2008 |
21 | EE | Chenxi Wang,
Xiaobo Wang,
Guohong Wang:
A Target Recognition Method of Multi-radar.
FSKD (1) 2008: 162-166 |
20 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
Self-optimizing distributed trees.
IPDPS 2008: 1-12 |
19 | EE | Deepayan Chakrabarti,
Yang Wang,
Chenxi Wang,
Jure Leskovec,
Christos Faloutsos:
Epidemic thresholds in real networks.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 |
18 | EE | Matthew Dunlop,
Carrie Gates,
Cynthia Wong,
Chenxi Wang:
SWorD - A Simple Worm Detection Scheme.
OTM Conferences (2) 2007: 1752-1769 |
2006 |
17 | EE | Ahren Studer,
Chenxi Wang:
Adaptive Detection of Local Scanners.
ACNS 2006: 1-17 |
16 | EE | Ginger Perng,
Michael K. Reiter,
Chenxi Wang:
M2: Multicasting Mixes for Efficient and Anonymous Communication.
ICDCS 2006: 59 |
2005 |
15 | EE | Ginger Perng,
Michael K. Reiter,
Chenxi Wang:
Censorship Resistance Revisited.
Information Hiding 2005: 62-76 |
14 | EE | Cynthia Wong,
Stan Bielski,
Ahren Studer,
Chenxi Wang:
Empirical Analysis of Rate Limiting Mechanisms.
RAID 2005: 22-42 |
13 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
Distributed Construction of a Fault-Tolerant Network from a Tree.
SRDS 2005: 155-165 |
12 | EE | Philip Koopman,
Howie Choset,
Rajeev Gandhi,
Bruce H. Krogh,
Diana Marculescu,
Priya Narasimhan,
JoAnn M. Paul,
Ragunathan Rajkumar,
Daniel P. Siewiorek,
Asim Smailagic,
Peter Steenkiste,
Donald E. Thomas,
Chenxi Wang:
Undergraduate embedded system education at Carnegie Mellon.
ACM Trans. Embedded Comput. Syst. 4(3): 500-528 (2005) |
2004 |
11 | EE | Cynthia Wong,
Chenxi Wang,
Dawn Xiaodong Song,
Stan Bielski,
Gregory R. Ganger:
Dynamic Quarantine of Internet Worms.
DSN 2004: 73-82 |
10 | EE | Brian Neil Levine,
Michael K. Reiter,
Chenxi Wang,
Matthew Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Financial Cryptography 2004: 251-265 |
9 | EE | Cynthia Wong,
Stan Bielski,
Jonathan M. McCune,
Chenxi Wang:
A study of mass-mailing worms.
WORM 2004: 1-10 |
2003 |
8 | EE | Yang Wang,
Deepayan Chakrabarti,
Chenxi Wang,
Christos Faloutsos:
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint.
SRDS 2003: 25-34 |
7 | EE | Michael K. Reiter,
Asad Samar,
Chenxi Wang:
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure.
SRDS 2003: 339-348 |
6 | EE | Yang Wang,
Chenxi Wang:
Modeling the effects of timing parameters on virus propagation.
WORM 2003: 61-66 |
2002 |
5 | EE | Theodore M. Wong,
Chenxi Wang,
Jeannette M. Wing:
Verifiable Secret Redistribution for Archive System.
IEEE Security in Storage Workshop 2002: 94-106 |
2001 |
4 | EE | Chenxi Wang,
Jonathan Hill,
John C. Knight,
Jack W. Davidson:
Protection of Software-Based Survivability Mechanisms.
DSN 2001: 193-202 |
2000 |
3 | EE | Chenxi Wang,
John C. Knight,
Matthew C. Elder:
On Computer Viral Infection and the Effect of Immunization.
ACSAC 2000: 246-256 |
1999 |
2 | EE | Chenxi Wang,
William A. Wulf:
Towards a Scalable PKI for Electronic Commerce Systems.
WECWIS 1999: 132-136 |
1 | EE | Steve J. Chapin,
Chenxi Wang,
William A. Wulf,
Frederick Knabe,
Andrew S. Grimshaw:
A new model of security for metasystems.
Future Generation Comp. Syst. 15(5-6): 713-722 (1999) |