You are here

Dong Xuan

  • Professor, Computer Science & Engineering
  • 593 Dreese Laboratories
    2015 Neil Ave
    Columbus, OH 43210
  • 614-292-2958

Honors

  • January, 2009

    College of Engineering Lumley Research Award.

  • December, 2005

    CAREER Award.

  • October, 2002

    SBC/Ameritech Faculty Fellow.

  • May, 2001

    Graduate Research Excellence Award.

  • August, 2000

    TxTEC Graduate Research Award.

  • January, 1997

    Outstanding Teaching Award.

  • October, 1995

    Scientific and Technological Achievement 1st Prize Award, Principle Contributor.

  • March, 1993

    Graduate Student Excellence Award.

Chapters

2008

  • 2008. "Delay Performance and Management of VoIP System." In VoIP Handbook: Applications, Technologies, Reliability, and Security,

Journal Articles

2012

  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan, 2012, "Mobility: A Double-Edged Sword for HSPA Networks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 23, no. 10, 1895-1907 - 1895-1907.

2011

  • Liao,Lin; Chen,Weifeng; Zhang,Chuanlin; Zhang,Lizhuo; Xuan,Dong; Jia,Weijia, 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 60, no. 5, 2239-2252 - 2239-2252.
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection of Camouflaging Worm." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.
  • Nan Xu, Weijia Jia, Yisha Luo, Fan Zhang, Dong Xuan and Jin Teng*, 2011, "Stealthy Video Capture: An Opened Eye on You." IEEE Vehicular Technology Magazine 6, no. 4, 49-59 - 49-59.
  • Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.
  • Yu,Wei; Wang,Xun; Champion,Adam; Xuan,Dong; Lee,David, 2011, "On detecting active worms with varying scan rate." COMPUTER COMMUNICATIONS 34, no. 11, 1269-1282 - 1269-1282.

2010

  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia and Can Que, 2010, "Null Data Frame: A Double-edged Sword in IEEE 802.11 WLANs." IEEE Transactions on Distributed and Parallel Systems (TPDS) 14, no. 7, 897-910 - 897-910.
  • Chuanlin Zhang, Xiaole Bai*, Jin Teng*, Dong Xuan and Weijia Jia, 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia, 2010, "Constructing low-connectivity and full-coverage three dimensional sensor networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Quarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3, 253-263 - 253-263.
  • Thang Le*, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal 8, no. 1, 108-118 - 108-118.
  • Thang Le, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal, Elsevier 8, no. 1, 108-118 - 108-118.
  • Gu,Wenjun; Yang,Zhimin; Xuan,Dong; Jia,Weijia; Que,Can, 2010, "Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 21, no. 7, 897-910 - 897-910.
  • Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen and Dong Xuan, 2010, "Mobile Phone-based Pervasive Fall Detection." Journal of Personal and Ubiquitous Computing, Springer 14, no. 7, 633-643 - 633-643.
  • Ziqiu Yun^, Xiaole Bai*, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." ACM/IEEE Transactions on Networking (ToN) 18, no. 3, 934-947 - 934-947.
  • Yun,Ziqiu; Bai,Xiaole; Xuan,Dong; Lai,Ten,H; Jia,Weijia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k." IEEE-ACM TRANSACTIONS ON NETWORKING 18, no. 3, 934-947 - 934-947.
  • Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity And Full-Coverage Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Le,Thang; Sinha,Prasun; Xuan,Dong, 2010, "Turning heterogeneity into an advantage in wireless ad-hoc network routing." AD HOC NETWORKS 8, no. 1, 108-118 - 108-118.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Guarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3-4, 253-263 - 253-263.
  • Dai,Jiangpeng; Bai,Xiaole; Yang,Zhimin; Shen,Zhaohui; Xuan,Dong, 2010, "Mobile phone-based pervasive fall detection." PERSONAL AND UBIQUITOUS COMPUTING 14, no. 7, 633-643 - 633-643.

2009

  • Ai Chen, Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier-Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1,
  • Ai Chen,Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1, 2 - 2.
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan, 2009, "Sensor Network Configuration under Physical Attacks." International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 4, no. 3-4, 174-182 - 174-182.
  • Chen,Ai; Lai,Ten,H; Xuan,Dong, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1, 2 - 2.

2008

  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan, 2008, "Peer-to-Peer System-based Active Worm Attacks: Modeling, Analysis and Defense." Journal of Computer Communications (COMCOM) 31, no. 17, 4005-4017 - 4005-4017.
  • Wei Yu, Sriram Chellappan, Xun Wang and Dong Xuan, 2008, "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense." COMPUTER COMMUNICATIONS 31, no. 17, 4005-4017 - 4005-4017.

2007

  • Sriram Chellappan*, Xiaole Bai*, Bin Ma, Dong Xuan and Changqing Xu, 2007, "Mobility Limited Flip-based Sensor Networks Deployment." IEEE Transactions on Parallel and Distributed Systems (TPDS) 18, no. 2, 199-211 - 199-211.
  • Chellappan,Sriram; Bai,Xiaole; Ma,Bin; Xuan,Dong; Xu,Changqing, 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199-211 - 199-211.
  • Sriram Chellappan*, Wenjun Gu*, Xiaole Bai*, Dong Xuan, Bin Ma and Kaizhong Zhang, 2007, "Deploying Wireless Sensor Networks under Limited Mobility Constraints." IEEE Transactions on Mobile Computing (TMC) 6, no. 10, 1142-1157 - 1142-1157.
  • Gu,Wenjun; Bai,Xiaole; Chellappan,Sriram; Xuan,Dong; Jia,Weijia, 2007, "Network decoupling: A methodology for secure communications in wireless sensor networks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 12, 1784-1796 - 1784-1796.

2006

  • Shengquan Wang, Zhibin Mai, Dong Xuan and Wei Zhao, 2006, "Design and Implementation of QoS-Provisioning System for Voice over IP." IEEE Transactions on Parallel and Distributed Systems (TPDS) 17, no. 3, 276-288 - 276-288.
  • Wei Yu, Sriram Chellappan*, Dong Xuan and Wei Zhao, 2006, "Distributed Policy Processing in Active-Service based Infrastructures." International Journal of Communication Systems (IJCS) 19, no. 7, 727-750 - 727-750.
  • Li Xiao, Yunhao Liu, Wenjun Gu*, Dong Xuan and Xiaomei Liu, 2006, "Mutual Anonymous Overlay Multicast." Journal of Parallel and Distributed Computing (JPDC) 66, no. 9, 1205-1216 - 1205-1216.
  • Wang,Xun; Chellappan,Sriram; Boyer,Phillip; Xuan,Dong, 2006, "On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17, no. 7, 619-632 - 619-632.
  • Wei Yu,Thang Nam Le*, Jangwon Lee and Dong Xuan, 2006, "Effective Query Aggregation for Data Services in Sensor Networks." Journal of Computer Communications (COMCOM) 29, no. 18, 3733-3744 - 3733-3744.

2005

  • Shengquang Wang, Dong Xuan and Wei Zhao, 2005, "Analyzing and Enhancing the Resilience of Structured Peer-to-Peer Systems." Journal of Parallel and Distributed Computing (JPDC) 65, no. 2, 207-219 - 207-219.
  • Wei Yu,Sriram Chellappan* and Dong Xuan, 2005, "P2P/Grid-based Overlay Architecture to Support VoIP Services in Large-Scale IP Networks." Journal of Future Generation Computer Systems (FGCS) 21, no. 1, 209-219 - 209-219.

2004

  • Jia,W,J; Xuan,D; Tu,W,Q; Lin,L,D; Zhao,W, 2004, "Distributed admission control for anycast flows." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 15, no. 8, 673-686 - 673-686.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks." IEEE/ACM Transactions on Networking (ToN) 12, no. 2, 326-339 - 326-339.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.
  • Wang,S,Q; Xuan,D; Bettati,R; Zhao,W, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.

2003

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based admission control for scalable real-time communication." REAL-TIME SYSTEMS 24, no. 2, 171-202 - 171-202.
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based Admission Control for Scalable Real-Time Communication." Journal of Real-Time Systems (JRTS) 24, no. 2, 171-202 - 171-202.

2001

  • Guan,Y; Fu,X,W; Xuan,D; Shenoy,P,U; Bettati,R; Zhao,W, 2001, "NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications." IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS 31, no. 4, 253-265 - 253-265.

2000

  • Weijia Jia, Dong Xuan and Wei Zhao, 2000, "Integrated Routing Algorithms for Anycast Messages." IEEE Communication Magazine 38, no. 1, 48-53 - 48-53.
  • Dong Xuan, Weijia Jia, Wei Zhao and Hongwen Zhu, 2000, "A Routing Protocol for Anycast Messages." IEEE Transactions on Parallel and Distributed Systems (TPDS) 11, no. 6, 571-588 - 571-588.

1999

  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu, 1999, "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-based Tree Techniques." IEEE Transactions on Parallel and Distributed Systems (TPDS) 10, no. 10, 984-1000 - 984-1000.
  • Jia,W,J; Zhao,W; Xuan,D; Xu,G,C, 1999, "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 10, no. 10, 984-1000 - 984-1000.

Unknown

  • Xuan, D.; Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zh,, "SurvSurf: human retrieval on large surveillance video data.." Multimedia Tools Applications 76, no. 5, 6521-6549 - 6521-6549.

Presentations

  • "Resource Over-Provisioning for Network Systems and Services." 2007, Presented at Department of Computer Science, Central South University, China,
  • "Scalable QoS Guarantees over IP Networks." 2002, Presented at Lucent Technologies Inc., USA,
  • "Resource Over-Provisioning for Network Systems and Services." 2006, Presented at College of Engineering and Computer Science, Wright State University, USA,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Department of Computer Science and Engineering, Temple University, USA,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, Virginia Tech,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science and Engineering, Temple University,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, George Washington University,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science, North Carolina State University, USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science and Engineering, University of Buffalo (SUNY), USA,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Polytechnic University of Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Xi’An Jiao Tong University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2009, Presented at Department of Electrical and Computer Science, Illinois Institute of Technology, USA,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2010, Presented at Department of Automation Control, Zhejiang University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Institute of Electronic Technology, China,
  • "Connected Coverage in Three-Dimensional Wireless Networks." 2009, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2011, Presented at School of Computer Science, Southeast University, China,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Institute of Computing Technology, China,
  • "Invisible Traceback in the Internet." 2008, Presented at PolyNet IT Symposium, Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Automation Control, Zhejiang University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Departmeng of Computer Science ,Wuhan University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Department of Electronic and Computer Engineering, Huazhong University of Science and Technology, China,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Bell Labs, New Jersey,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2011, Presented at Institute of Electronic Technology, China,

Papers in Proceedings

2017

  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On Human Mobility Predictability Via WLAN Logs." in IEEE Conference on Computer Communications (INFOCOM). (1 2017).
  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On Human Mobility Predictability Via WLAN Logs." (1 2017).
  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On human mobility predictability via WLAN logs." (10 2017).
  • Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, ; Cao, Y. "On Human Mobility Predictability via WLAN Logs." in IEEE International Conference on Computer Communications (INFOCOM). (5 2017).

