Lingyu Wang

Lingyu Wang

Concordia University

H-index: 45

North America-Canada

About Lingyu Wang

Lingyu Wang, With an exceptional h-index of 45 and a recent h-index of 32 (since 2020), a distinguished researcher at Concordia University, specializes in the field of NFV Security, Cloud Security, Container Security, Security Metrics, Privacy.

His recent articles reflect a diverse array of research interests and contributions to the field:

Apparatus and method for evaluating multiple aspects of the security for virtualized infrastructure in a cloud environment

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack

iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning

Cloud S&P 2023

Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV)

Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters

DPOD: DIFFERENTIALLY PRIVATE OUTSOURCING OF ANOMALY DETECTION

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds

Lingyu Wang Information

University

Position

Professor NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security

Citations(all)

8233

Citations(since 2020)

3328

Cited By

6049

hIndex(all)

45

hIndex(since 2020)

32

i10Index(all)

116

i10Index(since 2020)

78

Email

University Profile Page

Concordia University

Google Scholar

View Google Scholar Profile

Lingyu Wang Skills & Research Interests

NFV Security

Cloud Security

Container Security

Security Metrics

Privacy

Top articles of Lingyu Wang

Title

Journal

Author(s)

Publication Date

Apparatus and method for evaluating multiple aspects of the security for virtualized infrastructure in a cloud environment

2023/6/13

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack

Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings

Lingyu Wang

2023

iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning

IEEE Transactions on Dependable and Secure Computing

Momen Oqaily

Mohammad Ekramul Kabir

Suryadipta Majumdar

Yosr Jarraya

Mengyuan Zhang

...

2023/9/1

Cloud S&P 2023

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings

Suryadipta Majumdar

Cong Wang

Irfan Ahmed

Chadi Assi

Elias Bou-Harb

...

2023/10/3

Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV)

IEEE Transactions on Dependable and Secure Computing

Sudershan Lakshmanan

Mengyuan Zhang

Suryadipta Majumdar

Yosr Jarraya

Makan Pourzandi

...

2023/9/29

Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters

Sima Bagheri

Hugo Kermabon-Bobinnec

Suryadipta Majumdar

Yosr Jarraya

Lingyu Wang

...

2023/5/28

DPOD: DIFFERENTIALLY PRIVATE OUTSOURCING OF ANOMALY DETECTION

2023/8/31

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds

Momen Oqaily

Suryadipta Majumdar

Lingyu Wang

Mohammad Ekramul Kabir

Yosr Jarraya

...

2023/4/24

SYSTEM FOR TRANSLATION-BASED REAL-TIME INCONSISTENCY DETECTION IN NETWORK FUNCTIONS VIRTUALIZATION (NFV)

2023/7/27

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

Md Nazmul Hoq

Jia Wei Yao

Suryadipta Majumdar

Luis Suárez

Lingyu Wang

...

2023/9/25

An Event-Driven Forensic Auditing Framework for Clouds

Habib Louafi

Yue Xin

Masoud Bozorgi

Ronald Ellis

Yosr Jarraya

...

2023

Innovations In Digital Forensics

Suryadipta Majumdar

Paria Shirani

Lingyu Wang

2023/6/21

Data anonymization views

2022/7/7

Hardening Substations against Supply Chain Attacks Under Operational Constraints

Onur Duman

Lingyu Wang

Minh Au

Marthe Kassouf

Mourad Debbabi

2022/4/24

Utility optimized differential privacy system

2022/7/7

5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions

ASM Asadujjaman

Mohammad Ekramul Kabir

Hinddeep Purohit

Suryadipta Majumdar

Lingyu Wang

...

2022/12/13

ProSPEC: Proactive Security Policy Enforcement for Containers

Hugo Kermabon-Bobinnec

Mahmood Gholipourchoubeh

Sima Bagheri

Suryadipta Majumdar

Yosr Jarraya

...

2022/4/14

MSK‐PK: A Public‐Key Encryption Cryptosystem with Multiple Secret‐Keys

Chinese Journal of Electronics

Jiaqi ZHAI

Jian LIU

Lusheng CHEN

Lingyu WANG

2022/7

Network link verification

2022/11/22

A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features

Saed Alrabaee

Mourad Debbabi

Lingyu Wang

2022/1/17

See List of Professors in Lingyu Wang University(Concordia University)

Co-Authors

H-index: 52
Mourad Debbabi

Mourad Debbabi

Concordia University

H-index: 40
Amr Youssef

Amr Youssef

Concordia University

H-index: 37
Hadi Otrok

Hadi Otrok

Khalifa University

H-index: 37
Duminda Wijesekera

Duminda Wijesekera

George Mason University

H-index: 32
Massimiliano Albanese

Massimiliano Albanese

George Mason University

H-index: 29
Makan Pourzandi

Makan Pourzandi

Concordia University

academic-engine