Cliff Wang
#186,632
Most Influential Person Now
Computer Science researcher
Cliff Wang's AcademicInfluence.com Rankings
Cliff Wangcomputer-science Degrees
Computer Science
#12157
World Rank
#12957
Historical Rank
Machine Learning
#5581
World Rank
#5655
Historical Rank
Artificial Intelligence
#6024
World Rank
#6116
Historical Rank
Database
#9221
World Rank
#9703
Historical Rank

Download Badge
Computer Science
Cliff Wang's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Cliff Wang Influential?
(Suggest an Edit or Addition)According to Wikipedia, Cliff Wang is a researcher at North Carolina State university. He was named a Fellow of the Institute of Electrical and Electronics Engineers in 2016 for his leadership in trusted computing and communication systems.
Cliff Wang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (2011) (420)
- Introduction to Hardware Security and Trust (2011) (414)
- TinySeRSync: secure and resilient time synchronization in wireless sensor networks (2006) (220)
- Review and evaluation of security threats on the communication networks in the smart grid (2010) (185)
- Secure and resilient clock synchronization in wireless sensor networks (2006) (141)
- Attack-Resistant Location Estimation in Wireless Sensor Networks (2008) (137)
- Secure Distributed Cluster Formation in Wireless Sensor Networks (2006) (133)
- Cyber Situational Awareness - Issues and Research (2009) (130)
- Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (2006) (102)
- Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications (2014) (92)
- Botnet Detection: Countering the Largest Security Threat (2010) (85)
- Moving Target Defense II (2013) (80)
- Moving Target Defense II: Application of Game Theory and Adversarial Modeling (2012) (78)
- Fault-tolerant cluster-wise clock synchronization for wireless sensor networks (2005) (70)
- From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic (2011) (64)
- Malware Detection (2010) (63)
- Cyber Defense and Situational Awareness (2015) (63)
- Malware Detection (Advances in Information Security) (2006) (59)
- Concluding Thoughts (2014) (52)
- Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure (2010) (48)
- Cyber Warfare (2015) (48)
- Cyber Deception: Overview and the Road Ahead (2018) (45)
- Protocol for Carrying Authentication for Network Access (PANA) Requirements (2005) (35)
- Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming (2015) (34)
- On the Evolution and Impact of Mobile Botnets in Wireless Networks (2016) (24)
- Cyber Deception (2016) (24)
- Visualizing the Tactical Ground Battlefield in the Year 2050: Workshop Report (2015) (23)
- Secure Cloud Computing (2014) (21)
- How can botnets cause storms? Understanding the evolution and impact of mobile botnets (2014) (20)
- Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming (2012) (20)
- Will Cybersecurity Dictate the Outcome of Future Wars? (2015) (18)
- Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings (2019) (17)
- Supervised Multispectral Image Segmentation using Active Contours (2005) (15)
- Botnet Detection: Countering the Largest Security Threat (Advances in Information Security) (2007) (15)
- Honeypot Deception Tactics (2019) (14)
- Cyber Deception: Building the Scientific Foundation (2016) (13)
- Cyber Warfare: Building the Scientific Foundation (2015) (13)
- IPsec Security Policy Database Configuration MIB (2007) (13)
- On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks (2010) (12)
- Secure target localisation in sensor networks using relaxation labelling (2008) (12)
- Theory and Models for Cyber Situation Awareness (2017) (12)
- Computer-Aided Human Centric Cyber Situation Awareness (2017) (12)
- Secure and Resilient Time Synchronization in Wireless Sensor Networks (2007) (11)
- Robust localization of multiple events in sensor networks (2006) (10)
- Towards Intelligent Cyber Deception Systems (2019) (10)
- Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability (2018) (9)
- Experiments and Results (2014) (9)
- Securing Wireless Sensor Networks (2009) (9)
- On the Resilience of D2D-Based Social Networking Service against Random Failures (2016) (9)
- IPSec Policy Information Base (2004) (8)
- When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography (2017) (8)
- Edge detection in gated cardiac nuclear medicine images (1994) (8)
- How the anti-rumor kills the rumor: Conflicting information propagation in networks (2016) (7)
- Using Deep Learning to Generate Relational HoneyData (2019) (7)
- Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks (2012) (7)
- Cyber Deception for Computer and Network Security: Survey and Challenges (2020) (6)
- A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks (2007) (6)
- Secure Tracking in Sensor Networks (2007) (5)
- Digital Fingerprinting (2016) (5)
- Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference (2015) (5)
- Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (2015) (5)
- Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception (2019) (5)
- On detection and concealment of critical roles in tactical wireless networks (2015) (4)
- Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense (2021) (3)
- To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs (2015) (3)
- On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks (2010) (3)
- HONEYSCOPE: IoT Device Protection with Deceptive Network Views (2019) (3)
- Modeling and estimating the structure of D2D-based mobile social networks (2016) (3)
- DICOM 3.0 image display and processing tool for teleradiology (1995) (3)
- War of 2050: a Battle for Information, Communications, and Computer Security (2015) (3)
- Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective (2017) (3)
- Definitions of Managed Objects for Network Address Translators (NAT) (2005) (3)
- SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks (2019) (2)
- Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region (2017) (2)
- Sketch-Based Authentication (2014) (2)
- From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks (2017) (2)
- Adaptive Autonomous Secure Cyber Systems (2020) (2)
- Deception-Enhanced Threat Sensing for Resilient Intrusion Detection (2019) (2)
- Human-Computer Interaction (2014) (2)
- Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon (2020) (2)
- A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks (2016) (2)
- gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception (2019) (1)
- Proceedings of the 2016 ACM Workshop on Moving Target Defense (2016) (1)
- Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks (2015) (1)
- NetShifter: A Comprehensive Multi-Dimensional Network Obfuscation and Deception Solution (2019) (1)
- Artificial Intelligence in Synthetic Biology, Cyber Defense, and Aeromechanical Design (2020) (1)
- How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks? (2020) (1)
- Fundamentals of Sketch-Based Passwords (2014) (1)
- Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming (2015) (1)
- MTD 2016: Third ACM Workshop on Moving Target Defense (2016) (1)
- Correction to: Autonomous Cyber Deception (2019) (1)
- Security mechanisms for protecting foundational services in wireless sensor networks (2010) (1)
- Introduction to the Minitrack on Cyber Deception for Defense (2020) (1)
- On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks (2017) (1)
- Program Twenty-Second Annual Computer Security Applications Conference ( ACSAC ) Practical Solutions (0)
- Proceedings of the 2005 International Conference on Pervasive Systems and Computing, PSC'05 (2005) (0)
- Session details: Session 1: New Techniques, Models, and Evaluation (2020) (0)
- Efficiency, Uniqueness, and Robustness (2014) (0)
- MTD '22: 9th ACM Workshop on Moving Target Defense (2022) (0)
- How Robust Is a D2D-Based Messaging Service? (2016) (0)
- Session details: New paradigms (2010) (0)
- Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation (2017) (0)
- International Workshop on Intelligent Systems and Smart Home (WISH 2007) (2007) (0)
- Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection (2022) (0)
- An Algorithm Based on Mean- Field Annealing that Also Removes Noise and Preserves huge Edges (2000) (0)
- Session details: Keynote 2 (2020) (0)
- Routing Support in CE-based IPsec VPNs (2001) (0)
- A Password System Based on Sketches (2016) (0)
- Application of IPsec to teleradiology (1999) (0)
- Towards Fast and Energy-Efficient Access to Cloudlets in Hostile Environments (2023) (0)
- A ASED NEW INTE~OLATION METHOD FOR MEDICAL IMAGES (1996) (0)
- Trustworthy and resilient time synchronization in wireless sensor networks (2006) (0)
- Definitions of Managed Objects for ATMARP dependent Server Cache Synchronization Protocol Using SMIv2 (1998) (0)
- Proceedings of the 2005 International Conference on Pervasive Systems and Computing, PSC'05: Message from PSC-05 chairs (2005) (0)
- Malware Deception with Automatic Analysis and Generation of HoneyResource (2019) (0)
- Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in the Fog (2023) (0)
- Performance evaluation of the filtered back projection reconstruction and the iterative ML reconstruction for PET images (1996) (0)
- MTD'20: 7th ACM Workshop on Moving Target Defense (2020) (0)
- VPN Group Support for CE-based IPsec VPN (2001) (0)
- Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid (2015) (0)
- Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics (2016) (0)
- Optimal interpolation for medical images using MAP method (1997) (0)
- Abstract 2757: Correlates of peptide-HLA manufacturing success, TCR capture and neoTCR trafficking from patients using the PACTImmune࣪ Database (2022) (0)
- Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (2013) (0)
- Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense (2021) (0)
- Radio approval in Taiwan (2012) (0)
- 320 Rapid identification of a TCR library targeting the HPV E6/E7 oncoproteins to enable multi-TCR T-cell therapies for patients with HPV16+ epithelial cancers (2022) (0)
- Understanding the Resilience of Mobile Cloud Services to Malware (2015) (0)
- Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation (2018) (0)
This paper list is powered by the following services:
Other Resources About Cliff Wang
What Schools Are Affiliated With Cliff Wang?
Cliff Wang is affiliated with the following schools: