yang Ji, Sangho Lee, Mattia Fazzini, Joey Allen, Evan Downing, Taesoo Kim, Alessandro Orso, Wenke Lee:
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Security Symposium 2018: 1705-1722 - [i5]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats. CoRR abs/1811.05622 (2018) - 2017
- [c140]Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee:
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking. CCS 2017: 377-390 - [c139]Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee:
Identifying Open-Source License Violation and 1-day Security Risk at Large Scale. CCS 2017: 2169-2185 - [c138]Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes:
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. NDSS 2017 - [c137]Yanick Fratantonio, Chenxiong Qian, Simon P. Chung, Wenke Lee:
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. IEEE Symposium on Security and Privacy 2017: 1041-1057 - [c136]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification. USENIX ATC 2017: 271-283 - [c135]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [i4]Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee:
Bunshin: Compositing Security Mechanisms through Diversification (with Appendix). CoRR abs/1705.09165 (2017) - [i3]Ruian Duan, Weiren Wang, Wenke Lee:
Cloaker Catcher: A Client-based Cloaking Detection System. CoRR abs/1710.01387 (2017) - 2016
- [c134]Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c133]Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Wenke Lee, Michael Farrell:
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet. DIMVA 2016: 231-254 - [c132]Yang Ji, Sangho Lee, Wenke Lee:
RecProv: Towards Provenance-Aware User Space Record and Replay. IPAW 2016: 3-15 - [c131]Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes:
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. NDSS 2016 - [c130]Wei Meng, Ren Ding, Simon P. Chung, Steven Han, Wenke Lee:
The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads. NDSS 2016 - [c129]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c128]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [c127]Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - [c126]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - [i2]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - 2015
- [c125]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c124]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c123]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c122]Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. NDSS 2015 - [c121]Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. NDSS 2015 - [c120]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - [c119]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [j17]Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. IEEE Trans. Inf. Forensics Secur. 9(1): 27-38 (2014) - [c118]Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. CCS 2014: 103-115 - [c117]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c116]Tielei Wang, Chengyu Song, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. DIMVA 2014: 255-275 - [c115]Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee:
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic. DSN 2014: 598-609 - [c114]Yeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee:
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. NDSS 2014 - [c113]Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. PAM 2014: 131-140 - [c112]Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee:
From Zygote to Morula: Fortifying Weakened ASLR on Android. IEEE Symposium on Security and Privacy 2014: 424-439 - [c111]Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. USENIX Security Symposium 2014: 33-48 - [c110]Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon P. Chung, Billy Lau, Wenke Lee:
On the Feasibility of Large-Scale Infections of iOS Devices. USENIX Security Symposium 2014: 79-93 - 2013
- [c109]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee:
Beheading hydras: performing effective botnet takedowns. CCS 2013: 121-132 - [c108]Brendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee:
Tappan Zee (north) bridge: mining memory accesses for introspection. CCS 2013: 839-850 - [c107]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c106]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013 - [c105]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Connected Colors: Unveiling the Structure of Criminal Networks. RAID 2013: 390-410 - [c104]Tielei Wang, Kangjie Lu, Long Lu, Simon P. Chung, Wenke Lee:
Jekyll on iOS: When Benign Apps Become Evil. USENIX Security Symposium 2013: 559-572 - [c103]Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. USENIX Security Symposium 2013: 671-686 - 2012
- [j16]Manos Antonakakis, Roberto Perdisci, Nikolaos Vasiloglou, Wenke Lee:
Detecting and Tracking the Rise of DGA-Based Malware. login Usenix Mag. 37(6) (2012) - [c102]Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang:
CHEX: statically vetting Android apps for component hijacking vulnerabilities. CCS 2012: 229-240 - [c101]Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee:
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. RAID 2012: 22-41 - [c100]Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon:
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security Symposium 2012: 491-506 - [c99]Chengyu Song, Paul Royal, Wenke Lee:
Impeding Automated Malware Analysis with Environment-sensitive Malware. HotSec 2012 - [c98]Kapil Singh, Helen J. Wang, Alexander Moshchuk, Collin Jackson, Wenke Lee:
Practical end-to-end web content integrity. WWW 2012: 659-668 - [i1]Xinyu Xing, Junho Ahn, Wenke Lee, Richard Han, Shivakant Mishra:
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services. CoRR abs/1204.2774 (2012) - 2011
- [c97]Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Understanding the prevalence and use of alternative plans in malware with network games. ACSAC 2011: 1-10 - [c96]Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206 - [c95]Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster:
Boosting the scalability of botnet detection using adaptive traffic sampling. AsiaCCS 2011: 124-134 - [c94]Long Lu, Roberto Perdisci, Wenke Lee:
SURF: detecting and measuring search poisoning. CCS 2011: 467-476 - [c93]Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo:
Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132 - [c92]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. DSN 2011: 474-485 - [c91]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde, Brian Mastropietro:
PEASOUP: preventing exploits against software of uncertain provenance (position paper). SESS@ICSE 2011: 43-49 - [c90]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011 - [c89]Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon T. Giffin, Wenke Lee:
Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. IEEE Symposium on Security and Privacy 2011: 297-312 - [c88]Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou, David Dagon:
Detecting Malware Domains at the Upper DNS Hierarchy. USENIX Security Symposium 2011 - [c87]Junjie Zhang, Christian Seifert, Jack W. Stokes, Wenke Lee:
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. WWW 2011: 187-196 - [e5]Nick Feamster, Wenke Lee:
USENIX Workshop on Free and Open Communications on the Internet, FOCI '11, San Francisco, CA, USA, August 8, 2011. USENIX Association 2011 [contents] - 2010
- [c86]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: an attack-agnostic approach for preventing drive-by malware infections. CCS 2010: 440-450 - [c85]Qing Hui, Xiapu Luo, Wenke Lee:
Control of low-rate denial-of-service attacks on web servers and TCP flows. CDC 2010: 4186-4191 - [c84]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee:
Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80 - [c83]Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248 - [c82]Roberto Perdisci, Wenke Lee, Nick Feamster:
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. NSDI 2010: 391-404 - [c81]Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37 - [c80]Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee:
On the Incoherencies in Web Browser Access Control Policies. IEEE Symposium on Security and Privacy 2010: 463-478 - [c79]Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster:
Building a Dynamic Reputation System for DNS. USENIX Security Symposium 2010: 273-290
2000 – 2009
- 2009
- [j15]Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, Wenke Lee:
McPAD: A multiple classifier system for accurate payload-based anomaly detection. Comput. Networks 53(6): 864-881 (2009) - [j14]Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. Computer 42(2): 44-52 (2009) - [c78]Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee:
Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253 - [c77]Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee:
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. ACSAC 2009: 311-320 - [c76]Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi:
Secure in-VM monitoring using hardware virtualization. CCS 2009: 477-487 - [c75]Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:
Mapping kernel objects to enable systematic integrity checking. CCS 2009: 555-565 - [c74]Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12 - [c73]David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee:
Recursive DNS Architectures and Vulnerability Implications. NDSS 2009 - [c72]Andrea Lanzi, Monirul Islam Sharif, Wenke Lee:
K-Tracer: A System for Extracting Kernel Malware Behavior. NDSS 2009 - [c71]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352 - [c70]Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Automatic Reverse Engineering of Malware Emulators. SP 2009: 94-109 - [c69]Kapil Singh, Sumeer Bhola, Wenke Lee:
xBook: Redesigning Privacy Control in Social Networking Platforms. USENIX Security Symposium 2009: 249-266 - [e4]Wenke Lee:
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009. USENIX Association 2009 [contents] - [e3]David A. Basin, Srdjan Capkun, Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7 [contents] - 2008
- [j13]Martim Carbone, Wenke Lee, Diego Zamboni:
Taming Virtualization. IEEE Secur. Priv. 6(1): 65-67 (2008) - [j12]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14): 1941-1946 (2008) - [c68]Roberto Perdisci, Andrea Lanzi, Wenke Lee:
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. ACSAC 2008: 301-310 - [c67]Artem Dinaburg, Paul Royal, Monirul Islam Sharif, Wenke Lee:
Ether: malware analysis via hardware virtualization extensions. CCS 2008: 51-62 - [c66]Guofei Gu, Alvaro A. Cárdenas, Wenke Lee:
Principled reasoning and practical applications of alert fusion in intrusion detection systems. AsiaCCS 2008: 136-147 - [c65]David Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee:
