dblp.uni-trier.dewww.uni-trier.de

Xinwen Fu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22EEWei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao: On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365
21EERyan Pries, Wei Yu, Xinwen Fu, Wei Zhao: A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582
20EENan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das: Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508
19EEXun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao: iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938
18EERyan Pries, Wei Yu, Steve Graham, Xinwen Fu: On performance bottleneck of anonymous communication networks. IPDPS 2008: 1-11
17EESteve Graham, Xinwen Fu, Bin Lu: Network Security Fundamentals. Wiley Encyclopedia of Computer Science and Engineering 2008
16EEJangwon Lee, Wei Yu, Xinwen Fu: Energy-efficient target detection in sensor networks using line proxies. Int. J. Communication Systems 21(3): 251-275 (2008)
2007
15EEWei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao: DSSS-Based Flow Marking Technique for Invisible Traceback. IEEE Symposium on Security and Privacy 2007: 18-32
14EEYe Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao: Analysis of flow-correlation attacks in anonymity network. IJSN 2(1/2): 137-153 (2007)
2006
13EEXinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham: On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218
2005
12EEHongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao: SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461
11EEXinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503
10EEBryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati: Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. ICPADS (1) 2005: 57-63
9EEYe Zhu, Xinwen Fu, Riccardo Bettati: On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. NCA 2005: 215-218
2004
8EEXinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao: Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281
7EEYe Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225
6EEYong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao: A quantitative analysis of anonymous communications. IEEE Transactions on Reliability 53(1): 103-115 (2004)
2003
5 Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195
4EEXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. ICDCS 2003: 340-
3EEXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan: Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492
2002
2EEYong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao: An Optimal Strategy for Anonymous Communication Protocols. ICDCS 2002: 257-
2001
1 Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao: NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001)

Coauthor Index

1Riccardo Bettati [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [14] [22]
2Jianer Chen [12]
3Dan Cheng [13]
4Sajal K. Das [20]
5Bryan Graham [3] [4] [5] [7] [8] [10] [11]
6Steve Graham [13] [15] [17] [18]
7Yong Guan [1] [2] [6]
8Jangwon Lee [16]
9Bin Lu [17]
10Ryan Pries [18] [21]
11P. U. Shenoy [1]
12Kevin Streff [13]
13Xuejun Tan [13]
14Xun Wang [19]
15Hongyun Xu [12]
16Dong Xuan [1] [3] [8] [15] [19]
17Wei Yu [13] [15] [16] [18] [19] [20] [21] [22]
18Nan Zhang [20] [22]
19Wei Zhao [1] [2] [3] [4] [5] [6] [7] [8] [11] [12] [14] [15] [19] [21] [22]
20Ye Zhu [7] [9] [10] [11] [12] [14]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)