Fengyuan Xu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j9]Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Computers & Security 73: 425-438 (2018) - [j8]Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Information Forensics and Security 13(5): 1155-1168 (2018) - [c18]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. ACM Conference on Computer and Communications Security 2018: 1324-1337 - [c17]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c16]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [c15]
- [c14]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX Annual Technical Conference 2018: 113-126 - [i2]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i1]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - 2017
- [j7]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu Chiang Tan, Qun Li, Guihai Chen:
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Trans. Mob. Comput. 16(7): 2065-2078 (2017) - 2016
- [c13]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. ACM Conference on Computer and Communications Security 2016: 504-516 - 2015
- [j6]Yifan Zhang, Chiu Chiang Tan, Fengyuan Xu, Hao Han, Qun Li:
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. IEEE Trans. Vehicular Technology 64(1): 378-385 (2015) - 2014
- [j5]Tan Yan, Liudmila Ulanova, Ye Ouyang, Fengyuan Xu:
Data Mining in Time Series: Current Study and Future Trend. JCS 10(12): 2358-2359 (2014) - [j4]Hao Han, Fengyuan Xu, Chiu Chiang Tan, Yifan Zhang, Qun Li:
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet. IEEE Trans. Vehicular Technology 63(8): 3927-3934 (2014) - 2013
- [j3]Fengyuan Xu, Xiaojun Zhu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distrib. Syst. 24(12): 2482-2491 (2013) - [j2]Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li:
SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Trans. Parallel Distrib. Syst. 24(12): 2492-2502 (2013) - [c12]Wei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li:
Fast Mencius: Mencius with low commit latency. INFOCOM 2013: 881-889 - [c11]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu Chiang Tan, Qun Li, Guihai Chen:
Extracting secret key from wireless link dynamics in vehicular environments. INFOCOM 2013: 2283-2291 - [c10]Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, Qun Li:
Optimizing background email sync on smartphones. MobiSys 2013: 55-68 - [c9]Fengyuan Xu, Yunxin Liu, Qun Li, Yongguang Zhang:
V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. NSDI 2013: 43-55 - 2012
- [c8]Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li:
SybilDefender: Defend against sybil attacks in large social networks. INFOCOM 2012: 1951-1959 - [c7]Wei Wei, Fengyuan Xu, Qun Li:
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. INFOCOM 2012: 2616-2620 - 2011
- [c6]Hao Han, Fengyuan Xu, Chiu Chiang Tan, Yifan Zhang, Qun Li:
Defending against vehicular rogue APs. INFOCOM 2011: 1665-1673 - [c5]Fengyuan Xu, Zhengrui Qin, Chiu Chiang Tan, Baosheng Wang, Qun Li:
IMDGuard: Securing implantable medical devices with the external wearable guardian. INFOCOM 2011: 1862-1870 - 2010
- [j1]Harry Gao, Seth Utecht, Gregory Patrick, George Hsieh, Fengyuan Xu, Haodong Wang, Qun Li:
High Speed Data Routing in Vehicular Sensor Networks. JCM 5(3): 181-188 (2010) - [c4]Fengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369
2000 – 2009
- 2009
- [c3]Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang, Qun Li:
Experimental Study on Secure Data Collection in Vehicular Sensor Networks. WASA 2009: 22-31 - 2007
- [c2]Fengyuan Xu, Zhiyi Fang:
Individuation Learning Components in Intelligent Education Games. ITNG 2007: 955-956 - [c1]Fengyuan Xu, Zhiyi Fang, Xiao Han:
Gippy: Campus GIS Information System Supported by P2P. SAINT Workshops 2007: 63
Coauthor Index
last updated on 2018-12-25 18:41 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint