Lingyu Wang
Concordia University
H-index: 45
North America-Canada
Top articles of Lingyu Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Apparatus and method for evaluating multiple aspects of the security for virtualized infrastructure in a cloud environment | 2023/6/13 | ||
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack | Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings | Lingyu Wang | 2023 |
iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning | IEEE Transactions on Dependable and Secure Computing | Momen Oqaily Mohammad Ekramul Kabir Suryadipta Majumdar Yosr Jarraya Mengyuan Zhang | 2023/9/1 |
Cloud S&P 2023 | Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings | Suryadipta Majumdar Cong Wang Irfan Ahmed Chadi Assi Elias Bou-Harb | 2023/10/3 |
Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV) | IEEE Transactions on Dependable and Secure Computing | Sudershan Lakshmanan Mengyuan Zhang Suryadipta Majumdar Yosr Jarraya Makan Pourzandi | 2023/9/29 |
Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters | Sima Bagheri Hugo Kermabon-Bobinnec Suryadipta Majumdar Yosr Jarraya Lingyu Wang | 2023/5/28 | |
DPOD: DIFFERENTIALLY PRIVATE OUTSOURCING OF ANOMALY DETECTION | 2023/8/31 | ||
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds | Momen Oqaily Suryadipta Majumdar Lingyu Wang Mohammad Ekramul Kabir Yosr Jarraya | 2023/4/24 | |
SYSTEM FOR TRANSLATION-BASED REAL-TIME INCONSISTENCY DETECTION IN NETWORK FUNCTIONS VIRTUALIZATION (NFV) | 2023/7/27 | ||
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring | Md Nazmul Hoq Jia Wei Yao Suryadipta Majumdar Luis Suárez Lingyu Wang | 2023/9/25 | |
An Event-Driven Forensic Auditing Framework for Clouds | Habib Louafi Yue Xin Masoud Bozorgi Ronald Ellis Yosr Jarraya | 2023 | |
Innovations In Digital Forensics | Suryadipta Majumdar Paria Shirani Lingyu Wang | 2023/6/21 | |
Data anonymization views | 2022/7/7 | ||
Hardening Substations against Supply Chain Attacks Under Operational Constraints | Onur Duman Lingyu Wang Minh Au Marthe Kassouf Mourad Debbabi | 2022/4/24 | |
Utility optimized differential privacy system | 2022/7/7 | ||
5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions | ASM Asadujjaman Mohammad Ekramul Kabir Hinddeep Purohit Suryadipta Majumdar Lingyu Wang | 2022/12/13 | |
ProSPEC: Proactive Security Policy Enforcement for Containers | Hugo Kermabon-Bobinnec Mahmood Gholipourchoubeh Sima Bagheri Suryadipta Majumdar Yosr Jarraya | 2022/4/14 | |
MSK‐PK: A Public‐Key Encryption Cryptosystem with Multiple Secret‐Keys | Chinese Journal of Electronics | Jiaqi ZHAI Jian LIU Lusheng CHEN Lingyu WANG | 2022/7 |
Network link verification | 2022/11/22 | ||
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features | Saed Alrabaee Mourad Debbabi Lingyu Wang | 2022/1/17 |