Journal Papers:
Long Vu, Klara Nahrstedt, Rahul Malik, and Qiyan Wang. COADA: Leveraging Dynamic Coalition Peer-to-Peer Network for Adaptive Content Download of Cellular Users. In International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), 2011.
Conference & workshop papers:
Qiyan Wang, and Sanjay Sawhney. VeCure: A Practical Security Framework to Protect the CAN Bus of Vehicles. In International Conference of the Internet of Things (IoT'14), Cambridge MA, 2014.
Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas Hopper. rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. In NDSS’13, San Diego, CA, USA, 2013. (An extended draft with formal security proofs is available here.)
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, and Nikita Borisov. CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing. In ACM CCS’12, Raleigh, NC, USA, 2012.
Qiyan Wang, and Nikita Borisov. Octopus: A Secure and Anonymous DHT Lookup. In IEEE ICDCS’12, Macau, China, 2012. (A technical report with extension is available here.)
Qiyan Wang, Prateek Mittal, and Nikita Borisov. In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-Peer Anonymous Communication Systems. In ACM CCS’10, Chicago, IL, USA, 2010.
Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. In IEEE INFOCOM’10 (mini-symposium), San Diego, CA, USA, 2010. (A technical report with extension is available here.)
Long Vu, Rahul Malik, Qiyan Wang, and Klara Nahrstedt. An Adaptive Content Distribution Protocol for Dynamic Peer-to-Peer Coalition Networks. In the 4th International Workshop on Adaptive and Dependable Mobile Ubiquitous Systems (ADAMUS’10), 2010.
Rakesh B. Bobba, Katherine M. Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt and Thomas J. Overbye. Detecting False Data Injection Attacks on DC State Estimation. In the 1st Workshop on Secure Control Systems (SCS ’10), Stockholm, Sweden, April 2010.
Qiyan Wang, Himanshu Khurana, Ying Huang, and Klara Nahrstedt. Time-Valid One-Time Signature for Time Critical Multicast Data Authentication. In IEEE INFOCOM’09. Rio de Janeiro, Brazil, 2009.
Technical reports & posters:
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, and Nikita Borisov. CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. arXiv: 1203.1763 [cs.CR], March 2012.
Qiyan Wang, and Nikita Borisov. Octopus: A Secure and Anonymous DHT Lookup. arXiv: 1203.2668 [cs.CR], March 2012.
Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. Identifying Malicious Node in Network-Coding-Based Peer-to-Peer Streaming Networks. UIUC-CS-TechReport-12-01-2009.
Qiyan Wang, Himanshu Khurana, and Klara Nahrstedt. Non-Interactive Hierarchical Pairwise Key Predistribution Scheme with Multi-Level Key Establishment. UIUC-CS-TechReport-12-16-2009.
Qiyan Wang, Himanshu Khurana, and Klara Nahrstedt. Non-Interactive Multi-Level Key Establishment Scheme for Hierarchical Electric Power Grids (Extended Abstract). In ACM CCS’09, Chicago, USA, 2009.
Older papers (in college):
Qiyan Wang, Liusheng Huang, Wei Yang, and Yonglong Luo. Efficient and Secure Quantum All-or-Nothing Disclosure of Secrets Scheme. International Conference on Distributed Computing and Applications for Business Engineering and Sciences (DCABES’06), v2, pp. 1276-1280, 2006.
Wei Yang, Liusheng Huang, and Qiyan Wang. Provably Secure 1-out-of-n Oblivious Transfer Scheme. WSEAS Transactions on Computers, v5, n9, pp. 1823-1830, September, 2006.
Long Vu, Klara Nahrstedt, Rahul Malik, and Qiyan Wang. COADA: Leveraging Dynamic Coalition Peer-to-Peer Network for Adaptive Content Download of Cellular Users. In International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), 2011.
Conference & workshop papers:
Qiyan Wang, and Sanjay Sawhney. VeCure: A Practical Security Framework to Protect the CAN Bus of Vehicles. In International Conference of the Internet of Things (IoT'14), Cambridge MA, 2014.
Qiyan Wang, Zi Lin, Nikita Borisov, and Nicholas Hopper. rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. In NDSS’13, San Diego, CA, USA, 2013. (An extended draft with formal security proofs is available here.)
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, and Nikita Borisov. CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing. In ACM CCS’12, Raleigh, NC, USA, 2012.
Qiyan Wang, and Nikita Borisov. Octopus: A Secure and Anonymous DHT Lookup. In IEEE ICDCS’12, Macau, China, 2012. (A technical report with extension is available here.)
Qiyan Wang, Prateek Mittal, and Nikita Borisov. In Search of an Anonymous and Secure Lookup: Attacks on Structured Peer-to-Peer Anonymous Communication Systems. In ACM CCS’10, Chicago, IL, USA, 2010.
Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. In IEEE INFOCOM’10 (mini-symposium), San Diego, CA, USA, 2010. (A technical report with extension is available here.)
Long Vu, Rahul Malik, Qiyan Wang, and Klara Nahrstedt. An Adaptive Content Distribution Protocol for Dynamic Peer-to-Peer Coalition Networks. In the 4th International Workshop on Adaptive and Dependable Mobile Ubiquitous Systems (ADAMUS’10), 2010.
Rakesh B. Bobba, Katherine M. Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt and Thomas J. Overbye. Detecting False Data Injection Attacks on DC State Estimation. In the 1st Workshop on Secure Control Systems (SCS ’10), Stockholm, Sweden, April 2010.
Qiyan Wang, Himanshu Khurana, Ying Huang, and Klara Nahrstedt. Time-Valid One-Time Signature for Time Critical Multicast Data Authentication. In IEEE INFOCOM’09. Rio de Janeiro, Brazil, 2009.
Technical reports & posters:
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, and Nikita Borisov. CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing. arXiv: 1203.1763 [cs.CR], March 2012.
Qiyan Wang, and Nikita Borisov. Octopus: A Secure and Anonymous DHT Lookup. arXiv: 1203.2668 [cs.CR], March 2012.
Qiyan Wang, Long Vu, Klara Nahrstedt, and Himanshu Khurana. Identifying Malicious Node in Network-Coding-Based Peer-to-Peer Streaming Networks. UIUC-CS-TechReport-12-01-2009.
Qiyan Wang, Himanshu Khurana, and Klara Nahrstedt. Non-Interactive Hierarchical Pairwise Key Predistribution Scheme with Multi-Level Key Establishment. UIUC-CS-TechReport-12-16-2009.
Qiyan Wang, Himanshu Khurana, and Klara Nahrstedt. Non-Interactive Multi-Level Key Establishment Scheme for Hierarchical Electric Power Grids (Extended Abstract). In ACM CCS’09, Chicago, USA, 2009.
Older papers (in college):
Qiyan Wang, Liusheng Huang, Wei Yang, and Yonglong Luo. Efficient and Secure Quantum All-or-Nothing Disclosure of Secrets Scheme. International Conference on Distributed Computing and Applications for Business Engineering and Sciences (DCABES’06), v2, pp. 1276-1280, 2006.
Wei Yang, Liusheng Huang, and Qiyan Wang. Provably Secure 1-out-of-n Oblivious Transfer Scheme. WSEAS Transactions on Computers, v5, n9, pp. 1823-1830, September, 2006.