| 2008 |
| 22 | EE | Wei Yu,
Nan Zhang,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
DSN 2008: 356-365 |
| 21 | EE | Ryan Pries,
Wei Yu,
Xinwen Fu,
Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks.
ICC 2008: 1578-1582 |
| 20 | EE | Nan Zhang,
Wei Yu,
Xinwen Fu,
Sajal K. Das:
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
ICPADS 2008: 501-508 |
| 19 | EE | Xun Wang,
Wei Yu,
Xinwen Fu,
Dong Xuan,
Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
INFOCOM 2008: 1930-1938 |
| 18 | EE | Ryan Pries,
Wei Yu,
Steve Graham,
Xinwen Fu:
On performance bottleneck of anonymous communication networks.
IPDPS 2008: 1-11 |
| 17 | EE | Steve Graham,
Xinwen Fu,
Bin Lu:
Network Security Fundamentals.
Wiley Encyclopedia of Computer Science and Engineering 2008 |
| 16 | EE | Jangwon Lee,
Wei Yu,
Xinwen Fu:
Energy-efficient target detection in sensor networks using line proxies.
Int. J. Communication Systems 21(3): 251-275 (2008) |
| 2007 |
| 15 | EE | Wei Yu,
Xinwen Fu,
Steve Graham,
Dong Xuan,
Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback.
IEEE Symposium on Security and Privacy 2007: 18-32 |
| 14 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
Analysis of flow-correlation attacks in anonymity network.
IJSN 2(1/2): 137-153 (2007) |
| 2006 |
| 13 | EE | Xinwen Fu,
Wei Yu,
Dan Cheng,
Xuejun Tan,
Kevin Streff,
Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures.
DASC 2006: 211-218 |
| 2005 |
| 12 | EE | Hongyun Xu,
Xinwen Fu,
Ye Zhu,
Riccardo Bettati,
Jianer Chen,
Wei Zhao:
SAS: A Scalar Anonymous Communication System.
ICCNMC 2005: 452-461 |
| 11 | EE | Xinwen Fu,
Ye Zhu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks.
ICDCS 2005: 493-503 |
| 10 | EE | Bryan Graham,
Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
ICPADS (1) 2005: 57-63 |
| 9 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
NCA 2005: 215-218 |
| 2004 |
| 8 | EE | Xinwen Fu,
Bryan Graham,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Information Hiding 2004: 266-281 |
| 7 | EE | Ye Zhu,
Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks.
Privacy Enhancing Technologies 2004: 207-225 |
| 6 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
A quantitative analysis of anonymous communications.
IEEE Transactions on Reliability 53(1): 103-115 (2004) |
| 2003 |
| 5 | | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Countermeasures to Traffic Analysis Attacks.
IAW 2003: 188-195 |
| 4 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
ICDCS 2003: 340- |
| 3 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao,
Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
ICPP 2003: 483-492 |
| 2002 |
| 2 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols.
ICDCS 2002: 257- |
| 2001 |
| 1 | | Yong Guan,
Xinwen Fu,
Dong Xuan,
P. U. Shenoy,
Riccardo Bettati,
Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001) |