Xinwen Fu
Orcid: 0000-0003-2391-7789
According to our database1,
Xinwen Fu
authored at least 190 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Syst. Archit., 2024
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the IEEE Global Engineering Education Conference, 2024
2023
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
A Deep Learning Framework with Pruning RoI Proposal for Dental Caries Detection in Panoramic X-ray Images.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
A Greedy Algorithm-Based Self-Training Pipeline for Expansion of Dental Caries Dataset.
Proceedings of the IEEE International Conference on E-health Networking, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids.
IEEE Trans. Dependable Secur. Comput., 2022
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems.
IEEE Internet Things J., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
J. Syst. Archit., 2021
IEEE Internet Things J., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the ICC 2021, 2021
2020
World Wide Web, 2020
IEEE Internet Things J., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
World Wide Web, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data.
Multim. Tools Appl., 2019
On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids.
IEEE Internet Things J., 2019
CoRR, 2019
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Trans. Syst. Man Cybern. Syst., 2018
IEEE Trans. Serv. Comput., 2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Wirel. Commun. Mob. Comput., 2017
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems.
IEEE Trans. Veh. Technol., 2017
IEEE Internet Things J., 2017
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet Things J., 2017
IEEE Internet Things J., 2017
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Multim. Tools Appl., 2016
EURASIP J. Wirel. Commun. Netw., 2016
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
EAI Endorsed Trans. Ubiquitous Environ., 2015
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems.
IEEE Trans. Computers, 2015
Int. J. Parallel Emergent Distributed Syst., 2015
IEEE Commun. Mag., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014
IEEE Trans. Mob. Comput., 2014
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Commun. Mag., 2014
Ad Hoc Networks, 2014
Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Data Management in Cloud, Grid and P2P Systems, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
IEEE Trans. Veh. Technol., 2013
J. Supercomput., 2013
IEEE Trans. Computers, 2013
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback.
Int. J. Networked Distributed Comput., 2013
Int. J. Grid High Perform. Comput., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
IEEE Trans. Mob. Comput., 2012
Comput. Networks, 2012
Comput. Networks, 2012
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IEEE Trans. Veh. Technol., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011
2010
IEEE Trans. Syst. Man Cybern. Part B, 2010
IEEE Trans. Parallel Distributed Syst., 2010
IEEE Trans. Parallel Distributed Syst., 2010
IEEE Trans. Computers, 2010
Generic network forensic data acquisition from household and small business wireless routers.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Decision and Game Theory for Security, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
IEEE Trans. Parallel Distributed Syst., 2009
Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment.
Proceedings of the Wireless Algorithms, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Int. J. Netw. Secur., 2008
Int. J. Commun. Syst., 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of IEEE International Conference on Communications, 2008
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Int. J. Secur. Networks, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third IEEE International Symposium on Dependable, 2007
2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004
2003
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
On Countermeasures to Traffic Analysis Attacks.
Proceedings of the IEEE Systems, 2003
2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001