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. CCS 2008: 211-222 - [c64]Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee:
Evaluating email's feasibility for botnet command and control. DSN 2008: 376-385 - [c63]Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee:
Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500 - [c62]David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee:
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. NDSS 2008 - [c61]Guofei Gu, Junjie Zhang, Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008 - [c60]Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Impeding Malware Analysis Using Conditional Code Obfuscation. NDSS 2008 - [c59]Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee:
Lares: An Architecture for Secure Active Monitoring Using Virtualization. SP 2008: 233-247 - [c58]Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154 - [e2]Wenke Lee, Cliff Wang, David Dagon:
Botnet Detection: Countering the Largest Security Threat. Advances in Information Security 36, Springer 2008, ISBN 978-0-387-68768-1 [contents] - 2007
- [j11]Bryan D. Payne, Reiner Sailer, Ramón Cáceres, Ronald Perez, Wenke Lee:
A layered approach to simplified access control in virtualized systems. ACM SIGOPS Oper. Syst. Rev. 41(4): 12-19 (2007) - [c57]David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee:
A Taxonomy of Botnet Structures. ACSAC 2007: 325-339 - [c56]Bryan D. Payne, Wenke Lee:
Secure and Flexible Monitoring of Virtual Machines. ACSAC 2007: 385-397 - [c55]Monirul Islam Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee:
Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41 - [c54]Guofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee:
Misleading and defeating importance-scanning malware propagation. SecureComm 2007: 250-259 - [c53]Takehiro Takahashi, Wenke Lee:
An assessment of VoIP covert channel threats. SecureComm 2007: 371-380 - [c52]David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish:
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 - [c51]Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. USENIX Security Symposium 2007 - 2006
- [j10]Prahlad Fogla, Wenke Lee:
q-Gram Matching Using Tree Models. IEEE Trans. Knowl. Data Eng. 18(4): 433-447 (2006) - [c50]Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough:
DSO: Dependable Signing Overlay. ACNS 2006: 33-49 - [c49]Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee:
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300 - [c48]Prahlad Fogla, Wenke Lee:
Evading network anomaly detection systems: formal reasoning and practical techniques. CCS 2006: 59-68 - [c47]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. AsiaCCS 2006: 90-101 - [c46]Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee:
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108 - [c45]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 - [c44]Calton Pu, Steve Webb, Oleg M. Kolesnikov, Wenke Lee, Richard J. Lipton:
Towards the integration of diverse spam filtering techniques. GrC 2006: 17-20 - [c43]Roberto Perdisci, Guofei Gu, Wenke Lee:
Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. ICDM 2006: 488-498 - [c42]Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee:
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620 - [c41]David Dagon, Cliff Changchun Zou, Wenke Lee:
Modeling Botnet Propagation Using Time Zones. NDSS 2006 - [c40]Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Islam Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection. S&P 2006: 17-31 - [c39]Prahlad Fogla, Monirul Islam Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee:
Polymorphic Blending Attacks. USENIX Security Symposium 2006 - 2005
- [c38]Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee:
Anomalous path detection with hardware support. CASES 2005: 43-54 - [c37]David Dagon, Wenke Lee, Richard J. Lipton:
Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30 - [c36]Monirul Islam Sharif, George F. Riley, Wenke Lee:
Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98 - [c35]Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller:
Environment-Sensitive Intrusion Detection. RAID 2005: 185-206 - [c34]Yongguang Zhang, Yi-an Huang, Wenke Lee:
An Extensible Environment for Evaluating Secure MANET. SecureComm 2005: 339-352 - [c33]Yi-an Huang, Wenke Lee:
Hotspot-based traceback for mobile ad hoc networks. Workshop on Wireless Security 2005: 43-54 - 2004
- [j9]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6(5): 507-527 (2004) - [c32]Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145 - [c31]Xinzhou Qin, Wenke Lee:
Attack Plan Recognition and Prediction Using Causal Networks. ACSAC 2004: 370-379 - [c30]João B. D. Cabrera, Jaykumar Gosar, Wenke Lee, Raman K. Mehra:
On the statistical distribution of processing times in network intrusion detection. CDC 2004: 75-80 - [c29]Xinzhou Qin, Wenke Lee:
Discovering Novel Attack Strategies from INFOSEC Alerts. ESORICS 2004: 439-456 - [c28]George F. Riley, Monirul Islam Sharif, Wenke Lee:
Simulating Internet Worms. MASCOTS 2004: 268-274 - [c27]David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58 - [c26]Yi-an Huang, Wenke Lee:
Attack Analysis and Detection for Ad Hoc Routing Protocols. RAID 2004: 125-145 - [c25]Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller:
Formalizing Sensitivity in Static Analysis for Intrusion Detection. S&P 2004: 194- - [r1]Wenke Lee:
An Overview of Intrusion Detection Techniques. The Practical Handbook of Internet Computing 2004 - 2003
- [c24]Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu:
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. ICDCS 2003: 478- - [c23]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Carlos Gutiérrez, Wenke Lee, Raman K. Mehra:
Proactive Intrusion Detection and SNMP-based Security Management: New Experiments and Validation. Integrated Network Management 2003: 93-96 - [c22]Xinzhou Qin, Wenke Lee:
Statistical Causality Analysis of INFOSEC Alert Data. RAID 2003: 73-93 - [c21]Yi-an Huang, Wenke Lee:
A cooperative intrusion detection system for ad hoc networks. SASN 2003: 135-147 - [c20]Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong:
Anomaly Detection Using Call Stack Information. S&P 2003: 62- - 2002
- [j8]Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. J. Comput. Secur. 10(1/2): 5-22 (2002) - [j7]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra:
Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. J. Netw. Syst. Manag. 10(2): 225-254 (2002) - [j6]Wenke Lee:
Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility. SIGKDD Explor. 4(2): 35-42 (2002) - [c19]João B. D. Cabrera, Wenke Lee, Ravi K. Prasanth, Lundy M. Lewis, Raman K. Mehra:
Optimization and control problems in Real-time Intrusion Detection. CDC 2002: 1408-1413 - [c18]Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera:
Integrating intrusion detection and network management. NOMS 2002: 329-344 - [c17]Mustaque Ahamad, Leo Mark, Wenke Lee, Edward Omicienski, Andre dos Santos, Ling Liu, Calton Pu:
Guarding the next Internet frontier: countering denial of information attacks. NSPW 2002: 136-143 - [c16]Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang:
Performance Adaptation in Real-Time Intrusion Detection Systems. RAID 2002: 252-273 - [p2]Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera:
Using MIB II Variables for Network Intrusion Detection. Applications of Data Mining in Computer Security 2002: 123-151 - [p1]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra:
Proactive Intrusion Detection. Applications of Data Mining in Computer Security 2002: 195-227 - 2001
- [j5]Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin:
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Rec. 30(4): 5-14 (2001) - [j4]Wenke Lee, Wei Fan:
Mining System Audit Data: Opportunities and Challenges. SIGMOD Rec. 30(4): 35-44 (2001) - [c15]Wei Fan, Matthew Miller, Salvatore J. Stolfo, Wenke Lee, Philip K. Chan:
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions. ICDM 2001: 123-130 - [c14]João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, Ravi Ravichandran, Raman K. Mehra:
Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables - A Feasibility Study. Integrated Network Management 2001: 609-622 - [c13]Yongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao:
Heterogeneous networking: a new survivability paradigm. NSPW 2001: 33-39 - [c12]Wenke Lee, Dong Xiang:
Information-Theoretic Measures for Anomaly Detection. S&P 2001: 130-143 - [e1]Wenke Lee, Ludovic Mé, Andreas Wespi:
Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings. Lecture Notes in Computer Science 2212, Springer 2001, ISBN 3-540-42702-3 [contents] - 2000
- [j3]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Adaptive Intrusion Detection: A Data Mining Approach. Artif. Intell. Rev. 14(6): 533-567 (2000) - [j2]Wenke Lee, Salvatore J. Stolfo:
A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4): 227-261 (2000) - [c11]Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew Miller:
A Multiple Model Cost-Sensitive Approach for Intrusion Detection. ECML 2000: 142-153 - [c10]Yongguang Zhang, Wenke Lee:
Intrusion detection in wireless ad-hoc networks. MobiCom 2000: 275-283 - [c9]Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo:
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. Recent Advances in Intrusion Detection 2000: 49-65
1990 – 1999
- 1999
- [j1]Wenke Lee, Gail E. Kaiser:
Interfacing Oz with the PCTE OMS: A Case Study of Integrating a Legacy System with a Standard Object Management System. J. Syst. Integr. 9(4): 329-358 (1999) - [c8]Wenke Lee, Christopher T. Park, Salvatore J. Stolfo:
Automated Intrusion Detection Using NFR: Methods and Experiences. Workshop on Intrusion Detection and Network Monitoring 1999: 63-72 - [c7]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. KDD 1999: 114-124 - [c6]Wenke Lee, Salvatore J. Stolfo:
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. Recent Advances in Intrusion Detection 1999 - [c5]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
A Data Mining Framework for Building Intrusion Detection Models. S&P 1999: 120-132 - 1998
- [c4]Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
Mining Audit Data to Build Intrusion Detection Models. KDD 1998: 66-72 - [c3]Wenke Lee, Salvatore J. Stolfo:
Data Mining Approaches for Intrusion Detection. USENIX Security Symposium 1998 - [d1]Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas L. Prodromidis, Philip Chan:
KDD Cup 1999 Data. UCI Machine Learning Repository, 1998 - 1997
- [c2]Naser S. Barghouti, John M. Mocenigo, Wenke Lee:
Grappa: A GRAPh PAckage in Java. GD 1997: 336-343 - [c1]Salvatore J. Stolfo, Andreas L. Prodromidis, Shelley Tselepis, Wenke Lee, Dave W. Fan, Philip K. Chan:
JAM: Java Agents for Meta-Learning over Distributed Databases. KDD 1997: 74-81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint