default search action
Helen J. Wang
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j5]Mona Haraty, Zhongyuan Wang, Helen J. Wang, Shamsi T. Iqbal, Jaime Teevan:
Design and in-situ evaluation of a mixed-initiative approach to information organization. J. Assoc. Inf. Sci. Technol. 68(9): 2211-2224 (2017) - 2015
- [c51]Helen J. Wang, Alexander Moshchuk, Michael Gamon, Shamsi T. Iqbal, Eli T. Brown, Ashish Kapoor, Christopher Meek, Eric Yawei Chen, Yuan Tian, Jaime Teevan, Mary Czerwinski, Susan T. Dumais:
The Activity Platform. HotOS 2015 - [c50]John Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Christopher J. Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal:
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser. IEEE Symposium on Security and Privacy 2015: 431-446 - 2014
- [c49]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - 2013
- [c48]Alexander Moshchuk, Helen J. Wang, Yunxin Liu:
Content-based isolation: rethinking isolation policy design on client systems. CCS 2013: 1167-1180 - [c47]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c46]Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek:
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. USENIX Security Symposium 2013: 415-430 - [c45]Alexei Czeskis, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
Lightweight server support for browser-based CSRF protection. WWW 2013: 273-284 - 2012
- [c44]Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu:
Scalable Telemetry Classification for Automated Malware Detection. ESORICS 2012: 788-805 - [c43]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c42]Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schecter, Collin Jackson:
Clickjacking: Attacks and Defenses. USENIX Security Symposium 2012: 413-428 - [c41]Kapil Singh, Helen J. Wang, Alexander Moshchuk, Collin Jackson, Wenke Lee:
Practical end-to-end web content integrity. WWW 2012: 659-668 - 2011
- [c40]Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, Li Zhuang:
Enabling Security in Cloud Storage SLAs with CloudProof. USENIX ATC 2011 - [c39]Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin:
Permission Re-Delegation: Attacks and Defenses. USENIX Security Symposium 2011 - 2010
- [j4]Helen J. Wang:
Attacks target Web server logic and prey on XCS weaknesses: technical persepctive. Commun. ACM 53(8): 104 (2010) - [c38]Chuanxiong Guo, Guohan Lu, Helen J. Wang, Shuang Yang, Chao Kong, Peng Sun, Wenfei Wu, Yongguang Zhang:
SecondNet: a data center network virtualization architecture with bandwidth guarantees. CoNEXT 2010: 15 - [c37]Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee:
On the Incoherencies in Web Browser Access Control Policies. IEEE Symposium on Security and Privacy 2010: 463-478
2000 – 2009
- 2009
- [c36]Chuanxiong Guo, Yunxin Liu, Wenchao Shen, Helen J. Wang, Qing Yu, Yongguang Zhang:
Mining the Web and the Internet for Accurate IP Address Geolocations. INFOCOM 2009: 2841-2845 - [c35]Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter:
The Multi-Principal OS Construction of the Gazelle Web Browser. USENIX Security Symposium 2009: 417-432 - 2008
- [c34]Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irún-Briz:
Tupni: automatic reverse engineering of input formats. CCS 2008: 391-402 - [c33]Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar:
Characterizing Botnets from Email Spam Records. LEET 2008 - 2007
- [j3]Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir:
BrowserShield: Vulnerability-driven filtering of dynamic HTML. ACM Trans. Web 1(3): 11 (2007) - [c32]Jon Howell, Collin Jackson, Helen J. Wang, Xiaofeng Fan:
MashupOS: Operating System Abstractions for Client Mashups. HotOS 2007 - [c31]Emre Kiciman, Helen J. Wang:
Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications. HotOS 2007 - [c30]Tao Jiang, Helen J. Wang, Yih-Chun Hu:
Preserving location privacy in wireless lans. MobiSys 2007: 246-257 - [c29]Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo:
Generic Application-Level Protocol Analyzer and its Language. NDSS 2007 - [c28]Helen J. Wang, Xiaofeng Fan, Jon Howell, Collin Jackson:
Protection and communication abstractions for web browsers in MashupOS. SOSP 2007: 1-16 - [c27]José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic. S&P 2007: 71-85 - [c26]Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. S&P 2007: 252-266 - [c25]Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang:
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. SRDS 2007: 209-218 - [c24]Weidong Cui, Jayanthkumar Kannan, Helen J. Wang:
Discoverer: Automatic Protocol Reverse Engineering from Network Traces. USENIX Security Symposium 2007 - [c23]Collin Jackson, Helen J. Wang:
Subspace: secure cross-domain communication for web mashups. WWW 2007: 611-620 - 2006
- [c22]Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker:
Finding diversity in remote code injection exploits. Internet Measurement Conference 2006: 53-64 - [c21]Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir:
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. OSDI 2006: 61-74 - [c20]Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines. S&P 2006: 314-327 - 2005
- [c19]Qiang Huang, David Jao, Helen J. Wang:
Applications of secure electronic voting to automated privacy-preserving troubleshooting. CCS 2005: 68-80 - [c18]Qiang Huang, Helen J. Wang, Nikita Borisov:
Privacy-Preserving Friends Troubleshooting Network. NDSS 2005 - [c17]Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 - 2004
- [j2]Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:
Strider: a black-box, state-based approach to change and configuration management and support. Sci. Comput. Program. 53(2): 143-164 (2004) - [c16]Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou:
Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming. IPTPS 2004: 54-63 - [c15]Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang:
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. IPTPS 2004: 184-194 - [c14]Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang:
Automatic Misconfiguration Troubleshooting with PeerPressure. OSDI 2004: 245-258 - [c13]Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier:
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. SIGCOMM 2004: 193-204 - [c12]Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang:
PeerPressure for automatic troubleshooting. SIGMETRICS 2004: 398-399 - 2003
- [c11]Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou:
Resilient Peer-to-Peer Streaming. ICNP 2003: 16-27 - [c10]Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang:
Server-based Inference of Internet Link Lossiness. INFOCOM 2003: 145-155 - [c9]Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony I. T. Rowstron, Marvin Theimer, Helen J. Wang, Alec Wolman:
An Evaluation of Scalable Application-Level Multicast Built Using Peer-To-Peer Overlays. INFOCOM 2003: 1510-1520 - [c8]Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang:
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. LISA 2003: 159-172 - 2002
- [c7]Venkata N. Padmanabhan, Lili Qiu, Helen J. Wang:
Passive network tomography using Bayesian inference. Internet Measurement Workshop 2002: 93-94 - [c6]Venkata N. Padmanabhan, Helen J. Wang, Philip A. Chou, Kunwadee Sripanidkulchai:
Distributing streaming media content using cooperative networking. NOSSDAV 2002: 177-186 - 2001
- [c5]Helen J. Wang, Ascan F. Morlang, Randy H. Katz:
A personal communication service creation model for Internet-based unified communication systems. ICC 2001: 1325-1329 - [c4]Helen J. Wang, Randy H. Katz:
Mobility support in unified communication networks. WOWMOM 2001: 95-102 - 2000
- [j1]Helen J. Wang, Bhaskaran Raman, Chen-Nee Chuah, Rahul Biswas, Ramakrishna Gummadi, Barbara Hohlt, Xia Hong, Emre Kiciman, Zhuoqing Morley Mao, Jimmy S. Shih, Lakshminarayanan Subramanian, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz:
ICEBERG: an Internet core network architecture for integrated communications. IEEE Wirel. Commun. 7(4): 10-19 (2000) - [c3]Helen J. Wang, Anthony D. Joseph, Randy H. Katz:
A Signaling System Using Lightweight Call Sessions. INFOCOM 2000: 697-706
1990 – 1999
- 1999
- [c2]Helen J. Wang, Randy H. Katz, Jochen Giese:
Policy-Enabled Handoffs Across Heterogeneous Wireless Networks. WMCSA 1999: 51- - 1997
- [c1]Joseph M. Hellerstein, Peter J. Haas, Helen J. Wang:
Online Aggregation. SIGMOD Conference 1997: 171-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint