Xinwen Fu
Xinwen Fu
Preverjeni e-poštni naslov na cs.uml.edu - Domača stran
A survey on big data market: Pricing, trading and protection
F Liang, W Yu, D An, Q Yang, X Fu, W Zhao
Ieee Access 6, 15132-15154, 2018
DSSS-based flow marking technique for invisible traceback
W Yu, X Fu, S Graham, D Xuan, W Zhao
2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005
Security vulnerabilities of internet of things: A case study of the smart plug system
Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu
IEEE Internet of Things Journal 4 (6), 1899-1909, 2017
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
Barrier coverage with sensors of limited mobility
A Saipulla, B Liu, G Xing, X Fu, J Wang
Proceedings of the eleventh ACM international symposium on Mobile ad hoc …, 2010
Cybersecurity for digital manufacturing
D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu, J Terpenny
Journal of manufacturing systems 48, 3-12, 2018
A real-time en-route route guidance decision scheme for transportation-based cyberphysical systems
J Lin, W Yu, X Yang, Q Yang, X Fu, W Zhao
IEEE Transactions on Vehicular Technology 66 (3), 2551-2566, 2016
Cap: A context-aware privacy protection system for location-based services
A Pingley, W Yu, N Zhang, X Fu, W Zhao
2009 29th IEEE international conference on distributed computing systems, 49-57, 2009
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
X Yang, J Lin, W Yu, PM Moulema, X Fu, W Zhao
IEEE Transactions on Computers 64 (1), 4-18, 2013
SBVLC: Secure barcode-based visible light communication for smartphones
B Zhang, K Ren, G Xing, X Fu, C Wang
IEEE Transactions on Mobile Computing 15 (2), 432-446, 2015
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
A new cell counter based attack against tor
Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia
Proceedings of the 16th ACM conference on Computer and communications …, 2009
A new replay attack against anonymous communication networks
R Pries, W Yu, X Fu, W Zhao
2008 IEEE International Conference on Communications, 1578-1582, 2008
Blind recognition of touched keys on mobile devices
Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Fingerprint attack against touch-enabled devices
Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu
Proceedings of the second ACM workshop on Security and privacy in …, 2012
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
L Wu, X Du, X Fu
IEEE Communications Magazine 52 (3), 80-87, 2014
Detecting worms via mining dynamic program execution
X Wang, W Yu, A Champion, X Fu, D Xuan
2007 Third International Conference on Security and Privacy in …, 2007
On flow marking attacks in wireless anonymous communication networks
X Fu, Y Zhu, B Graham, R Bettati, W Zhao
Journal of Ubiquitous Computing and Intelligence 1 (1), 42-53, 2007
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20