@inproceedings{Xie-Rootkit-13,
title={Rootkit Detection on Virtual Machines through Deep Information Extraction at Hypervisor level},
booktitle={International Workshop on Security and Privacy in Cloud computing (SPCC), in conjunction with IEEE CNS},
year={2013},
author={Xiongwei Xie and W. Wang}
}

@inproceedings{Xie-Detect-13,
title={Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding},
booktitle={International Workshop on Communications and sensor Networks, in conjunction with EUSPN},
year={2013},
author={X. Xie and W. Wang}
}

@inproceedings{Owens-Preserve-13,
title={Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing},
booktitle={Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, in conjunction with ICCCN},
year={2013},
author={R. Owens and W. Wang}
}

@inproceedings{Li-Towards-12,
title={Towards the Attacker's View of Protocol Narrations (or, How to Compile Security Protocols)},
booktitle={ACM AsiaCCS},
year={2012},
author={Z. Li and W. Wang}
}

@inproceedings{Owens-Inter-11,
title={Non-interactive OS Fingerprinting through Memory De-duplication Technique in Virtual Machines},
booktitle={IEEE International Performance Computing and Communications Conference (IPCCC)},
year={2011},
author={R. Owens and W. Wang}
}

@inproceedings{Owens-Finger-11,
title={Fingerprinting Large Data Sets Through Memory De-duplication Technique in Virtual Machines},
booktitle={IEEE Military Communications Conference (MILCOM)},
year={2011},
author={R. Owens and W. Wang}
}

@inproceedings{Owens-Norm-11,
title={Non-normalizable Functions: a New Method to Generate Metamorphic Malware},
booktitle={IEEE Military Communications Conference (MILCOM)},
year={2011},
author={R. Owens and W. Wang}
}

@inproceedings{Hu-Towards-11,
title={Towards Effective Collaborative Analysis for Distributed Intrusion Detection},
booktitle={IASTED International Conference on Human-Computer Interaction (HCI)},
year={2011},
author={X. Hu and H. Song and L. Harrison and A. Lu and J. Gao and W. Wang}
}

@inproceedings{Li-Rethink-11,
title={Rethinking about Guessing Attacks},
booktitle={ACM AsiaCCS},
year={2011},
author={Z. Li and W. Wang}
}

@inproceedings{Li-Rethink-10,
title={Rethinking about Type-flaw Attacks},
booktitle={IEEE Global Communications Conference (GLOBECOM)},
year={2010},
author={Z. Li and W. Wang}
}

@inproceedings{Li-Node-10,
title={Node Localization in Wireless Networks Through Physical Layer Network Coding},
booktitle={IEEE Globol Communications Conference (GLOBECOM)},
year={2010},
author={Z. Li and D. Pu and W. Wang and A. Wyglinski}
}

@inproceedings{Coble-Secure-10,
title={Secure Software Attestation for Military Telesurgical Robot Systems},
booktitle={IEEE Military Communications Conference (MILCOM)},
year={2010},
author={K. Coble and W. Wang and B. Chu and Z. Li}
}

@inproceedings{Li-Decide-10,
title={Deciding recognizability under Dolev-Yao intruder model},
booktitle={Information Security Conference (ISC)},
year={2010},
author={Z. Li and W. Wang}
}

@inproceedings{Song-Secure-10,
title={Secure Online Scientific Visualization of Atmospheric Nucleation Processes},
booktitle={International Conference on Networking and Distributed Computing (ICNDC)},
year={2010},
author={H. Song and W. Wang and J. Gao and A. Lu and L. Huang}
}

@inproceedings{Harrison-Detect-10,
title={Detecting Network Abnormalities via Dual-Domain Exploration},
booktitle={International Symposium on Visualization for Cyber Security (VizSec)},
year={2010},
author={L. Harrison and X. Hu and X. Ying and A. Lu and W. Wang and X. Wu}
}

@inproceedings{Wang-Detect-10,
title={Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding},
booktitle={Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},
pages={21--30},
year={2010},
author={W. Wang and D. Pu and A. Wyglinski}
}

@inproceedings{Wang-Secure-09,
title={Secure and Efficient Access to Outsourced Data},
booktitle={ACM Cloud Computing Security Workshop (CCSW), in conjunction with ACM CCS},
year={2009},
author={W. Wang and Z. Li and R. Owens and B. Bhargava}
}

@inproceedings{Wang-Defend-09,
title={Defending against Collaborative Packet Drop Attacks on MANETs},
booktitle={IEEE Workshop on Dependable Network Computing and Mobile Systems (DNCMS), in conjunction with IEEE SRDS},
year={2009},
author={W. Wang and B. Bhargava and M. Linderman}
}

@inproceedings{Li-Using-09,
title={Using Deductive Knowledge to Improve Cryptographic Protocol Verification},
booktitle={IEEE Military Communications Conference (MILCOM)},
year={2009},
author={Zhiwei Li and W. Wang}
}

@inproceedings{Owens-Build-09,
title={Building a Dark PicoNet upon Bluetooth Interfaces of Computers},
booktitle={IEEE Military Communications Conference (MILCOM)},
year={2009},
author={Rodney Owens and W. Wang}
}

@inproceedings{Wang-Achieve-08,
title={Achieving Configurable Location Privacy in Location Based Routing for MANET},
booktitle={Proceedings of IEEE Military Communications Conference (MILCOM)},
year={2008},
author={W. Wang and C. Cui}
}

@inproceedings{Wang-Digi-08,
title={A Digital Lego Set and Exercises for Teaching Security Protocols},
booktitle={Proceedings of Colloquium for Information Systems Security Education (CISSE)},
pages={26--33},
year={2008},
author={W. Wang and A. Lu and L. Yu and Z. Li}
}

@inproceedings{Wang-Secure-08,
title={Secure Group-based Information Sharing in Mobile Ad Hoc Networks},
booktitle={Proceedings of IEEE International Conference on Communications (ICC)},
year={2008},
author={W. Wang and Yu Wang}
}

@inproceedings{Rohrer-Homo-07,
title={Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol},
booktitle={Proceedings of Military Communications Conference (MilCom)},
year={2007},
author={J. Rohrer and W. Wang and J. Sterbenz}
}

@inproceedings{Mural-HiFi-07,
title={HiFi-WiN: Hybrid Integrated Fiber-Wireless Networking for Broadband Metropolitan Area Access},
booktitle={Proceedings of Virginia Tech Symposium on Wireless Personal Communications},
year={2007},
author={V. Muralidharan and A. Wyglinski and Weichao Wang}
}

@inproceedings{Wang-Visua-06,
title={Visualization Assisted Detection of Sybil Attacks in Wireless Networks},
booktitle={Proceedings of ACM Workshop on Visualization for Computer Security (VizSEC), in conjunction with ACM CCS},
pages={51--60},
year={2006},
author={W. Wang and A. Lu}
}

@inproceedings{Wang-Inter-06,
title={Interactive Wormhole Detection in Large Scale Wireless Networks},
booktitle={Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST)},
pages={99--106},
year={2006},
author={W. Wang and A. Lu}
}

@inproceedings{Wang-Key-05,
title={Key Distribution and Update for Secure Inter-group Multicast Communication},
booktitle={Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), in conjunction with ACM CCS},
year={2005},
author={W. Wang and B. Bhargava}
}

@inproceedings{Kong-Low-05,
title={Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks},
booktitle={Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom},
year={2005},
author={J. Kong and Z. Ji and W. Wang and M. Gerla and R. Bagrodia and B. Bhargava}
}

@inproceedings{Wang-Visual-04,
title={Visualization of Wormholes in Sensor Networks},
booktitle={Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom},
year={2004},
author={W. Wang and B. Bhargava}
}

@inproceedings{Wang-Security-03,
title={On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks},
booktitle={Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)},
year={2003},
author={W. Wang and Y. Lu and B. Bhargava}
}

@inproceedings{Lu-Study-03,
title={Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks},
booktitle={Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)},
year={2003},
author={Y. Lu and W. Wang and B. Bhargava}
}

@inproceedings{Wang-Vulner-03,
title={On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol},
booktitle={Proceedings of International Conference on Telecommunications (ICT)},
year={2003},
author={W. Wang and Y. Lu and B. Bhargava}
}

@inproceedings{Lu-Hierar-03,
title={Hierarchical Structure for Supporting Movable Base Stations in Wireless Networks},
booktitle={Proceedings of International Conference on Telecommunications (ICT)},
year={2003},
author={Y. Lu and W. Wang and B. Bhargava}
}

@inproceedings{Lu-Trust-04,
title={Trust-Based Privacy Preservation for Peer-to-peer Media Streaming},
booktitle={Proceedings of NSF/NSA/AFRL Workshop on Secure Knowledge Management (SKM)},
year={2004},
author={Y. Lu and W. Wang and D. Xu and B. Bhargava}
}