default search action
Donggang Liu
Person information
- affiliation: University of Texas at Arlington, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c32]Sarker T. Ahmed Rumee, Donggang Liu, Yu Lei:
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution. CISS 2017: 1-6 - 2016
- [j17]Mohsin Junaid, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models. Comput. Secur. 59: 92-117 (2016) - 2015
- [i2]Mohsin Junaid, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models. CoRR abs/1506.05217 (2015) - 2014
- [j16]Dazhi Zhang, Donggang Liu, Christoph Csallner, David Chenho Kung, Yu Lei:
A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87: 60-73 (2014) - [j15]Mayank Raj, Na Li, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Using data mules to preserve source location privacy in Wireless Sensor Networks. Pervasive Mob. Comput. 11: 244-260 (2014) - [i1]Nabila Rahman, Matthew K. Wright, Donggang Liu:
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks. CoRR abs/1401.7002 (2014) - 2013
- [j14]Qi Dong, Donggang Liu, Peng Ning:
Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Trans. Embed. Comput. Syst. 12(3): 73:1-73:26 (2013) - [j13]Qi Dong, Donggang Liu, Matthew K. Wright:
Mitigating jamming attacks in wireless broadcast systems. Wirel. Networks 19(8): 1867-1880 (2013) - [c31]Azade Nazi, Donggang Liu, Sajal K. Das:
Privacy Preserving Query Answering in Peer Data Management Systems. ICDCS Workshops 2013: 64-69 - [c30]Xiaowei Mei, Donggang Liu, Kun Sun, Dingbang Xu:
On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties. IPDPS 2013: 1112-1121 - [c29]Sarker T. Ahmed Rumee, Donggang Liu:
DroidTest: Testing Android Applications for Leakage of Private Information. ISC 2013: 341-353 - 2012
- [j12]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. J. Syst. Softw. 85(1): 102-111 (2012) - [j11]Qi Dong, Donggang Liu:
Using Auxiliary Sensors for Pairwise Key Establishment in WSN. ACM Trans. Embed. Comput. Syst. 11(3): 59:1-59:31 (2012) - [j10]Kiran Mehta, Donggang Liu, Matthew K. Wright:
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper. IEEE Trans. Mob. Comput. 11(2): 320-336 (2012) - [c28]Kartik Siddhabathula, Qi Dong, Donggang Liu, Matthew K. Wright:
Fast jamming detection in sensor networks. ICC 2012: 934-938 - [c27]Na Li, Mayank Raj, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks. ICDCN 2012: 309-324 - [c26]Donggang Liu, Joshua Raymer, Andy Fox:
Efficient and timely jamming detection in wireless sensor networks. MASS 2012: 335-343 - 2011
- [j9]Donggang Liu, Qi Dong:
Hardening Embedded Networking Devices Against Side-Channel Attacks. Ad Hoc Sens. Wirel. Networks 12(1-2): 103-124 (2011) - [c25]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278 - [r4]Donggang Liu:
Broadcast Authentication from a Conditional Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 168-170 - [r3]Donggang Liu:
Node Clone Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 844-846 - [r2]Donggang Liu:
Probabilistic Key Sharing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 978-980 - [r1]Donggang Liu:
Secure Localization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1119-1121 - 2010
- [j8]Donggang Liu:
Efficient and distributed access control for sensor networks. Wirel. Networks 16(8): 2151-2167 (2010) - [c24]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. DSN 2010: 241-250 - [c23]Dazhi Zhang, Donggang Liu:
DataGuard: Dynamic data attestation in wireless sensor networks. DSN 2010: 261-270 - [c22]Qi Dong, Donggang Liu:
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. ICDCS 2010: 428-437
2000 – 2009
- 2009
- [j7]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476-1488 (2009) - [c21]Donggang Liu:
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks. ICDCS 2009: 579-588 - [c20]Donggang Liu, Qi Dong:
Combating side-channel attacks using key management. IPDPS 2009: 1-8 - [c19]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. PerCom Workshops 2009: 1-6 - [c18]Qi Dong, Donggang Liu:
Resilient Cluster Leader Election for Wireless Sensor Networks. SECON 2009: 1-9 - 2008
- [j6]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [j5]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key predistribution for wireless sensor networks. ACM Trans. Sens. Networks 4(2): 11:1-11:30 (2008) - [c17]Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Chenho Kung:
Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324 - [c16]Yi Ouyang, Zhengyi Le, Donggang Liu, James Ford, Fillia Makedon:
Source location privacy against laptop-class attacks in sensor networks. SecureComm 2008: 5 - [c15]Qi Dong, Donggang Liu, Peng Ning:
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12 - 2007
- [b1]Donggang Liu, Peng Ning:
Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209 - [j4]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient security mechanisms for overlay multicast based content delivery. Comput. Commun. 30(4): 793-806 (2007) - [c14]Donggang Liu:
Efficient and Distributed Access Control for Sensor Networks. DCOSS 2007: 21-35 - [c13]Donggang Liu:
Resilient Cluster Formation for Sensor Networks. ICDCS 2007: 40 - [c12]Kiran Mehta, Donggang Liu, Matthew K. Wright:
Location Privacy in Sensor Networks Against a Global Eavesdropper. ICNP 2007: 314-323 - [c11]Donggang Liu, Qi Dong:
Detecting Misused Keys in Wireless Sensor Networks. IPCCC 2007: 272-280 - [c10]Qi Dong, Donggang Liu:
Using Auxiliary Sensors for Pairwise Key Establishment in WSN. Networking 2007: 251-262 - [p2]Peng Ning, Donggang Liu, Wenliang Du:
Secure and Resilient Localization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 161-184 - 2006
- [e1]Sencun Zhu, Donggang Liu:
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-554-1 [contents] - 2005
- [j3]Donggang Liu, Peng Ning, Rongfang Li:
Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005) - [j2]Donggang Liu, Peng Ning:
Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Networks 1(2): 204-239 (2005) - [c9]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 - [c8]Donggang Liu, Peng Ning, Wenliang Du:
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 - [c7]Donggang Liu, Peng Ning, Wenliang Du:
Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 - [c6]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 - [c5]Donggang Liu, Peng Ning, Wenliang Du:
Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 - [p1]Peng Ning, Donggang Liu:
Broadcast Authentication and Key Management for Secure Sensor Networks. Handbook of Sensor Networks 2005: 141-172 - 2004
- [j1]Donggang Liu, Peng Ning:
Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3(4): 800-836 (2004) - 2003
- [c4]Donggang Liu, Peng Ning:
Establishing pairwise keys in distributed sensor networks. CCS 2003: 52-61 - [c3]Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. CCS 2003: 231-240 - [c2]Donggang Liu, Peng Ning:
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003 - [c1]Donggang Liu, Peng Ning:
Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint