2009 |
45 | EE | Zhimin Yang,
Adam C. Champion,
Boxuan Gu,
Xiaole Bai,
Dong Xuan:
Link-layer protection in 802.11i WLANS with dummy authentication.
WISEC 2009: 131-138 |
44 | EE | Nan Xu,
Fan Zhang,
Yisha Luo,
Weijia Jia,
Dong Xuan,
Jin Teng:
Stealthy video capturer: a new video-based spyware in 3G smartphones.
WISEC 2009: 69-78 |
43 | EE | Xun Wang,
Wenjun Gu,
Kurt Schosek,
Sriram Chellappan,
Dong Xuan:
Sensor network configuration under physical attacks.
IJAHUC 4(3/4): 174-182 (2009) |
2008 |
42 | EE | Wenjun Gu,
Zhimin Yang,
Can Que,
Dong Xuan,
Weijia Jia:
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs.
ICDCS 2008: 28-35 |
41 | EE | Xun Wang,
Wei Yu,
Xinwen Fu,
Dong Xuan,
Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
INFOCOM 2008: 1930-1938 |
40 | EE | Xiaole Bai,
Ziqiu Yun,
Dong Xuan,
Ten-Hwang Lai,
Weijia Jia:
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks.
INFOCOM 2008: 296-300 |
39 | EE | Xiaole Bai,
Dong Xuan,
Ziqiu Yun,
Ten-Hwang Lai,
Weijia Jia:
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks.
MobiHoc 2008: 401-410 |
38 | EE | Ai Chen,
Ten-Hwang Lai,
Dong Xuan:
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks.
MobiHoc 2008: 421-430 |
37 | EE | Wei Yu,
Sriram Chellappan,
Xun Wang,
Dong Xuan:
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Computer Communications 31(17): 4005-4017 (2008) |
2007 |
36 | EE | Wei Yu,
Xinwen Fu,
Steve Graham,
Dong Xuan,
Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback.
IEEE Symposium on Security and Privacy 2007: 18-32 |
35 | EE | Zhimin Yang,
Eylem Ekici,
Dong Xuan:
A Localization-Based Anti-Sensor Network System.
INFOCOM 2007: 2396-2400 |
34 | EE | Sriram Chellappan,
Wenjun Gu,
Xiaole Bai,
Dong Xuan,
Bin Ma,
Kaizhong Zhang:
Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput. 6(10): 1142-1157 (2007) |
33 | EE | Wenjun Gu,
Xiaole Bai,
Sriram Chellappan,
Dong Xuan,
Weijia Jia:
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst. 18(12): 1784-1796 (2007) |
32 | EE | Sriram Chellappan,
Xiaole Bai,
Bin Ma,
Dong Xuan,
Changqing Xu:
Mobility Limited Flip-Based Sensor Networks Deployment.
IEEE Trans. Parallel Distrib. Syst. 18(2): 199-211 (2007) |
2006 |
31 | EE | Wei Yu,
Xun Wang,
Prasad Calyam,
Dong Xuan,
Wei Zhao:
On Detecting Camouflaging Worm.
ACSAC 2006: 235-244 |
30 | EE | Li Xiao,
Xiaomei Liu,
Wenjun Gu,
Dong Xuan,
Yunhao Liu:
A design of overlay anonymous multicast protocol.
IPDPS 2006 |
29 | EE | Xiaole Bai,
Santosh Kumar,
Dong Xuan,
Ziqiu Yun,
Ten-Hwang Lai:
Deploying wireless sensors to achieve both coverage and connectivity.
MobiHoc 2006: 131-142 |
28 | EE | Wei Yu,
Thang Nam Le,
Jangwon Lee,
Dong Xuan:
Effective query aggregation for data services in sensor networks.
Computer Communications 29(18): 3733-3744 (2006) |
27 | EE | Shengquan Wang,
Zhibin Mai,
Dong Xuan,
Wei Zhao:
Design and Implementation of QoS-Provisioning System for Voice over IP.
IEEE Trans. Parallel Distrib. Syst. 17(3): 276-288 (2006) |
26 | EE | Xun Wang,
Sriram Chellappan,
Phillip Boyer,
Dong Xuan:
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks.
IEEE Trans. Parallel Distrib. Syst. 17(7): 619-632 (2006) |
25 | EE | Wei Yu,
Sriram Chellappan,
Dong Xuan,
Wei Zhao:
Distributed policy processing in active-service based infrastructures.
Int. J. Communication Systems 19(7): 727-750 (2006) |
24 | EE | Li Xiao,
Yunhao Liu,
Wenjun Gu,
Dong Xuan,
Xiaomei Liu:
Mutual anonymous overlay multicast.
J. Parallel Distrib. Comput. 66(9): 1205-1216 (2006) |
2005 |
23 | EE | Xun Wang,
Wenjun Gu,
Kurt Schosek,
Sriram Chellappan,
Dong Xuan:
Sensor Network Configuration Under Physical Attacks.
ICCNMC 2005: 23-32 |
22 | EE | Wei Yu,
Sriram Chellappan,
Dong Xuan:
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Generation Comp. Syst. 21(1): 209-219 (2005) |
21 | EE | Shengquan Wang,
Dong Xuan,
Wei Zhao:
Analyzing and enhancing the resilience of structured peer-to-peer systems.
J. Parallel Distrib. Comput. 65(2): 207-219 (2005) |
2004 |
20 | EE | Dong Xuan,
Sriram Chellappan,
Xun Wang,
Shengquan Wang:
Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks.
ICDCS 2004: 408-417 |
19 | EE | Xinwen Fu,
Bryan Graham,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Information Hiding 2004: 266-281 |
18 | EE | Weijia Jia,
Dong Xuan,
Wanqing Tu,
Lidong Lin,
Wei Zhao:
Distributed Admission Control for Anycast Flows.
IEEE Trans. Parallel Distrib. Syst. 15(8): 673-686 (2004) |
17 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw. 12(2): 326-339 (2004) |
2003 |
16 | | Wei Yu,
Dong Xuan,
Sandeep K. Reddy,
Riccardo Bettati,
Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
IAW 2003: 84-91 |
15 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao,
Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
ICPP 2003: 483-492 |
14 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
A Study of Providing Statistical QoS in a Differentiated Sevices Network.
NCA 2003: 297-304 |
13 | | Byung-Kyu Choi,
Dong Xuan,
Riccardo Bettati,
Wei Zhao,
Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication.
Real-Time Systems 24(2): 171-202 (2003) |
2002 |
12 | EE | Shengquan Wang,
Zhibin Mai,
Walt Magnussen,
Dong Xuan,
Wei Zhao:
Implementation of QoS-Provisioning System for Voice over IP.
IEEE Real Time Technology and Applications Symposium 2002: 266-275 |
2001 |
11 | EE | Dong Xuan,
Weijia Jia:
Distributed Admission Control for Anycast Flows with QoS Requirements.
ICDCS 2001: 292-300 |
10 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
IEEE Real Time Technology and Applications Symposium 2001: 127-129 |
9 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
IEEE Real-Time Systems Symposium 2001: 289-298 |
8 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
INFOCOM 2001: 669-678 |
7 | | Yong Guan,
Xinwen Fu,
Dong Xuan,
P. U. Shenoy,
Riccardo Bettati,
Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001) |
2000 |
6 | EE | Byung-Kyu Choi,
Dong Xuan,
Chengzhi Li,
Riccardo Bettati,
Wei Zhao:
Scalable QoS Guaranteed Communication Services for Real-Time Applications.
ICDCS 2000: 180-187 |
5 | EE | Dong Xuan,
Chengzhi Li,
Riccardo Bettati,
Jianer Chen,
Wei Zhao:
Utilization-Based Admission Control for Real-Time Applications.
ICPP 2000: 251- |
4 | EE | Dong Xuan,
Weijia Jia,
Wei Zhao,
Hongwen Zhu:
A Routing Protocol for Anycast Messages.
IEEE Trans. Parallel Distrib. Syst. 11(6): 571-588 (2000) |
1999 |
3 | EE | Weijia Jia,
Gaochao Xu,
Dong Xuan,
Wei Zhao:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
ICPP 1999: 508-515 |
2 | EE | Weijia Jia,
Wei Zhao,
Dong Xuan,
Gaochao Xu:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
IEEE Trans. Parallel Distrib. Syst. 10(10): 984-1000 (1999) |
1998 |
1 | EE | Dong Xuan,
Weijia Jia,
Wei Zhao:
Routing Algorithms for Anycast Messages.
ICPP 1998: 122- |