Bibtex of Ting's Publications

@inproceedings{Schales:2015:icde,
  author = {Douglas Lee Schales and Xin Hu and Jiyong Jang and Reiner Sailer and Marc Ph. Stoecklin and Ting Wang},
  title = {{FCCE:} Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics},
  booktitle = {Proceedings of the 31st IEEE International Conference on Data Engineering},
  pages = {1316--1327},
  year = {2015},
  location = {Seoul, South Korea},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA},
  series = {ICDE '15}
}
@article{Wang:2011:tods,
  author = {Wang, Ting and Liu, Ling},
  title = {{Output Privacy in Data Mining}},
  journal = {ACM Trans. Database Syst.},
  issue_date = {March 2011},
  volume = {36},
  number = {1},
  month = mar,
  year = {2011},
  issn = {0362-5915},
  pages = {1:1--1:34},
  numpages = {34},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {Output privacy, data perturbation, stream mining}
}
@article{Wang:2015:tkde,
  author = {Ting Wang and Shicong Meng and Jiang Bian},
  journal = {Knowledge and Data Engineering, IEEE Transactions on},
  title = {{Indexing Earth Mover's Distance over Network Metrics}},
  year = {2015},
  volume = {27},
  number = {6},
  pages = {1588-1601}
}
@inproceedings{Huang:2015:isit,
  author = {W. Huang and T. Wang and X. Hu and J. Jang and T. Salonidis},
  booktitle = {Proceedings of 2015 IEEE International Symposium on Information Theory},
  title = {Rateless and pollution-attack-resilient network coding},
  year = {2015},
  series = {ISIT '15},
  pages = {2623-2627},
  keywords = {cryptography;error correction;multicast communication;network coding;random number generation;telecommunication network reliability;telecommunication security;adversarial errors;cryptographic pseudorandom generators;pollution-attack-resilient network coding;rateless network coding;reliable multicast problem;secret randomness;secure key distribution scheme;short key sharing;throughput-optimal error correction schemes;Decoding;Encoding;Error correction codes;Generators;Network coding;Reliability;Transforms},
  doi = {10.1109/ISIT.2015.7282931},
  month = {June}
}
@article{Meng:2011:tkde,
  author = {Meng, Shicong and Liu, Ling and Wang, Ting},
  title = {{State Monitoring in Cloud Datacenters}},
  journal = {IEEE Trans. on Knowl. and Data Eng.},
  issue_date = {September 2011},
  volume = {23},
  number = {9},
  month = sep,
  year = {2011},
  issn = {1041-4347},
  pages = {1328--1344},
  publisher = {IEEE Educational Activities Department},
  address = {Piscataway, NJ, USA},
  keywords = {State monitoring, datacenter, cloud, distributed, aggregation, tuning.}
}
@inproceedings{Wang:2008:icde,
  author = {Wang, Ting and Liu, Ling},
  title = {{Butterfly: Protecting Output Privacy in Stream Mining}},
  booktitle = {Proceedings of the 2008 IEEE 24th International Conference on Data Engineering},
  series = {ICDE '08},
  year = {2008},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA}
}
@inproceedings{Wang:2008:edbt,
  author = {Wang, Ting and Pottinger, Rachel},
  title = {{SeMap: A Generic Mapping Construction System}},
  booktitle = {Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology},
  series = {EDBT '08},
  year = {2008},
  numpages = {12},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Bamba:2008:www,
  author = {Bamba, Bhuvan and Liu, Ling and Pesti, Peter and Wang, Ting},
  title = {Supporting Anonymous Location Queries in Mobile Environments with Privacygrid},
  booktitle = {Proceedings of the 17th International Conference on World Wide Web},
  series = {WWW '08},
  year = {2008},
  isbn = {978-1-60558-085-2},
  location = {Beijing, China},
  pages = {237--246},
  numpages = {10},
  doi = {10.1145/1367497.1367531},
  acmid = {1367531},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {k-anonymity, l-diversity, location privacy}
}
@inproceedings{Wang:2009:icde,
  author = {Wang, Ting and Meng, Shicong and Bamba, Bhuvan and Liu, Ling and Pu, Calton},
  title = {{A General Proximity Privacy Principle}},
  booktitle = {Proceedings of the 2009 IEEE International Conference on Data Engineering},
  series = {ICDE '09},
  year = {2009},
  isbn = {978-0-7695-3545-6},
  pages = {1279--1282},
  numpages = {4},
  doi = {10.1109/ICDE.2009.220},
  acmid = {1547497},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA}
}
@inproceedings{Wang:2010:icde,
  author = {Wang, Ting and Liu, Ling},
  title = {{XColor: Protecting General Proximity Privacy}},
  booktitle = {Proceedings of the 2010 IEEE International Conference on Data Engineering},
  series = {ICDE '10},
  year = {2010},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA}
}
@inproceedings{Wang:2009:kdd,
  author = {Wang, Ting and Srivatsa, Mudhakar and Agrawal, Dakshi and Liu, Ling},
  title = {{Learning, Indexing, and Diagnosing Network Faults}},
  booktitle = {Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  series = {KDD '09},
  year = {2009},
  isbn = {978-1-60558-495-9},
  location = {Paris, France},
  pages = {857--866},
  numpages = {10},
  doi = {10.1145/1557019.1557113},
  acmid = {1557113},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {fault signature, network topology, online diagnosis}
}
@inproceedings{Wang:2010:conext,
  author = {Wang, Ting and Srivatsa, Mudhakar and Agrawal, Dakshi and Liu, Ling},
  title = {{Spatio-temporal Patterns in Network Events}},
  booktitle = {Proceedings of the 6th International COnference on emerging Networking EXperiments and Technologies},
  series = {Co-NEXT '10},
  year = {2010},
  isbn = {978-1-4503-0448-1},
  location = {Philadelphia, Pennsylvania},
  pages = {3:1--3:12},
  articleno = {3},
  numpages = {12},
  doi = {10.1145/1921168.1921172},
  acmid = {1921172},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Wang:2011:sacmat,
  author = {Wang, Ting and Srivatsa, Mudhakar and Agrawal, Dakshi and Liu, Ling},
  title = {{Modeling Data Flow in Socio-information Networks: A Risk Estimation Approach}},
  booktitle = {Proceedings of the 16th ACM Symposium on Access Control Models and Technologies},
  series = {SACMAT '11},
  year = {2011},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {access control, risk estimation, social network}
}
@inproceedings{Tang:2011:cikm,
  author = {Tang, Yuzhe and Wang, Ting and Liu, Ling and Meng, Shicong and Palanisamy, Balaji},
  title = {{Privacy Preserving Indexing for eHealth Information Networks}},
  booktitle = {Proceedings of the 20th ACM International Conference on Information and Knowledge Management},
  series = {CIKM '11},
  year = {2011},
  isbn = {978-1-4503-0717-8},
  location = {Glasgow, Scotland, UK},
  pages = {905--914},
  numpages = {10},
  doi = {10.1145/2063576.2063707},
  acmid = {2063707},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {distributed indexing, keyword search, privacy preserving protocol}
}
@inproceedings{Wang:2012:sacmat,
  author = {Wang, Ting and Srivatsa, Mudhakar and Liu, Ling},
  title = {{Fine-grained Access Control of Personal Data}},
  booktitle = {Proceedings of the 17th ACM Symposium on Access Control Models and Technologies},
  series = {SACMAT '12},
  year = {2012},
  isbn = {978-1-4503-1295-0},
  location = {Newark, New Jersey, USA},
  pages = {145--156},
  numpages = {12},
  doi = {10.1145/2295136.2295165},
  acmid = {2295165},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {access control, social network, social role}
}
@article{Wang:2010:ieice,
  author = {{Wang}, T. and {Liu}, L.},
  title = {{Execution Assurance for Massive Computing Tasks}},
  journal = {IEICE Transactions on Information and Systems},
  year = 2010,
  volume = 93,
  pages = {1343-1351}
}
@inproceedings{Gao:2014:icnp,
  author = {Gao, Wei and Li, Yong and Lu, Haoyang and Wang, Ting and Liu, Cong},
  title = {{On Exploiting Dynamic Execution Patterns for Workload Offloading in Mobile Cloud Applications}},
