


default search action
Dong Xuan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c96]Haochen Wang
, Zhiwei Shi
, Yafei Qiao
, Fan Yang
, Yuzhe He
, Dong Xuan
, Wei Zhao
:
Autonomous and Cost-effective Defect Detection System for Molded Pulp Products. ICCPS 2023: 1-11 - 2022
- [c95]Fan Yang, Zhiwei Shi, Sixian Ye, Jiazhong Qian, Wenjie Wang, Dong Xuan:
VaRSM: Versatile Autonomous Racquet Sports Machine. ICCPS 2022: 203-214 - 2021
- [c94]Jihyung Kil, Cheng Zhang, Dong Xuan, Wei-Lun Chao:
Discovering the Unknown Knowns: Turning Implicit Knowledge in the Dataset into Explicit Training Examples for Visual Question Answering. EMNLP (1) 2021: 6346-6361 - [c93]Cheng Zhang, Tai-Yu Pan, Yandong Li, Hexiang Hu
, Dong Xuan, Soravit Changpinyo, Boqing Gong, Wei-Lun Chao:
MosaicOS: A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection. ICCV 2021: 407-417 - [c92]Tai-Yu Pan, Cheng Zhang, Yandong Li, Hexiang Hu, Dong Xuan, Soravit Changpinyo, Boqing Gong, Wei-Lun Chao:
On Model Calibration for Long-Tailed Object Detection and Instance Segmentation. NeurIPS 2021: 2529-2542 - [i7]Cheng Zhang, Tai-Yu Pan, Yandong Li, Hexiang Hu, Dong Xuan, Soravit Changpinyo, Boqing Gong, Wei-Lun Chao:
A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection. CoRR abs/2102.08884 (2021) - [i6]Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff:
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic. CoRR abs/2102.11171 (2021) - [i5]Tai-Yu Pan, Cheng Zhang, Yandong Li, Hexiang Hu, Dong Xuan, Soravit Changpinyo, Boqing Gong, Wei-Lun Chao:
On Model Calibration for Long-Tailed Object Detection and Instance Segmentation. CoRR abs/2107.02170 (2021) - [i4]Jihyung Kil, Cheng Zhang, Dong Xuan, Wei-Lun Chao:
Discovering the Unknown Knowns: Turning Implicit Knowledge in the Dataset into Explicit Training Examples for Visual Question Answering. CoRR abs/2109.06122 (2021) - 2020
- [c91]Wang Wei, Dong Xuan, Gao Wenlin:
Research on Design Method of Mechanism Dimensional Parameters for Double Parallelogram Palletizing Robot Based on Task Space. CACRE 2020: 152-157 - [c90]Qingchuan Zhao
, Haohuang Wen
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps. SecureComm (1) 2020: 49-60 - [c89]Haohuang Wen
, Qingchuan Zhao
, Zhiqiang Lin, Dong Xuan, Ness B. Shroff:
A Study of the Privacy of COVID-19 Contact Tracing Apps. SecureComm (1) 2020: 297-317 - [i3]Yuxiang Luo, Cheng Zhang, Yunqi Zhang
, Chaoshun Zuo, Dong Xuan, Zhiqiang Lin, Adam C. Champion, Ness B. Shroff:
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing. CoRR abs/2006.13362 (2020)
2010 – 2019
- 2019
- [c88]Cheng Zhang, Wei-Lun Chao, Dong Xuan:
An Empirical Study on Leveraging Scene Graphs for Visual Question Answering. BMVC 2019: 288 - [i2]Cheng Zhang, Wei-Lun Chao, Dong Xuan:
An Empirical Study on Leveraging Scene Graphs for Visual Question Answering. CoRR abs/1907.12133 (2019) - 2018
- [c87]Cheng Zhang, Fan Yang, Gang Li, Qiang Zhai, Yi Jiang, Dong Xuan:
MV-Sports: A Motion and Vision Sensor Integration-Based Sports Analysis System. INFOCOM 2018: 1070-1078 - 2017
- [j50]Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zhai, Adam C. Champion, Junda Zhu, Dong Xuan, Yuan F. Zheng:
SurvSurf: human retrieval on large surveillance video data. Multim. Tools Appl. 76(5): 6521-6549 (2017) - [j49]Gang Li, Xinfeng Li, Fan Yang, Jin Teng, Sihao Ding, Yuan F. Zheng, Dong Xuan, Biao Chen, Wei Zhao
:
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data. IEEE Trans. Parallel Distributed Syst. 28(9): 2703-2717 (2017) - [c86]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao
:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698 - [c85]Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao
:
On human mobility predictability via WLAN logs. INFOCOM 2017: 1-9 - [c84]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Jingchuan Wang, Dong Xuan, Wei Zhao
:
BridgeLoc: Bridging Vision-Based Localization for Robots. MASS 2017: 362-370 - 2016
- [j48]Sihao Ding, Qiang Zhai, Ying Li, Junda Zhu, Yuan F. Zheng, Dong Xuan:
Simultaneous body part and motion identification for human-following robots. Pattern Recognit. 50: 118-130 (2016) - [j47]Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu
, Dong Xuan:
A mobile phone-based physical-social location proof system for mobile social network service. Secur. Commun. Networks 9(13): 1890-1904 (2016) - [c83]Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen:
Traffic at-a-glance: Time-bounded analytics on large visual traffic data. INFOCOM 2016: 1-9 - [c82]Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan:
Flash-Loc: Flashing mobile phones for accurate indoor localization. INFOCOM 2016: 1-9 - [c81]Ankita Sikdar, Yuan F. Zheng, Dong Xuan:
Robust object tracking in the X-Z domain. MFI 2016: 499-504 - [c80]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Junda Zhu, Dong Xuan, Biao Chen, Yuan F. Zheng, Wei Zhao
:
S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments. MSN 2016: 301-305 - 2015
- [j46]Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng, Dong Xuan:
Sequential Sample Consensus: A Robust Algorithm for Video-Based Face Recognition. IEEE Trans. Circuits Syst. Video Technol. 25(10): 1586-1598 (2015) - [c79]Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan:
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. ICDCS 2015: 11-20 - [c78]Ying Li, Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan:
Human feet tracking guided by locomotion model. ICRA 2015: 2424-2429 - [c77]Zuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan:
Local face-view barrier coverage in camera sensor networks. INFOCOM 2015: 684-692 - [c76]Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
VM-tracking: Visual-motion sensing integration for real-time human tracking. INFOCOM 2015: 711-719 - [c75]Ankita Sikdar, Yuan F. Zheng, Dong Xuan:
An iterative clustering algorithm for classification of object motion direction using infrared sensor array. TePRA 2015: 1-6 - [e1]Qun Li, Dong Xuan:
Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata@MobiHoc 2015, Hangzhou, China, June 21, 2015. ACM 2015, ISBN 978-1-4503-3524-9 [contents] - [i1]Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan:
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. CoRR abs/1501.02484 (2015) - 2014
- [j45]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. IEEE Trans. Computers 63(6): 1422-1433 (2014) - [j44]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks. IEEE Trans. Mob. Comput. 13(2): 250-262 (2014) - [j43]Jin Teng, Boying Zhang, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization. IEEE/ACM Trans. Netw. 22(4): 1285-1296 (2014) - [j42]Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia
:
Connected Coverage in Wireless Networks with Directional Antennas. ACM Trans. Sens. Networks 10(3): 51:1-51:28 (2014) - [j41]Jin Teng, Boying Zhang, Xiaole Bai, Zhimin Yang, Dong Xuan:
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks. IEEE Trans. Parallel Distributed Syst. 25(11): 2909-2919 (2014) - [c74]Gang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng:
EV-sounding: A visual assisted electronic channel sounding system. INFOCOM 2014: 1483-1491 - 2013
- [j40]Weijia Jia
, Fung Po Tso
, Zhen Ling, Xinwen Fu
, Dong Xuan, Wei Yu
:
Blind detection of spread spectrum flow watermarks. Secur. Commun. Networks 6(3): 257-274 (2013) - [j39]Zhen Ling, Xinwen Fu
, Weijia Jia
, Wei Yu
, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. IEEE Trans. Computers 62(12): 2411-2426 (2013) - [j38]Fung Po Tso
, Lin Cui, Lizhuo Zhang, Weijia Jia
, Di Yao, Jin Teng, Dong Xuan:
DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains. IEEE Trans. Mob. Comput. 12(11): 2206-2218 (2013) - [j37]Adam C. Champion, Zhimin Yang, Boying Zhang, Jiangpeng Dai, Dong Xuan, Du Li:
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. IEEE Trans. Parallel Distributed Syst. 24(8): 1535-1545 (2013) - [c73]Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng, Dong Xuan:
Robust video-based face recognition by sequential sample consensus. AVSS 2013: 336-341 - [c72]Zhaoyang Zhang, Honggang Wang
, Xiaodong Lin, Hua Fang, Dong Xuan:
Effective epidemic control and source tracing through mobile social sensing over WBANs. INFOCOM 2013: 300-304 - [c71]Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
EV-Human: Human localization via visual estimation of body electronic interference. INFOCOM 2013: 500-504 - [c70]Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan:
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. INFOCOM 2013: 791-799 - [c69]Zuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan:
On wireless network coverage in bounded areas. INFOCOM 2013: 1195-1203 - [c68]Sihao Ding, Qiang Zhai, Yuan F. Zheng, Dong Xuan:
Side-view face authentication based on wavelet and random forest with subsets. ISI 2013: 76-81 - 2012
- [j36]Zhen Ling, Junzhou Luo, Wei Yu
, Xinwen Fu
, Dong Xuan, Weijia Jia
:
A New Cell-Counting-Based Attack Against Tor. IEEE/ACM Trans. Netw. 20(4): 1245-1261 (2012) - [j35]Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia
, Wei Zhao
:
Pattern mutation in wireless sensor deployment. IEEE/ACM Trans. Netw. 20(6): 1964-1977 (2012) - [j34]Fung Po Tso
, Jin Teng, Weijia Jia
, Dong Xuan:
Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks. IEEE Trans. Parallel Distributed Syst. 23(10): 1895-1907 (2012) - [c67]Zhaoyang Zhang, Ken C. K. Lee, Honggang Wang
, Dong Xuan, Hua Fang:
Epidemic Control Based on Fused Body Sensed and Social Network Information. ICDCS Workshops 2012: 285-290 - [c66]Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, Yuan F. Zheng:
E-V: Efficient visual surveillance with electronic footprints. INFOCOM 2012: 109-117 - [c65]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A service for controlling information dissemination in wireless networks. INFOCOM 2012: 298-306 - [c64]Boying Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: integrating electronic and visual signals for accurate localization. MobiHoc 2012: 25-34 - [c63]Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan:
JSGuard: Shellcode Detection in JavaScript. SecureComm 2012: 112-130 - [c62]Adam C. Champion, Xinfeng Li, Qiang Zhai, Jin Teng, Dong Xuan:
Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World. WASA 2012: 235-247 - 2011
- [j33]Changqing Xu, Xiaole Bai, Lei Ding, Jin Teng, Sriram Chellappan, Dong Xuan:
Directed Coverage in Wireless Sensor Networks: Concept and Quality. Ad Hoc Sens. Wirel. Networks 11(3-4): 173-197 (2011) - [j32]Wei Yu
, Xun Wang, Adam C. Champion, Dong Xuan, David Lee:
On detecting active worms with varying scan rate. Comput. Commun. 34(11): 1269-1282 (2011) - [j31]Wei Yu
, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
:
Modeling and Detection of Camouflaging Worm. IEEE Trans. Dependable Secur. Comput. 8(3): 377-390 (2011) - [j30]Lin Liao, Weifeng Chen, Chuanlin Zhang, Lizhuo Zhang, Dong Xuan, Weijia Jia
:
Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization. IEEE Trans. Veh. Technol. 60(5): 2239-2252 (2011) - [j29]Nan Xu, Weijia Jia
, Yisha Luo, Fan Zhang, Dong Xuan, Jin Teng:
An Opened Eye on you. IEEE Veh. Technol. Mag. 6(4): 49-59 (2011) - [c61]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. ICDCS 2011: 909-918 - [c60]Zhen Ling, Xinwen Fu
, Weijia Jia
, Wei Yu
, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. INFOCOM 2011: 186-190 - [c59]Fung Po Tso
, Lin Cui, Lizhuo Zhang, Weijia Jia
, Di Yao, Jin Teng, Dong Xuan:
DragonNet: A robust mobile Internet service system for long distance trains. INFOCOM 2011: 855-863 - [c58]Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia
:
Connected coverage in wireless networks with directional antennas. INFOCOM 2011: 2264-2272 - [c57]Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, Dong Xuan:
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution. PerCom 2011: 93-101 - 2010
- [j28]Thang Nam Le, Prasun Sinha, Dong Xuan:
Turning heterogeneity into an advantage in wireless ad-hoc network routing. Ad Hoc Networks 8(1): 108-118 (2010) - [j27]Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia
:
Constructing low-connectivity and full-coverage three dimensional sensor networks. IEEE J. Sel. Areas Commun. 28(7): 984-993 (2010) - [j26]Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen, Dong Xuan:
Mobile phone-based pervasive fall detection. Pers. Ubiquitous Comput. 14(7): 633-643 (2010) - [j25]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Toward statistical QoS guarantees in a differentiated services network. Telecommun. Syst. 43(3-4): 253-263 (2010) - [j24]Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia
:
Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(3): 435-448 (2010) - [j23]Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten-Hwang Lai, Weijia Jia
:
Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks. IEEE/ACM Trans. Netw. 18(3): 934-947 (2010) - [j22]Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia
, Can Que:
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs. IEEE Trans. Parallel Distributed Syst. 21(7): 897-910 (2010) - [c56]Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. Champion, Dong Xuan, Du Li:
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. ICDCS 2010: 468-477 - [c55]Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan:
Malicious Shellcode Detection with Virtual Memory Snapshots. INFOCOM 2010: 974-982 - [c54]Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia
, Wei Zhao
:
Pattern Mutation in Wireless Sensor Deployment. INFOCOM 2010: 2480-2488 - [c53]Fung Po Tso
, Jin Teng, Weijia Jia
, Dong Xuan:
Mobility: a double-edged sword for HSPA networks: a large-scale test on Hong Kong mobile HSPA networks. MobiHoc 2010: 81-90 - [c52]Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen, Dong Xuan:
PerFallD: A pervasive fall detection system using mobile phones. PerCom Workshops 2010: 292-297 - [c51]Jiangpeng Dai, Jin Teng, Xiaole Bai, Zhaohui Shen, Dong Xuan:
Mobile phone based drunk driving detection. PervasiveHealth 2010: 1-8
2000 – 2009
- 2009
- [j21]Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan:
Sensor network configuration under physical attacks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 174-182 (2009) - [j20]Ai Chen, Ten-Hwang Lai, Dong Xuan:
Measuring and guaranteeing quality of barrier coverage for general belts with wireless sensors. ACM Trans. Sens. Networks 6(1): 2:1-2:31 (2009) - [j19]Wei Yu
, Xun Wang, Xinwen Fu
, Dong Xuan, Wei Zhao
:
An Invisible Localization Attack to Internet Threat Monitors. IEEE Trans. Parallel Distributed Syst. 20(11): 1611-1625 (2009) - [c50]Zhen Ling, Junzhou Luo, Wei Yu
, Xinwen Fu
, Dong Xuan, Weijia Jia
:
A new cell counter based attack against tor. CCS 2009: 578-589 - [c49]Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
:
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks. INFOCOM 2009: 388-396 - [c48]Weijia Jia
, Fung Po Tso
, Zhen Ling, Xinwen Fu
, Dong Xuan, Wei Yu
:
Blind Detection of Spread Spectrum Flow Watermarks. INFOCOM 2009: 2195-2203 - [c47]Jin Teng, Changqing Xu, Weijia Jia
, Dong Xuan:
D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks. INFOCOM 2009: 2616-2620 - [c46]Xiaole Bai, Lei Ding, Jin Teng, Changqing Xu, Dong Xuan:
Directed Coverage in Wireless Sensor Networks: Concept and Quality. MASS 2009: 476-485 - [c45]Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, Dong Xuan:
DiffUser: Differentiated User Access Control on Smartphone. MASS 2009: 1012-1017 - [c44]Xiaole Bai, Chuanlin Zhang, Dong Xuan, Jin Teng, Weijia Jia
:
Low-connectivity and full-coverage three dimensional wireless sensor networks. MobiHoc 2009: 145-154 - [c43]Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia
, Dong Xuan, Jin Teng:
Stealthy video capturer: a new video-based spyware in 3G smartphones. WISEC 2009: 69-78 - [c42]Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan:
Link-layer protection in 802.11i WLANS with dummy authentication. WISEC 2009: 131-138 - 2008
- [j18]Wei Yu
, Sriram Chellappan, Xun Wang, Dong Xuan:
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Comput. Commun. 31(17): 4005-4017 (2008) - [c41]Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma:
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. ACSAC 2008: 433-442 - [c40]Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia Jia:
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. ICDCS 2008: 28-35 - [c39]Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. INFOCOM 2008: 296-300 - [c38]Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 - [c37]Xiaole Bai, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai, Weijia Jia:
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. MobiHoc 2008: 401-410 - [c36]Ai Chen, Ten-Hwang Lai, Dong Xuan:
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. MobiHoc 2008: 421-430 - 2007
- [j17]Sriram Chellappan, Wenjun Gu, Xiaole Bai, Dong Xuan, Bin Ma, Kaizhong Zhang:
Deploying Wireless Sensor Networks under Limited Mobility Constraints. IEEE Trans. Mob. Comput. 6(10): 1142-1157 (2007) - [j16]Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan, Changqing Xu:
Mobility Limited Flip-Based Sensor Networks Deployment. IEEE Trans. Parallel Distributed Syst. 18(2): 199-211 (2007) - [j15]Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan, Weijia Jia:
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(12): 1784-1796 (2007) - [c35]Zhimin Yang, Eylem Ekici
, Dong Xuan:
A Localization-Based Anti-Sensor Network System. INFOCOM 2007: 2396-2400 - [c34]Xun Wang, Wei Yu
, Adam C. Champion, Xinwen Fu
, Dong Xuan:
Detecting worms via mining dynamic program execution. SecureComm 2007: 412-421 - [c33]Wei Yu
, Xinwen Fu
, Steve Graham, Dong Xuan, Wei Zhao
:
DSSS-Based Flow Marking Technique for Invisible Traceback. S&P 2007: 18-32 - 2006
- [j14]Wei Yu
, Thang Nam Le, Jangwon Lee, Dong Xuan:
Effective query aggregation for data services in sensor networks. Comput. Commun. 29(18): 3733-3744 (2006) - [j13]Wei Yu
, Sriram Chellappan, Dong Xuan, Wei Zhao
:
Distributed policy processing in active-service based infrastructures. Int. J. Commun. Syst. 19(7): 727-750 (2006) - [j12]Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei Liu:
Mutual anonymous overlay multicast. J. Parallel Distributed Comput. 66(9): 1205-1216 (2006) - [j11]Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao
:
Design and Implementation of QoS-Provisioning System for Voice over IP. IEEE Trans. Parallel Distributed Syst. 17(3): 276-288 (2006) - [j10]Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan:
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. IEEE Trans. Parallel Distributed Syst. 17(7): 619-632 (2006) - [c32]Wei Yu
, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
:
On Detecting Camouflaging Worm. ACSAC 2006: 235-244 - [c31]Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu:
A design of overlay anonymous multicast protocol. IPDPS 2006 - [c30]Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan:
Network Decoupling for Secure Communications in Wireless Sensor Networks. IWQoS 2006: 189-198 - [c29]Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai:
Deploying wireless sensors to achieve both coverage and connectivity. MobiHoc 2006: 131-142 - [c28]Wei Yu
, Xun Wang, Dong Xuan, David Lee:
Effective Detection of Active Worms with Varying Scan Rate. SecureComm 2006: 1-10 - [c27]Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu, Dong Xuan:
Policy-driven physical attacks in sensor networks: modeling and measurement. WCNC 2006: 671-678 - [c26]Thang Nam Le, Wei Yu, Xiaole Bai, Dong Xuan:
A dynamic geographic hash table for data-centric storage in sensor networks. WCNC 2006: 2168-2174 - 2005
- [j9]Wei Yu
, Sriram Chellappan, Dong Xuan:
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener. Comput. Syst. 21(1): 209-219 (2005) - [j8]Shengquan Wang, Dong Xuan, Wei Zhao
:
Analyzing and enhancing the resilience of structured peer-to-peer systems. J. Parallel Distributed Comput. 65(2): 207-219 (2005) - [c25]Thang Nam Le, Dong Xuan, Wei Yu
:
An adaptive zone-based storage architecture for wireless sensor networks. GLOBECOM 2005: 5 - [c24]Wei Yu
, Sriram Chellappan, Xun Wang, Dong Xuan:
On defending peer-to-peer system-based active worm attacks. GLOBECOM 2005: 5 - [c23]Wei Yu, Corey Boyer, Sriram Chellappan, Dong Xuan:
Peer-to-peer system-based active worm attacks: modeling and analysis. ICC 2005: 295-300 - [c22]Xun Wang, Wenjun Gu, Sriram Chellappan, Kurt Schosek, Dong Xuan:
