You are here

Dong Xuan

  • Professor, Computer Science & Engineering
  • 593 Dreese Laboratories
    2015 Neil Ave
    Columbus, OH 43210
  • 614-292-2958

Honors

  • 20090101

    College of Engineering Lumley Research Award.

  • 20051201

    CAREER Award.

  • 20021001

    SBC/Ameritech Faculty Fellow.

  • 20010501

    Graduate Research Excellence Award.

  • 20000801

    TxTEC Graduate Research Award.

  • 19970101

    Outstanding Teaching Award.

  • 19951001

    Scientific and Technological Achievement 1st Prize Award, Principle Contributor.

  • 19930301

    Graduate Student Excellence Award.

Chapters

2008

  • 2008. "Delay Performance and Management of VoIP System." In VoIP Handbook: Applications, Technologies, Reliability, and Security,

Journal Articles

2012

  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan, 2012, "Mobility: A Double-Edged Sword for HSPA Networks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 23, no. 10, 1895-1907 - 1895-1907.

2011

  • Liao,Lin; Chen,Weifeng; Zhang,Chuanlin; Zhang,Lizhuo; Xuan,Dong; Jia,Weijia, 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 60, no. 5, 2239-2252 - 2239-2252.
  • Yu,Wei; Wang,Xun; Champion,Adam; Xuan,Dong; Lee,David, 2011, "On detecting active worms with varying scan rate." COMPUTER COMMUNICATIONS 34, no. 11, 1269-1282 - 1269-1282.
  • Nan Xu, Weijia Jia, Yisha Luo, Fan Zhang, Dong Xuan and Jin Teng*, 2011, "Stealthy Video Capture: An Opened Eye on You." IEEE Vehicular Technology Magazine 6, no. 4, 49-59 - 49-59.
  • Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection of Camouflaging Worm." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377-390 - 377-390.

2010

  • Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity And Full-Coverage Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Thang Le, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal, Elsevier 8, no. 1, 108-118 - 108-118.
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435-448 - 435-448.
  • Ziqiu Yun^, Xiaole Bai*, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." ACM/IEEE Transactions on Networking (ToN) 18, no. 3, 934-947 - 934-947.
  • Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen and Dong Xuan, 2010, "Mobile Phone-based Pervasive Fall Detection." Journal of Personal and Ubiquitous Computing, Springer 14, no. 7, 633-643 - 633-643.
  • Yun,Ziqiu; Bai,Xiaole; Xuan,Dong; Lai,Ten,H; Jia,Weijia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k." IEEE-ACM TRANSACTIONS ON NETWORKING 18, no. 3, 934-947 - 934-947.
  • Chuanlin Zhang, Xiaole Bai*, Jin Teng*, Dong Xuan and Weijia Jia, 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia and Can Que, 2010, "Null Data Frame: A Double-edged Sword in IEEE 802.11 WLANs." IEEE Transactions on Distributed and Parallel Systems (TPDS) 14, no. 7, 897-910 - 897-910.
  • Le,Thang; Sinha,Prasun; Xuan,Dong, 2010, "Turning heterogeneity into an advantage in wireless ad-hoc network routing." AD HOC NETWORKS 8, no. 1, 108-118 - 108-118.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Quarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3, 253-263 - 253-263.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Guarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3-4, 253-263 - 253-263.
  • Dai,Jiangpeng; Bai,Xiaole; Yang,Zhimin; Shen,Zhaohui; Xuan,Dong, 2010, "Mobile phone-based pervasive fall detection." PERSONAL AND UBIQUITOUS COMPUTING 14, no. 7, 633-643 - 633-643.
  • Gu,Wenjun; Yang,Zhimin; Xuan,Dong; Jia,Weijia; Que,Can, 2010, "Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 21, no. 7, 897-910 - 897-910.
  • Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia, 2010, "Constructing low-connectivity and full-coverage three dimensional sensor networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984-993 - 984-993.
  • Thang Le*, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal 8, no. 1, 108-118 - 108-118.

2009

  • Ai Chen, Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier-Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1,
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan, 2009, "Sensor Network Configuration under Physical Attacks." International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 4, no. 3-4, 174-182 - 174-182.
  • Chen,Ai; Lai,Ten,H; Xuan,Dong, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1, 2 - 2.
  • Ai Chen,Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1, 2 - 2.

2008

  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan, 2008, "Peer-to-Peer System-based Active Worm Attacks: Modeling, Analysis and Defense." Journal of Computer Communications (COMCOM) 31, no. 17, 4005-4017 - 4005-4017.
  • Wei Yu, Sriram Chellappan, Xun Wang and Dong Xuan, 2008, "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense." COMPUTER COMMUNICATIONS 31, no. 17, 4005-4017 - 4005-4017.

2007

  • Gu,Wenjun; Bai,Xiaole; Chellappan,Sriram; Xuan,Dong; Jia,Weijia, 2007, "Network decoupling: A methodology for secure communications in wireless sensor networks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 12, 1784-1796 - 1784-1796.
  • Sriram Chellappan*, Wenjun Gu*, Xiaole Bai*, Dong Xuan, Bin Ma and Kaizhong Zhang, 2007, "Deploying Wireless Sensor Networks under Limited Mobility Constraints." IEEE Transactions on Mobile Computing (TMC) 6, no. 10, 1142-1157 - 1142-1157.
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma, Dong Xuan and Changqing Xu, 2007, "Mobility Limited Flip-based Sensor Networks Deployment." IEEE Transactions on Parallel and Distributed Systems (TPDS) 18, no. 2, 199-211 - 199-211.
  • Chellappan,Sriram; Bai,Xiaole; Ma,Bin; Xuan,Dong; Xu,Changqing, 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199-211 - 199-211.

