You are here

Dong Xuan

  • Professor, Computer Science & Engineering
  • 593 Dreese Laboratories
    2015 Neil Ave
    Columbus, OH 43210
  • 614-292-2958

Honors

  • 2009

    College of Engineering Lumley Research Award. .

  • 2005

    CAREER Award. .

  • 2002

    SBC/Ameritech Faculty Fellow. .

  • 2001

    Graduate Research Excellence Award. .

  • 2000

    TxTEC Graduate Research Award. .

  • 1997

    Outstanding Teaching Award. .

  • 1995

    Scientific and Technological Achievement 1st Prize Award, Principle Contributor. .

  • 1993

    Graduate Student Excellence Award. .

Chapters

2012

  • Jin Teng*, Wenjun Gu* and Dong Xuan. 2012. "Defending against Physical Attacks in Wireless Sensor Networks." In Handbook on Securing Cyber-Physical Critical Infrastructure, New York: Elsevier.

2008

  • Zhibin Mai, Shengquan Wang, Dong Xuan and Wei Zhao. 2008. "Delay Performance and Management of VoIP System." In VoIP Handbook: Applications, Technologies, Reliability, and Security, Boca Raton: CRC Press.

2004

  • Dong Xuan, Sriram Chellappan* and Xun Wang*. 2004. "Resilience of Structured Peer-to-Peer Systems: Analysis and Enhancement." In Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks, Boca Raton: CRC Press.

Journal Articles

2016

  • Sihao Ding, Qiang Zhai, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan, 2016, "Simultaneous Body Part and Motion Identification for Human-following Robots." Pattern Recognition 50, 118 - 130.

2015

  • Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan, 2015, "Sequential Sample Consensus: A Robust Algorithm for Video-based Face Recognition." IEEE Transactions on Circuits and System for Video Technology 25, no. 10, 1586 - 1598.

2014

  • Xinfeng Li*, Jin Teng*, Boying Zhang*, Adam C. Champion* and Dong Xuan, 2014, "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." IEEE Transactions on Mobile Computing (TMC) 13, no. 2, 13 -
  • Jin Teng*, Boying Zhang*, Xinfeng Li*, Xiaole Bai* and Dong Xuan, 2014, "E-Shadow: Lubricating Social Interaction using Mobile Phones." IEEE Transactions on Computers (TC) 63, no. 6, 1422 - 1433.
  • Jin Teng*, Boying Zhang*, Xiaole Bai*, Zhimin Yang* and Dong Xuan, 2014, "Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks." IEEE Transactions on Parallel Distributed Systems (TPDS) 25, no. 11, 2909 - 2919.

2013

  • Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, and Wei Yu, 2013, "Blind Detection of Spread Spectrum Flow Watermarks." International Journal of Security and Communication Networks (SCN) 6, no. 3, 257 - 274.
  • Adam Champion*, Zhimin Yang*, Boying Zhang*, Jiangpeng Dai^, Dong Xuan and Du Li, 2013, "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." IEEE Transactions on Parallel and Distributed Systems (TPDS) 24, no. 8, 11 -
  • Zheng Ling, Wei Yu, Xinwen Fu, Weijia Jia, Dong Xuan and Junzhou Luo, 2013, "Novel Packet Size Based Covert Channel Attacks against Anonymizer." IEEE Transactions on Computers (TC) 62, no. 12, 14 -

2012

  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan, 2012, "Mobility: A Double-Edged Sword for HSPA Networks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 23, no. 10, 1895 - 1907.
  • Ziqiu Yun^, Xiaole Bai*, Dong Xuan, Weijia Jia and Wei Zhao, 2012, "Pattern Mutation in Wireless Sensor Deployment." ACM/IEEE Transactions on Networking (ToN) 20, no. 6, 1964 - 1977.
  • Zheng Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia, 2012, "A New Cell Counting Based Attack against Tor." ACM/IEEE Transactions on Networking (ToN) 20, no. 4, 1245 - 1261.

2011

  • Yu,Wei; Wang,Xun; Champion,Adam; Xuan,Dong; Lee,David, 2011, "On detecting active worms with varying scan rate." COMPUTER COMMUNICATIONS 34, no. 11, 1269 - 1282.
  • Xu,Nan; Jia,Weijia; Luo,Yisha; Zhang,Fan; Xuan,Dong; Teng,Jin, 2011, "AN OPENED EYE ON YOU." IEEE VEHICULAR TECHNOLOGY MAGAZINE 6, no. 4, 49 - 59.
  • Lin Liao, Weifeng Chen, Chuanlin Zhang, Lizhuo Zhang, Dong Xuan and Weijia Jia, 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE Transactions on Vehicle Technology (TVT) 60, no. 5, 2239 - 2252.
  • Nan Xu, Weijia Jia, Yisha Luo, Fan Zhang, Dong Xuan and Jin Teng*, 2011, "Stealthy Video Capture: An Opened Eye on You." IEEE Vehicular Technology Magazine 6, no. 4, 49 - 59.
  • Wei Yu, Xun Wang*, Adam Champion*, Dong Xuan and David Lee, 2011, "On Detecting Active Worms with Varying Scan Rate." Journal of Computer Communications (COMCOM) 34, no. 11, 1269 - 1282.
  • Changqing Xu, Xiaole Bai*, Lei Ding, Jin Teng*, Sriram Chellappan* and Dong Xuan, 2011, "Directed Coverage in Wireless Sensor Networks: Concept and Quality." Ad Hoc & Sensor Wireless Networks (AHSWN) 11, no. 3-4, 173 - 197.
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection of Camouflaging Worm." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377 - 390.
  • Xu,Changqing; Bai,Xiaole; Ding,Lei; Teng,Jin; Chellappan,Sriram; Xuan,Dong, 2011, "Directed Coverage in Wireless Sensor Networks: Concept and Quality." AD HOC & SENSOR WIRELESS NETWORKS 11, no. 3-4, 173 - 197.
  • Liao,Lin; Chen,Weifeng; Zhang,Chuanlin; Zhang,Lizhuo; Xuan,Dong; Jia,Weijia, 2011, "Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization." IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 60, no. 5, 2239 - 2252.
  • Yu,Wei; Wang,Xun; Calyam,Prasad; Xuan,Dong; Zhao,Wei, 2011, "Modeling and Detection of Camouflaging Worm." IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 8, no. 3, 377 - 390.
  • Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan and Wei Zhao, 2011, "Camouflaging Worm: Modeling and Detection." IEEE Transactions on Dependable and Secure Computing (TDSC) 8, no. 3, 377 - 390.

2010

  • Wenjun Gu*, Zhimin Yang*, Dong Xuan, Weijia Jia and Can Que, 2010, "Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs." IEEE Transactions on Distributed and Parallel Systems (TPDS) 21, no. 7, 897 - 910.
  • Ziqiu Yun^, Xiaole Bai*, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." ACM/IEEE Transactions on Networking (ToN) 18, no. 3, 934 - 947.
  • Chuanlin Zhang, Xiaole Bai*, Jin Teng*, Dong Xuan and Weijia Jia, 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984 - 993.
  • Yun,Ziqiu; Bai,Xiaole; Xuan,Dong; Lai,Ten,H; Jia,Weijia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k." IEEE-ACM TRANSACTIONS ON NETWORKING 18, no. 3, 934 - 947.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Guarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3-4, 253 - 263.
  • Zhang,Chuanlin; Bai,Xiaole; Teng,Jin; Xuan,Dong; Jia,Weijia, 2010, "Constructing Low-Connectivity and Full-Coverage Three Dimensional Sensor Networks." IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 28, no. 7, 984 - 993.
  • Le,Thang; Sinha,Prasun; Xuan,Dong, 2010, "Turning heterogeneity into an advantage in wireless ad-hoc network routing." AD HOC NETWORKS 8, no. 1, 108 - 118.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2010, "Toward Statistical QoS Quarantees in A Differentiated Services Network." Telecommunication Systems 43, no. 3, 253 - 263.
  • Bai,Xiaole; Yun,Ziqiu; Xuan,Dong; Lai,Ten,H; Jia,Weijia, 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE TRANSACTIONS ON MOBILE COMPUTING 9, no. 3, 435 - 448.
  • Dai,Jiangpeng; Bai,Xiaole; Yang,Zhimin; Shen,Zhaohui; Xuan,Dong, 2010, "Mobile phone-based pervasive fall detection." PERSONAL AND UBIQUITOUS COMPUTING 14, no. 7, 633 - 643.
  • Wang,Shengquan; Xuan,Dong; Bettati,Riccardo; Zhao,Wei, 2010, "Toward statistical QoS guarantees in a differentiated services network." TELECOMMUNICATION SYSTEMS 43, no. 3-4, 253 - 263.
  • Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia and Can Que, 2010, "Null Data Frame: A Double-edged Sword in IEEE 802.11 WLANs." IEEE Transactions on Distributed and Parallel Systems (TPDS) 14, no. 7, 897 - 910.
  • Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Shen and Dong Xuan, 2010, "Mobile Phone-based Pervasive Fall Detection." Journal of Personal and Ubiquitous Computing, Springer 14, no. 7, 633 - 643.
  • Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Deployment Patterns for Full Coverage and k-Connectivity (k." ACM/IEEE Transactions on Networking (ToN) 18, no. 3, 934 - 947.
  • Chuanlin Zhang, Xiaole Bai, Jin Teng, Dong Xuan, Weijia Jia, 2010, "Constructing low-connectivity and full-coverage three dimensional sensor networks." IEEE Journal on Selected Areas in Communications (JSAC) 28, no. 7, 984 - 993.
  • Jiangpeng Dai^, Xiaole Bai*, Zhimin Yang*, Zhaohui Shen and Dong Xuan, 2010, "Mobile Phone-based Pervasive Fall Detection." Journal of Personal and Ubiquitous Computing 14, no. 7, 633 - 643.
  • Thang Le*, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal 8, no. 1, 108 - 118.
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435 - 448.
  • Gu,Wenjun; Yang,Zhimin; Xuan,Dong; Jia,Weijia; Que,Can, 2010, "Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 21, no. 7, 897 - 910.
  • Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten H. Lai and Weijia Jia, 2010, "Optimal Patterns for Four-Connectivity And Full-Coverage Wireless Sensor Networks." IEEE Transactions on Mobile Computing (TMC) 9, no. 3, 435 - 448.
  • Thang Le, Prasun Sinha and Dong Xuan, 2010, "Turning Heterogeneity into An Advantage in Wireless Ad-hoc Network Routing." Ad Hoc Networks Journal, Elsevier 8, no. 1, 108 - 118.

2009

  • Ai Chen,Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1, 2 -
  • Ai Chen, Ten H. Lai and Dong Xuan, 2009, "Measuring and Guaranteeing Quality of Barrier-Coverage for General Belts with Wireless Sensors." ACM Transactions on Sensor Networks (TOSN) 6, no. 1,
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan, 2009, "Sensor Network Configuration under Physical Attacks." International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) 4, no. 3-4, 174 - 182.
  • Chen,Ai; Lai,Ten,H; Xuan,Dong, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1, 2 -
  • Wei Yu, Xun Wang*, Xinwen Fu, Dong Xuan and Wei Zhao, 2009, "An Invisible Localization Attack to Internet Threat Monitors." IEEE Transactions on Distributed and Parallel Systems (TPDS) 20, no. 11, 1611 - 1625.
  • Chen,Ai; Lai,Ten,H; Xuan,Dong, 2009, "Measuring and Guaranteeing Quality of Barrier Coverage for General Belts with Wireless Sensors." ACM TRANSACTIONS ON SENSOR NETWORKS 6, no. 1, 2 -
  • Wang,Xun; Gu,Wenjun; Schosek,Kurt; Chellappan,Sriram; Xuan,Dong, 2009, "Sensor network configuration under physical attacks." INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING 4, no. 3-4, 174 - 182.

2008

  • Wei Yu, Sriram Chellappan, Xun Wang and Dong Xuan, 2008, "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense." COMPUTER COMMUNICATIONS 31, no. 17, 4005 - 4017.
  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan, 2008, "Peer-to-Peer System-based Active Worm Attacks: Modeling, Analysis and Defense." Journal of Computer Communications (COMCOM) 31, no. 17, 4005 - 4017.
  • Yu,Wei; Chellappan,Sriram; Wang,Xun; Xuan,Dong, 2008, "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense." COMPUTER COMMUNICATIONS 31, no. 17, 4005 - 4017.

2007

  • Chellappan,Sriram; Bai,Xiaole; Ma,Bin; Xuan,Dong; Xu,Changqing, 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199 - 211.
  • Sriram Chellappan*, Wenjun Gu*, Xiaole Bai*, Dong Xuan, Bin Ma and Kaizhong Zhang, 2007, "Deploying Wireless Sensor Networks under Limited Mobility Constraints." IEEE Transactions on Mobile Computing (TMC) 6, no. 10, 1142 - 1157.
  • Chellappan,Sriram; Gu,Wenjun; Bai,Xiaole; Xuan,Dong; Ma,Bin; Zhang,Kaizhong, 2007, "Deploying wireless sensor networks under limited mobility constraints." IEEE TRANSACTIONS ON MOBILE COMPUTING 6, no. 10, 1142 - 1157.
  • Gu,Wenjun; Bai,Xiaole; Chellappan,Sriram; Xuan,Dong; Jia,Weijia, 2007, "Network decoupling: A methodology for secure communications in wireless sensor networks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 12, 1784 - 1796.
  • Chellappan,Sriram; Bai,Xiaole; Ma,Bin; Xuan,Dong; Xu,Changqing, 2007, "Mobility limited flip-based sensor networks deployment." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 18, no. 2, 199 - 211.
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma, Dong Xuan and Changqing Xu, 2007, "Mobility Limited Flip-based Sensor Networks Deployment." IEEE Transactions on Parallel and Distributed Systems (TPDS) 18, no. 2, 199 - 211.
  • Wenjun Gu*, Xiaole Bai*, Sriram Chellappan*, Dong Xuan and Weijia Jia, 2007, "Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 18, no. 12, 1784 - 1796.

2006

  • Li Xiao, Yunhao Liu, Wenjun Gu*, Dong Xuan and Xiaomei Liu, 2006, "Mutual Anonymous Overlay Multicast." Journal of Parallel and Distributed Computing (JPDC) 66, no. 9, 1205 - 1216.
  • Wei Yu,Thang Nam Le*, Jangwon Lee and Dong Xuan, 2006, "Effective Query Aggregation for Data Services in Sensor Networks." Journal of Computer Communications (COMCOM) 29, no. 18, 3733 - 3744.
  • Wang,Xun; Chellappan,Sriram; Boyer,Phillip; Xuan,Dong, 2006, "On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17, no. 7, 619 - 632.
  • Wei Yu, Sriram Chellappan*, Dong Xuan and Wei Zhao, 2006, "Distributed Policy Processing in Active-Service based Infrastructures." International Journal of Communication Systems (IJCS) 19, no. 7, 727 - 750.
  • Xun Wang*, Sriram Chellappan*, Phillip Corey Boyer and Dong Xuan, 2006, "On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks." IEEE Transactions on Parallel and Distributed Systems (TPDS) 17, no. 7, 619 - 632.
  • Yu,Wei; Chellappan,Sriram; Xuan,Dong; Zhao,Wei, 2006, "Distributed policy processing in active-service based infrastructures." INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 19, no. 7, 727 - 750.
  • Shengquan Wang, Zhibin Mai, Dong Xuan and Wei Zhao, 2006, "Design and Implementation of QoS-Provisioning System for Voice over IP." IEEE Transactions on Parallel and Distributed Systems (TPDS) 17, no. 3, 276 - 288.
  • Wang,S,Q; Mai,Z,B; Xuan,D; Zhao,W, 2006, "Design and implementation of QoS-provisioning system for voice over IP." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17, no. 3, 276 - 288.
  • Xiao,Li; Liu,Yunhao; Gu,Wenjun; Xuan,Dong; Liu,Xiaomei, 2006, "Mutual anonymous overlay multicast." JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 66, no. 9, 1205 - 1216.
  • Yu,Wei; Le,Thang,Nam; Lee,Jangwon; Xuan,Dong, 2006, "Effective query aggregation for data services in sensor networks." COMPUTER COMMUNICATIONS 29, no. 18, 3733 - 3744.

2005

  • Wang,S,Q; Dong,X; Wei,Z, 2005, "Analyzing and enhancing the resilience of structured peer-to-peer systems." JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 65, no. 2, 207 - 219.
  • Yu,W; Chellappan,S; Xuan,D, 2005, "P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks." FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE 21, no. 1, 209 - 219.
  • Shengquang Wang, Dong Xuan and Wei Zhao, 2005, "Analyzing and Enhancing the Resilience of Structured Peer-to-Peer Systems." Journal of Parallel and Distributed Computing (JPDC) 65, no. 2, 207 - 219.
  • Wei Yu,Sriram Chellappan* and Dong Xuan, 2005, "P2P/Grid-based Overlay Architecture to Support VoIP Services in Large-Scale IP Networks." Journal of Future Generation Computer Systems (FGCS) 21, no. 1, 209 - 219.

2004

  • Wang,S,Q; Xuan,D; Bettati,R; Zhao,W, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326 - 339.
  • Jia,W,J; Xuan,D; Tu,W,Q; Lin,L,D; Zhao,W, 2004, "Distributed admission control for anycast flows." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 15, no. 8, 673 - 686.
  • Weijia Jia, Dong Xuan, Wenqing Tu, Lidong Lin and Wei Zhao, 2004, "Distributed Admission Control for Anycast Flows." IEEE Transactions on Parallel and Distributed Systems (TPDS) 15, no. 8, 673 - 686.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing absolute differentiated services for real-time applications in static-priority scheduling networks." IEEE-ACM TRANSACTIONS ON NETWORKING 12, no. 2, 326 - 339.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao, 2004, "Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks." IEEE/ACM Transactions on Networking (ToN) 12, no. 2, 326 - 339.

2003

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based admission control for scalable real-time communication." REAL-TIME SYSTEMS 24, no. 2, 171 - 202.
  • Choi,B,K; Xuan,D; Bettati,R; Zhao,W; Li,C,Z, 2003, "Utilization-based admission control for scalable real-time communication." REAL-TIME SYSTEMS 24, no. 2, 171 - 202.
  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao, 2003, "Utilization-based Admission Control for Scalable Real-Time Communication." Journal of Real-Time Systems (JRTS) 24, no. 2, 171 - 202.

2001

  • Guan,Y; Fu,X,W; Xuan,D; Shenoy,P,U; Bettati,R; Zhao,W, 2001, "NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications." IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS 31, no. 4, 253 - 265.
  • Yong Guan, Xinwen Fu, Dong Xuan, Prashanth Umesh Shenoy, Riccardo Bettati and Wei Zhao, 2001, "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications." IEEE Transactions on Systems, Man, and Cybernetics (TSMC) 31, no. 4, 253 - 265.

2000

  • Xuan,D; Jia,W,J; Zhao,W; Zhu,H,W, 2000, "A routing protocol for anycast messages." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 11, no. 6, 571 - 588.
  • Dong Xuan, Weijia Jia, Wei Zhao and Hongwen Zhu, 2000, "A Routing Protocol for Anycast Messages." IEEE Transactions on Parallel and Distributed Systems (TPDS) 11, no. 6, 571 - 588.
  • Jia,W,J; Xuan,D; Zhao,W, 2000, "Integrated routing algorithms for anycast messages." IEEE COMMUNICATIONS MAGAZINE 38, no. 1, 48 - 53.
  • Weijia Jia, Dong Xuan and Wei Zhao, 2000, "Integrated Routing Algorithms for Anycast Messages." IEEE Communication Magazine 38, no. 1, 48 - 53.

1999

  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu, 1999, "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-based Tree Techniques." IEEE Transactions on Parallel and Distributed Systems (TPDS) 10, no. 10, 984 - 1000.
  • Jia,W,J; Zhao,W; Xuan,D; Xu,G,C, 1999, "An efficient fault-tolerant multicast routing protocol with core-based tree techniques." IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 10, no. 10, 984 - 1000.

Unknown

  • Fung Po Tso, Lin Cui, Lizhuo Zhang, Weijia Jia, Di Yao, Jin Teng* and Dong Xuan, "DragonNet: A Robust Mobile Internet Service System for Long Distance Trains." IEEE Transactions on Mobile Computing (TMC)

Presentations

  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, Virginia Tech,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science, George Washington University,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Department of Computer Science and Engineering, Temple University,
  • "Resource Over-Provisioning for Network Systems and Services." 2006, Presented at College of Engineering and Computer Science, Wright State University, USA,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Xi’An Jiao Tong University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Institute of Electronic Technology, China,
  • "Scalable QoS Guarantees over IP Networks." 2002, Presented at Lucent Technologies Inc., USA,
  • "Invisible Traceback in the Internet." 2008, Presented at PolyNet IT Symposium, Hong Kong,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Automation Control, Zhejiang University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Departmeng of Computer Science ,Wuhan University, China,
  • "Invisible Traceback in the Internet." 2008, Presented at Department of Electronic and Computer Engineering, Huazhong University of Science and Technology, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2009, Presented at Department of Electrical and Computer Science, Illinois Institute of Technology, USA,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2011, Presented at Institute of Electronic Technology, China,
  • "Integrating Electronic and Visual Signals for Efficient Surveillance in Large-scale Areas." 2012, Presented at Institute of Computing Technology, China,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Information Science, The Ohio-State University, USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science and Engineering, University of Buffalo (SUNY), USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Computer Science, North Carolina State University, USA,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Department of Electronic and Computer Engineering, University of Wisconsin at Madison, USA,
  • "Resource Over-Provisioning for Network Systems and Services." 2007, Presented at Department of Computer Science, Central South University, China,
  • "Connected Coverage of Wireless Networks in Theoretical and Practical Settings." 2010, Presented at Department of Computer Science and Engineering, Temple University, USA,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2011, Presented at School of Computer Science, Southeast University, China,
  • "Optimal Deployment in Wireless Sensor Networks." 2008, Presented at Department of Computer Science, Polytechnic University of Hong Kong,
  • "Connected Coverage in Three-Dimensional Wireless Networks." 2009, Presented at Department of Computer Science, Shanghai Jiao Tong University, China,
  • "Design and Implementation of Smartphone-based Systems and Networking." 2010, Presented at Department of Automation Control, Zhejiang University, China,
  • "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." 2001, Presented at Bell Labs, New Jersey,

Papers in Proceedings

2016

  • Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan and Biao Chen "Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2016). 9 -
  • Fan Yang, Qiang Zhai, Guoxing Chen, Adadm C. Champion, Junda Zhu and Dong Xuan "Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2016). 9 -

2015

  • Qiang Zhai*, Sihao Ding, Xinfeng Li*, Fan Yang*, Jin Teng*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "M-Tracking: Visual-Motion Sensing Integration for Real-time Human Tracking." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2015). 9 -
  • Zuoming Yu, Fan Yang*, Jin Teng*, Adam C. Champion*, and Dong Xuan "Local Face-View Barrier Coverage in Camera Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2015). 9 -
  • Ying Li, Sihao Ding, Qiang Zhai*, Yuan F. Zheng and Dong Xuan "Human Feet Tracking Guided by Locomotion Model." in IEEE International Conference on Robotics and Automation (ICRA). New York, (5 2015). 6 -
  • Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin and Dong Xuan "Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices." in EEE International Conference on Distributed Computing Systems (ICDCS). New York, (6 2015). 11 - 20.

2014

  • Gang Li, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan, Hong Luan and Yuan F. Zheng "EV-Sounding: A Visual Assisted Wireless Channel Sounding System." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2014). 9 -

2013

  • Zuoming Yu, Jin Teng*, Xinfeng Li* and Dong Xuan "On Wireless Network Coverage in Bounded Areas." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2013). 9 -
  • Boxuan Gu*, Xinfeng Li*, Gang Li*, Adam C. Champion*, Zhezhe Chen, Feng Qin and Dong Xuan "D2Taint: Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2013). 9 -
  • Sihao Ding, Qiang Zhai, Yuan F. Zheng and Dong Xuan "Side-View Face Authentication based on Wavelet and Random Forest." in IEEE Intelligence and Security Informatics (ISI). New York, (6 2013). 6 -
  • Xinfeng Li*, Jin Teng*, Qiang Zhai*, Junda Zhu, Dong Xuan, Yuan F. Zheng and Wei Zhao "EV-Human: Human Localization via Visual Estimation of Body Electronic Interference." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (4 2013). 5 -
  • Sihao Ding, Ying Li, Junda Zhu, Yuan F. Zheng and Dong Xuan "Robust Video-based Face Recognition by Sequential Sample Consensus." in IEEE International Conference on Advanced Video and Singal-based Surveillance (AVSS). New York, (8 2013). 6 -
  • Zhaoyang Zhang, Honggang Wang, Xiaodong Lin, Hua Fang and Dong Xuan "Effective Epidemic Control and Source Tracing Through Mobile Social Sensing over WBANs." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (4 2013). 5 -

2012

  • Adam Champion*, Xinfeng Li*, Qiang Zhai*, Jin Teng* and Dong Xuan "Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World." in the International Conference on Wireless Algorithms, Systems, and Applications (WASA),. New Work, (8 2012). 235 - 247.
  • Xinfeng Li*, Jin Teng*, Boying Zhang*, Adam Champion* and Dong Xuan "TurfCast: A Service for Controlling Information Dissemination in Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). New York, (3 2012). 298 - 306.
  • Jin Teng*, Junda Zhu, Boying Zhang*, Dong Xuan and Yuan F. Zheng "E-V: Efficient Visual Surveillance with Electronic Footprints." in IEEE International Conference on Computer Communications (INFOCOM). New York, (3 2012). 109 - 117.
  • Boxuan Gu*, Wenbin Zhang, Xiaole Bai*, Adam Champion*, Feng Qin and Dong Xuan "JSGuard: Shellcode Detection in JavaScript." in International Conference on Security and Privacy in Communication Networks (SecureComm),. Berlin, (9 2012). #31 -
  • Boying Zhang*, Jin Teng*, Junda Zhu, Xinfeng Li*, Dong Xuan and Yuan F. Zheng "EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). New York, (6 2012). 25 - 34.

