The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xinwen Fu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham
    On Recognizing Virtual Honeypots and Countermeasures. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:211-218 [Conf]
  2. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:188-195 [Conf]
  3. Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao
    SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:452-461 [Conf]
  4. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:340-0 [Conf]
  5. Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Marking Attacks in Wireless Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:493-503 [Conf]
  6. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:257-0 [Conf]
  7. Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati
    Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:57-63 [Conf]
  8. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
    Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2003, pp:483-492 [Conf]
  9. Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
    Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:266-281 [Conf]
  10. Ye Zhu, Xinwen Fu, Riccardo Bettati
    On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:215-218 [Conf]
  11. Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Correlation Attacks and Countermeasures in Mix Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:207-225 [Conf]
  12. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
    DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
  13. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  14. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal]

  15. A new cell counter based attack against tor. [Citation Graph (, )][DBLP]


  16. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]


  17. A New Replay Attack Against Anonymous Communication Networks. [Citation Graph (, )][DBLP]


  18. The Digital Marauder's Map: A New Threat to Location Privacy. [Citation Graph (, )][DBLP]


  19. CAP: A Context-Aware Privacy Protection System for Location-Based Services. [Citation Graph (, )][DBLP]


  20. 3DLoc: Three Dimensional Wireless Localization Toolkit. [Citation Graph (, )][DBLP]


  21. Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. [Citation Graph (, )][DBLP]


  22. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]


  23. Blind Detection of Spread Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]


  24. On performance bottleneck of anonymous communication networks. [Citation Graph (, )][DBLP]


  25. Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. [Citation Graph (, )][DBLP]


  26. Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.278secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002