Research
Publications [Listed by Years] [Listed by
Topics]
______________________________________________________________________
October 2013 - Present
- Fan Yang, Zhiwei Shi, Shixian Ye, Jiazhong Qian, Wenjie Wang and Dong Xuan, VaRSM: Versatile Automomous Racquet Sports Machine, accepted by ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2022 (Video).
- Tai-Yu Pan, Cheng Zhang, Yandong Li, Hexiang Hu, Dong Xuan, Soravit Changpinyo, Boqing Gong and Wei-Lun Chao, On Calibration of Long-Tailed Object Detectors, accepted by International Conference on Neural Information Processing Systems (NeurIPS), 2021.
- Jihyung Kil, Cheng Zhang, Dong Xuan and Wei-Lun Chao, Discovering the Unknown Knowns: Turning Implicit Knowledge in the Dataset into Explicit Training Examples for Visual Question Answering, accepted by International Conference on Empirical Methods in Natural Language Processing (EMNLP), 2021.
- Cheng Zhang, Tai-Yu Pan, Yandong Li, Hexiang Hu, Dong Xuan, Soravit Changpinyo, Boqing Gong and Wei-Lun Chao, MosaicOS: A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection, accepted by International Conference on Computer Vision (ICCV), 2021.
- Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, ZhiqiangLin and Ness B. Shroff, WLAN-Log-based Superspreader Detection in the COVID-19 Pandemic, accepted to appear in Elsevier High-Confidence Computing Journal (HCC), 2021.
- Rahul Singh, Wenbo Ren, Fang Liu, Dong Xuan, Zhiqiang Lin and Ness B. Shroff, A Blueprint for Effective Pandemic Mitigation, accepted to appear in the ITU Journal on Future and Evolving Technologies (ITU J-FET), Dec. 2020.
- Qingchuan Zhao, Haohuang Wen, Zhiqiang Lin, Dong Xuan and Ness B. Shroff, On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps, in Proc. of International Conference on Security and Privacy in Communication Systems (SecureComm), Oct. 2020.
- Haohuang Wen, Qingchuan Zhao, Zhiqiang Lin, Dong Xuan and Ness B. Shroff, A Study of the Privacy of COVID-19 Contact Tracing Apps, in Proc. of International Conference on Security and Privacy in Communication Systems (SecureComm), Oct. 2020.
- Cheng Zhang, Wei-Lun Chao and Dong Xuan, An Empirical Study on
Leveraging Scene Graphs for Visual Question Answering, in Proc. of British
Machine Vision Conference (BMVC), Sept. 2019.
- Cheng Zhang, Fan Yang, Gang
Li, Qiang Zhai, Yi
Jiang and Dong Xuan, MV-Sports:
A Motion and Vision Sensor Integration-Based Sports Analysis System,
in Proc. of IEEE International Conference on Computer Communications
(INFOCOM), April 2018.
- Qiang
Zhai, Fan Yang, Adam Champion, Chunyi
Peng, Jingchuan
Wang, Dong
Xuan, Wei Zhao, BridgeLoc: Bridging Vision-Based Localization for
Robots, in Proc. of IEEE International Conference on Mobile Ad-hoc and
Sensor Systems (MASS), Oct. 2017.
- Gang Li, Xinfeng
Li, Fan Yang, Jin Teng,
Sihao Ding, Dong Xuan, Biao Chen, Yuan F. Zheng
and Wei Zhao, Traffic At-a-Glance: Time-Bounded Analytics on Large Visual
Traffic Data, in IEEE Transactions on Parallel Distributed Systems (TPDS),
Vol. 28, No. 9, Sept. 2017, pp. 2703-2717.
- Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen and Wei Zhao, EV-Matching:
Bridging Large Visual Data and Electronic Data for Efficient Surveillance,
in Proc. of IEEE International Conference on Distributed Computing Systems
(ICDCS), June 2017.
- Paul Y. Cao, Gang Li, Adam
C. Champion, Dong Xuan, Steve Romig and Wei
Zhao, On
Human Mobility Predictability via WLAN Logs, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), May 2017.
- Sihao
Ding, Gang Li, Ying Li, Xinfeng
Li, Qiang Zhai, Adam
C. Champion, Junda Zhu, Dong Xuan, Yuan F. Zheng, SurvSurf: Human Retrieval on Large Surveillance Video
Data, Multimedia Tools and Applications, Vol. 76, No. 5, March 2017,
pp. 6521-6549.
- Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda
Zhu and Dong Xuan, Flash-Loc:
Flashing Mobile Phones for Accurate Indoor Localization, in Proc. of IEEE International
Conference on Computer Communications (INFOCOM), April 2016.
- Xinfeng
Li, Gang Li, Fan Yang, Jin Teng,
Dong Xuan and Biao Chen, Traffic
At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data,
in Proc. of IEEE International Conference on Computer Communications
(INFOCOM), April 2016.
- Sihao
Ding, Qiang Zhai, Ying
Li, Junda Zhu, Yuan F. Zheng and Dong Xuan,
Simultaneous Body Part and Motion Identification for Human-following
Robots, Pattern Recognition, Elsevier, Vol. 50, Feb. 2016, pp.118-130.
- Sihao
Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong
Xuan, Sequential Sample Consensus: A Robust Algorithm for Video-based
Face Recognition, in IEEE Transactions on Circuits and System for
Video Technology, Nov 2015, pp.1586-1598.
- Jihun
Hamm, Adam C. Champion, Guoxing
Chen, Mikhail Belkin and Dong Xuan, Crowd-ML:
A Privacy-Preserving Learning Framework for a Crowd of Smart Devices,
in Proc. of IEEE International Conference on Distributed Computing
Systems (ICDCS), June 2015.
- Ying Li, Sihao
Ding, Qiang Zhai, Yuan
F. Zheng and Dong Xuan, Human Feet Tracking Guided by Locomotion Model, in
Proc. of IEEE International Conference on Robotics and Automation (ICRA),
May 2015.
- Ankita Sikdar, Yuan
F. Zheng and Dong Xuan, An Iterative Clustering Algorithm for
Classification of Object Motion Direction using Infrared Sensor Array, in
Proc. of IEEE International Conference on Technologies for Practical
Robot Applications, May 2015, pp.1-6.
- Zuoming
Yu, Fan Yang, Jin Teng,
Adam C. Champion, and Dong Xuan, Local
Face-View Barrier Coverage in Camera Sensor Networks, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), April 2015.
- Qiang
Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan,
Yuan F. Zheng and Wei Zhao, VM-Tracking:
Visual-Motion Sensing Integration for Real-time Human Tracking, in
Proc. of IEEE International Conference on Computer Communications
(INFOCOM), April 2015.
- Jin
Teng, Boying Zhang, Xiaole Bai, Zhimin Yang and
Dong Xuan, Incentive-Driven and Privacy-Preserving Message Dissemination
in Large-Scale Mobile Networks, in IEEE Transactions on Parallel
Distributed Systems (TPDS), Vol. 25, No. 11, Nov. 2014, pp. 2909-2919.
- Jin
Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and
Dong Xuan, E-Shadow: Lubricating Social Interaction using Mobile Phones,
in IEEE Transactions on Computers (TC), Vol. 63, No. 6, June 2014, pp.
1422-1433.
- Jin
Teng, Boying Zhang, Junda Zhu, Xinfeng Li, Dong
Xuan, Yuan F. Zheng, EV-Loc: Integrating
Electronic and Visual Signals for Accurate Localization, in IEEE/ACM
Transactions on Networking (ToN), Vol. 22, No.
4, April 2014, pp. 1285-1296.
- Zuoming
Yu, Jin Teng, Xiaole Bai, Dong Xuan and Weijia
Jia, Connected Coverage in Wireless Networks
with Directional Antennas, in ACM Transactions on Sensor Networks (ToSN), Vol. 10, No. 3, Article 51, April 2014.
- Gang Li, Fan Yang, Jin Teng, Adam C. Champion,
Dong Xuan, Hong Luan and Yuan F. Zheng, EV-Sounding:
A Visual Assisted Wireless Channel Sounding System, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), April 2014.
- Xinfeng
Li, Jin Teng, Boying Zhang, Adam Champion and Dong Xuan, TurfCast: A Service for Controlling Information
Dissemination in Wireless Networks, in IEEE Transactions on Mobile
Computing (TMC), Vol. 13, No. 2, Feb. 2014, pp. 250-262.
- Zheng Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan and Junzhou
Luo, Novel Packet Size Based Covert Channel Attacks against Anonymizer, in
IEEE Transactions on Computers (TC), Vol. 62, No. 12, Dec. 2013, pp.
2411-2426
- Fung Po Tso, Lin Cui, Lizhuo Zhang, Weijia Jia, Di Yao, Jin Teng and Dong Xuan, DragonNet:
A Robust Mobile Internet Service System for Long Distance Trains, in IEEE
Transactions on Mobile Computing (TMC), Vol. 12, No. 11, Nov. 2013, pp.
2206-2218.
October 2007 - September 2013
- Adam Champion, Zhimin Yang, Boying Zhang, Jiangpeng Dai, Dong Xuan and Du Li, E-SmallTalker: A
Distributed Mobile System for Social Networking in Physical Proximity, IEEE
Transactions on Parallel and Distributed Systems (TPDS), Vol.24, No. 8, Aug. 2013, pp. 1535-1545.
- Sihao Ding,
Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan,
Robust Video-based Face Recognition by Sequential Sample Consensus, in
IEEE International Conference on Advanced Video and Singal-based
Surveillance (AVSS), Aug. 2013.
- Sihao Ding,
Qiang Zhai, Yuan F.
Zheng and Dong Xuan, Side-View Face Authentication based on Wavelet and
Random Forest, in IEEE Intelligence and Security Informatics (ISI), June
2013.
- Weijia
Jia, Fung Po Tso, Zhen Ling, Xinwen
Fu, Dong Xuan, and Wei Yu, Blind Detection of Spread Spectrum Flow
Watermarks, in International Journal of Security and Communication
Networks (SCN), Wiley, Vol. 6, No. 3, Mar. 2013, pp. 257-274.
- Boxuan
Gu, Xinfeng Li, Gang
Li, Adam C. Champion, Zhezhe Chen, Feng Qin and
Dong Xuan, D2Taint:
Differentiated and Dynamic Information Flow Tracking on Smartphones for
Numerous Data Sources, in Proc. of IEEE International Conference on
Computer Communications (INFOCOM), April 2013.
- Zuoming
Yu, Jin Teng, Xinfeng Li and Dong Xuan, On
Wireless Network Coverage in Bounded Areas, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), April 2013.
- Xinfeng
Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao, EV-Human:
Human Localization via Visual Estimation of Body Electronic Interference,
in Proc. of the mini-conference conjunction with IEEE International
Conference on Computer Communications (INFOCOM), April 2013.
- Zhaoyang
Zhang, Honggang Wang, Xiaodong
Lin, Hua Fang and Dong Xuan, Effective Epidemic Control and Source Tracing
Through Mobile Social Sensing over WBANs, in Proc. of the mini-conference
conjunction with IEEE International Conference on Computer Communications
(INFOCOM), April 2013.
- Ziqiu
Yun, Xiaole Bai, Dong Xuan, Weijia
Jia and Wei Zhao, Pattern Mutation in Wireless
Sensor Deployment, in ACM/IEEE Transactions on Networking (ToN), Vol. 20, No. 6, Dec. 2012, pp. 1964-1977.
- Fung Po Tso, Jin Teng, Weijia Jia and Dong Xuan, Mobility: A Double-Edged
Sword for HSPA Networks, in IEEE
Transactions on Parallel and Distributed Systems (TPDS), Vol. 23, No. 10, Oct. 2012, pp.
1895-1907.
- Zheng Ling, Junzhou Luo, Wei Yu, Xinwen
Fu, Dong Xuan and Weijia Jia,
A New Cell Counting Based Attack against Tor, in ACM/IEEE Transactions on
Networking (ToN), Vol. 20, No. 4, Aug. 2012, pp.
1245-1261.
- Boxuan
Gu, Wenbin Zhang, Xiaole Bai, Adam Champion, Feng Qin and Dong Xuan, JSGuard: Shellcode Detection in JavaScript, to appear
in International Conference on Security and Privacy in Communication
Networks (SecureComm), Sept. 2012.
- Adam C. Champion, Xinfeng Li, Qiang Zhai, Jin Teng and Dong Xuan, Enclave: Promoting Unobtrusive and
Secure Mobile Communications with a Ubiquitous Electronic World, in Proc.
of the International Conference on Wireless Algorithms, Systems, and
Applications (WASA), August 2012. (Best Paper Runner-Up Award)
- Boying
Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Dong
Xuan and Yuan F. Zheng, EV-Loc: Integrating Electronic and Visual Signals for
Accurate Localization, in Proc. of ACM International Symposium on
Mobile Ad Hoc Networking and Computing (MobiHoc),
June 2012.
- Jin
Teng, Junda Zhu, Boying Zhang, Dong Xuan and Yuan F. Zheng, E-V:
Efficient Visual Surveillance with Electronic Footprints, in Proc. of
IEEE International Conference on Computer Communications (INFOCOM), March
2012.
- Xinfeng Li, Jin Teng, Boying Zhang, Adam
Champion and Dong Xuan, TurfCast: A Service for Controlling Information
Dissemination in Wireless Networks, in Proc. of IEEE International Conference on Computer
Communications (INFOCOM), March 2012.
- Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng, Stealthy Video Capturer: An Opened Eye on You,
in IEEE Vehicular Technology Magazine, Vol. 6, No. 4, Dec. 2011, pp.
49-59.
- Jin
Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and
Dong Xuan, E-Shadow:
Lubricating Social Interaction using Mobile Phones, in Proc. of
IEEE International Conference on Distributed Computing Systems (ICDCS),
June 2011 [slides].
- Lin Liao, Weifeng Chen, Chuanlin
Zhang, Lizhuo Zhang, Dong Xuan and Weijia Jia, Two Birds with
One Stone: Wireless Access Point Deployment for Both Coverage and
Localization, in IEEE Transactions on Vehicle Technology (TVT), Vol. 60,
No. 5, June 2011, pp. 2239-2252.
- Zuoming
Yu, Jin Teng, Xiaole Bai, Dong Xuan and Weijia
Jia, Connected
Coverage in Wireless Networks with Directional Antennas, in Proc. of
IEEE International Conference on Computer Communications (INFOCOM), April
2011.
- Fung Po Tso, Lin Cui, Lizhuo Zhang, Weijia Jia, Di Yao, Jin Teng and Dong Xuan, DragonNet: A Robust Mobile Internet Service System for
Long Distance Trains, in Proc. of IEEE International Conference on
Computer Communications (INFOCOM), April 2011.
- Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu and Dong Xuan, A Novel Packet Size Based
Covert Channel Attack against Anonymizer, in the mini-conference
conjunction with IEEE International Conference on Computer Communications
(INFOCOM), April 2011.
- Boying
Zhang, Jin Teng, Xiaole Bai, Zhimin Yang and
Dong Xuan, P3-Coupon:
A Probabilistic System for Prompt and Privacy-preserving Electronic Coupon
Distribution, in Proc. of IEEE
International Conference on Pervasive Computing and Communications (PerCom), March 2011 [slides].
- Changqing
Xu, Xiaole Bai, Lei Ding, Jin
Teng, Sriram Chellappan and Dong Xuan, Directed-Coverage in
Wireless Sensor Networks: Concept and Quality, in Ad Hoc & Sensor
Wireless Networks (AHSWN), Vol. 11, No. 3-4, March 2011, pp.
173-197.
- Wei, Yu, Xun
Wang, Adam Champion, Dong Xuan, and David Lee, On Detecting Active Worms
with Varying Scan Rate, in Journal of Computer Communications (JCC),
Elsevier, Vol 34, No. 11, March 2011, pp. 1269-1282.
- Wei Yu, Xun
Wang, Prasad Calyam, Dong Xuan and Wei Zhao, Camouflaging
Worm: Modeling and Detection, in IEEE Transactions on Dependable and
Secure Computing (TDSC), Vol. 8, No. 3, March 2011, pp.
377-390.
- Fung Po Tso, Jin Teng, Weijia Jia and Dong Xuan, Mobility:
A Double-Edged Sword for HSPA Networks, in Proc. of ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MobiHoc), Sept. 2010.
- Chuanlin
Zhang, Xiaole Bai, Dong Xuan, Jin Teng and Weijia Jia, Constructing
Low-Connectivity and Full-Coverage Three Dimensional Networks, in IEEE
Journal on Selected Areas in Communications (JSAC), Simple Wireless Sensor
Networking Solutions, Vol. 28, No. 7, Sept. 2010, pp. 984-993.
- Jiangpeng
Dai, Xiaole Bai, Zhimin
Yang, Zhaohui Shen and Dong Xuan, Mobile
Phone-based Pervasive Fall Detection, in Journal of Personal and
Ubiquitous Computing, Springer, Vol. 14, No. 7, July 2010, pp. 633-643.
- Wenjun
Gu, Zhimin Yang, Dong
Xuan, Weijia Jia and
Can Que, Null Data Frame: A Double-edged Sword in
IEEE 802.11 WLANs, in IEEE Transactions on Distributed and
Parallel Systems (TPDS), Vol.
21, No. 7, July 2010, pp. 897-910.
- Zhimin
Yang, Boying Zhang, Jiangpeng
Dai, Adam Champion, Dong Xuan and Du Li, E-SmallTalker: A Distributed Mobile System for Social
Networking in Physical Proximity, in Proc. of IEEE
International Conference on Distributed Computing Systems (ICDCS), June
2010.
- Shengquan
Wang, Dong Xuan, Riccardo Bettati and Wei Zhao,
Toward Statistical QoS Guarantees in A
Differentiated Services Network, Telecommunication Systems, Vol. 43(3-4),
March 2010, pp. 253-263.
- Ziqiu
Yun, Xiaole Bai, Dong Xuan, Ten H. Lai and Weijia Jia, Optimal
Deployment Patterns for Full Coverage and k-Connectivity (k<=6)
Wireless Sensor Networks, in
ACM/IEEE Transactions on Networking (ToN), Vol.
18 , No. 3, March 2010,pp. 934-947.
- Xiaole
Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, Optimal
Deployment Patterns for Four-Connectivity And Full-Coverage Wireless
Sensor Networks, in IEEE Transactions on Mobile Computing (TMC), Vol.
9, No. 3, March 2010, pp. 435-448.
- Jiangpeng
Dai, Jin Teng, Xiaole Bai, Zhaohui Shen and
Dong Xuan, Mobile
Phone based Drunk Driving Detection, in Proc. of International ICST
Conference on Pervasive Computing Technologies for Healthcare (Pervasive
Health), March 2010.
- Jiangpeng
Dai, Xiaole Bai, Zhimin
Yang, Zhaohui Shen and Dong Xuan, PerFallD: A Pervasive Fall Detection System Using
Mobile Phones, in Proc. of IEEE Workshop on Pervasive Healthcare
(PerHealth) conjunction with the 8th IEEE International Conference on
Pervasive Computing and Communications (PerCom),
March 2010.
- Boxuan
Gu, Xiaole Bai, Zhimin Yang, Adam Champion and Dong Xuan, Malicious
Shellcode Detection with a Virtual Memory Snapshot, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), March 2010.
- Xiaole
Bai, Ziqiu Yun, Dong Xuan, Weijia
Jia and Wei Zhao, Pattern
Mutation in Wireless Sensor Deployment, in Proc. of IEEE International
Conference on Computer Communications (INFOCOM), March 2010.
- Thang Le, Prasun Sinha and Dong Xuan, Turning Heterogeneity into
An Advantage in Wireless Ad-hoc Network Routing, in Ad Hoc Networks
Journal, Elsevier, Vol. 8, No. 1, Jan. 2010, pp. 108-118.
- Ai Chen, Ten H. Lai and Dong
Xuan, Measuring and Guaranteeing Quality of Barrier-Coverage for General
Belts with Wireless Sensors, in ACM Transactions on Sensor Networks (ToSN), Vol. 6, No. 1, Article 2, Dec. 2009.
- Zheng Ling, Junzhou Luo, Wei Yu, Xinwen Fu,
Dong Xuan and Weijia Jia, A New
Cell Counter Based Attack against Tor, in Proc. of ACM Conference on
Computer and Communications Security (CCS), Nov. 2009.