  booktitle = {Proceedings of the 2014 IEEE 22Nd International Conference on Network Protocols},
  series = {ICNP '14},
  year = {2014},
  isbn = {978-1-4799-6204-4},
  pages = {1--12},
  numpages = {12},
  doi = {10.1109/ICNP.2014.22},
  acmid = {2707036},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA}
}
@inproceedings{Tang:2014:acsac,
  author = {Tang, Yuzhe and Wang, Ting and Liu, Ling and Hu, Xin and Jang, Jiyong},
  title = {Lightweight Authentication of Freshness in Outsourced Key-value Stores},
  booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference},
  series = {ACSAC '14},
  year = {2014},
  isbn = {978-1-4503-3005-3},
  location = {New Orleans, Louisiana, USA},
  pages = {176--185},
  numpages = {10},
  doi = {10.1145/2664243.2664244},
  acmid = {2664244},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Wang:2014:cikm,
  author = {Wang, Ting and Meng, Shicong and Gao, Wei and Hu, Xin},
  title = {Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing},
  booktitle = {Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management},
  series = {CIKM '14},
  year = {2014},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Wang:2014:kdd,
  author = {Wang, Ting and Wang, Dashun and Wang, Fei},
  title = {Quantifying Herding Effects in Crowd Wisdom},
  booktitle = {Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  series = {KDD '14},
  year = {2014},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Ji:2015:acsac,
  author = {Shouling Ji and Shukun Yang and Ting Wang and Changchang Liu and Wei-han Lee and Raheem Beyah},
  title = {{PARS: A Uniform and Open-source Password Analysis and Research System}},
  booktitle = {Proceedings of the 31th Annual Computer Security Applications Conference},
  series = {ACSAC '15},
  year = {2015},
  publisher = {ACM},
  address = {New York, NY, USA}
}
@inproceedings{Wang:2014:sdm,
  author = {Ting Wang and Fei Wang and Reiner Sailer and Douglas Schales},
  title = {{Kaleido: Network Traffic Attribution using Multifaceted Footprinting}},
  booktitle = {Proceedings of the 2014 SIAM International Conference on Data Mining},
  series = {SDM '14},
  year = 2014
}
@inproceedings{Wang:2012:sdm,
  author = {Ting Wang and Mudhakar Srivatsa and Dakshi Agrawal and Ling Liu},
  title = {{Microscopic Social Influence}},
  booktitle = {Proceedings of the 2012 SIAM International Conference on Data Mining},
  series = {SDM '12},
  year = 2012
}
@inproceedings{Hu:2014:spw,
  author = {Hu, Xin and Wang, Ting and Stoecklin, Marc Ph. and Schales, Douglas L. and Jang, Jiyong and Sailer, Reiner},
  title = {Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation},
  booktitle = {Proceedings of the 2014 IEEE Security and Privacy Workshops},
  series = {SPW '14},
  year = {2014},
  isbn = {978-1-4799-5103-1},
  pages = {61--64},
  numpages = {4},
  doi = {10.1109/SPW.2014.18},
  acmid = {2709747},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA},
  keywords = {Risk Scoring, reputation propagation, mutually reinforced principles}
}
@article{Hu:2014:eurasip,
  author = {Hu, Xin and Wang, Ting and Stoecklin, Marc and Schales, Douglas and Jang, Jiyong and Sailer, Reiner},
  title = {{MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation}},
  journal = {EURASIP Journal on Information Security},
  volume = {2014},
  year = {2014},
  number = {1},
  pages = {17}
}
@incollection{Wang:2009:mlct,
  year = {2009},
  booktitle = {Machine Learning in Cyber Trust},
  title = {{From Data Privacy to Location Privacy}},
  publisher = {Springer US},
  author = {Wang, Ting and Liu, Ling},
  pages = {217-246}
}
@inproceedings{Zhang:2016:infocom,
  title = {Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis},
  author = {Jialong Zhang and Xin Hu and Jiyong Jang and Ting Wang and Guofei Gu and Marc Stoecklin},
  year = {2016},