2011

  • Zuoming Yu, Jin Teng*, Xiaole Bai*, Dong Xuan and Weijia Jia "Connected Coverage in Wireless Networks with Directional Antennas." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2011). 2264 - 2272.
  • Junda Zhu, Jin Teng*, Dong Xuan, and Yuan F. Zheng, "Effective Visual Tracking with Electronic Localization by Directional Antennas." in IEEE National Aerospace Electronics Conference (NAECON). New York, (7 2011). 95 - 100.
  • Jin Teng*, Boying Zhang*, Xinfeng Li*, Xiaole Bai* and Dong Xuan "E-Shadow: Lubricating Social Interaction using Mobile Phones." in 31st International Conference on Distributed Computing Systems (ICDCS). NEW YORK, (1 2011). 909 - 918.
  • Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu and Dong Xuan "A Novel Packet Size Based Covert Channel Attack against Anonymizer." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2011). 186 - 190.
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Biao Chen and Wei Zhao "Optimal Multiple-Coverage of Sensor Networks." in IEEE International Conference on Computer Communications (INFOCOM). New York, (4 2011). 2498 - 2506.
  • Boying Zhang*, Jin Teng*, Xiaole Bai*, Zhimin Yang* and Dong Xuan "P-3-Coupon: a Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution." in IEEE International Conference on Pervasive Computing and Communications (PerCom). NEW YORK, (1 2011). 93 - 101.
  • Fung Po Tso, Li Cui, Lizhuo Zhang, Weijia Jia, Di Yao, JinTeng* and Dong Xuan "DragonNet: A Robust Mobile Internet Service System for Long Distance Trains." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2011). 855 - 863.

2010

  • Boxuan Gu*, Xiaole Bai*, Zhimin Yang*, Adam Champion* and Dong Xuan "Malicious Shellcode Detection with Virtual Memory Snapshots." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2010). 974 - 982.
  • Zhimin Yang*, Boying Zhang*, Jiangpeng Dai^, Adam Champion*, Dong Xuan and Du Li "E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity." in International Conference on Distributed Computing Systems (ICDCS 2010). NEW YORK, (1 2010). 468 - 477.
  • Fung Po Tso, Jin Teng*, Weijia Jia and Dong Xuan "Mobility: A Double-Edged Sword for HSPA Networks,." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Chicago, (9 2010). 81 - 90.
  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Weijia Jia and Wei Zhao "Pattern Mutation in Wireless Sensor Deployment." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2010). 1 - 9.
  • Jiangpeng Dai^, Xiaole Bai*, Zhimin Yang*, Zhaohui Shen and Dong Xuan "PerFallD: A Pervasive Fall Detection System Using Mobile Phones." in IEEE Workshop on Pervasive Healthcare (PerHealth) conjunction with the 8th IEEE International Conference on Pervasive Computing and Communication (PerCom). New York, (3 2010). 292 - 297.
  • Jiangpeng Dai^, Jin Teng*, Xiaole Bai*, Zhaohui Shen and Dong Xuan "Mobile Phone based Drunk Driving Detection." in 4th International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health). Munchen, (3 2010). 1 - 8.

2009

  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan and Weijia Jia "Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2009). 388 - 396.
  • Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu "Blind Detection of Spread Spectrum Flow Watermarks." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2009). 2195 - 2203.
  • Xiaole Bai*, Lei Ding, Jin Teng*, Sriram Chellappan*, Changqing Xu and Dong Xuan "Directed Coverage in Wireless Sensor Networks: Concept and Quality." in International Conference on Mobile Adhoc and Sensor Systems (MASS). NEW YORK, (1 2009). 677 - 686.
  • Zheng Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan and Weijia Jia "A New Cell Counter Based Attack Against Tor." in ACM Conference on Computer and Communications Security (CCS). NEW YORK, (1 2009). 578 - 589.
  • Jin Teng*, Changqing Xu, Weijia Jia and Dong Xuan "D-Scan: Enabling Fast and Smooth Handoffs in AP-dense 802.11 Wireless Networks." in IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2009). 2616 - 2620.
  • Xiaole Bai*, Chuanlin Zhang, Dong Xuan, Jin Teng* and Weijia Jia "Low-Connectivity and Full-Coverage Three Dimensional Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). NEW YORK, (1 2009). 145 - 154.
  • Zhimin Yang*, Boxuan Gu*, Adam Champion*, Xiaole Bai* and Dong Xuan "Link-Layer Protection in 802.11i WLANs wiht Dummy Authentication." in ACM Conference on Wireless Network Security (WiSec). Zurich, (3 2009). 131 - 138.
  • Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng* "Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones." in ACM Conference on Wireless Network Security (WiSec). Zurich, (3 2009). 69 - 78.
  • Xudong Ni^, Zhimin Yang*, Xiaole Bai*, Adam Champion* and Dong Xuan "DiffUser: Differentiated User Access Control on Smartphone." in International Workshop on Wireless and Sensor Networks Security (WSNS'09) conjunction with IEEE Mobile and Ad-hoc Sensor Systems (MASS). New York, (10 2009). 1012 - 1017.

2008

  • Xiaole Bai*, Ziqiu Yun^, Dong Xuan, Ten H. Lai and Weijia Jia "Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks." in IEEE Conference on Computer Communications (INFOCOM). NEW YORK, (1 2008). 906 - 914.
  • Xun Wang*, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao "iLOC: An Invisible LOCalization Attack to Internet Threat Monitoring System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2008). 61 - 65.
  • Ai Chen, Ten H. Lai and Dong Xuan "Measuring and Guaranteeing Quality of Barrier-Coverage in Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Hong Kong, (5 2008). 421 - 430.
  • Xiaole Bai*, Dong Xuan, Ziqiu Yun^, Ten H. Lai and Weijia Jia "Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k less than or equal to 6) Wireless Sensor Networks." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Hong Kong, (5 2008). 401 - 410.
  • Xiaole Bai*, Wenjun Gu*, Sriram Chellappan*, Xun Wang*, Dong Xuan and Bin Ma "PAS: Predicate-based Authentication Services Against Powerful Passive Adversaries." in Annual Computer Security Applications Conference (ACSAC). LOS ALAMITOS, (1 2008). 433 - 442.
  • Wenjun Gu*, Zhimin Yang*, Can Que, Dong Xuan and Weijia Jia "On Security Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs." in IEEE International Conference on Distributed Computing Systems (ICDCS). LOS ALAMITOS, (1 2008). 28 - 35.

2007

  • Xun Wang*, Wei Yu, Adam Champion*, Xinwen Fu and Dong Xuan "Detecting Worms via Mining Dynamic Program Execution." in International Conference on Security and Privacy in Communication Networks (SecureComm). Nice, (1 2007). 412 - 421.
  • Zhimin Yang*, Eylem Ekici and Dong Xuan "A localization-based Anti-Sensor Network System." in the mini-conference conjunction with IEEE International Conference on Computer Communications (INFOCOM). NEW YORK, (1 2007). 2396 - 2400.
  • Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan and Wei Zhao "DSSS-Based Flow Marking Technique for Invisible Traceback." in IEEE Symposium on Security and Privacy (S&P). LOS ALAMITOS, (1 2007). 18 - 32.

2006

  • Wenjun Gu*, Xiaole Bai*, Sriram Chellappan* and Dong Xuan "Network Decoupling for Secure Communications in Wireless Sensor Networks." in IEEE International Workshop on Quality of Service (IWQoS). NEW YORK, (6 2006). 189 - 198.
  • Thang Nam Le*, Wei Yu, Xiaole Bai* and Dong Xuan "A Dynamic Geographic Hash Table for Data-Centric Storage in Sensor Networks." in IEEE Wireless Communications and Networking Conference (WCNC). NEW YORK, (4 2006). 2168 - 2174.
  • Wei Yu, Xun Wang*, Prasad Calyam, Dong Xuan and Wei Zhao "On Detecting Camouflaging Worm." in Annual Computer Security Applications Conference (ACSAC). Miami Beach, (12 2006). 235 - 244.
  • Xiaole Bai*, Santosh Kumar, Dong Xuan, Ziqiu Yun^ and Ten H. Lai "Deploying Wireless Sensors to Achieve Both Coverage and Connectivity." in ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Florence, (5 2006). 131 - 142.
  • Wei Yu, Xun Wang*, Dong Xuan and David Lee "Effective Detection of Active Worms with Varying Scan Rate." in International Conference on Security and Privacy in Communication Networks (SecureComm). Baltimore, (8 2006). 1 - 10.
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Policy-driven Physical Attacks in Sensor Networks: Modeling and Measurement." in IEEE Wireless Communications and Networking Conference (WCNC). NEW YORK, (1 2006). 671 - 678.
  • Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan and Xiaomei Liu "A Design of Overlay Anonymous Multicast Protocol." in IEEE International Parallel & Distributed Processing Symposium (IPDPS). New York, (4 2006). 10 -

2005

  • Thang Nam Le*, Dong Xuan, and Wei Yu "An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks." in IEEE Global Telecommunications Conference (GLOBECOM). NEW YORK, (1 2005). 2782 - 2786.
  • Sriram Chellappan*, Xiaole Bai*, Bin Ma and Dong Xuan "Sensor Network Deployment using Flip-based Sensors." in IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). New York, (11 2005). 291 - 298.
  • Wenjun Gu*, Xun Wang*, Sriram Chellappan*, Dong Xuan and Ten H. Lai "Defending against Search-based Physical Attacks in Sensor Networks." in of IEEE Mobile Sensor and Ad-hoc and Sensor Systems (MASS). New York, (11 2005). 520 - 527.
  • Wei Yu, Sriram Chellappan*, Xun Wang* and Dong Xuan "On Defending Peer-to-Peer System-based Active Worm Attacks." in IEEE Global Telecommunications Conference (GLOBECOM). NEW YORK, (1 2005). 1757 - 1761.
  • Wei Yu, Philip Coyer Boyer*, Sriram Chellappan* and Dong Xuan "Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis." in IEEE International Conference on Communications (ICC). NEW YORK, (1 2005). 295 - 300.
  • Xun Wang*, Sriram Chellappan*, Wenjun Gu*, Wei Yu and Dong Xuan "Search-based Physical Attacks in Sensor Networks." in IEEE International Conference on Computer Communications and Networks (ICCCN). NEW YORK, (1 2005). 489 - 496.
  • Xun Wang*, Wenjun Gu*, Sriram Chellappan*, Kurt Schosek and Dong Xuan "Lifetime Optimization of Sensor Networks under Physical Attacks." in IEEE International Conference on Communications (ICC). NEW YORK, (1 2005). 3295 - 3301.
  • Xun Wang*, Wenjun Gu*, Kurt Schosek*, Sriram Chellappan* and Dong Xuan "Sensor Network Configuration under Physical Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). BERLIN, (1 2005). 23 - 32.

2004

  • Wei Yu, Thang Nam Le*, Dong Xuan and Wei Zhao "Query Aggregation for Providing Efficient Data Services in Sensor Networks." in IEEE Mobile and Ad-hoc Sensor Systems (MASS). New York, (10 2004). 31 - 40.
  • Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati and Wei Zhao "Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures." in International Workshop on Information Hiding (IH). BERLIN, (1 2004). 266 - 281.
  • Dong Xuan, Sriram Chellappan*, Xun Wang* and Shengquan Wang "Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks." in IEEE International Conference on Distributed Computing Systems (ICDCS). LOS ALAMITOS, (1 2004). 408 - 417.

2003

  • Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati and Wei Zhao "Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks." in IEEE Information Assurance Workshop (IAW). NEW YORK, (1 2003). 84 - 91.
  • Shengquan Wang, Dong Xuan and Wei Zhao "On Resilience of Structured Peer-to-Peer Systems." in IEEE Global Telecommunications Conference (GLOBECOM). NEW YORK, (1 2003). 3851 - 3856.
  • Dong Xuan, Sriram Chellappan* and Muralidhar Krishnamoorthy "RChord: An Enhanced Chord System Resilient to Routing Attacks." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). LOS ALAMITOS, (1 2003). 253 - 260.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "A Study of Providing Statistical QoS in A Differentiated Sevices Network." in IEEE International Symposium on Network Computing and Applications (NCA). LOS ALAMITOS, (1 2003). 297 - 304.
  • Xiuzhong Chen, Chunfeng Wang, Dong Xuan, Zhongcheng Li, Yinghua Min and Wei Zhao "Survey on QoS Management of VoIP." in IEEE International Conference on Computer Networks and Mobile Computing (ICCNMC). LOS ALAMITOS, (1 2003). 69 - 77.
  • Zhibin Mai, Shengquan Wang, Dong Xuan and Wei Zhao "Group Aggregation for Scalable Anycast Routing." in IEEE International Performance, Computing and Communications Conference (IPCCC). NEW YORK, (1 2003). 33 - 40.
  • Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao and Dong Xuan "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks." in International Conference on Parallel Processing (ICPP). LOS ALAMITOS, (1 2003). 483 - 492.

2002

  • Wei Yu, Dong Xuan and Wei Zhao "Middleware based Approach for Preventing Distributed Denial of Service Attacks." in IEEE Military Communications (MILCOM). New York, (10 2002). 1124 - 1129.
  • Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan and Wei Zhao "Implementation of QoS-Provisioning System for Voice over IP." in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). LOS ALAMITOS, (1 2002). 266 - 275.

2001

  • Wei Yu, Dong Xuan, Bryan Graham, S. Santhanam, Riccardo Bettati and Wei Zhao "An Integrated Middleware-Based Solution for Supporting Secured Dynamic-Coalition Applications in Heterogeneous Environments." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). New York, (6 2001). 259 - 264.
  • Dong Xuan and Weijia Jia "Distributed Admission Control for Anycast Flows with QoS Requirements." in IEEE International Conference on Distributed Computing Systems (ICDCS). LOS ALAMITOS, (1 2001). 292 - 300.
  • Shengquan Wang, Dong Xuan, Riccarod Bettati and Wei Zhao "Providing Absolute Differentiated Services for Real-time Applications in Static-Priority Scheduling Networks." in IEEE International Conference on Computer Communications (INFOCOM). New York, (1 2001). 669 - 678.
  • Shengquan Wang, Dong Xuan, Riccardo Bettati and Wei Zhao "Differentiated Services with Statistical Real-time Guarantees in Static-Priority Scheduling Networks." in IEEE Real-Time Systems Symposium (RTSS). LOS ALAMITOS, (1 2001). 289 - 298.
  • Dong Xuan, Riccardo Bettati and Wei Zhao "A Gateway-Based Defense System for Distributed DoS Attacks in High Speed Networks." in IEEE Systems, Man, and Cybernetics Information Assurance Workshop (IAW). New York, (6 2001). 212 - 219.

2000

  • Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati and Wei Zhao "Scalable QoS Guaranteed Communication Services for Real-Time Applications." in IEEE International Conference on Distributed Computing Systems (ICDCS). New York, (4 2000). 180 - 187.
  • Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen and Wei Zhao "Utilization-based Admission Control for Real-time Applications." in International Conference on Parallel Processing (ICPP). LOS ALAMITOS, (1 2000). 251 - 260.

1999

  • Yong Guan, Chengzhi Li, Dong Xuan, Riccardo Bettati and Wei Zhao "Preventing Traffic Analysis for Real-Time Communication Networks." in IEEE Military Communications (MILCOM). New York, (10 1999). 744 - 750.
  • Weijia Jia, Wei Zhao, Dong Xuan and Gaochao Xu "An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques." in IEEE International Conference on Parallel Processing (ICPP). new York, (8 1999). 508 - 514.
  • Weijia Jia, Gaochao Xu, Wei Zhao and Dong Xuan "An Integrated Routing Protocol for Reliable Anycast and Multicast Communications." in International Conference on Parallel and Distributed Computing Systems (ICPDCS). New York, (8 1999). 185 - 190.

1998

  • Weijia Jia, Dong Xuan and Wei Zhao "Integrated Routing Algorithms for Anycast Messages." in IEEE Global Telecommunications Conference (GLOBECOM). New York, (1 1998). 1635 - 1640.
  • Dong Xuan, Weijia Jia and Wei Zhao "Routing Algorithms for Anycast Messages." in IEEE International Conference on Parallel Processing (ICPP). New York, (8 1998). 122 - 130.

Patents

  • Dong Xuan, Yuan F. Zheng, Wei Zhao, Jin Teng, Junda Zhu, Boying Zhang, Xinfeng Li, Biao Chen and Wei Li. "E-V: Integrating Electronic and Visual Signals for Efficient Surveillance."