Xin-Wen Wu

Orcid: 0000-0003-2548-9271

According to our database1, Xin-Wen Wu authored at least 57 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Pareto-Optimal Machine Learning Models for Security of IoT Applications.
Proceedings of the International Conference on Smart Applications, 2024

Lifetime Modelling of Wireless Sensor Networks with Multipath Routing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

2023
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks.
Comput. Networks, August, 2023

2022
Accuracy vs Efficiency: Machine Learning Enabled Anomaly Detection on the Internet of Things.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022

IoT Anomaly Detection Using a Multitude of Machine Learning Algorithms.
Proceedings of the 51st IEEE Applied Imagery Pattern Recognition Workshop, 2022

2021
SP-CIDS: Secure and Private Collaborative IDS for VANETs.
IEEE Trans. Intell. Transp. Syst., 2021

Notes on LCD Codes Over Frobenius Rings.
IEEE Commun. Lett., 2021

2020
Energy efficient protocol for routing and scheduling in wireless body area networks.
Wirel. Networks, 2020

Securing the Internet of Everything through Adaptive and Resource-Efficient Mechanisms.
IEEE Internet Things Mag., 2020

Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan.
Des. Codes Cryptogr., 2020

2019
Correct filtering for subgraph isomorphism search in compressed vertex-labeled graphs.
Inf. Sci., 2019

A Novel Framework for Software Defined Wireless Body Area Network.
CoRR, 2019

An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

On Optimal Information-Theoretically Secure Key Management.
Proceedings of the 16th Canadian Workshop on Information Theory, 2019

Internet of Things Anomaly Detection using Machine Learning.
Proceedings of the 48th IEEE Applied Imagery Pattern Recognition Workshop, 2019

2018
A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Lightweight security protocols for the Internet of Things.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Information-theoretically secure key generation and management.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
On the Security of Permutation-Only Image Encryption Schemes.
IEEE Trans. Inf. Forensics Secur., 2016

Construction of optimal constant-dimension subspace codes.
J. Comb. Optim., 2016

The fullrank value function.
Des. Codes Cryptogr., 2016

Trellis complexity and pseudoredundancy of relative two-weight codes.
Appl. Algebra Eng. Commun. Comput., 2016

On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

2015
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability.
IEEE Trans. Inf. Forensics Secur., 2015

Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron., 2015

Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks, 2015

Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB).
J. Networks, 2015

An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks.
J. Networks, 2015

An Analytical Model for Lifetime Estimation of Wireless Sensor Networks.
IEEE Commun. Lett., 2015

On relative constant-weight codes.
Des. Codes Cryptogr., 2015

A Secure Lightweight Texture Encryption Scheme.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

A reliable multicast MAC protocol for Wi-Fi Direct 802.11 networks.
Proceedings of the 2015 European Conference on Networks and Communications, 2015

2014
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks, 2014

Comments on the security of "Diffusion-substitution based gray image encryption" scheme.
Digit. Signal Process., 2014

New Results on the Pseudoredundancy.
CoRR, 2014

Notes on the pseudoredundancy.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder.
IEEE Trans. Inf. Forensics Secur., 2013

Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

On the Feasibility and Performance of Pass-Thought Authentication Systems.
Proceedings of the Fourth International Conference on Emerging Security Technologies, 2013

A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise.
IEEE Trans. Inf. Forensics Secur., 2012

Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers.
IET Inf. Secur., 2012

Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

On a class of three-weight codes with cryptographic applications.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

A novel dynamic user authentication scheme.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Securing mobile agent based Wireless Sensor Network applications on middleware.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
New code equivalence based on relative generalized Hamming weights.
Inf. Sci., 2011

Investigation on Scrambler Reconstruction with Minimum A Priori Knowledge.
Proceedings of the Global Communications Conference, 2011

2010
On the Relative Generalized Hamming Weights of Linear Codes and their Subcodes.
SIAM J. Discret. Math., 2010

Primitive polynomials for robust scramblers and stream ciphers against reverse engineering.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2005
A root-finding algorithm for list decoding of Reed-Muller codes.
IEEE Trans. Inf. Theory, 2005

On the decoding radius of Lee-metric decoding of algebraic-geometric codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
List decoding of q-ary Reed-Muller codes.
IEEE Trans. Inf. Theory, 2004

A class of algebraic-geometric codes for Lee-Metric and their decoding.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2001
Efficient root-finding algorithm with application to list decoding of Algebraic-Geometric codes.
IEEE Trans. Inf. Theory, 2001

1999
Correction to "New double-byte error-correcting codes for memory systems".
IEEE Trans. Inf. Theory, 1999


  Loading...