- Xiaole Bai, Lei
Ding, Jin Teng, Sriram Chellappan, Changqing Xu and Dong Xuan, Directed
Coverage in Wireless Sensor Networks: Concept and Quality, in Proc. of
IEEE Mobile and Ad-hoc Sensor Systems (MASS), Oct. 2009
- Xudong Ni, Zhimin Yang, Xiaole Bai,
Adam Champion and Dong Xuan, DiffUser:
Differentiated User Access Control on Smartphone, accepted in
Proc. of International Workshop on Wireless and Sensor Networks Security
(WSNS'09) conjunction with IEEE Mobile and Ad-hoc Sensor Systems (MASS),
Oct. 2009
- Wei Yu, Xun Wang, Xinwen Fu,
Dong Xuan and Wei Zhao, An Invisible Localization Attack to Internet
Threat Monitors, in IEEE Transactions on Distributed and Parallel Systems
(TPDS), Vol. 20, No. 11, Nov. 2009, pp. 1611-1625.
- Xiaole Bai, Chuanlin Zhang, Dong Xuan, Jin Teng and Weijia Jia, Low-Connectivity
and Full-Coverage Three Dimensional Networks, in Proc. of ACM
International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 2009.
- Xiaole Bai, Chuanlin Zhang, Dong Xuan and Weijia Jia, Full-Coverage
and K-Connectivity (K=14, 6) Three Dimensional Networks, in Proc. of
IEEE International Conference on Computer Communications (INFOCOM), April
2009.
- Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu, Blind
Detection of Spread Spectrum Flow Watermarks, in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), April 2009.
- Jin Teng, Changqing Xu, Weijia Jia and
Dong Xuan, D-Scan:
Enabling Fast and Smooth Handoff in AP-dense 802.11 Wireless Networks,
in the mini-conference conjunction with IEEE International Conference on
Computer Communications (INFOCOM), April 2009.
- Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng, Stealthy
Video Capturer: A New Video-based Spyware in 3G Smartphones, in
Proc. of ACM Conference on Wireless Network Security (WiSec),
March 2009.
- Zhimin Yang, Boxuan Gu,
Adam Champion, Xiaole Bai and Dong
Xuan, Link-Layer
Protection in 802.11i WLANs with Dummy Authentication, in Proc.
of ACM Conference on Wireless Network Security (WiSec),
March 2009 (short paper).
- Wei Yu, Sriram Chellappan, Xun Wang and Dong Xuan, Peer-to-Peer
System-based Active Worm Attacks: Modeling, Analysis and Defense, in
Journal of Computer Communications (COMCOM), Elsevier, Vol. 31, No. 17,
Nov. 2008, pp. 4005-4017.
- Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan and Bin Ma, PAS:
Predicate-based Authentication Services Against Powerful Passive
Adversaries, in Proc. of Annual Computer Security Applications
Conference (ACSAC), Dec. 2008.
- Wenjun Gu, Zhimin Yang,
Can Que, Dong Xuan and Weijia Jia, On
Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs,
in Proc. of IEEE International Conference on Distributed Computing
Systems (ICDCS), June 2008, pp. 28-35.
- Xiaole Bai,
Dong Xuan, Ziqiu Yun, Ten H. Lai
and Weijia Jia, Complete
Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k
<=6) Wireless Sensor Networks, in Proc. of ACM International
Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc),
May 2008, pp. 401-410.
- Ai Chen, Ten H. Lai and Dong
Xuan, Measuring
and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks,
in Proc. of ACM International Symposium on Mobile Ad Hoc Networking
and Computing (MobiHoc), May 2008, pp. 421-430.
- Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, Deploying
Four-Connectivity And Full-Coverage Wireless Sensor Networks, in Proc.
of IEEE International Conference on Computer Communications (INFOCOM),
April 2008, pp. 906-914.
- Xun Wang,
Wei Yu, Xinwen Fu, Dong Xuan and Wei
Zhao, iLOC:
An invisible LOCalization Attack to Internet Threat
Monitoring System, in the mini-conference conjunction with IEEE
International Conference on Computer Communications (INFOCOM), April 2008,
pp. 1930-1938.
- Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong
Xuan and Weijia Jia, Network
Decoupling: A Methodology for Secure Communications in Wireless Sensor
Networks, in IEEE Transactions on Parallel and Distributed Systems
(TPDS), Vol. 18, No. 12, Dec. 2007, pp. 1784-1796.
- Sriram Chellappan, Wenjun Gu, Xiaole Bai,
Dong Xuan, Bin Ma and Kaizhong Zhang, Deploying
Wireless Sensor Networks under Limited Mobility Constraints, in
IEEE Transactions on Mobile Computing (TMC), Vol. 6, No. 10, Oct.
2007, pp. 1142-1157.
October 2001 - September 2007
- Xun Wang,
Wei Yu, Adam Champion, Xinwen Fu and
Dong Xuan, Detecting
Worms via Mining Dynamic Program Execution, in Proc. of
International Conference on Security and Privacy in Communication Networks
(SecureComm), Sept. 2007, pp. 412-421.
- Wei Yu, Xinwen Fu, Steve Graham,
Dong Xuan and Wei Zhao, DSSS-Based
Flow Marking Technique for Invisible Traceback,
in Proc. of IEEE Symposium on Security and Privacy (Oakland),
May. 2007, pp. 18-32.
- Zhimin Yang, Eylem Ekici and
Dong Xuan, A
Localization-Based Anti-Sensor Network System, in Proc of the
mini-conference in conjunction with IEEE International Conference on
Computer Communications (INFOCOM), May 2007, pp. 6-12.
- Sriram Chellappan, Xiaole Bai,
Bin Ma, Dong Xuan and Changqing Xu, Mobility
Limited Flip-based Sensor Network Deployment, in IEEE Transactions on
Parallel and Distributed Systems (TPDS), Vol. 18, No. 2, Feb. 2007, pp.
199-211.
- Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan and Xiaomei Liu,
Mutual Anonymous Overlay Multicast, in Journal of Parallel and Distributed
Computing (JPDC), Elsevier, Vol. 66, No. 9, Sept. 2006, pp.
1205-1216.
- Wei Yu, Xun Wang, Dong Xuan and David Lee, Effective
Detection of Active Worms with Varying Scan Rate, in Proc. of
International Conference on Security and Privacy in Communication Networks
(SecureComm), Aug. 2006 (10 pages).
- Wei Yu, Xun Wang, Prasad Calyam,
Dong Xuan and Wei Zhao, On Detecting Camouflaging Worm, in Proc. of Annual
Computer Security Applications Conference (ACSAC), Aug. 2006, pp. 235-244.
- Wei Yu, Sriram Chellappan, Dong
Xuan and Wei Zhao, Distributed Policy Processing in Active-Service based
Infrastructures, in International Journal of Communication Systems (IJCS),
John Wiley & Sons, Vol. 19, No. 7, July 2006, pp. 727-750.
- Xun Wang, Sriram Chellappan,
Philip Corey Boyer and Dong Xuan, On the
Effectiveness of Secure Overlay Forwarding Systems under Intelligent
Distributed DoS Attacks,
IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 17, No.
7, June 2006, pp. 619-632.
- Wenjun Gu, Xiaole Bai, Sriram Chellappan and
Dong Xuan, Network
Decoupling for Secure Communications in Sensor Networks, in Proc. of
IEEE International Workshop on Quality of Service (IWQoS),
June 2006, pp. 189-198 [slides].
- Wei Yu, Thang Nam Le, Jangwon Lee and Dong Xuan, Effective Query
Aggregation for Data Services in Sensor Networks, in International Journal
of Computer Communications (JCC), Elsevier, Vol. 29, No. 18, June 2006,
pp. 3733-3744.
- Xiaole Bai,
Santosh Kumar, Dong Xuan, Ziqiu Yun
and Ten H. Lai, Deploying
Wireless Sensors to Achieve Both Coverage and Connectivity, in Proc.
of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 2006, pp. 131-142 [slides].
- Thang Nam Le, Wei Yu, Xiaole Bai and Dong Xuan, A Dynamic GHT for
Data-Centric Storage in Sensor Networks, in Proc. of IEEE Wireless
Communications and Networking Conference (WCNC), April 2006 (7 pages).
- Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu and
Dong Xuan, Policy-driven Physical Attacks in Sensor Networks: Modeling and
Measurement, in Proc. of IEEE Wireless Communications and Networking
Conference (WCNC), April 2006 (8 pages).
- Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan and Xiaomei Liu,
A Design of Overlay Anonymous Multicast Protocol, in Proc. of IEEE
International Parallel & Distributed Processing Symposium (IPDPS),
April 2006 (10 pages).
- Shengquan Wang, Zhibin Mai, Dong Xuan and Wei Zhao, Design
and Implementation of QoS-Provisioning
System for Voice over IP, IEEE Transactions on Parallel and
Distributed Systems (TPDS), Vol. 17, No. 3, March 2006, pp. 276-288.
- Xun Wang, Wenjun Gu,
Kurt Schosek, Sriram Chellappan and Dong Xuan, Sensor Network
Configuration under Physical Attacks, accepted to appear in International
Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience, Jan. 2006.
- Sriram Chellappan, Xiaole Bai,
Bin Ma and Dong Xuan, Sensor
Network Deployment using Flip-based Sensors, in Proc. of IEEE Mobile
Sensor and Ad-hoc and Sensor Systems (MASS), Nov. 2005, pp. 291-298 [slides].
- Wenjun Gu, Xun Wang, Sriram Chellappan, Dong
Xuan and Ten H. Lai, Defending
against Search-based Physical Attacks in Sensor Networks, in Proc. of
IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS), Nov. 2005, pp.
520-527 [slides].
- Thang Nam Le,
Wei Yu and Dong Xuan, An Adaptive
Zone-Based Storage Architecture for Wireless Sensor Networks, in Proc. of
Global Telecommunications Conference (GLOBECOM), Nov. 2005, pp. 2782-2786.
- Wei Yu, Sriram Chellappan and
Dong Xuan, On Defending Peer-to-Peer System-based Active Worm Attack, in
Proc. of IEEE Global Telecommunications Conference (GLOBECOM), Nov. 2005,
pp. 1757-1761.
- Xun Wang, Sriram Chellappan, Wenjun Gu, Wei Yu and
Dong Xuan, Search-based Physical Attacks in Sensor Networks, in Proc. of
IEEE International Conference on Computer Communication and Networks
(ICCCN), Oct. 2005, pp. 489-496.
- Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan and Dong Xuan, Sensor Network
Configuration under Physical Attacks, Proc. of IEEE International
Conference on Computer Networks and Mobile Computing (ICCNMC), Aug. 2005,
pp. 23-32.
- Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan and Dong Xuan, Lifetime
Optimization of Sensor Networks under Physical Attacks, in Proc of
IEEE International Conference on Communications (ICC), May 2005, pp.
3295-3301.
- Wei Yu, Philip Coyer
Boyer, Sriram Chellappan and
Dong Xuan, Peer-to-Peer
System-based Active Worm Attacks: Modeling and Analysis, in Proc. of
IEEE International Conference on Communications (ICC), May 2005, pp.
295-300.
- Shengquan Wang,
Dong Xuan and Wei Zhao, Analyzing and Enhancing the Resilience of
Structured Peer-to-Peer Systems, Journal of Parallel and Distributed
Computing (JPDC), Elsevier, Vol. 65, Jan. 2005, pp. 207-219.
- Wei Yu, Sriram
Challappan and Dong Xuan, P2P/ Grid-based
Overlay Architecture to Support VoIP Services in Large Scale IP Networks,
in Journal of Future Generation Computer Systems (FGCS), Elsevier, Vol.
21, No. 1, Jan. 2005, pp. 209-219.
- Wei Yu, Thang Nam Le, Dong
Xuan and Wei Zhao, Query Aggregation for Providing Efficient Data Services
in Sensor Networks, in Proc. of IEEE Mobile and Ad-hoc Sensor Systems
(MASS), Oct. 2004, pp. 31-40.
- Weijia Jia, Dong Xuan, Wanqing Tu, Lidong Lin and
Wei Zhao, Distributed Admission Control for Anycast Flows,
IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol 15, No.
8, Aug. 2004, pp. 673-686.
- Xinwen Fu,
Bryan Graham, Dong Xuan, Riccard Bettati and Wei Zhao, Empirical
and Theoretical Evaluation of Active Probing Attacks and Their
Countermeasures, in Proc. of Information Hiding Workshop (IH), May
2004, pp. 266-281.
- Shengquan Wang,
Dong Xuan, Riccardo Bettati and Wei
Zhao, Providing
Absolute Differentiated Services for Real-Time Applications in
Static-Priority Scheduling Networks, IEEE/ACM Transactions on
Networking (ToN), Vol 12, No. 2, April 2004, pp.
326-339.
- Dong Xuan, Sriram Chellappan, Xun Wang and Shengquan
Wang, Analyzing
the Secure Overlay Services Architecture under Intelligent DDoS Attacks,
in Proc. of IEEE International Conference on Distributed Computing Systems
(ICDCS), Mar. 2004, pp. 408-417 [slides].
- Dong Xuan, Sriram Chellappan and Xun Wang, Resilience
of Structured Peer-to-Peer Systems: Analysis and Enhancement, in
Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless
and Peer-to-Peer Networks, edited by Jie Wu,
CRC press LLC, 2004.
- Shengquan Wang,
Dong Xuan and Wei Zhao, On
Resilience of Structured Peer-to-Peer Systems, in Proc. of IEEE Global
Telecommunications Conference (GLOBECOM), Dec. 2003, pp. 3851-3856.
- Dong Xuan, Sriram Chellappan and Muralidhar Krishnamoorthy, RChord:
An Enhanced Chord System Resilient to Routing Attacks, in Proc.
of IEEE International Conference on Computer Networks and Mobile Computing
(ICCNMC), Oct. 2003, pp. 69-77.
- Xinwen Fu,
Bryan Graham, Riccardo Bettati, Wei Zhao
and Dong Xuan, Analytical and Empirical Analysis of Countermeasures to
Traffic Analysis Attacks, in Proc. of International Conference on Parallel
Processing (ICPP), Oct. 2003, pp. 483-492.
- Xiuzhong Chen, Chunfeng Wang, Dong Xuan, Zhongcheng Li, Yinghua Min
and Wei Zhao, Survey on QoS Management
of VoIP, in Proc. of IEEE International Conference on Computer Networks
and Mobile Computing
(ICCNMC), Oct. 2003, pp. 253-259.
- Wei Yu, Dong Xuan, Sandeep
K. Reddy, Riccardo Bettati and Wei
Zhao, Distributed Policy Processing in Virtual Private Operation
Environment for Large Scale Networks, in Proc. of IEEE Systems, Man and
Cybernetics Society Information Assurance Workshop (IAW), June 2003, pp.
84-91.
- Shengquan Wang,
Dong Xuan, Riccardo Bettati and Wei
Zhao, A
Study of Providing Statistical QoS Guarantees
in Differentiated Services Networks, in Proc. of IEEE International
Symposium on Network Computing and Applications (NCA), April 2003, pp.
297-304.
- Zhibin Mai, Shengquan Wang, Dong Xuan and Wei Zhao, Group
Aggregation for Scalable Anycast Routing,
in Proc. of IEEE International Performance Computing and Communications
Conference (IPCCC), April 2003, pp. 33-40.
- Byung-Kyu Choi,
Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, Utilization-based
Admission Control for Real-Time Communication, Journal of Real-Time
Systems (JRTS), Vol. 24, No.2, 2003, pp. 171-202.
- Shengquang Wang, Zhibin Mai, Walt Magnussen, Dong Xuan and Wei
Zhao, Implementation
of QoS-Provision System for Voice
over IP, in Proc. of IEEE Real-time Technology and Applications
Symposium (RTAS), Oct. 2002, pp. 266-275.
- Wei Yu, Dong Xuan and Wei
Zhao, Middleware based Approach for Preventing Distributed Denial of
Service Attacks, in Proc. of IEEE Military Communications (MILCOM), Oct.
2002, pp. 1124-1129.
- Dong Xuan, Shengquan Wang, Ye Zhu, Riccardo Bettati and Wei Zhao, A Gateway-Based Defense
System for Distributed Denial-of-Service Attacks in High Speed Networks,
accepted to appear in IEEE Transaction on Systems, Man, and Cybernetics
(TSMC), 2002.
- Wei Yu, Dong Xuan,
Riccardo Bettati, and Wei Zhao, An
Integrated Middleware-Based Solution for Supporting Secured
Dynamic-Coalition Applications in Heterogeneous Environments, accepted to
appear in IEEE Transaction on Systems, Man, and Cybernetics (TSMC), 2002.
Before September 2001
- Yong Guan, Xingwen Fu, Dong Xuan, Prashanth Umesh Shenoy,
Riccardo Bettati and Wei Zhao, NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical
Applications, IEEE Transactions on Systems, Man, and Cybernetics (TSMC),
Vol. 31, No. 4, July 2001, pp. 253-265
- Dong Xuan, Riccardo Bettati, and Wei Zhao, A Gateway-Based Defense System
for Distributed DoS Attacks in High
Speed Networks, in Proc. of IEEE Systems, Man, and Cybernetics Information
Assurance Workshop (IAW), June 2001, pp. 212-219.
- Wei Yu, Dong Xuan, Bryan
Graham, S. Santhanam, Riccardo Bettati, and Wei Zhao, An Integrated Middleware-Based
Solution for Supporting Secured Dynamic-Coalition Applications in
Heterogeneous Environments, in Proc. of IEEE Systems, Man, and Cybernetics
Information Assurance Workshop (IAW), June 2001, pp. 259-264.
- Dong Xuan and Weijia Jia, Distributed
Admission Control for Anycast Flows
with QoS Requirements, in
Proc. of IEEE International Conference on Distributed Computing Systems
(ICDCS), April 2001, pp. 292-300.
- Shengquan Wang,
Dong Xuan, Riccardo Bettati and Wei
Zhao, Providing
Absolute Differentiated Services for Real-Time Applications in Static
Priority Scheduling Networks, in Proc. of IEEE International
Conference on Computer Communications (INFOCOM), April 2001, pp. 669-678.
- Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen and Wei Zhao, Utilization-based
Admission Control for Real-Time Applications, in Proc. of
International Conference on Parallel Processing (ICPP), Aug. 2000, pp.
251-260.
- Dong Xuan, Weijia Jia, Wei Zhao
and Hongwen Zhu, A
Routing Protocol for Anycast Messages,
IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 11, No.
6, June 2000, pp. 571-588.
- Byung-Kyu Choi,
Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, Scalable QoS Guaranteed Communication
Services for Real-Time Applications, in Proc. of IEEE International
Conference on Distributed Computing Systems (ICDCS), April 2000, pp.
180-187.
- Weijia Jia, Dong Xuan and Wei Zhao, Integrated Routing
Algorithms for Anycast Messages, IEEE
Communication Magazine, Vol. 38, No. 1, Jan. 2000, pp. 48-53.
- Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu,
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based
Tree Techniques, IEEE Transactions on Parallel and Distributed Systems
(TPDS), Vol.10, No.10, Oct.1999, pp. 984-1000.
- Yong Guan, Chengzhi Li, Dong Xuan, Riccardo Bettati and Wei Zhao, Preventing traffic analysis
for real-time communication networks, in Proc. of IEEE Military
Communications (MILCOM), Oct. 1999, pp. 744-750.
- Weijia Jia, Wei Zhao, Dong Xuan, and Gaochao Xu,
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based
Tree Techniques, in Proc. of International Conference on Parallel
Processing (ICPP), Aug. 1999, pp. 508-514.
- Weijia Jia, Gaochao Xu,
Wei Zhao, and Dong Xuan, An Integrated Routing Protocol for Reliable Anycast and Multicast Communications, in Proc. of
International Conference on Parallel and Distributed Computing Systems
(ICPDCS), Aug. 1999, pp. 185-190.
- Weijia Jia, Dong Xuan and Wei Zhao, Integrated Routing
Algorithms for Anycast Messages, in
Proc. of IEEE Global Telecommunications Conference (GLOBECOM), Vol: 3,
Nov. 1998, pp. 1635-1640.
- Dong
Xuan, Weijia Jia and
Wei Zhao, Routing Algorithms for Anycast Messages,
in Proc. of International Conference on Parallel Processing (ICPP),
Aug. 1998, pp. 122-130
______________________________________________________________________
Click here for
my research publications listed by topics and here for my homepage.
______________________________________________________________________
-- Last
Updated on 01/31/2022