Dinghao Wu

    • 1043 Citations
    • 17 h-Index
    19952019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1995 2019

    Filter
    Conference contribution
    2019

    A lightweight framework for regular expression verification

    Liu, X., Jiang, Y. & Wu, D., Mar 22 2019, Proceedings - 19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019. Yu, D., Nguyen, V. & Jiang, C. (eds.). IEEE Computer Society, p. 1-8 8 p. 8673038. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Finite automata
    Intrusion detection
    Specifications
    Testing
    Formal specification

    Automatic grading of programming assignments: An approach based on formal semantics

    Liu, X., Wang, S., Wang, P. & Wu, D., May 1 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019. Institute of Electrical and Electronics Engineers Inc., p. 126-137 12 p. 8802114. (Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    grading
    Computer programming
    programming
    Semantics
    semantics
    2018
    4 Citations (Scopus)

    Automated Synthesis of Access Control Lists

    Liu, X., Holden, B. & Wu, D., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 104-109 6 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Access control
    Encapsulation
    Artificial intelligence
    1 Citation (Scopus)

    Lambda obfuscation

    Lan, P., Wang, P., Wang, S. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 206-224 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Reverse engineering
    Intellectual property
    Flow control
    Semantics
    Engineers
    1 Citation (Scopus)

    Protecting million-user iOS apps with obfuscation: Motivations, pitfalls, and experience

    Wang, P., Wu, D., Chen, Z. & Wei, T., May 27 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2018. IEEE Computer Society, p. 235-244 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Reverse engineering
    Ecosystems
    Industry
    Profitability
    4 Citations (Scopus)

    RedDroid: Android Application Redundancy Customization Based on Static Analysis

    Jiang, Y., Bao, Q., Wang, S., Liu, X. & Wu, D., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 189-199 11 p. 8539081. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Static analysis
    Application programs
    Redundancy
    Smartphones
    Hard disk storage

    SecControl: Bridging the gap between security tools and SDN controllers

    Wang, L. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Proceedings. Ghorbani, A., Ren, K., Zhu, S., Zhang, A. & Lin, X. (eds.). Springer Verlag, p. 11-31 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Controllers
    Network security
    Software defined networking
    Experiments
    2 Citations (Scopus)

    Turing obfuscation

    Wang, Y., Wang, S., Wang, P. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Turing machines
    Flow control
    Reverse engineering
    Flow graphs
    Machine components
    3 Citations (Scopus)

    VMhunt: A verifiable approach to partially-virtualized binary code simplification

    Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Cryptography
    Radar
    Switches
    Virtualization
    2017
    22 Citations (Scopus)

    Adaptive unpacking of android apps

    Xue, L., Luo, X., Yu, L., Wang, S. & Wu, D., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 358-369 12 p. 7985676. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Packers
    Application programs
    Reverse engineering
    Android (operating system)
    1 Citation (Scopus)

    Binary code retrofiting and hardening using SGX

    Wang, S., Wang, W., Bao, Q., Wang, P., Wang, X. F. & Wu, D., Nov 3 2017, FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 43-49 7 p. (FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Hardening
    Cryptography
    Semantics
    Data storage equipment
    4 Citations (Scopus)

    Composite software diversification

    Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 284-294 11 p. 8094429. (Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Composite materials
    Chemical analysis
    Costs
    19 Citations (Scopus)

    Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

    Xu, D., Ming, J. & Wu, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 921-937 17 p. 7958617. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Computer system firewalls
    Semantics
    Malware

    FEAST 2017: The secondworkshop on forming an ecosystem around software transformation

    Kim, T. & Wu, D., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2634 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security of data
    Ecosystems
    Secure communication
    5 Citations (Scopus)

    In-memory fuzzing for binary code similarity analysis

    Wang, S. & Wu, D., Nov 20 2017, ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. Nguyen, T. N., Rosu, G. & Di Penta, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-330 12 p. 8115645. (ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Binary Code
    Data storage equipment
    Feature Vector
    Trace
    31 Citations (Scopus)

    LibD: Scalable and precise third-party library detection in android markets

    Li, M., Wang, W., Wang, P., Wang, S., Wu, D., Liu, J., Xue, R. & Huo, W., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 335-346 12 p. 7985674. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Ecosystems
    Android (operating system)
    Scalability
    6 Citations (Scopus)

    Semantics-aware machine learning for function recognition in binary code

    Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 388-398 11 p. 8094438

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Learning systems
    Semantics
    Distribution functions
    2016
    1 Citation (Scopus)

    BinCFP: Efficient multi-threaded binary code control flow profiling

    Ming, J. & Wu, D., Dec 12 2016, Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016. Institute of Electrical and Electronics Engineers Inc., p. 61-66 6 p. 7781797. (Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Flow control
    Utility programs
    Flow graphs
    Reverse engineering
    9 Citations (Scopus)

    Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods

    Jiang, Y., Zhang, C., Wu, D. & Liu, P., Mar 1 2016, Proceedings - 17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016. Babiceanu, R., Waeselynck, H., Xu, J., Paul, R. A. & Cukic, B. (eds.). IEEE Computer Society, p. 122-131 10 p. 7423143. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Software engineering
    Creep
    9 Citations (Scopus)

    Generalized dynamic opaque predicates: A new control flow obfuscation method

    Xu, D., Ming, J. & Wu, D., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Obfuscation
    Flow Control
    Flow control
    Predicate
    Semantics

    ICruiser: Protecting Kernel Link-Based Data Structures with Secure Canary

    Li, W., Wu, D. & Liu, P., Sep 21 2016, Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016. Institute of Electrical and Electronics Engineers Inc., p. 31-38 8 p. 7573721. (Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data structures
    Binary trees
    Seed
    9 Citations (Scopus)

    JRed: Program Customization and Bloatware Mitigation Based on Static Analysis

    Jiang, Y., Wu, D. & Liu, P., Aug 24 2016, Proceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016. Claycomb, W., Milojicic, D., Liu, L., Matskin, M., Zhang, Z., Reisman, S., Sato, H., Zhang, Z. & Ahamed, S. I. (eds.). IEEE Computer Society, p. 12-21 10 p. 7551989. (Proceedings - International Computer Software and Applications Conference; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Trimming
    Static analysis
    Soot
    Software engineering
    Data storage equipment
    6 Citations (Scopus)

    Moving target defense against network reconnaissance with softwaredefined networking

    Wang, L. & Wu, D., Jan 1 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Moving Target
    Networking
    Local area networks
    Computer systems
    Reflector
    3 Citations (Scopus)

    Program-object level data flow analysis with applications to data leakage and contamination forensics

    Xiao, G., Wang, J., Liu, P., Ming, J. & Wu, D., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 277-284 8 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data flow analysis
    Contamination
    Servers
    Data flow graphs
    Leakage (fluid)
    5 Citations (Scopus)

    Repackage-proofing android apps

    Luo, L., Fu, Y., Wu, D., Zhu, S. & Liu, P., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 550-561 12 p. 7579771. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Application programs
    Ecosystems
    Android (operating system)
    10 Citations (Scopus)

    StraightTaint: Decoupled offline symbolic taint analysis

    Ming, J., Wu, D., Wang, J., Xiao, G. & Liu, P., Aug 25 2016, ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. Khurshid, S., Lo, D. & Apel, S. (eds.). Association for Computing Machinery, Inc, p. 308-319 12 p. (ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Dynamic analysis
    Computer forensics
    Reverse engineering
    Program processors
    Communication
    7 Citations (Scopus)

    Translingual obfuscation

    Wang, P., Wang, S., Ming, J., Jiang, Y. & Wu, D., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 128-144 17 p. 7467351. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Logic programming
    Computer programming languages
    Reverse engineering
    Flow control
    Engineers
    2015
    4 Citations (Scopus)

    A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

    Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data flow analysis
    Computer programming
    Computer programming languages
    Software engineering
    Creep
    16 Citations (Scopus)

    LOOP: Logic-oriented opaque predicate detection in obfuscated binary code

    Ming, J., Xu, D., Wang, L. & Wu, D., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 757-768 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Reverse engineering
    Flow control
    Malware
    3 Citations (Scopus)

    Memoized semantics-based binary diffing with application to malware lineage inference

    Ming, J., Xu, D. & Wu, D., Jan 1 2015, ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer New York LLC, p. 416-430 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Semantics
    Binary codes
    Syntactics
    Malware
    Inference
    7 Citations (Scopus)

    Replacement attacks: Automatically impeding behavior-based malware specifications

    Ming, J., Xin, Z., Lan, P., Wu, D., Liu, P. & Mao, B., Jan 1 2015, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers. Malkin, T., Lewko, A. B., Kolesnikov, V. & Polychronakis, M. (eds.). Springer Verlag, p. 497-517 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Malware
    Replacement
    Attack
    Specification
    Specifications
    10 Citations (Scopus)

    Risk Assessment of Buffer 'Heartbleed' Over-Read Vulnerabilities

    Wang, J., Zhao, M., Zeng, Q., Wu, D. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, p. 555-562 8 p. 7266882. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Risk assessment
    1 Citation (Scopus)

    Uncovering the dilemmas on antivirus software design in modern mobile platforms

    Huang, H., Chen, K., Liu, P., Zhu, S. & Wu, D., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 359-366 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Software design
    Detectors
    Scanning
    Malware
    Mobile devices
    2014
    8 Citations (Scopus)

    A framework for integrating change management with building information modeling

    Liu, F., Jallow, A. K., Anumba, C. J. & Wu, D., Jan 1 2014, Computing in Civil and Building Engineering - Proceedings of the 2014 International Conference on Computing in Civil and Building Engineering. Issa, R. R. & Flood, I. (eds.). American Society of Civil Engineers (ASCE), p. 439-446 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Data structures
    Energy efficiency
    3 Citations (Scopus)

    PiE: Programming in Eliza

    Liu, X. & Wu, D., Jan 1 2014, ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. Association for Computing Machinery, Inc, p. 695-700 6 p. (ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Computer programming languages
    Processing
    57 Citations (Scopus)

    Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

    Luo, L., Ming, J., Wu, D., Liu, P. & Zhu, S., Nov 16 2014, 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2014 - Proceedings. Association for Computing Machinery, p. 389-400 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 16-21-November-2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Binary codes
    Semantics
    100 Citations (Scopus)

    ViewDroid: Towards obfuscation-resilient mobile application repackaging detection

    Zhang, F., Huang, H., Zhu, S., Wu, D. & Liu, P., Jan 1 2014, WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 25-36 12 p. (WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    User interfaces
    Profitability
    Sales
    Navigation
    Experiments
    2013
    43 Citations (Scopus)

    A framework for evaluating mobile app repackaging detection algorithms

    Huang, H., Zhu, S., Liu, P. & Wu, D., Oct 1 2013, Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, Proceedings. p. 169-186 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7904 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Obfuscation
    Application programs
    Resilience
    Intellectual property
    Intellectual Property
    14 Citations (Scopus)

    Integrating BIMserver and OpenStudio for energy efficient building

    Yu, N., Jiang, Y., Luo, L., Lee, S., Jallow, A., Wu, D., Messner, J. I., Leicht, R. M. & Yen, J., Nov 15 2013, Computing in Civil Engineering - Proceedings of the 2013 ASCE International Workshop on Computing in Civil Engineering. p. 516-523 8 p. (Computing in Civil Engineering - Proceedings of the 2013 ASCE International Workshop on Computing in Civil Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Electronic data interchange
    Interoperability
    Servers
    Decision making
    Testing
    2012
    30 Citations (Scopus)

    A first step towards algorithm plagiarism detection

    Zhang, F., Jhi, Y. C., Wu, D., Liu, P. & Zhu, S., Aug 28 2012, 2012 International Symposium on Software Testing and Analysis, ISSTA 2012 - Proceedings. p. 111-121 11 p. (2012 International Symposium on Software Testing and Analysis, ISSTA 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intellectual property
    14 Citations (Scopus)

    BIM server requirements to support the energy efficient building lifecycle

    Jiang, Y., Ming, J., Wu, D., Yen, J., Mitra, P., Messner, J. I. & Leicht, R., Dec 1 2012, Computing in Civil Engineering - Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering. p. 365-372 8 p. (Congress on Computing in Civil Engineering, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Servers
    Data privacy
    Computer applications
    Security of data
    Interoperability
    2 Citations (Scopus)

    SA3: Automatic semantic aware attribution analysis of remote exploits

    Kong, D., Tian, D., Liu, P. & Wu, D., Nov 7 2012, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers. p. 190-208 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 96 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Semantics
    Statistical methods
    HTTP
    Binary codes
    Web services
    23 Citations (Scopus)

    Towards trusted services: Result verification schemes for MapReduce

    Huang, C., Zhu, S. & Wu, D., Jul 16 2012, Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012. p. 41-48 8 p. 6217403. (Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    MapReduce
    Internet
    Cloud computing
    Computer programming
    Computing
    2011
    81 Citations (Scopus)

    Classifying text messages for the haiti earthquake

    Caragea, C., McNeese, N., Jaiswal, A., Traylor, G., Kim, H. W., Mitra, P., Wu, D., Tapia, A. H., Giles, L., Jansen, B. J. & Yen, J., Jan 1 2011, 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Information Systems for Crisis Response and Management, ISCRAM, (8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Earthquakes
    Personnel
    Disasters
    Information technology
    Communication
    19 Citations (Scopus)

    Cruiser: Concurrent heap buffer overflow monitoring using lock-free data structures

    Zeng, Q., Wu, D. & Liu, P., Jul 7 2011, PLDI'11 - Proceedings of the 2011 ACM Conference on Programming Language Design and Implementation. p. 367-377 11 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Reclamation
    Data structures
    Monitoring
    Scalability
    Synchronization
    55 Citations (Scopus)

    Get online support, feel better-sentiment analysis and dynamics in an online cancer survivor community

    Qiu, B., Zhao, K., Mitra, P., Wu, D., Caragea, C., Yen, J., Greer, G. E. & Portier, K., Dec 1 2011, Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. p. 274-281 8 p. 6113125. (Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Health
    Learning systems
    Managers
    8 Citations (Scopus)

    Identifying leaders in an online cancer survivor community

    Zhao, K., Qiu, B., Caragea, C., Wu, D., Mitra, P., Yen, J., Greer, G. E. & Portier, K., 2011, Proceedings - 21st Workshop on Information Technologies and Systems, WITS 2011. Jindal School of Management, JSOM, p. 115-120 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Classifiers
    Semantics
    43 Citations (Scopus)

    Value-based program characterization and its application to software plagiarism detection

    Jhi, Y. C., Wang, X., Jia, X., Zhu, S., Liu, P. & Wu, D., Jul 7 2011, ICSE 2011 - 33rd International Conference on Software Engineering, Proceedings of the Conference. p. 756-765 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Computer programming languages
    Semantics
    2004
    8 Citations (Scopus)

    Construction of a semantic model for a typed assembly language

    Tan, G., Appel, A. W., Swadi, K. N. & Wu, D., Jan 1 2004, Verification, Model Checking, and Abstract Interpretation - 5th International Conference, VMCAI 2004, Proceedings. Steffen, B. & Levi, G. (eds.). Springer Verlag, p. 30-43 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2937).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Safety
    Semantics
    Axioms
    Lemma
    Proof by induction
    160 Citations (Scopus)

    KISS: Keep it simple and sequential

    Qadeer, S. & Wu, D., 2004, Proceedings of the 2004 ACM SIGPLAN Conference on Programming Language Design and Implementaion (PLD'04). Association for Computing Machinery, Vol. 1. p. 14-24 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hazards and race conditions
    Model checking
    Computational complexity
    Semantics