Author

Lingyu Ying

Professor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia University - Cited by 7,856 - NFV Security - Cloud Security - Container Security - Security Metrics - Privacy

Biography

Lingyu Ying  working in a Research Institute of Forest Resource Information Technique, Chinese Academy of Forestry, Beijing, 100091, PR China. He has published more than 30 articles, In the field of Geography, Natural Disasters, Earth Science, Climatic conditions,  Natural Hazards
Title
Cited by
Year
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies
A Qasem, P Shirani, M Debbabi, L Wang, B Lebel, BL AgbaACM Computing Surveys (CSUR) 54 (2), 1-42, 2021202
32
2021
On the feasibility of binary authorship characterization
S Alrabaee, M Debbabi, L WangDigital Investigation 28, S3-S11, 2019201
17
2019
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities
SL Thirunavukkarasu, M Zhang, A Oqaily, GS Chawla, L Wang, ...2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019201
16
2019
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
S Alrabaee, M Debbabi, L WangACM Computing Surveys (CSUR) 55 (1), 1-41, 2022202
14
2022
Optimizing the network diversity to improve the resilience of networks against unknown attacks
D Borbor, L Wang, S Jajodia, A SinghalComputer Communications 5, 96-112, 2019201
14
2019
Modeling Supply Chain Attacks in IEC 61850 Substations
O Duman, M Ghafouri, M Kassouf, R Atallah, L Wang, M Debbabi2019 IEEE International Conference on Communications, Control, and Computing …, 2019201
14
2019
Modeling and mitigating security threats in network functions virtualization (NFV)
N Alhebaishi, L Wang, S JajodiaData and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 …, 2020202
13
2020
CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA
S Alrabaee, M Debbabi, L WangIEEE Transactions on Information Forensics and Security 15, 3051-3066, 2020202
9
2020
SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing
M Oqaily, Y Jarraya, M Mohammady, S Majumdar, M Pourzandi, L Wang, ...IEEE Transactions on Dependable and Secure Computing 18 (5), 2486-2505, 2019201
7
2019
Provtalk: Towards interpretable multi-level provenance analysis in networking functions virtualization (nfv)
A Tabiban, H Zhao, Y Jarraya, M Pourzandi, M Zhang, L WangThe Network and Distributed System Security Symposium 2022 (NDSS ‘22), 2022202
6
2022
A generalized framework for preserving both privacy and utility in data outsourcing
S Xie, M Mohammady, H Wang, L Wang, J Vaidya, Y HongIEEE Transactions on Knowledge and Data Engineering 35 (1), 1-15, 2021202
6
2021
Binary analysis overview
S Alrabaee, M Debbabi, P Shirani, L Wang, A Youssef, A Rahimian, ...Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code …, 2020202
5
2020
ProSAS: Proactive Security Auditing System for Clouds
S Majumdar, GS Chawla, A Alimohammadifar, T Madi, Y Jarraya, ...IEEE Transactions on Dependable and Secure Computing 19 (4), 217-234, 2021202
5
2021
Cloud Security Auditing
S Majumdar, T Madi, Y Wang, A Tabiban, M Oqaily, A Alimohammadifar, ...Springer, 2019201
5
2019
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack
A Oqaily, LT Sudershan, Y Jarraya, S Majumdar, M Zhang, M Pourzandi, ...2020 IEEE International Conference on Cloud Computing Technology and Science …, 2020202
5
2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack
A Tabiban, Y Jarraya, M Zhang, M Pourzandi, L Wang, M Debbabi2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020202
5
2020
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization
M Mohammady, M Oqaily, L Wang, Y Hong, H Louafi, M Pourzandi, ...ACM Transactions on Privacy and Security (TOPS) 24 (), 1-6, 2021202
3
2021
Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems
O Duman, M Zhang, L Wang, M Debbabi, RF Atallah, B LebelIEEE Transactions on Dependable and Secure Computing 19 (2), 1018-105, 2020202
3
2020
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV
GS Chawla, M Zhang, S Majumdar, Y Jarraya, M Pourzandi, L Wang, ...IEEE Transactions on Dependable and Secure Computing 18 (4), 155-1567, 2020202
3
2020