


default search action
Cliff Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Jie Wang
, Wenye Wang
, Cliff Wang:
Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog. IEEE Internet Things J. 10(13): 11669-11682 (2023) - [j16]Jie Wang
, Sigit Aryo Pambudi, Wenye Wang
, Cliff Wang:
Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments. IEEE Trans. Wirel. Commun. 22(11): 8320-8335 (2023) - [c34]Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang, Matt Bishop:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2023: 845 - 2022
- [j15]Jie Wang
, Wenye Wang
, Cliff Wang, Min Song
:
Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection. IEEE Trans. Mob. Comput. 21(5): 1829-1846 (2022) - [c33]Hamed Okhravi, Cliff Wang:
MTD '22: 9th ACM Workshop on Moving Target Defense. CCS 2022: 3539-3540 - [c32]Sunny Fugate, Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter:
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense. HICSS 2022: 1-2 - [e20]Hamed Okhravi, Cliff Wang:
Proceedings of the 9th ACM Workshop on Moving Target Defense, MTD 2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9878-7 [contents] - 2021
- [j14]Shangqing Zhao
, Zhuo Lu
, Cliff Wang:
Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense. IEEE Trans. Dependable Secur. Comput. 18(6): 2617-2630 (2021) - [c31]Matt Bishop, Cliff Wang, Kimberly Ferguson-Walter, Sunny Fugate:
Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense. HICSS 2021: 1-2 - 2020
- [j13]Jie Wang
, Wenye Wang, Cliff Wang:
Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon. IEEE/ACM Trans. Netw. 28(3): 972-985 (2020) - [j12]Shangqing Zhao
, Zhuo Lu
, Cliff Wang:
How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks? IEEE Trans. Wirel. Commun. 19(11): 7224-7236 (2020) - [c30]Hamed Okhravi, Cliff Wang:
MTD'20: 7th ACM Workshop on Moving Target Defense. CCS 2020: 2137-2138 - [c29]Kimberly Ferguson-Walter, Sunny Fugate, Cliff Wang:
Introduction to the Minitrack on Cyber Deception for Defense. HICSS 2020: 1-2 - [e19]Sushil Jajodia
, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman
:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [e18]Hamed Okhravi, Cliff Wang:
Proceedings of the 7th ACM Workshop on Moving Target Defense, MTD@CCS 2020, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8085-0 [contents] - [i5]Zhuo Lu, Cliff Wang, Shangqing Zhao:
Cyber Deception for Computer and Network Security: Survey and Challenges. CoRR abs/2007.14497 (2020)
2010 – 2019
- 2019
- [b3]Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang:
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer 2019, ISBN 978-3-030-02109-2 - [c28]Jie Wang, Wenye Wang, Cliff Wang:
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks. INFOCOM 2019: 2143-2151 - [e17]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j11]Cliff Wang, Zhuo Lu:
Cyber Deception: Overview and the Road Ahead. IEEE Secur. Priv. 16(2): 80-85 (2018) - [c27]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability. INFOCOM 2018: 1385-1393 - 2017
- [j10]Zhuo Lu
, Cliff Wang:
Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective. IEEE/ACM Trans. Netw. 25(1): 43-55 (2017) - [c26]Sigit Aryo Pambudi, Wenye Wang
, Cliff Wang:
From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks. GLOBECOM 2017: 1-6 - [c25]Jie Wang
, Wenye Wang
, Cliff Wang:
Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region. GLOBECOM 2017: 1-6 - [c24]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks. ICCCN 2017: 1-9 - [c23]Shangqing Zhao, Zhuo Lu, Cliff Wang:
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography. ICDCS 2017: 172-182 - [p7]Massimiliano Albanese
, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia
, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [e16]Taesoo Kim, Cliff Wang, Dinghao Wu:
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5395-3 [contents] - [e15]Peng Liu, Sushil Jajodia
, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - 2016
- [j9]Zhuo Lu, Wenye Wang
, Cliff Wang:
On the Evolution and Impact of Mobile Botnets in Wireless Networks. IEEE Trans. Mob. Comput. 15(9): 2304-2316 (2016) - [c22]Peng Liu, Cliff Wang:
MTD 2016: Third ACM Workshop on Moving Target Defense. CCS 2016: 1868-1869 - [c21]Sigit Aryo Pambudi, Wenye Wang
, Cliff Wang:
How Robust Is a D2D-Based Messaging Service? GLOBECOM 2016: 1-6 - [c20]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
On the Resilience of D2D-Based Social Networking Service against Random Failures. GLOBECOM 2016: 1-6 - [c19]Jie Wang
, Wenye Wang
, Cliff Wang:
Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics. GLOBECOM 2016: 1-6 - [c18]Sigit Aryo Pambudi, Wenye Wang
, Cliff Wang:
Modeling and estimating the structure of D2D-based mobile social networks. ICC 2016: 1-6 - [c17]Jie Wang
, Wenye Wang
, Cliff Wang:
How the anti-rumor kills the rumor: Conflicting information propagation in networks. ICC 2016: 1-6 - [p6]Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes:
Introduction. Digital Fingerprinting 2016: 1-3 - [p5]Zhuo Lu, Cliff Wang, Mingkui Wei:
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. Cyber Deception 2016: 99-116 - [p4]Yong Guan, Sneha Kumar Kasera, Cliff Wang, Ryan M. Gerdes:
Conclusion. Digital Fingerprinting 2016: 177-181 - [e14]Sushil Jajodia
, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e13]Cliff Wang, Ryan M. Gerdes, Yong Guan, Sneha Kumar Kasera:
Digital Fingerprinting. Springer 2016, ISBN 978-1-4939-6599-1 [contents] - [e12]Peng Liu, Cliff Wang:
Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4570-5 [contents] - 2015
- [b2]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23287-4, pp. 1-116 - [j8]Alexander Kott, David S. Alberts, Cliff Wang:
Will Cybersecurity Dictate the Outcome of Future Wars? Computer 48(12): 98-101 (2015) - [j7]Zhuo Lu, Wenye Wang
, Cliff Wang:
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming. IEEE Trans. Dependable Secur. Comput. 12(1): 31-44 (2015) - [c16]Zhuo Lu, Lisa M. Marvel, Cliff Wang:
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs. MTD@CCS 2015: 85-93 - [c15]Zhuo Lu, Cliff Wang:
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. INFOCOM 2015: 280-288 - [c14]Zhuo Lu, Cliff Wang, Mingkui Wei:
On detection and concealment of critical roles in tactical wireless networks. MILCOM 2015: 909-914 - [e11]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i4]Alexander Kott, David S. Alberts, Cliff Wang:
War of 2050: a Battle for Information, Communications, and Computer Security. CoRR abs/1512.00360 (2015) - 2014
- [b1]Benjamin S. Riggan, Wesley E. Snyder, Cliff Wang:
Fundamentals of Sketch-Based Passwords - A General Framework. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-13628-8, pp. 1-64 - [j6]Zhuo Lu, Wenye Wang
, Cliff Wang:
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications. IEEE Trans. Mob. Comput. 13(8): 1746-1759 (2014) - [c13]Zhuo Lu, Wenye Wang
, Cliff Wang:
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. INFOCOM 2014: 1501-1509 - [p3]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Preview. Cyber Defense and Situational Awareness 2014: 1-5 - [p2]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Concluding Thoughts. Cyber Defense and Situational Awareness 2014: 323-328 - [e10]Sushil Jajodia
, Krishna Kant, Pierangela Samarati
, Anoop Singhal, Vipin Swarup, Cliff Wang:
Secure Cloud Computing. Springer 2014, ISBN 978-1-4614-9277-1 [contents] - [e9]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - [e8]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Cyber Defense and Situational Awareness. Advances in Information Security 62, Springer 2014, ISBN 978-3-319-11390-6 [contents] - 2013
- [e7]Ahmad-Reza Sadeghi, Cliff Wang, Hervé Seudie:
CyCAR'13, Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for CyberVehicles, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2487-8 [contents] - [e6]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents] - 2012
- [j5]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks. IEEE Trans. Mob. Comput. 11(8): 1331-1344 (2012) - [c12]Zhuo Lu, Wenye Wang
, Cliff Wang:
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. INFOCOM 2012: 3066-3070 - 2011
- [c11]Zhuo Lu, Wenye Wang
, Cliff Wang:
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. INFOCOM 2011: 1871-1879 - [e5]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents] - 2010
- [c10]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang:
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376 - [c9]Zhuo Lu, Cliff Wang, Wenye Wang:
On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks. ICC 2010: 1-5 - [c8]Zhuo Lu, Wenye Wang
, Cliff Wang:
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks. INFOCOM 2010: 1819-1827 - [e4]Sushil Jajodia
, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents]
2000 – 2009
- 2008
- [j4]Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
Secure target localisation in sensor networks using relaxation labelling. Int. J. Sens. Networks 4(3): 172-184 (2008) - [j3]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [e3]Wenke Lee, Cliff Wang, David Dagon:
Botnet Detection: Countering the Largest Security Threat. Advances in Information Security 36, Springer 2008, ISBN 978-0-387-68768-1 [contents] - 2007
- [c7]Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks. ICC 2007: 3076-3081 - [c6]Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
Secure Tracking in Sensor Networks. ICC 2007: 3082-3087 - [p1]Kun Sun, Peng Ning, Cliff Wang:
Secure and Resilient Time Synchronization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 347-367 - [e2]Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang:
Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4 [contents] - [e1]Radha Poovendran, Sumit Roy, Cliff Wang:
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security 30, Springer 2007, ISBN 978-0-387-32721-1 [contents] - [i3]Michael Baer, Ricky Charlet, Wes Hardaker
, Robert Story, Cliff Wang:
IPsec Security Policy Database Configuration MIB. RFC 4807: 1-71 (2007) - 2006
- [j2]Kun Sun, Peng Ning, Cliff Wang:
Secure and resilient clock synchronization in wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 395-408 (2006) - [c5]Kun Sun, Pai Peng, Peng Ning, Cliff Wang:
Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140 - [c4]Kun Sun
, Peng Ning, Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks. CCS 2006: 264-277 - [c3]Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
Robust Localization of Multiple Events in Sensor Networks. SUTC (1) 2006: 168-177 - 2005
- [j1]Kun Sun, Peng Ning, Cliff Wang:
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2(3): 177-189 (2005) - [c2]Cheolha Pedro Lee, Wesley E. Snyder, Cliff Wang:
Supervised Multispectral Image Segmentation using Active Contours. ICRA 2005: 4242-4247 - [i2]R. Rohit, Pyda Srisuresh, Rajiv Raghunarayan, Nalinaksh Pai, Cliff Wang:
Definitions of Managed Objects for Network Address Translators (NAT). RFC 4008: 1-64 (2005) - [i1]Alper E. Yegin, Yoshihiro Ohba, Reinaldo Penno, George Tsirtsis, Cliff Wang:
Protocol for Carrying Authentication for Network Access (PANA) Requirements. RFC 4058: 1-19 (2005)
1990 – 1999
- 1994
- [c1]Cliff Wang, Lori Small, Wesley E. Snyder, Rodney Williams:
Edge detection in gated cardiac nuclear medicine images. CBMS 1994: 28-33
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint