2008 | ||
---|---|---|
21 | EE | Chenxi Wang, Xiaobo Wang, Guohong Wang: A Target Recognition Method of Multi-radar. FSKD (1) 2008: 162-166 |
20 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: Self-optimizing distributed trees. IPDPS 2008: 1-12 |
19 | EE | Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jure Leskovec, Christos Faloutsos: Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 | ||
18 | EE | Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang: SWorD - A Simple Worm Detection Scheme. OTM Conferences (2) 2007: 1752-1769 |
2006 | ||
17 | EE | Ahren Studer, Chenxi Wang: Adaptive Detection of Local Scanners. ACNS 2006: 1-17 |
16 | EE | Ginger Perng, Michael K. Reiter, Chenxi Wang: M2: Multicasting Mixes for Efficient and Anonymous Communication. ICDCS 2006: 59 |
2005 | ||
15 | EE | Ginger Perng, Michael K. Reiter, Chenxi Wang: Censorship Resistance Revisited. Information Hiding 2005: 62-76 |
14 | EE | Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang: Empirical Analysis of Rate Limiting Mechanisms. RAID 2005: 22-42 |
13 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: Distributed Construction of a Fault-Tolerant Network from a Tree. SRDS 2005: 155-165 |
12 | EE | Philip Koopman, Howie Choset, Rajeev Gandhi, Bruce H. Krogh, Diana Marculescu, Priya Narasimhan, JoAnn M. Paul, Ragunathan Rajkumar, Daniel P. Siewiorek, Asim Smailagic, Peter Steenkiste, Donald E. Thomas, Chenxi Wang: Undergraduate embedded system education at Carnegie Mellon. ACM Trans. Embedded Comput. Syst. 4(3): 500-528 (2005) |
2004 | ||
11 | EE | Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger: Dynamic Quarantine of Internet Worms. DSN 2004: 73-82 |
10 | EE | Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright: Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 |
9 | EE | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang: A study of mass-mailing worms. WORM 2004: 1-10 |
2003 | ||
8 | EE | Yang Wang, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos: Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. SRDS 2003: 25-34 |
7 | EE | Michael K. Reiter, Asad Samar, Chenxi Wang: The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003: 339-348 |
6 | EE | Yang Wang, Chenxi Wang: Modeling the effects of timing parameters on virus propagation. WORM 2003: 61-66 |
2002 | ||
5 | EE | Theodore M. Wong, Chenxi Wang, Jeannette M. Wing: Verifiable Secret Redistribution for Archive System. IEEE Security in Storage Workshop 2002: 94-106 |
2001 | ||
4 | EE | Chenxi Wang, Jonathan Hill, John C. Knight, Jack W. Davidson: Protection of Software-Based Survivability Mechanisms. DSN 2001: 193-202 |
2000 | ||
3 | EE | Chenxi Wang, John C. Knight, Matthew C. Elder: On Computer Viral Infection and the Effect of Immunization. ACSAC 2000: 246-256 |
1999 | ||
2 | EE | Chenxi Wang, William A. Wulf: Towards a Scalable PKI for Electronic Commerce Systems. WECWIS 1999: 132-136 |
1 | EE | Steve J. Chapin, Chenxi Wang, William A. Wulf, Frederick Knabe, Andrew S. Grimshaw: A new model of security for metasystems. Future Generation Comp. Syst. 15(5-6): 713-722 (1999) |