Xinwen Fu
Title
Cited by
Cited by
Year
DSSS-based flow marking technique for invisible traceback
W Yu, X Fu, S Graham, D Xuan, W Zhao
2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007
2102007
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
International Workshop on Privacy Enhancing Technologies, 207-225, 2004
2052004
Barrier coverage with sensors of limited mobility
A Saipulla, B Liu, G Xing, X Fu, J Wang
Proceedings of the eleventh ACM international symposium on Mobile ad hoc …, 2010
1442010
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
1432011
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
1172001
Cap: A context-aware privacy protection system for location-based services
A Pingley, W Yu, N Zhang, X Fu, W Zhao
2009 29th IEEE International Conference on Distributed Computing Systems, 49-57, 2009
1132009
A new cell counter based attack against tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1052009
SBVLC: Secure barcode-based visible light communication for smartphones
B Zhang, K Ren, G Xing, X Fu, C Wang
IEEE Transactions on Mobile Computing 15 (2), 432-446, 2015
1022015
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
X Yang, J Lin, W Yu, PM Moulema, X Fu, W Zhao
IEEE Transactions on Computers 64 (1), 4-18, 2013
1022013
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
922002
Security vulnerabilities of internet of things: A case study of the smart plug system
Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu
IEEE Internet of Things Journal 4 (6), 1899-1909, 2017
902017
A survey on big data market: Pricing, trading and protection
F Liang, W Yu, D An, Q Yang, X Fu, W Zhao
IEEE Access 6, 15132-15154, 2018
872018
A new replay attack against anonymous communication networks
R Pries, W Yu, X Fu, W Zhao
2008 IEEE International Conference on Communications, 1578-1582, 2008
822008
On flow marking attacks in wireless anonymous communication networks
X Fu, Y Zhu, B Graham, R Bettati, W Zhao
Journal of Ubiquitous Computing and Intelligence 1 (1), 42-53, 2007
822007
Fingerprint attack against touch-enabled devices
Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu
Proceedings of the second ACM workshop on Security and privacy in …, 2012
782012
Detecting worms via mining dynamic program execution
X Wang, W Yu, A Champion, X Fu, D Xuan
2007 Third International Conference on Security and Privacy in …, 2007
722007
A real-time en-route route guidance decision scheme for transportation-based cyberphysical systems
J Lin, W Yu, X Yang, Q Yang, X Fu, W Zhao
IEEE Transactions on Vehicular Technology 66 (3), 2551-2566, 2016
672016
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
L Wu, X Du, X Fu
IEEE Communications Magazine 52 (3), 80-87, 2014
652014
Blind recognition of touched keys on mobile devices
Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
622014
Correlation-based traffic analysis attacks on anonymity networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
IEEE Transactions on Parallel and Distributed Systems 21 (7), 954-967, 2009
592009
The system can't perform the operation now. Try again later.
Articles 1–20