You are here

Dong Xuan

  • Professor, Computer Science & Engineering
  • 593 Dreese Laboratories
    2015 Neil Ave
    Columbus, OH 43210
  • 614-292-2958

Honors

  • 20090101

    College of Engineering Lumley Research Award.

  • 20051201

    CAREER Award.

  • 20021001

    SBC/Ameritech Faculty Fellow.

  • 20010501

    Graduate Research Excellence Award.

  • 20000801

    TxTEC Graduate Research Award.

  • 19970101

    Outstanding Teaching Award.

  • 19951001

    Scientific and Technological Achievement 1st Prize Award, Principle Contributor.

  • 19930301

    Graduate Student Excellence Award.

Chapters

2008

  • 2008. "Delay Performance and Management of VoIP System." In VoIP Handbook: Applications, Technologies, Reliability, and Security,

2004

  • 2004. "Resilience of Structured Peer-to-Peer Systems: Analysis and Enhancement." In Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks,

Journal Articles

2016

  • Ding, S.; Zhai, Q.; Li, Y.; Zhu, J. et al., 2016, "Simultaneous body part and motion identification for human-following robots." PATTERN RECOGNITION 50, 118-130 - 118-130.

2012

  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan, 2012, "Mobility: A Double-Edged Sword for HSPA Networks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 23, no. 10, 1895-1907 - 1895-1907.

2011

  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection of Camouflaging Worm." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.
  • Liao,Lin; Chen,Weifeng; Zhang,Chuanlin; Zhang,Lizhuo; Xuan,Dong; Jia,Weijia, 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 60, no. 5, 2239-2252 - 2239-2252.
  • Nan Xu, Weijia Jia, Yisha Luo, Fan Zhang, Dong Xuan and Jin Teng*, 2011, "Stealthy Video Capture: An Opened Eye on You." IEEE Vehicular Technology Magazine 6, no. 4, 49-59 - 49-59.
  • Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al., 2011, "A Novel Packet Size Based Covert Channel Attack against Anonymizer." 2011 PROCEEDINGS IEEE INFOCOM 186-190 - 186-190.
  • Yu,Wei; Wang,Xun; Champion,Adam; Xuan,Dong; Lee,David, 2011, "On detecting active worms with varying scan rate." COMPUTER COMMUNICATIONS 34, no. 11, 1269-1282 - 1269-1282.
  • Liao, L.; Chen, W.; Zhang, C.; Zhang, L. et al., 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 60, no. 5, 2239-2252 - 2239-2252.
  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al., 2011, "E-Shadow: Lubricating Social Interaction using Mobile Phones." 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011) 909-918 - 909-918.

2010

  • Thang Le, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal, Elsevier 8, no. 1, 108-118 - 108-118.
  • Gu,Wenjun; Yang,Zhimin; Xuan,Dong; Jia,Weijia; Que,Can, 2010, "Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 21, no. 7, 897-910 - 897-910.
  • Zhang, C.; Bai, X.; Teng, J.; Xuan, D. et al., 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 28, no. 7, 984-993 - 984-993.
  • Thang Le*, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal 8, no. 1, 108-118 - 108-118.
  • Chuanlin Zhang, Xiaole Bai*, Jin Teng*, Dong Xuan and Weijia Jia, 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen and Dong Xuan, 2010, "Mobile Phone-based Pervasive Fall Detection." Journal of Personal and Ubiquitous Computing, Springer 14, no. 7, 633-643 - 633-643.
  • Dai, J.; Bai, X.; Yang, Z.; Shen, Z. et al., 2010, "Mobile phone-based pervasive fall detection." PERSONAL AND UBIQUITOUS COMPUTING 14, no. 7, 633-643 - 633-643.
  • Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia and Can Que, 2010, "Null Data Frame: A Double-edged Sword in IEEE 802.11 WLANs." IEEE Transactions on Distributed and Parallel Systems (TPDS) 14, no. 7, 897-910 - 897-910.
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al., 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE TRANSACTIONS ON MOBILE COMPUTING 9, no. 3, 435-448 - 435-448.
  • Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia, 2010, "Constructing low-connectivity and full-coverage three dimensional sensor networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Quarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3, 253-263 - 253-263.
  • Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity And Full-Coverage Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Dai,Jiangpeng; Bai,Xiaole; Yang,Zhimin; Shen,Zhaohui; Xuan,Dong, 2010, "Mobile phone-based pervasive fall detection." PERSONAL AND UBIQUITOUS COMPUTING 14, no. 7, 633-643 - 633-643.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Guarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3-4, 253-263 - 253-263.
  • Yun,Ziqiu; Bai,Xiaole; Xuan,Dong; Lai,Ten,H; Jia,Weijia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k." IEEE-ACM TRANSACTIONS ON NETWORKING 18, no. 3, 934-947 - 934-947.
  • Ziqiu Yun^, Xiaole Bai*, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." ACM/IEEE Transactions on Networking (ToN) 18, no. 3, 934-947 - 934-947.
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Le,Thang; Sinha,Prasun; Xuan,Dong, 2010, "Turning heterogeneity into an advantage in wireless ad-hoc network routing." AD HOC NETWORKS 8, no. 1, 108-118 - 108-118.

2009

  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan, 2009, "Sensor Network Configuration under Physical Attacks." International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 4, no. 3-4, 174-182 - 174-182.
  • Ai Chen,Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1, 2 - 2.
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al., 2009, "Blind Detection of Spread Spectrum Flow Watermarks." IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5 2195-+ - 2195-+.
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al., 2009, "A New Cell Counter Based Attack Against Tor." CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY 578-589 - 578-589.
  • Chen, A.; Lai, T.H.; Xuan, D., 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1,
  • Chen,Ai; Lai,Ten,H; Xuan,Dong, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1, 2 - 2.
  • Ai Chen, Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier-Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1,

2008

  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan, 2008, "Peer-to-Peer System-based Active Worm Attacks: Modeling, Analysis and Defense." Journal of Computer Communications (COMCOM) 31, no. 17, 4005-4017 - 4005-4017.
  • Wei Yu, Sriram Chellappan, Xun Wang and Dong Xuan, 2008, "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense." COMPUTER COMMUNICATIONS 31, no. 17, 4005-4017 - 4005-4017.

2007

  • Gu,Wenjun; Bai,Xiaole; Chellappan,Sriram; Xuan,Dong; Jia,Weijia, 2007, "Network decoupling: A methodology for secure communications in wireless sensor networks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 12, 1784-1796 - 1784-1796.
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma, Dong Xuan and Changqing Xu, 2007, "Mobility Limited Flip-based Sensor Networks Deployment." IEEE Transactions on Parallel and Distributed Systems (TPDS) 18, no. 2, 199-211 - 199-211.
  • Chellappan, S.; Bai, X.; Ma, B.; Xuan, D. et al., 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199-211 - 199-211.
  • Chellappan,Sriram; Bai,Xiaole; Ma,Bin; Xuan,Dong; Xu,Changqing, 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199-211 - 199-211.
  • Sriram Chellappan*, Wenjun Gu*, Xiaole Bai*, Dong Xuan, Bin Ma and Kaizhong Zhang, 2007, "Deploying Wireless Sensor Networks under Limited Mobility Constraints." IEEE Transactions on Mobile Computing (TMC) 6, no. 10, 1142-1157 - 1142-1157.
  • Chellappan, S.; Gu, W.; Bai, X.; Xuan, D. et al., 2007, "Deploying wireless sensor networks under limited mobility constraints." IEEE TRANSACTIONS ON MOBILE COMPUTING 6, no. 10, 1142-1157 - 1142-1157.

2006

  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al., 2006, "Network decoupling for secure communications in wireless sensor networks." 2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS 189-+ - 189-+.
  • Wang,Xun; Chellappan,Sriram; Boyer,Phillip; Xuan,Dong, 2006, "On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17, no. 7, 619-632 - 619-632.
  • Wei Yu,Thang Nam Le*, Jangwon Lee and Dong Xuan, 2006, "Effective Query Aggregation for Data Services in Sensor Networks." Journal of Computer Communications (COMCOM) 29, no. 18, 3733-3744 - 3733-3744.
  • Shengquan Wang, Zhibin Mai, Dong Xuan and Wei Zhao, 2006, "Design and Implementation of QoS-Provisioning System for Voice over IP." IEEE Transactions on Parallel and Distributed Systems (TPDS) 17, no. 3, 276-288 - 276-288.
  • Li Xiao, Yunhao Liu, Wenjun Gu*, Dong Xuan and Xiaomei Liu, 2006, "Mutual Anonymous Overlay Multicast." Journal of Parallel and Distributed Computing (JPDC) 66, no. 9, 1205-1216 - 1205-1216.
  • Wei Yu, Sriram Chellappan*, Dong Xuan and Wei Zhao, 2006, "Distributed Policy Processing in Active-Service based Infrastructures." International Journal of Communication Systems (IJCS) 19, no. 7, 727-750 - 727-750.

2005

  • Wei Yu,Sriram Chellappan* and Dong Xuan, 2005, "P2P/Grid-based Overlay Architecture to Support VoIP Services in Large-Scale IP Networks." Journal of Future Generation Computer Systems (FGCS) 21, no. 1, 209-219 - 209-219.
  • Shengquang Wang, Dong Xuan and Wei Zhao, 2005, "Analyzing and Enhancing the Resilience of Structured Peer-to-Peer Systems." Journal of Parallel and Distributed Computing (JPDC) 65, no. 2, 207-219 - 207-219.

2004

  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks." IEEE/ACM Transactions on Networking (ToN) 12, no. 2, 326-339 - 326-339.
  • Wang,S,Q; Xuan,D; Bettati,R; Zhao,W, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.
  • Jia,W,J; Xuan,D; Tu,W,Q; Lin,L,D; Zhao,W, 2004, "Distributed admission control for anycast flows." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 15, no. 8, 673-686 - 673-686.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.

2003

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based Admission Control for Scalable Real-Time Communication." Journal of Real-Time Systems (JRTS) 24, no. 2, 171-202 - 171-202.
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based admission control for scalable real-time communication." REAL-TIME SYSTEMS 24, no. 2, 171-202 - 171-202.

2001

  • Guan,Y; Fu,X,W; Xuan,D; Shenoy,P,U; Bettati,R; Zhao,W, 2001, "NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications." IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS 31, no. 4, 253-265 - 253-265.

2000

  • Xuan, D.; Jia, W.J.; Zhao, W.; Zhu, H.W., 2000, "A routing protocol for anycast messages." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 11, no. 6, 571-588 - 571-588.
  • Weijia Jia, Dong Xuan and Wei Zhao, 2000, "Integrated Routing Algorithms for Anycast Messages." IEEE Communication Magazine 38, no. 1, 48-53 - 48-53.
  • Dong Xuan, Weijia Jia, Wei Zhao and Hongwen Zhu, 2000, "A Routing Protocol for Anycast Messages." IEEE Transactions on Parallel and Distributed Systems (TPDS) 11, no. 6, 571-588 - 571-588.

1999

  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu, 1999, "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-based Tree Techniques." IEEE Transactions on Parallel and Distributed Systems (TPDS) 10, no. 10, 984-1000 - 984-1000.
  • Jia,W,J; Zhao,W; Xuan,D; Xu,G,C, 1999, "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 10, no. 10, 984-1000 - 984-1000.

Unknown

  • Xuan, D.; Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zh,, "SurvSurf: human retrieval on large surveillance video data.." Multimedia Tools Applications 76, no. 5, 6521-6549 - 6521-6549.

Presentations

  • "Resource Over-Provisioning for Network Systems and Services." 2007, Presented at Department of Computer Science, Central South University, China,
  • "Scalable QoS Guarantees over IP Networks." 2002, Presented at Lucent Technologies Inc., USA,
  • "Resource Over-Provisioning for Network Systems and Services." 2006, Presented at College of Engineering and Computer Science, Wright State University, USA,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Department of Computer Science and Engineering, Temple University, USA,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, Virginia Tech,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science and Engineering, Temple University,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, George Washington University,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science, North Carolina State University, USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science and Engineering, University of Buffalo (SUNY), USA,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Polytechnic University of Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Xi’An Jiao Tong University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2009, Presented at Department of Electrical and Computer Science, Illinois Institute of Technology, USA,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2010, Presented at Department of Automation Control, Zhejiang University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Institute of Electronic Technology, China,
  • "Connected Coverage in Three-Dimensional Wireless Networks." 2009, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2011, Presented at School of Computer Science, Southeast University, China,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Institute of Computing Technology, China,
  • "Invisible Traceback in the Internet." 2008, Presented at PolyNet IT Symposium, Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Automation Control, Zhejiang University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Departmeng of Computer Science ,Wuhan University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Department of Electronic and Computer Engineering, Huazhong University of Science and Technology, China,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Bell Labs, New Jersey,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2011, Presented at Institute of Electronic Technology, China,

Papers in Proceedings

2015

  • Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin and Dong Xuan "Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices." in EEE International Conference on Distributed Computing Systems (ICDCS). (6 2015).
  • Qiang Zhai*, Sihao Ding, Xinfeng Li*, Fan Yang*, Jin Teng*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "M-Tracking: Visual-Motion Sensing Integration for Real-time Human Tracking." in IEEE International Conference on Computer Communications (INFOCOM). (4 2015).
  • Ying Li, Sihao Ding, Qiang Zhai*, Yuan F. Zheng and Dong Xuan "Human Feet Tracking Guided by Locomotion Model." in IEEE International Conference on Robotics and Automation (ICRA). (5 2015).

2013

  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. et al. "On Wireless Network Coverage in Bounded Areas." (1 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel Packet Size-Based Covert Channel Attacks against Anonymizer." (12 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." (1 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (3 2013).
  • Boxuan Gu*, Xinfeng Li*, Gang Li*, Adam C. Champion*, Zhezhe Chen, Feng Qin and Dong Xuan "D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources." in IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan "Robust Video-based Face Recognition by Sequential Sample Consensus." in IEEE International Conference on Advanced Video and Singal-based Surveillance (AVSS). (8 2013).
  • Xinfeng Li*, Jin Teng*, Qiang Zhai*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "EV-Human: Human Localization via Visual Estimation of Body Electronic Interference." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (4 2013).

2012

  • Jin Teng*, Junda Zhu, Boying Zhang*, Dong Xuan and Yuan F. Zheng "E-V: Efficient Visual Surveillance with Electronic Footprints." in IEEE International Conference on Computer Communications (INFOCOM). (3 2012).
  • Boxuan Gu*, Wenbin Zhang, Xiaole Bai*, Adam Champion*, Feng Qin and Dong Xuan "JSGuard: Shellcode Detection in JavaScript." in International Conference on Security and Privacy in Communication Networks (SecureComm),. (9 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A New Cell-Counting-Based Attack Against Tor." (8 2012).
  • Boying Zhang*, Jin Teng*, Junda Zhu, Xinfeng Li*, Dong Xuan and Yuan F. Zheng "EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (6 2012).

2011

  • Junda Zhu, Jin Teng*, Dong Xuan, and Yuan F. Zheng, "Effective Visual Tracking with Electronic Localization by Directional Antennas." in IEEE National Aerospace Electronics Conference (NAECON). (7 2011).

2010

  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan "Mobility: A Double-Edged Sword for HSPA Networks,." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (9 2010).

2009

  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. et al. "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." (1 2009).

2008

  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k." (1 2008).

2006

  • Le, T.N.; Yu, W.; Bai, X.; Xuan, D. et al. "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." (1 2006).

2004

  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).

2001

  • Wei Yu, Dong Xuan, Bryan Graham, S. Santhanam, Riccardo Bettati and Wei Zhao "An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).
  • Shengquan Wang, Dong Xuan, Riccarod Bettati and Wei Zhao "Providing Absolute Differentiated Services for Real-time Applications in Static-Priority Scheduling Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2001).
  • Dong Xuan, Riccardo Bettati and Wei Zhao "A Gateway-Based Defense System for Distributed DoS Attacks in High Speed Networks." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).

2000

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao "Scalable QoS Guaranteed Communication Services for Real-Time Applications." in IEEE International Conference on Distributed Computing Systems (ICDCS). (4 2000).

1999

  • Yong Guan, Chengzhi Li, Dong Xuan, Riccardo Bettati and Wei Zhao "Preventing Traffic Analysis for Real-Time Communication Networks." in IEEE Military Communications (MILCOM). (10 1999).
  • Weijia Jia, Gaochao Xu, Wei Zhao and Dong Xuan "An Integrated Routing Protocol for Reliable Anycast and Multicast Communications." in International Conference on Parallel and Distributed Computing Systems (ICPDCS). (8 1999).
  • Jia, W.J.; Zhao, W.; Xuan, D.; Xu, G.C. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).

Patents

  • Dong Xuan, Yuan F. Zheng, Wei Zhao, Jin Teng, Junda Zhu, Boying Zhang, Xinfeng Li, Biao Chen and Wei Li. "E-V: Integrating Electronic and Visual Signals for Efficient Surveillance."