2006

  • Li Xiao, Yunhao Liu, Wenjun Gu*, Dong Xuan and Xiaomei Liu, 2006, "Mutual Anonymous Overlay Multicast." Journal of Parallel and Distributed Computing (JPDC) 66, no. 9, 1205-1216 - 1205-1216.
  • Wei Yu, Sriram Chellappan*, Dong Xuan and Wei Zhao, 2006, "Distributed Policy Processing in Active-Service based Infrastructures." International Journal of Communication Systems (IJCS) 19, no. 7, 727-750 - 727-750.
  • Wang,Xun; Chellappan,Sriram; Boyer,Phillip; Xuan,Dong, 2006, "On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17, no. 7, 619-632 - 619-632.
  • Wei Yu,Thang Nam Le*, Jangwon Lee and Dong Xuan, 2006, "Effective Query Aggregation for Data Services in Sensor Networks." Journal of Computer Communications (COMCOM) 29, no. 18, 3733-3744 - 3733-3744.
  • Shengquan Wang, Zhibin Mai, Dong Xuan and Wei Zhao, 2006, "Design and Implementation of QoS-Provisioning System for Voice over IP." IEEE Transactions on Parallel and Distributed Systems (TPDS) 17, no. 3, 276-288 - 276-288.

2005

  • Wei Yu,Sriram Chellappan* and Dong Xuan, 2005, "P2P/Grid-based Overlay Architecture to Support VoIP Services in Large-Scale IP Networks." Journal of Future Generation Computer Systems (FGCS) 21, no. 1, 209-219 - 209-219.
  • Shengquang Wang, Dong Xuan and Wei Zhao, 2005, "Analyzing and Enhancing the Resilience of Structured Peer-to-Peer Systems." Journal of Parallel and Distributed Computing (JPDC) 65, no. 2, 207-219 - 207-219.

2004

  • Jia,W,J; Xuan,D; Tu,W,Q; Lin,L,D; Zhao,W, 2004, "Distributed admission control for anycast flows." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 15, no. 8, 673-686 - 673-686.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.
  • Wang,S,Q; Xuan,D; Bettati,R; Zhao,W, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326-339 - 326-339.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks." IEEE/ACM Transactions on Networking (ToN) 12, no. 2, 326-339 - 326-339.

2003

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based Admission Control for Scalable Real-Time Communication." Journal of Real-Time Systems (JRTS) 24, no. 2, 171-202 - 171-202.
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based admission control for scalable real-time communication." REAL-TIME SYSTEMS 24, no. 2, 171-202 - 171-202.

2001

  • Guan,Y; Fu,X,W; Xuan,D; Shenoy,P,U; Bettati,R; Zhao,W, 2001, "NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications." IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS 31, no. 4, 253-265 - 253-265.

2000

  • Dong Xuan, Weijia Jia, Wei Zhao and Hongwen Zhu, 2000, "A Routing Protocol for Anycast Messages." IEEE Transactions on Parallel and Distributed Systems (TPDS) 11, no. 6, 571-588 - 571-588.
  • Weijia Jia, Dong Xuan and Wei Zhao, 2000, "Integrated Routing Algorithms for Anycast Messages." IEEE Communication Magazine 38, no. 1, 48-53 - 48-53.

1999

  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu, 1999, "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-based Tree Techniques." IEEE Transactions on Parallel and Distributed Systems (TPDS) 10, no. 10, 984-1000 - 984-1000.
  • Jia,W,J; Zhao,W; Xuan,D; Xu,G,C, 1999, "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 10, no. 10, 984-1000 - 984-1000.

Unknown

  • Xuan, D.; Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zh,, "SurvSurf: human retrieval on large surveillance video data.." Multimedia Tools Applications 76, no. 5, 6521-6549 - 6521-6549.

Presentations

  • "Resource Over-Provisioning for Network Systems and Services." 2007, Presented at Department of Computer Science, Central South University, China,
  • "Scalable QoS Guarantees over IP Networks." 2002, Presented at Lucent Technologies Inc., USA,
  • "Resource Over-Provisioning for Network Systems and Services." 2006, Presented at College of Engineering and Computer Science, Wright State University, USA,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Department of Computer Science and Engineering, Temple University, USA,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, Virginia Tech,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science and Engineering, Temple University,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, George Washington University,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science, North Carolina State University, USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science and Engineering, University of Buffalo (SUNY), USA,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Polytechnic University of Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Xi’An Jiao Tong University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2009, Presented at Department of Electrical and Computer Science, Illinois Institute of Technology, USA,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2010, Presented at Department of Automation Control, Zhejiang University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Institute of Electronic Technology, China,
  • "Connected Coverage in Three-Dimensional Wireless Networks." 2009, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2011, Presented at School of Computer Science, Southeast University, China,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Institute of Computing Technology, China,
  • "Invisible Traceback in the Internet." 2008, Presented at PolyNet IT Symposium, Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Automation Control, Zhejiang University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Departmeng of Computer Science ,Wuhan University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Department of Electronic and Computer Engineering, Huazhong University of Science and Technology, China,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Bell Labs, New Jersey,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2011, Presented at Institute of Electronic Technology, China,

Papers in Proceedings

2017

  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On human mobility predictability via WLAN logs." (10 2017).
  • Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, ; Cao, Y. "On Human Mobility Predictability via WLAN Logs." in IEEE International Conference on Computer Communications (INFOCOM). (5 2017).
  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On Human Mobility Predictability Via WLAN Logs." (1 2017).
  • Cao, P.Y.; Li, G.; Champion, A.C.; Xuan, D. et al. "On Human Mobility Predictability Via WLAN Logs." in IEEE Conference on Computer Communications (INFOCOM). (1 2017).

2016

  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing mobile phones for accurate indoor localization." (7 2016).
  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic at-a-glance: Time-bounded analytics on large visual traffic data." (7 2016).
  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." (1 2016).
  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." (1 2016).
  • Yang, F.; Zhai, Q.; Chen, G.; Champion, A.C. et al. "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." in 35th IEEE Annual International Conference on Computer Communications (IEEE INFOCOM). (1 2016).
  • Li, X.; Li, G.; Yang, F.; Teng, J. et al. "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." in 35th IEEE Annual International Conference on Computer Communications (IEEE INFOCOM). (1 2016).
  • Fan Yang, Qiang Zhai, Guoxing Chen, Adadm C. Champion, Junda Zhu and Dong Xuan "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." in IEEE International Conference on Computer Communications (INFOCOM). (4 2016).
  • Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan and Biao Chen "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." in IEEE International Conference on Computer Communications (INFOCOM). (4 2016).

2015

  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local Face-View Barrier Coverage in Camera Sensor Networks." in 34th IEEE Conference on Computer Communications (INFOCOM). (1 2015).
  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local face-view barrier coverage in camera sensor networks." (8 2015).
  • Zuoming Yu, Fan Yang*, Jin Teng*, Adam C. Champion*, and Dong Xuan "Local Face-View Barrier Coverage in Camera Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). (4 2015).
  • Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin and Dong Xuan "Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices." in EEE International Conference on Distributed Computing Systems (ICDCS). (6 2015).
  • Qiang Zhai*, Sihao Ding, Xinfeng Li*, Fan Yang*, Jin Teng*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "M-Tracking: Visual-Motion Sensing Integration for Real-time Human Tracking." in IEEE International Conference on Computer Communications (INFOCOM). (4 2015).
  • Ying Li, Sihao Ding, Qiang Zhai*, Yuan F. Zheng and Dong Xuan "Human Feet Tracking Guided by Locomotion Model." in IEEE International Conference on Robotics and Automation (ICRA). (5 2015).
  • Yu, Z.; Yang, F.; Teng, J.; Champion, A.C. et al. "Local Face-View Barrier Coverage in Camera Sensor Networks." (1 2015).

2014

  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-Shadow: Lubricating Social Interaction Using Mobile Phones." (6 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-sounding: A visual assisted electronic channel sounding system." (1 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected Coverage in Wireless Networks with Directional Antennas." (4 2014).
  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-Shadow: Lubricating Social Interaction Using Mobile Phones." (6 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected Coverage in Wireless Networks with Directional Antennas." (4 2014).
  • Yu, Z.; Teng, J.; Bai, X.; Xuan, D. et al. "Connected coverage in wireless networks with directional antennas." (1 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-Sounding: A Visual Assisted Electronic Channel Sounding System." in 33rd IEEE Annual Conference on Computer Communications (IEEE INFOCOM). (1 2014).
  • Gang Li, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan, Hong Luan and Yuan F. Zheng "EV-Sounding: A Visual Assisted Wireless Channel Sounding System." in IEEE International Conference on Computer Communications (INFOCOM). (4 2014).
  • Li, G.; Teng, J.; Yang, F.; Champion, A.C. et al. "EV-Sounding: A Visual Assisted Electronic Channel Sounding System." (1 2014).
  • Teng, J.; Zhang, B.; Li, X.; Bai, X. et al. "E-shadow: Lubricating social interaction using mobile phones." (1 2014).

2013

  • Zhaoyang Zhang, Honggang Wang, Xiaodong Lin, Hua Fang and Dong Xuan "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Zuoming Yu, Jin Teng*, Xinfeng Li* and Dong Xuan "On Wireless Network Coverage in Bounded Areas." in IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains." (11 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view Face Authentication Based on Wavelet and Random Forest with Subsets." (1 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel Packet Size-Based Covert Channel Attacks against Anonymizer." (12 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." (1 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. et al. "On Wireless Network Coverage in Bounded Areas." (1 2013).
  • Boxuan Gu*, Xinfeng Li*, Gang Li*, Adam C. Champion*, Zhezhe Chen, Feng Qin and Dong Xuan "D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources." in IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Sihao Ding, Qiang Zhai, Yuan F. Zheng and Dong Xuan "Side-View Face Authentication based on Wavelet and Random Forest." in IEEE Intelligence and Security Informatics (ISI). (6 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel Packet Size-Based Covert Channel Attacks against Anonymizer." (12 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (3 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective epidemic control and source tracing through mobile social sensing over WBANs." (9 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (1 2013).
  • Xinfeng Li*, Jin Teng*, Qiang Zhai*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "EV-Human: Human Localization via Visual Estimation of Body Electronic Interference." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (4 2013).
  • Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan "Robust Video-based Face Recognition by Sequential Sample Consensus." in IEEE International Conference on Advanced Video and Singal-based Surveillance (AVSS). (8 2013).
  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A robust mobile internet service system for long-distance trains." (10 2013).
  • Ling, Z.; Fu, X.; Jia, W.; Yu, W. et al. "Novel packet size-based covert channel attacks against anonymizer." (11 2013).
  • Jia, W.; Tso, F.P.; Ling, Z.; Fu, X. et al. "Blind detection of spread spectrum flow watermarks." (3 2013).
  • Zhang, Z.; Wang, H.; Lin, X.; Fang, H. et al. "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." in 32nd IEEE INFOCOM Conference. (1 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. "On wireless network coverage in bounded areas." (9 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view Face Authentication Based on Wavelet and Random Forest with Subsets." in 11th IEEE International Conference on Intelligence and Security Informatics (IEEE ISI). (1 2013).
  • Tso, F.P.; Cui, L.; Zhang, L.; Jia, W. et al. "DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains." (11 2013).
  • Yu, Z.; Teng, J.; Li, X.; Xuan, D. "On Wireless Network Coverage in Bounded Areas." in 32nd IEEE INFOCOM Conference. (1 2013).
  • Ding, S.; Zhai, Q.; Zheng, Y.F.; Xuan, D. "Side-view face authentication based on wavelet and random forest with subsets." (9 2013).

2012

  • Xinfeng Li*, Jin Teng*, Boying Zhang*, Adam Champion* and Dong Xuan "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). (3 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern mutation in wireless sensor deployment." (12 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A new cell-counting-based attack against tor." (1 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (6 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." in IEEE INFOCOM Conference. (1 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (12 2012).
  • Adam Champion*, Xinfeng Li*, Qiang Zhai*, Jin Teng* and Dong Xuan "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." in the International Conference on Wireless Algorithms, Systems, and Applications (WASA),. (8 2012).
  • Yun, Z.; Bai, X.; Xuan, D.; Jia, W. et al. "Pattern Mutation in Wireless Sensor Deployment." (12 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A New Cell-Counting-Based Attack Against Tor." (8 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." in 7th International Conference on Wireless Algorithms, Systems, and Applications (WASA). (1 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." (1 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A service for controlling information dissemination in wireless networks." (6 2012).
  • Champion, A.C.; Li, X.; Zhai, Q.; Teng, J. et al. "Enclave: Promoting unobtrusive and secure mobile communications with a ubiquitous electronic world." (9 2012).
  • Li, X.; Teng, J.; Zhang, B.; Champion, A.C. et al. "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." (1 2012).
  • Ling, Z.; Luo, J.; Yu, W.; Fu, X. et al. "A New Cell-Counting-Based Attack Against Tor." (8 2012).
  • Jin Teng*, Junda Zhu, Boying Zhang*, Dong Xuan and Yuan F. Zheng "E-V: Efficient Visual Surveillance with Electronic Footprints." in IEEE International Conference on Computer Communications (INFOCOM). (3 2012).
  • Boxuan Gu*, Wenbin Zhang, Xiaole Bai*, Adam Champion*, Feng Qin and Dong Xuan "JSGuard: Shellcode Detection in JavaScript." in International Conference on Security and Privacy in Communication Networks (SecureComm),. (9 2012).
  • Boying Zhang*, Jin Teng*, Junda Zhu, Xinfeng Li*, Dong Xuan and Yuan F. Zheng "EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (6 2012).

2011

  • Junda Zhu, Jin Teng*, Dong Xuan, and Yuan F. Zheng, "Effective Visual Tracking with Electronic Localization by Directional Antennas." in IEEE National Aerospace Electronics Conference (NAECON). (7 2011).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Biao Chen and Wei Zhao "Optimal Multiple-Coverage of Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). (4 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal Multiple-Coverage of Sensor Networks." (1 2011).
  • Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu and Dong Xuan "A Novel Packet Size Based Covert Channel Attack against Anonymizer." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Fung Po Tso, Li Cui, Lizhuo Zhang, Weijia Jia, Di Yao, JinTeng* and Dong Xuan "DragonNet: A Robust Mobile Internet Service System for Long Distance Trains." in IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal Multiple-Coverage of Sensor Networks." in IEEE INFOCOM Conference. (1 2011).
  • Bai, X.; Yun, Z.; Xuan, D.; Chen, B. et al. "Optimal multiple-coverage of sensor networks." (8 2011).
  • Boying Zhang*, Jin Teng*, Xiaole Bai*, Zhimin Yang* and Dong Xuan "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." in IEEE International Conference on Pervasive Computing and Communications (PerCom). (1 2011).
  • Jin Teng*, Boying Zhang*, Xinfeng Li*, Xiaole Bai* and Dong Xuan "E-Shadow: Lubricating Social Interaction using Mobile Phones." in 31st International Conference on Distributed Computing Systems (ICDCS). (1 2011).
  • Zhang, B.; Teng, J.; Bai, X.; Yang, Z. et al. "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." in IEEE International Conference on Pervasive Computing and Communications (PerCom). (1 2011).
  • Zuoming Yu, Jin Teng*, Xiaole Bai*, Dong Xuan and Weijia Jia "Connected Coverage in Wireless Networks with Directional Antennas." in IEEE International Conference on Computer Communications (INFOCOM). (1 2011).
  • Zhang, B.; Teng, J.; Bai, X.; Yang, Z. et al. "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." (1 2011).

2010

  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." (1 2010).
  • Zhimin Yang*, Boying Zhang*, Jiangpeng Dai^, Adam Champion*, Dong Xuan and Du Li "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." in International Conference on Distributed Computing Systems (ICDCS 2010). (1 2010).
  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." in International Conference on Distributed Computing Systems (ICDCS 2010). (1 2010).
  • Dai, J.; Bai, X.; Yang, Z.; Shen, Z. et al. "PerFallD: A pervasive fall detection system using mobile phones." (7 2010).
  • Boxuan Gu*, Xiaole Bai*, Zhimin Yang*, Adam Champion* and Dong Xuan "Malicious Shellcode Detection with Virtual Memory Snapshots." in IEEE International Conference on Computer Communications (INFOCOM). (1 2010).
  • Jiangpeng Dai^, Jin Teng*, Xiaole Bai*, Zhaohui Shen and Dong Xuan "Mobile Phone based Drunk Driving Detection." in 4th International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health). (3 2010).
  • Dai, J.; Teng, J.; Bai, X.; Shen, Z. et al. "Mobile phone based drunk driving detection." (7 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious Shellcode Detection with Virtual Memory Snapshots." in Conference on IEEE INFOCOM. (1 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious Shellcode Detection with Virtual Memory Snapshots." (1 2010).
  • Yang, Z.; Zhang, B.; Dai, J.; Champion, A.C. et al. "E-SmallTalker: A distributed mobile system for social networking in physical proximity." (8 2010).
  • Gu, B.; Bai, X.; Yang, Z.; Champion, A.C. et al. "Malicious shellcode detection with virtual memory snapshots." (6 2010).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Weijia Jia and Wei Zhao "Pattern Mutation in Wireless Sensor Deployment." in IEEE International Conference on Computer Communications (INFOCOM). (1 2010).
  • Jiangpeng Dai^, Xiaole Bai*, Zhimin Yang*, Zhaohui Shen and Dong Xuan "PerFallD: A Pervasive Fall Detection System Using Mobile Phones." in IEEE Workshop on Pervasive Healthcare (PerHealth) conjunction with the 8th IEEE International Conference on Pervasive Computing and Communication (PerCom). (3 2010).
  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan "Mobility: A Double-Edged Sword for HSPA Networks,." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (9 2010).

2009

  • Zhimin Yang*, Boxuan Gu*, Adam Champion*, Xiaole Bai* and Dong Xuan "Link-Layer Protection in 802.11i WLANs wiht Dummy Authentication." in ACM Conference on Wireless Network Security (WiSec). (3 2009).
  • Zheng Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia "A New Cell Counter Based Attack Against Tor." in ACM Conference on Computer and Communications Security (CCS). (1 2009).
  • Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng* "Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones." in ACM Conference on Wireless Network Security (WiSec). (3 2009).
  • Xudong Ni^, Zhimin Yang*, Xiaole Bai*, Adam Champion* and Dong Xuan "DiffUser: Differentiated User Access Control on Smartphone." in International Workshop on Wireless and Sensor Networks Security (WSNS'09) conjunction with IEEE Mobile and Ad-hoc Sensor Systems (MASS). (10 2009).
  • Xiaole Bai*, Lei Ding, Jin Teng*, Sriram Chellappan*, Changqing Xu and Dong Xuan "Directed Coverage in Wireless Sensor Networks: Concept and Quality." in International Conference on Mobile Adhoc and Sensor Systems (MASS). (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." in 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." in IEEE INFOCOM Conference 2009. (1 2009).
  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan and Weijia Jia "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan, Jin Teng* and Weijia Jia "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2009).
  • Xu, N.; Zhang, F.; Luo, Y.; Jia, W. et al. "Stealthy Video Capturer: A new video-based spyware in 3G Smartphones." (9 2009).
  • Ni, X.; Yang, Z.; Bai, X.; Champion, A.C. et al. "DiffUser: Differentiated User Access Control on Smartphones." (1 2009).
  • Bai, X.; Ding, L.; Teng, J.; Chellappan, S. et al. "Directed Coverage in Wireless Sensor Networks: Concept and Quality." (1 2009).
  • Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu "Blind Detection of Spread Spectrum Flow Watermarks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. et al. "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. "Full-coverage and k-connectivity (k =14, 6) three dimensional networks." (10 2009).
  • Jin Teng*, Changqing Xu, Weijia Jia and Dong Xuan "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Jia, W. et al. "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." (1 2009).
  • Ni, X.; Yang, Z.; Bai, X.; Champion, A.C. et al. "DiffUser: Differentiated User Access Control on Smartphones." in 6th International Conference on Mobile Adhoc and Sensor Systems. (1 2009).
  • Bai, X.; Ding, L.; Teng, J.; Chellappan, S. et al. "Directed Coverage in Wireless Sensor Networks: Concept and Quality." in 6th International Conference on Mobile Adhoc and Sensor Systems. (1 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." (1 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." in IEEE INFOCOM Conference 2009. (1 2009).
  • Teng, J.; Xu, C.; Jia, W.; Xuan, D. "D-scan: Enabling fast and smooth handoffs in AP-dense 802.11 wireless networks." (10 2009).
  • Bai, X.; Zhang, C.; Xuan, D.; Teng, J. et al. "Low-connectivity and full-coverage three dimensional wireless sensor networks." (11 2009).
  • Yang, Z.; Champion, A.C.; Gu, B.; Bai, X. et al. "Link-layer protection in 802.11i WLANs with dummy authentication." (9 2009).

2008

  • Wang, X.; Yu, W.; Fu, X.; Xuan, D. et al. "iLOC: An invisible LOCalization attack to Internet threat monitoring systems." in 27th IEEE Conference on Computer Communications (INFOCOM 2008). (1 2008).
  • Chen, A.; Lai, T.H.; Xuan, D. "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." in 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2008).
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." in 27th IEEE Conference on Computer Communications (INFOCOM 2008). (1 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k." (1 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." (1 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." (1 2008).
  • Xiaole Bai*, Dong Xuan, Ziqiu Yun^, Ten H. Lai and Weijia Jia "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2008).
  • Wang, X.; Yu, W.; Fu, X.; Xuan, D. et al. "iLOC: An invisible LOCalization attack to Internet threat monitoring systems." (1 2008).
  • Ai Chen, Ten H. Lai and Dong Xuan "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." in 24th Annual Computer Security Applications Conference. (1 2008).
  • Wenjun Gu*, Zhimin Yang*, Can Que, Dong Xuan and Weijia Jia "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2008).
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia "Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks." in IEEE Conference on Computer Communications (INFOCOM). (1 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On security vulnerabilities of null data frames in IEEE 802.11 based WLANs." (9 2008).
  • Xun Wang*, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao "iLOC: An Invisible LOCalization Attack to Internet Threat Monitoring System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2008).
  • Xiaole Bai*, Wenjun Gu*, Sriram Chellappan*, Xun Wang*, Dong Xuan and Bin Ma "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." in Annual Computer Security Applications Conference (ACSAC). (1 2008).
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." (1 2008).
  • Chen, A.; Lai, T.H.; Xuan, D.; ACM, "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." (1 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete optimal deployment patterns for full-coverage and κ-connectivity (κ < 6) wireless sensor networks." (12 2008).
  • Bai, X.; Yun, Z.; Xuan, D.; Lai, T.H. et al. "Deploying four-connectivity and full-coverage wireless sensor networks." (9 2008).
  • Chen, A.; Lai, T.H.; Xuan, D. "Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks." (12 2008).
  • Bai, X.; Xuan, D.; Yun, Z.; Lai, T.H. et al. "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k." in 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (1 2008).
  • Bai, X.; Gu, W.; Chellappan, S.; Wang, X. et al. "PAS: Predicate-based authentication services against powerful passive adversaries." (12 2008).
  • Gu, W.; Yang, Z.; Que, C.; Xuan, D. et al. "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." in 28th International Conference on Distributed Computing Systems. (1 2008).

2007

  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." in 3rd International Conference o Security and Privacy in Communication Networks and Workshops. (1 2007).
  • Yang, Z.; Ekici, E.; Xuan, D. "A localization-based anti-sensor network system." in 26th IEEE Conference on Computer Communications (INFOCOM 2007). (1 2007).
  • Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and Wei Zhao "DSSS-Based Flow Marking Technique for Invisible Traceback." in IEEE Symposium on Security and Privacy (S&P). (1 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-Based flow marking technique for invisible traceback." in IEEE Symposium on Security and Privacy (S&P 2007). (1 2007).
  • Xun Wang*, Wei Yu, Adam Champion*, Xinwen Fu and Dong Xuan "Detecting Worms via Mining Dynamic Program Execution." in International Conference on Security and Privacy in Communication Networks (SecureComm). (1 2007).
  • Zhimin, Y.; Ekici, E.; Dong, X. "A localization-based anti-sensor network system." (9 2007).
  • Zhimin Yang*, Eylem Ekici and Dong Xuan "A localization-based Anti-Sensor Network System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). (1 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-Based flow marking technique for invisible traceback." (1 2007).
  • Yang, Z.; Ekici, E.; Xuan, D.; IEEE, "A localization-based anti-sensor network system." (1 2007).
  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." (12 2007).
  • Wang, X.; Yu, W.; Champion, A.; Fu, X. et al. "Detecting worms via mining dynamic program execution." (1 2007).
  • Gu, W.; Bai, X.; Chellappan, S.; Xuan, D. et al. "Network decoupling: A methodology for secure communications in wireless sensor networks." (12 2007).
  • Yu, W.; Fu, X.; Graham, S.; Xuan, D. et al. "DSSS-based flow marking technique for invisible traceback." (9 2007).

2006

  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." in IEEE Wireless Communications and Networking Conference. (1 2006).
  • Thang, N.L.; Yu, W.; Bai, X.; Xuan, D. "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." in IEEE Wireless Communications and Networking Conference. (1 2006).
  • Wei Yu, Xun Wang*, Dong Xuan and David Lee "Effective Detection of Active Worms with Varying Scan Rate." in International Conference on Security and Privacy in Communication Networks (SecureComm). (8 2006).
  • Xiaole Bai*, Santosh Kumar, Dong Xuan, Ziqiu Yun^ and Ten H. Lai "Deploying Wireless Sensors to Achieve Both Coverage and Connectivity." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). (5 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." in 22nd Annual Computer Security Applications Conference. (1 2006).
  • Le, T.N.; Yu, W.; Bai, X.; Xuan, D. "A dynamic geographic hash table for data-centric storage in sensor networks." (12 2006).
  • Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan and Xiaomei Liu "A Design of Overlay Anonymous Multicast Protocol." in IEEE International Parallel & Distributed Processing Symposium (IPDPS). (4 2006).
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao "On Detecting Camouflaging Worm." in Annual Computer Security Applications Conference (ACSAC). (12 2006).
  • Wenjun Gu*, Xiaole Bai*, Sriram Chellappan* and Dong Xuan "Network Decoupling for Secure Communications in Wireless Sensor Networks." in IEEE International Workshop on Quality of Service (IWQoS). (6 2006).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." (1 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." (12 2006).
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." in IEEE Wireless Communications and Networking Conference (WCNC). (1 2006).
  • Xiao, L.; Liu, X.; Gu, W.; Xuan, D. et al. "A design of overlay anonymous multicast protocol." (12 2006).
  • Thang Nam Le*, Wei Yu, Xiaole Bai* and Dong Xuan "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." in IEEE Wireless Communications and Networking Conference (WCNC). (4 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. "Effective detection of active worms with Varying Scan Rate." (12 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. et al. "Effective detection of active worms 14 with varying scan rate." (1 2006).
  • Yu, W.; Wang, X.; Calyam, P.; Xuan, D. et al. "On detecting camouflaging worm." (1 2006).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Policy-driven physical attacks in sensor networks: Modeling and measurement." (12 2006).
  • Bai, X.; Kumar, S.; Xuan, D.; Yun, Z. et al. "Deploying wireless sensors to achieve both coverage and connectivity." (9 2006).
  • Yu, W.; Wang, X.; Xuan, D.; Lee, D. "Effective detection of active worms 14 with varying scan rate." in 2nd International Conference on Security and Privacy in Communication Networks (SecureComm 2006). (1 2006).
  • Le, T.N.; Yu, W.; Bai, X.; Xuan, D. et al. "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." (1 2006).

2005

  • Le, T.N.; Xuan, D.; Yu, W.; IEEE, "An adaptive zone-based storage architecture for wireless sensor networks." (1 2005).
  • Wang, X.; Chellappan, S.; Gu, W.J.; Yu, W. et al. "Search-based physical attacks in sensor networks." (1 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. et al. "On defending peer-to-peer system-based active worm attacks." (1 2005).
  • Le, T.N.; Xuan, D.; Yu, W. "An adaptive zone-based storage architecture for wireless sensor networks." in IEEE Global Telecommunications Conference (GLOBECOM 05). (1 2005).
  • Gu, W.; Wang, X.; Chellappan, S.; Xuan, D. et al. "Defending against search-based physical attacks in sensor networks." (12 2005).
  • Wang, X.; Chellappan, S.; Gu, W.; Yu, W. et al. "Search-based physical attacks in sensor networks." (12 2005).
  • Wang, X.; Chellappan, S.; Gu, W.J.; Yu, W. et al. "Search-based physical attacks in sensor networks." in 14th International Conference on Computer Communications and Networks. (1 2005).
  • Wang, X.; Gu, W.J.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." (1 2005).
  • Wang, X.; Gu, W.J.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." (1 2005).
  • Wang, X.; Gu, W.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." (9 2005).
  • Wang, X.; Gu, W.J.; Chellappan, S.; Schosek, K. et al. "Lifetime optimization of sensor networks under physical attacks." in IEEE International Conference on Communications (ICC 2005). (1 2005).
  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan "On Defending Peer-to-Peer System-based Active Worm Attacks." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2005).
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Search-based Physical Attacks in Sensor Networks." in IEEE International Conference on Computer Communications and Networks (ICCCN). (1 2005).
  • Le, T.N.; Xuan, D.; Yu, W. "An adaptive zone-based storage architecture for wireless sensor networks." (12 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. et al. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." (1 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." (9 2005).
  • Wang, X.; Gu, W.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." (10 2005).
  • Thang Nam Le*, Dong Xuan, and Wei Yu "An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2005).
  • Xun Wang*, Wenjun Gu*, Sriram Chellappan*, Kurt Schosek and Dong Xuan "Lifetime Optimization of Sensor Networks under Physical Attacks." in IEEE International Conference on Communications (ICC). (1 2005).
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma and Dong Xuan "Sensor Network Deployment using Flip-based Sensors." in IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). (11 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. "On defending peer-to-peer system-based active worm attacks." (12 2005).
  • Wei Yu, Philip Coyer Boyer*, Sriram Chellappan* and Dong Xuan "Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis." in IEEE International Conference on Communications (ICC). (1 2005).
  • Wenjun Gu*, Xun Wang*, Sriram Chellappan*, Dong Xuan and Ten H. Lai "Defending against Search-based Physical Attacks in Sensor Networks." in of IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). (11 2005).
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan "Sensor Network Configuration under Physical Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2005).
  • Chellappan, S.; Bai, X.; Ma, B.; Xuan, D. "Sensor networks deployment using flip-based sensors." (12 2005).
  • Yu, W.; Chellappan, S.; Wang, X.; Xuan, D. "On defending peer-to-peer system-based active worm attacks." in IEEE Global Telecommunications Conference (GLOBECOM 05). (1 2005).
  • Yu, W.; Boyer, C.; Chellappan, S.; Xuan, D. "Peer-to-Peer system-based active worm attacks: Modeling and analysis." in IEEE International Conference on Communications (ICC 2005). (1 2005).
  • Wang, X.; Gu, W.J.; Schosek, K.; Chellappan, S. et al. "Sensor network configuration under physical attacks." in 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005). (1 2005).

2004

  • Dong Xuan, Sriram Chellappan*, Xun Wang* and Shengquan Wang "Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2004).
  • Fu, X.W.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and theoretical evaluation of active probing attacks and their countermeasures." (1 2004).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Wei Yu, Thang Nam Le*, Dong Xuan and Wei Zhao "Query Aggregation for Providing Efficient Data Services in Sensor Networks." in IEEE Mobile and Ad-hoc Sensor Systems (MASS). (10 2004).
  • Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati and Wei Zhao "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures." in International Workshop on Information Hiding (IH). (1 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." (6 2004).
  • Fu, X.W.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and theoretical evaluation of active probing attacks and their countermeasures." in 6th International Workshop on Information Hiding. (1 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S.Q. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." in 24th International Conference on Distributed Computing Systems. (1 2004).
  • Xuan, D.; Chellappan, S.; Wang, X.; Wang, S.Q. "Analyzing the secure overlay services architecture under intelligent DDoS attacks." (1 2004).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." (4 2004).
  • Yu, W.; Le, T.N.; Xuan, D.; Zhao, W. "Query aggregation for providing efficient data services in sensor networks." (12 2004).
  • Fu, X.; Graham, B.; Xuan, D.; Bettati, R. et al. "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures." (12 2004).

2003

  • Shengquan Wang, Dong Xuan and Wei Zhao "On Resilience of Structured Peer-to-Peer Systems." in IEEE Global Telecommunications Conference (GLOBECOM). (1 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M. "RChord: An enhanced Chord system resilient to routing attacks." (1 2003).
  • Wang, S.; Xuan, D.; Zhao, W. "On Resilience of Structured Peer-to-Peer Systems." (12 2003).
  • Fu, X.; Graham, B.; Bettati, R.; Zhao, W. et al. "Analytical and empirical analysis of countermeasures to traffic analysis attacks." (1 2003).
  • Wang, S.Q.; Xuan, D.; Zhao, W. "On resilience of structured peer-to-peer systems." in IEEE Global Telecommunications Conference (GLOBECOM 03). (1 2003).
  • Mai, Z.B.; Wang, S.Q.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." in IEEE International Performance, Computing and Communications Conference. (1 2003).
  • Mai, Z.B.; Wang, S.Q.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." (1 2003).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "A study of providing statistical QoS in a differentiated sevices network." in 2nd IEEE International Symposium on Network Computing and Applications. (1 2003).
  • Chen, X.Z.; Wang, C.F.; Xuan, D.; Li, Z.C. et al. "Survey on QoS management of VoIP." in 2nd International Conference on Computer Networks and Mobile Computing. (1 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M. "RChord: An enhanced chord system resilient to routing attacks." in 2nd International Conference on Computer Networks and Mobile Computing. (1 2003).
  • Dong Xuan, Sriram Chellappan* and Muralidhar Krishnamoorthy "RChord: An Enhanced Chord System Resilient to Routing Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2003).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. et al. "A study of providing statistical QoS in a differentiated sevices network." (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." in 4th Annual IEEE Information Assurance Workshop. (1 2003).
  • Chen, X.Z.; Wang, C.F.; Xuan, D.; Li, Z.C. et al. "Survey on QoS management of VoIP." (1 2003).
  • Xuan, D.; Chellappan, S.; Krishnamoorthy, M.; SOCIETY, I.C. et al. "RChord: An enhanced chord system resilient to routing attacks." (1 2003).
  • Wang, S.Q.; Xuan, D.; Zhao, W.; IEEE, "On resilience of structured peer-to-peer systems." (1 2003).
  • Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao and Dong Xuan "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks." in International Conference on Parallel Processing (ICPP). (1 2003).
  • Yu, W.; Xuan, D.; Reddy, S.K.; Bettati, R. et al. "Distributed policy processing in virtual private operation environment for large scale networks." (1 2003).
  • Xiuzhong Chen, Chunfeng Wang, Dong Xuan, Zhongcheng Li, Yinghua Min and Wei Zhao "Survey on QoS Management of VoIP." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). (1 2003).
  • Chen, X.; Wang, C.; Xuan, D.; Li, Z. et al. "Survey on QoS management of VoIP." (1 2003).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "A study of providing statistical QoS in a differentiated services network." (1 2003).
  • Mai, Z.; Wang, S.; Xuan, D.; Zhao, W. "Group aggregation for scalable anycast routing." (1 2003).
  • Zhibin Mai, Shengquan Wang, Dong Xuan and Wei Zhao "Group Aggregation for Scalable Anycast Routing." in IEEE International Performance, Computing and Communications Conference (IPCCC). (1 2003).
  • Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati and Wei Zhao "Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks." in IEEE Information Assurance Workshop (IAW). (1 2003).
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "A Study of Providing Statistical QoS in A Differentiated Sevices Network." in IEEE International Symposium on Network Computing and Applications (NCA). (1 2003).

2002

  • Wei Yu, Dong Xuan and Wei Zhao "Middleware based Approach for Preventing Distributed Denial of Service Attacks." in IEEE Military Communications (MILCOM). (10 2002).
  • Yu, W.; Xuan, D.; Zhao, W. "Middleware-based approach for preventing distributed deny of service attacks." (12 2002).
  • Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan and Wei Zhao "Implementation of QoS-Provisioning System for Voice over IP." in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). (1 2002).
  • Wang, S.Q.; Mai, Z.B.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." (1 2002).
  • Wang, S.; Mai, Z.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." (12 2002).
  • Wang, S.Q.; Mai, Z.B.; Magnussen, W.; Xuan, D. et al. "Implementation of QoS-Provisioning system for voice over IP." in 8th IEEE Real-Time and Embedded Technology and Applications Symposium. (1 2002).

2001

  • Xuan, D.; Jia, W. "Distributed admission control for anycast flows with QoS requirements." (1 2001).
  • Wang, S.; Xuan, D.; Bettati, R.; Zhao, W. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." (12 2001).
  • Wei Yu, Dong Xuan, Bryan Graham, S. Santhanam, Riccardo Bettati and Wei Zhao "An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." in 22nd IEEE Real-Time Systems Symposium (RTSS 2001). (1 2001).
  • Xuan, D.; Jia, W.J. "Distributed Admission Control for anycast flows with QoS requirements." in 21st IEEE International Conference on Distributed Computing Systems. (1 2001).
  • Dong Xuan and Weijia Jia "Distributed Admission Control for Anycast Flows with QoS Requirements." in IEEE International Conference on Distributed Computing Systems (ICDCS). (1 2001).
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "Differentiated Services with Statistical Real-time Guarantees in Static-Priority Scheduling Networks." in IEEE Real-Time Systems Symposium (RTSS). (1 2001).
  • Xuan, D.; Jia, W.J.; SOCIETY, I.C.; SOCIETY, I.C. "Distributed Admission Control for anycast flows with QoS requirements." (1 2001).
  • Dong Xuan, Riccardo Bettati and Wei Zhao "A Gateway-Based Defense System for Distributed DoS Attacks in High Speed Networks." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). (6 2001).
  • Shengquan Wang, Dong Xuan, Riccarod Bettati and Wei Zhao "Providing Absolute Differentiated Services for Real-time Applications in Static-Priority Scheduling Networks." in IEEE International Conference on Computer Communications (INFOCOM). (1 2001).
  • Wang, S.Q.; Xuan, D.; Bettati, R.; Zhao, W. et al. "Differentiated services with statistical real-time guarantees in static-priority scheduling networks." (1 2001).

2000

  • Jia, W.J.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).
  • Xuan, D.; Li, C.; Bettati, R.; Chen, J. et al. "Utilization-based admission control for real-time applications." (1 2000).
  • Xuan, D.; Li, C.Z.; Bettati, R.; Chen, J.N. et al. "Utilization-based admission control for real-time applications." in International Conference on Parallel Processing (ICPP 2000). (1 2000).
  • Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen and Wei Zhao "Utilization-based Admission Control for Real-time Applications." in International Conference on Parallel Processing (ICPP). (1 2000).
  • Xuan, D.; Li, C.Z.; Bettati, R.; Chen, J.N. et al. "Utilization-based admission control for real-time applications." (1 2000).
  • Jia, W.J.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao "Scalable QoS Guaranteed Communication Services for Real-Time Applications." in IEEE International Conference on Distributed Computing Systems (ICDCS). (4 2000).
  • Jia, W.; Xuan, D.; Zhao, W. "Integrated routing algorithms for anycast messages." (1 2000).

1999

  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques." in IEEE International Conference on Parallel Processing (ICPP). (8 1999).
  • Weijia Jia, Gaochao Xu, Wei Zhao and Dong Xuan "An Integrated Routing Protocol for Reliable Anycast and Multicast Communications." in International Conference on Parallel and Distributed Computing Systems (ICPDCS). (8 1999).
  • Jia, W.J.; Zhao, W.; Xuan, D.; Xu, G.C. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).
  • Jia, W.; Zhao, W.; Xuan, D.; Xu, G. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).
  • Yong Guan, Chengzhi Li, Dong Xuan, Riccardo Bettati and Wei Zhao "Preventing Traffic Analysis for Real-Time Communication Networks." in IEEE Military Communications (MILCOM). (10 1999).
  • Jia, W.J.; Zhao, W.; Xuan, D.; Xu, G.C. "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." (10 1999).

1998

  • Xuan, D.; Jia, W.; Zhao, W. "Routing algorithms for anycast messages." (1 1998).
  • Weijia Jia, Dong Xuan and Wei Zhao "Integrated Routing Algorithms for Anycast Messages." in IEEE Global Telecommunications Conference (GLOBECOM). (1 1998).
  • Xuan, D.; Jia, W.J.; Zhao, W. "Routing algorithms for anycast messages." (1 1998).
  • Xuan, D.; Jia, W.J.; Zhao, W. "Routing algorithms for anycast messages." in International Conference on Parallel Processing (ICPP). (1 1998).
  • Dong Xuan, Weijia Jia and Wei Zhao "Routing Algorithms for Anycast Messages." in IEEE International Conference on Parallel Processing (ICPP). (8 1998).

Patents

  • Dong Xuan, Yuan F. Zheng, Wei Zhao, Jin Teng, Junda Zhu, Boying Zhang, Xinfeng Li, Biao Chen and Wei Li. "E-V: Integrating Electronic and Visual Signals for Efficient Surveillance."