2016

  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." (1 2016).
  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." (1 2016).
  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." in 35th IEEE Annual International Conference on Computer Communications (IEEE INFOCOM). (1 2016).
  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." in 35th IEEE Annual International Conference on Computer Communications (IEEE INFOCOM). (1 2016).
  • Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan and Biao Chen "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." in IEEE International Conference on Computer Communications (INFOCOM). (4 2016).
  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic at-a-glance: Time-bounded analytics on large visual traffic data." (7 2016).
  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing mobile phones for accurate indoor localization." (7 2016).
  • Fan Yang, Qiang Zhai, Guoxing Chen, Adadm C. Champion, Junda Zhu and Dong Xuan "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." in IEEE International Conference on Computer Communications (INFOCOM). (4 2016).

2015

  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local Face-View Barrier Coverage in Camera Sensor Networks." in 34th IEEE Conference on Computer Communications (INFOCOM). (1 2015).
  • Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin and Dong Xuan "Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices." in EEE International Conference on Distributed Computing Systems (ICDCS). (6 2015).
  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local face-view barrier coverage in camera sensor networks." (8 2015).
  • Zuoming Yu, Fan Yang*, Jin Teng*, Adam C. Champion*, and Dong Xuan "Local Face-View Barrier Coverage in Camera Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). (4 2015).
  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local Face-View Barrier Coverage in Camera Sensor Networks." (1 2015).
  • Qiang Zhai*, Sihao Ding, Xinfeng Li*, Fan Yang*, Jin Teng*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "M-Tracking: Visual-Motion Sensing Integration for Real-time Human Tracking." in IEEE International Conference on Computer Communications (INFOCOM). (4 2015).
  • Ying Li, Sihao Ding, Qiang Zhai*, Yuan F. Zheng and Dong Xuan "Human Feet Tracking Guided by Locomotion Model." in IEEE International Conference on Robotics and Automation (ICRA). (5 2015).

2014

  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-Shadow: Lubricating Social Interaction Using Mobile Phones." (6 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected Coverage in Wireless Networks with Directional Antennas." (4 2014).
  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-Shadow: Lubricating Social Interaction Using Mobile Phones." (6 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected Coverage in Wireless Networks with Directional Antennas." (4 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-sounding: A visual assisted electronic channel sounding system." (1 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected coverage in wireless networks with directional antennas." (1 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-Sounding: A Visual Assisted Electronic Channel Sounding System." in 33rd IEEE Annual Conference on Computer Communications (IEEE INFOCOM). (1 2014).
  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-shadow: Lubricating social interaction using mobile phones." (1 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-Sounding: A Visual Assisted Electronic Channel Sounding System." (1 2014).
  • Gang Li, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan, Hong Luan and Yuan F. Zheng "EV-Sounding: A Visual Assisted Wireless Channel Sounding System." in IEEE International Conference on Computer Communications (INFOCOM). (4 2014).

2013

  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains." (11 2013).
  • Boxuan Gu*, Xinfeng Li*, Gang Li*, Adam C. Champion*, Zhezhe Chen, Feng Qin and Dong Xuan "D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources." in IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. et al. "On Wireless Network Coverage in Bounded Areas." (1 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel Packet Size-Based Covert Channel Attacks against Anonymizer." (12 2013).
  • Sihao Ding, Qiang Zhai, Yuan F. Zheng and Dong Xuan "Side-View Face Authentication based on Wavelet and Random Forest." in IEEE Intelligence and Security Informatics (ISI). (6 2013).
  • Zhaoyang Zhang, Honggang Wang, Xiaodong Lin, Hua Fang and Dong Xuan "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Zuoming Yu, Jin Teng*, Xinfeng Li* and Dong Xuan "On Wireless Network Coverage in Bounded Areas." in IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view Face Authentication Based on Wavelet and Random Forest with Subsets." (1 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel Packet Size-Based Covert Channel Attacks against Anonymizer." (12 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." (1 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." in 32nd IEEE INFOCOM Conference. (1 2013).
  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A robust mobile internet service system for long-distance trains." (10 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. "On wireless network coverage in bounded areas." (9 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (3 2013).
  • Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan "Robust Video-based Face Recognition by Sequential Sample Consensus." in IEEE International Conference on Advanced Video and Singal-based Surveillance (AVSS). (8 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (3 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective epidemic control and source tracing through mobile social sensing over WBANs." (9 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (1 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel packet size-based covert channel attacks against anonymizer." (11 2013).
  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains." (11 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view Face Authentication Based on Wavelet and Random Forest with Subsets." in 11th IEEE International Conference on Intelligence and Security Informatics (IEEE ISI). (1 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. "On Wireless Network Coverage in Bounded Areas." in 32nd IEEE INFOCOM Conference. (1 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view face authentication based on wavelet and random forest with subsets." (9 2013).
  • Xinfeng Li*, Jin Teng*, Qiang Zhai*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "EV-Human: Human Localization via Visual Estimation of Body Electronic Interference." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (4 2013).

2012

  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A new cell-counting-based attack against tor." (1 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (6 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern mutation in wireless sensor deployment." (12 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." in IEEE INFOCOM Conference. (1 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." (1 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." (1 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A service for controlling information dissemination in wireless networks." (6 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting unobtrusive and secure mobile communications with a ubiquitous electronic world." (9 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." in 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA). (1 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A New Cell-Counting-Based Attack Against Tor." (8 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (12 2012).
  • Adam Champion*, Xinfeng Li*, Qiang Zhai*, Jin Teng* and Dong Xuan "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." in the International Conference on Wireless Algorithms, Systems, and Applications (WASA),. (8 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (12 2012).
  • Xinfeng Li*, Jin Teng*, Boying Zhang*, Adam Champion* and Dong Xuan "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). (3 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A New Cell-Counting-Based Attack Against Tor." (8 2012).
  • Boying Zhang*, Jin Teng*, Junda Zhu, Xinfeng Li*, Dong Xuan and Yuan F. Zheng "EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (6 2012).
  • Jin Teng*, Junda Zhu, Boying Zhang*, Dong Xuan and Yuan F. Zheng "E-V: Efficient Visual Surveillance with Electronic Footprints." in IEEE International Conference on Computer Communications (INFOCOM). (3 2012).
  • Boxuan Gu*, Wenbin Zhang, Xiaole Bai*, Adam Champion*, Feng Qin and Dong Xuan "JSGuard: Shellcode Detection in JavaScript." in International Conference on Security and Privacy in Communication Networks (SecureComm),. (9 2012).

2011

  • Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu and Dong Xuan "A Novel Packet Size Based Covert Channel Attack against Anonymizer." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Zhang, B.; Teng, J.; Bai, X.; Yang, Z. et al. "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." (1 2011).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Biao Chen and Wei Zhao "Optimal Multiple-Coverage of Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). (4 2011).
  • Junda Zhu, Jin Teng*, Dong Xuan, and Yuan F. Zheng, "Effective Visual Tracking with Electronic Localization by Directional Antennas." in IEEE National Aerospace Electronics Conference (NAECON). (7 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal multiple-coverage of sensor networks." (8 2011).
  • Zuoming Yu, Jin Teng*, Xiaole Bai*, Dong Xuan and Weijia Jia "Connected Coverage in Wireless Networks with Directional Antennas." in IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Boying Zhang*, Jin Teng*, Xiaole Bai*, Zhimin Yang* and Dong Xuan "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." in IEEE International Conference on Pervasive Computing and Communications (PerCom). (1 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal Multiple-Coverage of Sensor Networks." (1 2011).
  • Fung Po Tso, Li Cui, Lizhuo Zhang, Weijia Jia, Di Yao, JinTeng* and Dong Xuan "DragonNet: A Robust Mobile Internet Service System for Long Distance Trains." in IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal Multiple-Coverage of Sensor Networks." in IEEE INFOCOM Conference. (1 2011).
  • Zhang, B.; Teng, J.; Bai, X.; Yang, Z. et al. "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." in IEEE International Conference on Pervasive Computing and Communications (PerCom). (1 2011).
  • Jin Teng*, Boying Zhang*, Xinfeng Li*, Xiaole Bai* and Dong Xuan "E-Shadow: Lubricating Social Interaction using Mobile Phones." in 31st International Conference on Distributed Computing Systems (ICDCS). (1 2011).

2010

  • Dai, J.; Teng, J.; Bai, X.; Shen, Z. et al. "Mobile phone based drunk driving detection." (7 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious shellcode detection with virtual memory snapshots." (6 2010).
  • Dai, J.; Bai, X.; Yang, Z.; Shen, Z. et al. "PerFallD: A pervasive fall detection system using mobile phones." (7 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious Shellcode Detection with Virtual Memory Snapshots." in Conference on IEEE INFOCOM. (1 2010).
  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." in International Conference on Distributed Computing Systems (ICDCS 2010). (1 2010).
  • Zhimin Yang*, Boying Zhang*, Jiangpeng Dai^, Adam Champion*, Dong Xuan and Du Li "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." in International Conference on Distributed Computing Systems (ICDCS 2010). (1 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious Shellcode Detection with Virtual Memory Snapshots." (1 2010).
  • Jiangpeng Dai^, Jin Teng*, Xiaole Bai*, Zhaohui Shen and Dong Xuan "Mobile Phone based Drunk Driving Detection." in 4th International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health). (3 2010).
  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." (1 2010).
  • Boxuan Gu*, Xiaole Bai*, Zhimin Yang*, Adam Champion* and Dong Xuan "Malicious Shellcode Detection with Virtual Memory Snapshots." in IEEE International Conference on Computer Communications (INFOCOM). (1 2010).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Weijia Jia and Wei Zhao "Pattern Mutation in Wireless Sensor Deployment." in IEEE International Conference on Computer Communications (INFOCOM). (1 2010).
  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A distributed mobile system for social networking in physical proximity." (8 2010).
  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan "Mobility: A Double-Edged Sword for HSPA Networks,." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (9 2010).
  • Jiangpeng Dai^, Xiaole Bai*, Zhimin Yang*, Zhaohui Shen and Dong Xuan "PerFallD: A Pervasive Fall Detection System Using Mobile Phones." in IEEE Workshop on Pervasive Healthcare (PerHealth) conjunction with the 8th IEEE International Conference on Pervasive Computing and Communication (PerCom). (3 2010).

2009

  • Yang, Z.; Champion, A.C.; Gu, B.; Bai, X. et al. "Link-layer protection in 802.11i WLANs with dummy authentication." (9 2009).
  • Bai, X.; Ding, L.; Teng, J.; Chellappan, S. et al. "Directed Coverage in Wireless Sensor Networks: Concept and Quality." in 6th International Conference on Mobile Adhoc and Sensor Systems. (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." (1 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. "D-scan: Enabling fast and smooth handoffs in AP-dense 802.11 wireless networks." (10 2009).
  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan, Jin Teng* and Weijia Jia "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2009).
  • Ni, X.; Yang, Z.; Bai, X.; Champion, A.C. et al. "DiffUser: Differentiated User Access Control on Smartphones." (1 2009).
  • Bai, X.; Ding, L.; Teng, J.; Chellappan, S. et al. "Directed Coverage in Wireless Sensor Networks: Concept and Quality." (1 2009).
  • Xiaole Bai*, Lei Ding, Jin Teng*, Sriram Chellappan*, Changqing Xu and Dong Xuan "Directed Coverage in Wireless Sensor Networks: Concept and Quality." in International Conference on Mobile Adhoc and Sensor Systems (MASS). (1 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. et al. "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." (1 2009).
  • Xu, N.; Zhang, F.; Luo, Y.; Jia, W. et al. "Stealthy Video Capturer: A new video-based spyware in 3G Smartphones." (9 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." in 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-connectivity and full-coverage three dimensional wireless sensor networks." (11 2009).
  • Jin Teng*, Changqing Xu, Weijia Jia and Dong Xuan "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu "Blind Detection of Spread Spectrum Flow Watermarks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. "Full-coverage and k-connectivity (k =14, 6) three dimensional networks." (10 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." in IEEE INFOCOM Conference 2009. (1 2009).
  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan and Weijia Jia "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng* "Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones." in ACM Conference on Wireless Network Security (WiSec). (3 2009).
  • Xudong Ni^, Zhimin Yang*, Xiaole Bai*, Adam Champion* and Dong Xuan "DiffUser: Differentiated User Access Control on Smartphone." in International Workshop on Wireless and Sensor Networks Security (WSNS'09) conjunction with IEEE Mobile and Ad-hoc Sensor Systems (MASS). (10 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." in IEEE INFOCOM Conference 2009. (1 2009).
  • Ni, X.; Yang, Z.; Bai, X.; Champion, A.C. et al. "DiffUser: Differentiated User Access Control on Smartphones." in 6th International Conference on Mobile Adhoc and Sensor Systems. (1 2009).
  • Zheng Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia "A New Cell Counter Based Attack Against Tor." in ACM Conference on Computer and Communications Security (CCS). (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. et al. "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." (1 2009).
  • Zhimin Yang*, Boxuan Gu*, Adam Champion*, Xiaole Bai* and Dong Xuan "Link-Layer Protection in 802.11i WLANs wiht Dummy Authentication." in ACM Conference on Wireless Network Security (WiSec). (3 2009).

2008

  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." (9 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." (1 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." (1 2008).
  • Xiaole Bai*, Dong Xuan, Ziqiu Yun^, Ten H. Lai and Weijia Jia "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k." in 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k." (1 2008).
  • Wenjun Gu*, Zhimin Yang*, Can Que, Dong Xuan and Weijia Jia "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2008).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia "Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks." in IEEE Conference on Computer Communications (INFOCOM). (1 2008).
  • Xiaole Bai*, Wenjun Gu*, Sriram Chellappan*, Xun Wang*, Dong Xuan and Bin Ma "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." in Annual Computer Security Applications Conference (ACSAC). (1 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete optimal deployment patterns for full-coverage and κ-connectivity (κ < 6) wireless sensor networks." (12 2008).
  • Ai Chen, Ten H. Lai and Dong Xuan "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2008).
  • Chen, A.; Lai, T.H.; Xuan, D. "Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks." (12 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On security vulnerabilities of null data frames in IEEE 802.11 based WLANs." (9 2008).
  • Chen, A.; Lai, T.H.; Xuan, D. "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." in 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2008).
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." in 27th IEEE Conference on Computer Communications (INFOCOM 2008). (1 2008).
  • Wang, X.; Yu, W.; Fu, X.; Xuan, D. et al. "iLOC: An invisible LOCalization attack to Internet threat monitoring systems." (1 2008).
  • Xun Wang*, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao "iLOC: An Invisible LOCalization Attack to Internet Threat Monitoring System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2008).
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." (1 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." in 28th International Conference on Distributed Computing Systems. (1 2008).
  • Wang, X.; Yu, W.; Fu, X.; Xuan, D. et al. "iLOC: An invisible LOCalization attack to Internet threat monitoring systems." in 27th IEEE Conference on Computer Communications (INFOCOM 2008). (1 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based authentication services against powerful passive adversaries." (12 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." in 24th Annual Computer Security Applications Conference. (1 2008).
  • Chen, A.; Lai, T.H.; Xuan, D.; ACM, "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." (1 2008).

2007

  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." in 3rd International Conference o Security and Privacy in Communication Networks and Workshops. (1 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-Based flow marking technique for invisible traceback." in IEEE Symposium on Security and Privacy (S&P 2007). (1 2007).
  • Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and Wei Zhao "DSSS-Based Flow Marking Technique for Invisible Traceback." in IEEE Symposium on Security and Privacy (S&P). (1 2007).
  • Yang, Z.; Ekici, E.; Xuan, D. "A localization-based anti-sensor network system." in 26th IEEE Conference on Computer Communications (INFOCOM 2007). (1 2007).
  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Zhimin, Y.; Ekici, E.; Dong, X. "A localization-based anti-sensor network system." (9 2007).
  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." (12 2007).
  • Zhimin Yang*, Eylem Ekici and Dong Xuan "A localization-based Anti-Sensor Network System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2007).
  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." (1 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-Based flow marking technique for invisible traceback." (1 2007).
  • Xun Wang*, Wei Yu, Adam Champion*, Xinwen Fu and Dong Xuan "Detecting Worms via Mining Dynamic Program Execution." in International Conference on Security and Privacy in Communication Networks (SecureComm). (1 2007).
  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Yang, Z.; Ekici, E.; Xuan, D.; IEEE, "A localization-based anti-sensor network system." (1 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-based flow marking technique for invisible traceback." (9 2007).

2006

  • Le, T.N.; Yu, W.; Bai, X.; Xuan, D. et al. "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." (1 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. "Effective detection of active worms with Varying Scan Rate." (12 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. et al. "Effective detection of active worms 14 with varying scan rate." (1 2006).
  • Wei Yu, Xun Wang*, Dong Xuan and David Lee "Effective Detection of Active Worms with Varying Scan Rate." in International Conference on Security and Privacy in Communication Networks (SecureComm). (8 2006).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." in IEEE Wireless Communications and Networking Conference. (1 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." (1 2006).
  • Xiaole Bai*, Santosh Kumar, Dong Xuan, Ziqiu Yun^ and Ten H. Lai "Deploying Wireless Sensors to Achieve Both Coverage and Connectivity." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." in 22nd Annual Computer Security Applications Conference. (1 2006).
  • Le, T.N.; Yu, W.; Bai, X.; Xuan, D. "A dynamic geographic hash table for data-centric storage in sensor networks." (12 2006).
  • Wenjun Gu*, Xiaole Bai*, Sriram Chellappan* and Dong Xuan "Network Decoupling for Secure Communications in Wireless Sensor Networks." in IEEE International Workshop on Quality of Service (IWQoS). (6 2006).
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao "On Detecting Camouflaging Worm." in Annual Computer Security Applications Conference (ACSAC). (12 2006).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven physical attacks in sensor networks: Modeling and measurement." (12 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." (12 2006).
  • Bai, X.; Kumar, S.; Xuan, D.; Yun, Z. et al. "Deploying wireless sensors to achieve both coverage and connectivity." (9 2006).
  • Thang Nam Le*, Wei Yu, Xiaole Bai* and Dong Xuan "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." in IEEE Wireless Communications and Networking Conference (WCNC). (4 2006).
  • Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan and Xiaomei Liu "A Design of Overlay Anonymous Multicast Protocol." in IEEE International Parallel & Distributed Processing Symposium (IPDPS). (4 2006).
  • Xiao, L.; Liu, X.; Gu, W.; Xuan, D. et al. "A design of overlay anonymous multicast protocol." (12 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. "Effective detection of active worms 14 with varying scan rate." in 2nd International Conference on Security and Privacy in Communication Networks (SecureComm 2006). (1 2006).
  • Thang, N.L.; Yu, W.; Bai, X.; Xuan, D. "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." in IEEE Wireless Communications and Networking Conference. (1 2006).
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." in IEEE Wireless Communications and Networking Conference (WCNC). (1 2006).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." (1 2006).

2005

  • Le, T.N.; Xuan, D.; Yu, W. "An adaptive zone-based storage architecture for wireless sensor networks." (12 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." (9 2005).
  • Wang, X.; Gu, W.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." (10 2005).
  • Thang Nam Le*, Dong Xuan, and Wei Yu "An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2005).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Search-based physical attacks in sensor networks." (12 2005).
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan "Sensor Network Configuration under Physical Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2005).
  • Wang, X.; Gu, W.J.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." in IEEE International Conference on Communications (ICC 2005). (1 2005).
  • Wang, X.; Gu, W.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." (9 2005).
  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan "On Defending Peer-to-Peer System-based Active Worm Attacks." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2005).
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Search-based Physical Attacks in Sensor Networks." in IEEE International Conference on Computer Communications and Networks (ICCCN). (1 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. et al. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." (1 2005).
  • Wang, X.; Gu, W.J.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." (1 2005).
  • Wang, X.; Chellappan, S.; Gu, W.J.; Yu, W. et al. "Search-based physical attacks in sensor networks." (1 2005).
  • Le, T.N.; Xuan, D.; Yu, W.; IEEE, "An adaptive zone-based storage architecture for wireless sensor networks." (1 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. et al. "On defending peer-to-peer system-based active worm attacks." (1 2005).
  • Wang, X.; Gu, W.J.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." (1 2005).
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma and Dong Xuan "Sensor Network Deployment using Flip-based Sensors." in IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). (11 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. "On defending peer-to-peer system-based active worm attacks." (12 2005).
  • Chellappan, S.; Bai, X.; Ma, B.; Xuan, D. "Sensor networks deployment using flip-based sensors." (12 2005).
  • Gu, W.; Wang, X.; Chellappan, S.; Xuan, D. et al. "Defending against search-based physical attacks in sensor networks." (12 2005).
  • Xun Wang*, Wenjun Gu*, Sriram Chellappan*, Kurt Schosek and Dong Xuan "Lifetime Optimization of Sensor Networks under Physical Attacks." in IEEE International Conference on Communications (ICC). (1 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." in IEEE International Conference on Communications (ICC 2005). (1 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. "On defending peer-to-peer system-based active worm attacks." in IEEE Global Telecommunications Conference (GLOBECOM 05). (1 2005).
  • Wenjun Gu*, Xun Wang*, Sriram Chellappan*, Dong Xuan and Ten H. Lai "Defending against Search-based Physical Attacks in Sensor Networks." in of IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). (11 2005).
  • Wei Yu, Philip Coyer Boyer*, Sriram Chellappan* and Dong Xuan "Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis." in IEEE International Conference on Communications (ICC). (1 2005).
  • Wang, X.; Gu, W.J.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." in 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005). (1 2005).
  • Wang, X.; Chellappan, S.; Gu, W.J.; Yu, W. et al. "Search-based physical attacks in sensor networks." in 14th International Conference on Computer Communications and Networks. (1 2005).
  • Le, T.N.; Xuan, D.; Yu, W. "An adaptive zone-based storage architecture for wireless sensor networks." in IEEE Global Telecommunications Conference (GLOBECOM 05). (1 2005).

2004

  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati and Wei Zhao "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures." in International Workshop on Information Hiding (IH). (1 2004).
  • Wei Yu, Thang Nam Le*, Dong Xuan and Wei Zhao "Query Aggregation for Providing Efficient Data Services in Sensor Networks." in IEEE Mobile and Ad-hoc Sensor Systems (MASS). (10 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." (6 2004).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Dong Xuan, Sriram Chellappan*, Xun Wang* and Shengquan Wang "Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2004).
  • Fu, X.W.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and theoretical evaluation of active probing attacks and their countermeasures." in 6th International Workshop on Information Hiding. (1 2004).
  • Fu, X.W.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and theoretical evaluation of active probing attacks and their countermeasures." (1 2004).
  • Yu, W.; Le, T.N.; Xuan, D.; Zhao, W. "Query aggregation for providing efficient data services in sensor networks." (12 2004).
  • Fu, X.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures." (12 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S.Q. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." in 24th International Conference on Distributed Computing Systems. (1 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S.Q. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." (1 2004).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).

2003

  • Wang, S.; Xuan, D.; Zhao, W. "On Resilience of Structured Peer-to-Peer Systems." (12 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M. "RChord: An enhanced Chord system resilient to routing attacks." (1 2003).
  • Fu, X.; Graham, B.; Bettati, R.; Zhao, W. et al. "Analytical and empirical analysis of countermeasures to traffic analysis attacks." (1 2003).
  • Shengquan Wang, Dong Xuan and Wei Zhao "On Resilience of Structured Peer-to-Peer Systems." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2003).
  • Wang, S.Q.; Xuan, D.; Zhao, W. "On resilience of structured peer-to-peer systems." in IEEE Global Telecommunications Conference (GLOBECOM 03). (1 2003).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "A study of providing statistical QoS in a differentiated services network." (1 2003).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "A study of providing statistical QoS in a differentiated sevices network." in 2nd IEEE International Symposium on Network Computing and Applications. (1 2003).
  • Dong Xuan, Sriram Chellappan* and Muralidhar Krishnamoorthy "RChord: An Enhanced Chord System Resilient to Routing Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2003).
  • Chen, X.Z.; Wang, C.F.; Xuan, D.; Li, Z.C. et al. "Survey on QoS management of VoIP." (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." (1 2003).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. et al. "A study of providing statistical QoS in a differentiated sevices network." (1 2003).
  • Wang, S.Q.; Xuan, D.; Zhao, W.; IEEE, "On resilience of structured peer-to-peer systems." (1 2003).
  • Zhibin Mai, Shengquan Wang, Dong Xuan and Wei Zhao "Group Aggregation for Scalable Anycast Routing." in IEEE International Performance, Computing and Communications Conference (IPCCC). (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." in 4th Annual IEEE Information Assurance Workshop. (1 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M.; SOCIETY, I.C. et al. "RChord: An enhanced chord system resilient to routing attacks." (1 2003).
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "A Study of Providing Statistical QoS in A Differentiated Sevices Network." in IEEE International Symposium on Network Computing and Applications (NCA). (1 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M. "RChord: An enhanced chord system resilient to routing attacks." in 2nd International Conference on Computer Networks and Mobile Computing. (1 2003).
  • Mai, Z.B.; Wang, S.Q.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." in IEEE International Performance, Computing and Communications Conference. (1 2003).
  • Mai, Z.B.; Wang, S.Q.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." (1 2003).
  • Chen, X.Z.; Wang, C.F.; Xuan, D.; Li, Z.C. et al. "Survey on QoS management of VoIP." in 2nd International Conference on Computer Networks and Mobile Computing. (1 2003).
  • Mai, Z.; Wang, S.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." (1 2003).
  • Chen, X.; Wang, C.; Xuan, D.; Li, Z. et al. "Survey on QoS management of VoIP." (1 2003).
  • Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati and Wei Zhao "Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks." in IEEE Information Assurance Workshop (IAW). (1 2003).
  • Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao and Dong Xuan "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks." in International Conference on Parallel Processing (ICPP). (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." (1 2003).
  • Xiuzhong Chen, Chunfeng Wang, Dong Xuan, Zhongcheng Li, Yinghua Min and Wei Zhao "Survey on QoS Management of VoIP." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2003).

2002

  • Wang, S.; Mai, Z.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." (12 2002).
  • Yu, W.; Xuan, D.; Zhao, W. "Middleware-based approach for preventing distributed deny of service attacks." (12 2002).
  • Wang, S.Q.; Mai, Z.B.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." (1 2002).
  • Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan and Wei Zhao "Implementation of QoS-Provisioning System for Voice over IP." in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). (1 2002).
  • Wang, S.Q.; Mai, Z.B.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." in 8th IEEE Real-Time and Embedded Technology and Applications Symposium. (1 2002).
  • Wei Yu, Dong Xuan and Wei Zhao "Middleware based Approach for Preventing Distributed Denial of Service Attacks." in IEEE Military Communications (MILCOM). (10 2002).

2001

  • Xuan, D.; Jia, W.J.; SOCIETY, I.C.; SOCIETY, I.C. "Distributed Admission Control for anycast flows with QoS requirements." (1 2001).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." in 22nd IEEE Real-Time Systems Symposium (RTSS 2001). (1 2001).
  • Dong Xuan, Riccardo Bettati and Wei Zhao "A Gateway-Based Defense System for Distributed DoS Attacks in High Speed Networks." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).
  • Shengquan Wang, Dong Xuan, Riccarod Bettati and Wei Zhao "Providing Absolute Differentiated Services for Real-time Applications in Static-Priority Scheduling Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2001).
  • Xuan, D.; Jia, W.J. "Distributed Admission Control for anycast flows with QoS requirements." in 21st IEEE International Conference on Distributed Computing Systems. (1 2001).
  • Dong Xuan and Weijia Jia "Distributed Admission Control for Anycast Flows with QoS Requirements." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2001).
  • Wei Yu, Dong Xuan, Bryan Graham, S. Santhanam, Riccardo Bettati and Wei Zhao "An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." (12 2001).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. et al. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." (1 2001).
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "Differentiated Services with Statistical Real-time Guarantees in Static-Priority Scheduling Networks." in IEEE Real-Time Systems Symposium (RTSS). (1 2001).
  • Xuan, D.; Jia, W. "Distributed admission control for anycast flows with QoS requirements." (1 2001).

2000

  • Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen and Wei Zhao "Utilization-based Admission Control for Real-time Applications." in International Conference on Parallel Processing (ICPP). (1 2000).
  • Xuan, D.; Li, C.Z.; Bettati, R.; Chen, J.N. et al. "Utilization-based admission control for real-time applications." (1 2000).
  • Jia, W.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).
  • Jia, W.J.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).
  • Xuan, D.; Li, C.; Bettati, R.; Chen, J. et al. "Utilization-based admission control for real-time applications." (1 2000).
  • Jia, W.J.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).
  • Xuan, D.; Li, C.Z.; Bettati, R.; Chen, J.N. et al. "Utilization-based admission control for real-time applications." in International Conference on Parallel Processing (ICPP 2000). (1 2000).
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao "Scalable QoS Guaranteed Communication Services for Real-Time Applications." in IEEE International Conference on Distributed Computing Systems (ICDCS). (4 2000).

1999

  • Jia, W.; Zhao, W.; Xuan, D.; Xu, G. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).
  • Yong Guan, Chengzhi Li, Dong Xuan, Riccardo Bettati and Wei Zhao "Preventing Traffic Analysis for Real-Time Communication Networks." in IEEE Military Communications (MILCOM). (10 1999).
  • Weijia Jia, Gaochao Xu, Wei Zhao and Dong Xuan "An Integrated Routing Protocol for Reliable Anycast and Multicast Communications." in International Conference on Parallel and Distributed Computing Systems (ICPDCS). (8 1999).
  • Jia, W.J.; Zhao, W.; Xuan, D.; Xu, G.C. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).
  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques." in IEEE International Conference on Parallel Processing (ICPP). (8 1999).
  • Jia, W.J.; Zhao, W.; Xuan, D.; Xu, G.C. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).

1998

  • Weijia Jia, Dong Xuan and Wei Zhao "Integrated Routing Algorithms for Anycast Messages." in IEEE Global Telecommunications Conference (GLOBECOM). (1 1998).
  • Xuan, D.; Jia, W.J.; Zhao, W. "Routing algorithms for anycast messages." (1 1998).
  • Xuan, D.; Jia, W.J.; Zhao, W. "Routing algorithms for anycast messages." in International Conference on Parallel Processing (ICPP). (1 1998).
  • Dong Xuan, Weijia Jia and Wei Zhao "Routing Algorithms for Anycast Messages." in IEEE International Conference on Parallel Processing (ICPP). (8 1998).
  • Xuan, D.; Jia, W.; Zhao, W. "Routing algorithms for anycast messages." (1 1998).

Patents

  • Dong Xuan, Yuan F. Zheng, Wei Zhao, Jin Teng, Junda Zhu, Boying Zhang, Xinfeng Li, Biao Chen and Wei Li. "E-V: Integrating Electronic and Visual Signals for Efficient Surveillance."