Dong Xuan

Orcid: 0009-0006-0201-0378

According to our database1, Dong Xuan authored at least 139 papers between 1998 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2021, "for contributions to connected coverage in wireless networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Autonomous and Cost-effective Defect Detection System for Molded Pulp Products.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

2022
VaRSM: Versatile Autonomous Racquet Sports Machine.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

2021
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic.
CoRR, 2021

A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection.
CoRR, 2021

On Model Calibration for Long-Tailed Object Detection and Instance Segmentation.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

MosaicOS: A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Discovering the Unknown Knowns: Turning Implicit Knowledge in the Dataset into Explicit Training Examples for Visual Question Answering.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

2020
ACOUSTIC-TURF: Acoustic-based Privacy-Preserving COVID-19 Contact Tracing.
CoRR, 2020

On the Accuracy of Measured Proximity of Bluetooth-Based Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Study of the Privacy of COVID-19 Contact Tracing Apps.
Proceedings of the Security and Privacy in Communication Networks, 2020

Research on Design Method of Mechanism Dimensional Parameters for Double Parallelogram Palletizing Robot Based on Task Space.
Proceedings of the 5th International Conference on Automation, 2020

2019
An Empirical Study on Leveraging Scene Graphs for Visual Question Answering.
Proceedings of the 30th British Machine Vision Conference 2019, 2019

2018
MV-Sports: A Motion and Vision Sensor Integration-Based Sports Analysis System.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data.
IEEE Trans. Parallel Distributed Syst., 2017

SurvSurf: human retrieval on large surveillance video data.
Multim. Tools Appl., 2017

BridgeLoc: Bridging Vision-Based Localization for Robots.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

On human mobility predictability via WLAN logs.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
A mobile phone-based physical-social location proof system for mobile social network service.
Secur. Commun. Networks, 2016

Simultaneous body part and motion identification for human-following robots.
Pattern Recognit., 2016

S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Robust object tracking in the X-Z domain.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

Flash-Loc: Flashing mobile phones for accurate indoor localization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Traffic at-a-glance: Time-bounded analytics on large visual traffic data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Sequential Sample Consensus: A Robust Algorithm for Video-Based Face Recognition.
IEEE Trans. Circuits Syst. Video Technol., 2015

An iterative clustering algorithm for classification of object motion direction using infrared sensor array.
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015

VM-tracking: Visual-motion sensing integration for real-time human tracking.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Local face-view barrier coverage in camera sensor networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Human feet tracking guided by locomotion model.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Connected Coverage in Wireless Networks with Directional Antennas.
ACM Trans. Sens. Networks, 2014

EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization.
IEEE/ACM Trans. Netw., 2014

TurfCast: A Service for Controlling Information Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., 2014

E-Shadow: Lubricating Social Interaction Using Mobile Phones.
IEEE Trans. Computers, 2014

EV-sounding: A visual assisted electronic channel sounding system.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity.
IEEE Trans. Parallel Distributed Syst., 2013

DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains.
IEEE Trans. Mob. Comput., 2013

Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013

Blind detection of spread spectrum flow watermarks.
Secur. Commun. Networks, 2013

Side-view face authentication based on wavelet and random forest with subsets.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

On wireless network coverage in bounded areas.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

EV-Human: Human localization via visual estimation of body electronic interference.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Effective epidemic control and source tracing through mobile social sensing over WBANs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Robust video-based face recognition by sequential sample consensus.
Proceedings of the 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2013

2012
Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Pattern mutation in wireless sensor deployment.
IEEE/ACM Trans. Netw., 2012

A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012

Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

JSGuard: Shellcode Detection in JavaScript.
Proceedings of the Security and Privacy in Communication Networks, 2012

E-V: Efficient visual surveillance with electronic footprints.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Epidemic Control Based on Fused Body Sensed and Social Network Information.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
An Opened Eye on you.
IEEE Veh. Technol. Mag., 2011

Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization.
IEEE Trans. Veh. Technol., 2011

Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Secur. Comput., 2011

On detecting active worms with varying scan rate.
Comput. Commun., 2011

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Ad Hoc Sens. Wirel. Networks, 2011

P<sup>3</sup>-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs.
IEEE Trans. Parallel Distributed Syst., 2010

Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2010

Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Toward statistical QoS guarantees in a differentiated services network.
Telecommun. Syst., 2010

Mobile phone-based pervasive fall detection.
Pers. Ubiquitous Comput., 2010

Constructing low-connectivity and full-coverage three dimensional sensor networks.
IEEE J. Sel. Areas Commun., 2010

Turning heterogeneity into an advantage in wireless ad-hoc network routing.
Ad Hoc Networks, 2010

Mobile phone based drunk driving detection.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

PerFallD: A pervasive fall detection system using mobile phones.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Malicious Shellcode Detection with Virtual Memory Snapshots.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distributed Syst., 2009

Measuring and guaranteeing quality of barrier coverage for general belts with wireless sensors.
ACM Trans. Sens. Networks, 2009

Sensor network configuration under physical attacks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Link-layer protection in 802.11i WLANS with dummy authentication.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Stealthy video capturer: a new video-based spyware in 3G smartphones.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Low-connectivity and full-coverage three dimensional wireless sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

DiffUser: Differentiated User Access Control on Smartphone.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Comput. Commun., 2008

Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Mobility Limited Flip-Based Sensor Networks Deployment.
IEEE Trans. Parallel Distributed Syst., 2007

Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput., 2007

DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Detecting worms via mining dynamic program execution.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Localization-Based Anti-Sensor Network System.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Design and Implementation of QoS-Provisioning System for Voice over IP.
IEEE Trans. Parallel Distributed Syst., 2006

On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2006

Mutual anonymous overlay multicast.
J. Parallel Distributed Comput., 2006

Distributed policy processing in active-service based infrastructures.
Int. J. Commun. Syst., 2006

Effective query aggregation for data services in sensor networks.
Comput. Commun., 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

A dynamic geographic hash table for data-centric storage in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Effective Detection of Active Worms with Varying Scan Rate.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Deploying wireless sensors to achieve both coverage and connectivity.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

Network Decoupling for Secure Communications in Wireless Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

A design of overlay anonymous multicast protocol.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Analyzing and enhancing the resilience of structured peer-to-peer systems.
J. Parallel Distributed Comput., 2005

P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Gener. Comput. Syst., 2005

Defending against search-based physical attacks in sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Sensor networks deployment using flip-based sensors.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Peer-to-peer system-based active worm attacks: modeling and analysis.
Proceedings of IEEE International Conference on Communications, 2005

Lifetime optimization of sensor networks under physical attacks.
Proceedings of IEEE International Conference on Communications, 2005

On defending peer-to-peer system-based active worm attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An adaptive zone-based storage architecture for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Resilience of Structured Peer-to-Peer Systems.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Distributed Admission Control for Anycast Flows.
IEEE Trans. Parallel Distributed Syst., 2004

Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw., 2004

Query aggregation for providing efficient data services in sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Utilization-Based Admission Control for Scalable Real-Time Communication.
Real Time Syst., 2003

A Study of Providing Statistical QoS in a Differentiated Sevices Network.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Group aggregation for scalable anycast routing.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003

On resilience of structured peer-to-peer systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
Implementation of QoS-Provisioning System for Voice over IP.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Distributed Admission Control for Anycast Flows with QoS Requirements.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
A Routing Protocol for Anycast Messages.
IEEE Trans. Parallel Distributed Syst., 2000

Integrated routing algorithms for anycast messages.
IEEE Commun. Mag., 2000

Utilization-Based Admission Control for Real-Time Applications.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

Scalable QoS Guaranteed Communication Services for Real-Time Applications.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
IEEE Trans. Parallel Distributed Syst., 1999

1998
Routing Algorithms for Anycast Messages.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998


  Loading...