  booktitle = {Proceedings of the 2016 IEEE International Conference on Computer Communications},
  series = {INFOCOM 2016},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA}
}
@inproceedings{Taylor:2016:codaspy,
  author = {Taylor, Teryl and Hu, Xin and Wang, Ting and Jang, Jiyong and Stoecklin, Marc Ph and Monrose, Fabian and Sailer, Reiner},
  title = {Detecting Malicious Exploit Kits Using Tree-based Similarity Searches},
  booktitle = {Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy},
  series = {CODASPY '16},
  year = {2016},
  isbn = {978-1-4503-3935-3},
  location = {New Orleans, Louisiana, USA},
  pages = {255--266},
  numpages = {12},
  acmid = {2857718},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {exploit kit, information retrieval, intrusion detection, network security, security, subtree similarity search}
}
@inproceedings{Hu:2016:dsn,
  author = {Xin Hu and Jiyong Jang and Marc Stoecklin and Ting Wang and Douglas Schales and Dhilung Kirat and Josyula Rao},
  series = {DSN '16},
  booktitle = {Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks},
  publisher = {IEEE},
  title = {Baywatch: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks},
  year = 2016
}
@inproceedings{Wang:2016:icdcs,
  author = {Ting Wang and Xin Hu and Jiyong Jang and Shouling Ji and Marc Stoecklin and Teryl Taylor},
  title = {BotMeter: A DGA-Botnet Landscape Navigation System},
  booktitle = {Proceedings of the 36th IEEE International Conference on Distributed Computing Systems},
  year = {2016},
  series = {ICDCS '16}
}
@inproceedings{Wang:2014:icdew,
  author = {T. Wang and X. Hu and S. Meng and R. Sailer},
  booktitle = {Proceedings of 2014 IEEE 30th International Conference on Data Engineering Workshops},
  title = {Reconciling malware labeling discrepancy via consensus learning},
  series = {ICDEW '14},
  year = {2014}
}
@article{Wang:2009:vldb,
  author = {Wang, Ting and Liu, Ling},
  title = {Privacy-aware Mobile Services over Road Networks},
  journal = {Proc. VLDB Endow.},
  issue_date = {August 2009},
  volume = {2},
  number = {1},
  month = aug,
  year = {2009},
  issn = {2150-8097},
  pages = {1042--1053},
  numpages = {12},
  doi = {10.14778/1687627.1687745},
  acmid = {1687745},
  publisher = {VLDB Endowment}
}
@article{Wang:2014:bigdata,
  author = {Wang, Ting and Wang, Dashun},
  journal = {Big Data},
  keywords = {opinion-formation, opinion\_diffusion, social\_networks, wisdom\_crowds},
  month = dec,
  number = {4},
  pages = {196--204},
  publisher = {Mary Ann Liebert, Inc., publishers},
  title = {{Why Amazon's Ratings Might Mislead You: The Story of Herding Effects}},
  volume = {2},
  year = {2014}
}
@inproceedings{Meng:2010:icde,
  author = {Shicong Meng and Ting Wang and Ling Liu},
  title = {Monitoring continuous state violation in datacenters: Exploring the time dimension},
  booktitle = {Proceedings of 2010 IEEE 30th International Conference on Data Engineering},
  series = {ICDE '10},
  year = {2010},
  publisher = {IEEE Computer Society}
}
@inproceedings{Wang:2008:icws,
  author = {Ting Wang and Chang{-}Shing Perng and Tao Tao and Chunqiang Tang and Edward So and Chun Zhang and Rong N. Chang and Ling Liu},
  title = {A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows},
  booktitle = {Proceedings of 2008 IEEE International Conference on Web Services},
  year = {2008},
  series = {ICWS '08}
}
@inproceedings{Wang:2006:icccn,
  author = {T. Wang and S. Hao and P. Wang and G. Peng},
  booktitle = {Proceedings of the 15th IEEE International Conference on Computer Communications and Networks},
  title = {Efficient and Density-Aware Routing for Wireless Sensor Networks},
  year = {2006},
  series = {ICCCN '06}
}
@inproceedings{Wang:2006:apweb,
  author = {Ting Wang},
  title = {TWStream: Finding Correlated Data Streams Under Time Warping},
  booktitle = {Proceedings of the 8th Asia-Pacific Web Conference},
  year = {2006},
  series = {APWeb '06}
}