Xin-Wen Wu
Orcid: 0000-0003-2548-9271
According to our database1,
Xin-Wen Wu
authored at least 57 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the International Conference on Smart Applications, 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
2023
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks.
Comput. Networks, August, 2023
2022
Accuracy vs Efficiency: Machine Learning Enabled Anomaly Detection on the Internet of Things.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022
Proceedings of the 51st IEEE Applied Imagery Pattern Recognition Workshop, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
2020
Wirel. Networks, 2020
Securing the Internet of Everything through Adaptive and Resource-Efficient Mechanisms.
IEEE Internet Things Mag., 2020
Des. Codes Cryptogr., 2020
2019
Correct filtering for subgraph isomorphism search in compressed vertex-labeled graphs.
Inf. Sci., 2019
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
Proceedings of the 16th Canadian Workshop on Information Theory, 2019
Proceedings of the 48th IEEE Applied Imagery Pattern Recognition Workshop, 2019
2018
A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018
2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Appl. Algebra Eng. Commun. Comput., 2016
On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN.
Proceedings of the International Conference on Frontiers of Information Technology, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron., 2015
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks, 2015
J. Networks, 2015
An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks.
J. Networks, 2015
IEEE Commun. Lett., 2015
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015
Proceedings of the 2015 European Conference on Networks and Communications, 2015
2014
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks, 2014
Comments on the security of "Diffusion-substitution based gray image encryption" scheme.
Digit. Signal Process., 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise.
IEEE Trans. Inf. Forensics Secur., 2012
Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers.
IET Inf. Secur., 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Proceedings of the Global Communications Conference, 2011
2010
SIAM J. Discret. Math., 2010
Primitive polynomials for robust scramblers and stream ciphers against reverse engineering.
Proceedings of the IEEE International Symposium on Information Theory, 2010
2005
IEEE Trans. Inf. Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2001
Efficient root-finding algorithm with application to list decoding of Algebraic-Geometric codes.
IEEE Trans. Inf. Theory, 2001
1999
IEEE Trans. Inf. Theory, 1999