Lifetime optimization of sensor networks under physical attacks. ICC 2005: 3295-3301 - [c21]Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu
, Dong Xuan:
Search-based physical attacks in sensor networks. ICCCN 2005: 489-496 - [c20]Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan:
Sensor Network Configuration Under Physical Attacks. ICCNMC 2005: 23-32 - [c19]Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan:
Sensor networks deployment using flip-based sensors. MASS 2005 - [c18]Wenjun Gu, Xun Wang, Sriram Chellappan, Dong Xuan, Ten-Hwang Lai:
Defending against search-based physical attacks in sensor networks. MASS 2005 - [p1]Dong Xuan, Sriram Chellappan, Xun Wang:
Resilience of Structured Peer-to-Peer Systems. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks 2005: 767786- - 2004
- [j7]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Providing absolute differentiated services for real-time applications in static-priority scheduling networks. IEEE/ACM Trans. Netw. 12(2): 326-339 (2004) - [j6]Weijia Jia, Dong Xuan, Wanqing Tu
, Lidong Lin, Wei Zhao
:
Distributed Admission Control for Anycast Flows. IEEE Trans. Parallel Distributed Syst. 15(8): 673-686 (2004) - [c17]Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang:
Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. ICDCS 2004: 408-417 - [c16]Xinwen Fu
, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281 - [c15]Wei Yu, Thang Nam Le, Dong Xuan, Wei Zhao
:
Query aggregation for providing efficient data services in sensor networks. MASS 2004: 31-40 - 2003
- [j5]Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication. Real Time Syst. 24(2): 171-202 (2003) - [c14]Shengquan Wang, Dong Xuan, Wei Zhao
:
On resilience of structured peer-to-peer systems. GLOBECOM 2003: 3851-3856 - [c13]Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - [c12]Xinwen Fu
, Bryan Graham, Riccardo Bettati, Wei Zhao
, Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492 - [c11]Zhibin Mai, Shengquan Wang, Dong Xuan, Wei Zhao
:
Group aggregation for scalable anycast routing. IPCCC 2003: 33-40 - [c10]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
A Study of Providing Statistical QoS in a Differentiated Sevices Network. NCA 2003: 297-304 - 2002
- [c9]Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan, Wei Zhao
:
Implementation of QoS-Provisioning System for Voice over IP. IEEE Real Time Technology and Applications Symposium 2002: 266-275 - 2001
- [j4]Yong Guan, Xinwen Fu
, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans. Syst. Man Cybern. Part A 31(4): 253-265 (2001) - [c8]Dong Xuan, Weijia Jia:
Distributed Admission Control for Anycast Flows with QoS Requirements. ICDCS 2001: 292-300 - [c7]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. INFOCOM 2001: 669-678 - [c6]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. IEEE Real Time Technology and Applications Symposium 2001: 127-129 - [c5]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. RTSS 2001: 289-298 - 2000
- [j3]Weijia Jia, Dong Xuan, Wei Zhao
:
Integrated routing algorithms for anycast messages. IEEE Commun. Mag. 38(1): 48-53 (2000) - [j2]Dong Xuan, Weijia Jia, Wei Zhao
, Hongwen Zhu:
A Routing Protocol for Anycast Messages. IEEE Trans. Parallel Distributed Syst. 11(6): 571-588 (2000) - [c4]Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
:
Scalable QoS Guaranteed Communication Services for Real-Time Applications. ICDCS 2000: 180-187 - [c3]Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
:
Utilization-Based Admission Control for Real-Time Applications. ICPP 2000: 251-262
1990 – 1999
- 1999
- [j1]Weijia Jia, Wei Zhao
, Dong Xuan, Gaochao Xu:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. IEEE Trans. Parallel Distributed Syst. 10(10): 984-1000 (1999) - [c2]Weijia Jia, Gaochao Xu, Dong Xuan, Wei Zhao
:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. ICPP 1999: 508-515 - 1998
- [c1]Dong Xuan, Weijia Jia, Wei Zhao
:
Routing Algorithms for Anycast Messages. ICPP 1998: 122-131
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint