2008 |
22 | EE | Wei Yu,
Nan Zhang,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
DSN 2008: 356-365 |
21 | EE | Ryan Pries,
Wei Yu,
Xinwen Fu,
Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks.
ICC 2008: 1578-1582 |
20 | EE | Nan Zhang,
Wei Yu,
Xinwen Fu,
Sajal K. Das:
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
ICPADS 2008: 501-508 |
19 | EE | Xun Wang,
Wei Yu,
Xinwen Fu,
Dong Xuan,
Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
INFOCOM 2008: 1930-1938 |
18 | EE | Ryan Pries,
Wei Yu,
Steve Graham,
Xinwen Fu:
On performance bottleneck of anonymous communication networks.
IPDPS 2008: 1-11 |
17 | EE | Steve Graham,
Xinwen Fu,
Bin Lu:
Network Security Fundamentals.
Wiley Encyclopedia of Computer Science and Engineering 2008 |
16 | EE | Jangwon Lee,
Wei Yu,
Xinwen Fu:
Energy-efficient target detection in sensor networks using line proxies.
Int. J. Communication Systems 21(3): 251-275 (2008) |
2007 |
15 | EE | Wei Yu,
Xinwen Fu,
Steve Graham,
Dong Xuan,
Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback.
IEEE Symposium on Security and Privacy 2007: 18-32 |
14 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
Analysis of flow-correlation attacks in anonymity network.
IJSN 2(1/2): 137-153 (2007) |
2006 |
13 | EE | Xinwen Fu,
Wei Yu,
Dan Cheng,
Xuejun Tan,
Kevin Streff,
Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures.
DASC 2006: 211-218 |
2005 |
12 | EE | Hongyun Xu,
Xinwen Fu,
Ye Zhu,
Riccardo Bettati,
Jianer Chen,
Wei Zhao:
SAS: A Scalar Anonymous Communication System.
ICCNMC 2005: 452-461 |
11 | EE | Xinwen Fu,
Ye Zhu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks.
ICDCS 2005: 493-503 |
10 | EE | Bryan Graham,
Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
ICPADS (1) 2005: 57-63 |
9 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
NCA 2005: 215-218 |
2004 |
8 | EE | Xinwen Fu,
Bryan Graham,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Information Hiding 2004: 266-281 |
7 | EE | Ye Zhu,
Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks.
Privacy Enhancing Technologies 2004: 207-225 |
6 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
A quantitative analysis of anonymous communications.
IEEE Transactions on Reliability 53(1): 103-115 (2004) |
2003 |
5 | | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Countermeasures to Traffic Analysis Attacks.
IAW 2003: 188-195 |
4 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
ICDCS 2003: 340- |
3 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao,
Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
ICPP 2003: 483-492 |
2002 |
2 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols.
ICDCS 2002: 257- |
2001 |
1 | | Yong Guan,
Xinwen Fu,
Dong Xuan,
P. U. Shenoy,
Riccardo Bettati,
Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001) |