The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dong Xuan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
    Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:84-91 [Conf]
  2. Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan
    Sensor Network Configuration Under Physical Attacks. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:23-32 [Conf]
  3. Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
    Scalable QoS Guaranteed Communication Services for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:180-187 [Conf]
  4. Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang
    Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:408-417 [Conf]
  5. Dong Xuan, Weijia Jia
    Distributed Admission Control for Anycast Flows with QoS Requirements. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:292-300 [Conf]
  6. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
    Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2003, pp:483-492 [Conf]
  7. Weijia Jia, Gaochao Xu, Dong Xuan, Wei Zhao
    An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP]
    ICPP, 1999, pp:508-515 [Conf]
  8. Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
    Utilization-Based Admission Control for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICPP, 2000, pp:251-0 [Conf]
  9. Dong Xuan, Weijia Jia, Wei Zhao
    Routing Algorithms for Anycast Messages. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:122-0 [Conf]
  10. Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
    Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:266-281 [Conf]
  11. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:669-678 [Conf]
  12. Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao Liu
    A design of overlay anonymous multicast protocol. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  13. Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai
    Deploying wireless sensors to achieve both coverage and connectivity. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2006, pp:131-142 [Conf]
  14. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    A Study of Providing Statistical QoS in a Differentiated Sevices Network. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:297-304 [Conf]
  15. Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan, Wei Zhao
    Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2002, pp:266-275 [Conf]
  16. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2001, pp:127-129 [Conf]
  17. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 2001, pp:289-298 [Conf]
  18. Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
    DSSS-Based Flow Marking Technique for Invisible Traceback. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:18-32 [Conf]
  19. Wei Yu, Thang Nam Le, Jangwon Lee, Dong Xuan
    Effective query aggregation for data services in sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:18, pp:3733-3744 [Journal]
  20. Wei Yu, Sriram Chellappan, Dong Xuan
    P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2005, v:21, n:1, pp:209-219 [Journal]
  21. Shengquan Wang, Dong Xuan, Wei Zhao
    Analyzing and enhancing the resilience of structured peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2005, v:65, n:2, pp:207-219 [Journal]
  22. Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei Liu
    Mutual anonymous overlay multicast. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1205-1216 [Journal]
  23. Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li
    Utilization-Based Admission Control for Scalable Real-Time Communication. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2003, v:24, n:2, pp:171-202 [Journal]
  24. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing absolute differentiated services for real-time applications in static-priority scheduling networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:326-339 [Journal]
  25. Weijia Jia, Dong Xuan, Wanqing Tu, Lidong Lin, Wei Zhao
    Distributed Admission Control for Anycast Flows. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:8, pp:673-686 [Journal]
  26. Weijia Jia, Wei Zhao, Dong Xuan, Gaochao Xu
    An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:10, pp:984-1000 [Journal]
  27. Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan
    On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:7, pp:619-632 [Journal]
  28. Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao
    Design and Implementation of QoS-Provisioning System for Voice over IP. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:3, pp:276-288 [Journal]
  29. Dong Xuan, Weijia Jia, Wei Zhao, HongWen Zhu
    A Routing Protocol for Anycast Messages. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:6, pp:571-588 [Journal]
  30. Sriram Chellappan, Xiaole Bai, Bin Ma, Dong Xuan, Changqing Xu
    Mobility Limited Flip-Based Sensor Networks Deployment. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:2, pp:199-211 [Journal]
  31. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  32. Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
    Distributed policy processing in active-service based infrastructures. [Citation Graph (0, 0)][DBLP]
    Int. J. Communication Systems, 2006, v:19, n:7, pp:727-750 [Journal]
  33. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
    On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:235-244 [Conf]
  34. Zhimin Yang, Eylem Ekici, Dong Xuan
    A Localization-Based Anti-Sensor Network System. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2396-2400 [Conf]
  35. Sriram Chellappan, Wenjun Gu, Xiaole Bai, Dong Xuan, Bin Ma, Kaizhong Zhang
    Deploying Wireless Sensor Networks under Limited Mobility Constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:10, pp:1142-1157 [Journal]
  36. Wenjun Gu, Xiaole Bai, Sriram Chellappan, Dong Xuan, Weijia Jia
    Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:12, pp:1784-1796 [Journal]

  37. PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. [Citation Graph (, )][DBLP]


  38. A new cell counter based attack against tor. [Citation Graph (, )][DBLP]


  39. On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs. [Citation Graph (, )][DBLP]


  40. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. [Citation Graph (, )][DBLP]


  41. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. [Citation Graph (, )][DBLP]


  42. Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  43. Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks. [Citation Graph (, )][DBLP]


  44. Blind Detection of Spread Spectrum Flow Watermarks. [Citation Graph (, )][DBLP]


  45. D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks. [Citation Graph (, )][DBLP]


  46. Malicious Shellcode Detection with Virtual Memory Snapshots. [Citation Graph (, )][DBLP]


  47. Pattern Mutation in Wireless Sensor Deployment. [Citation Graph (, )][DBLP]


  48. Network Decoupling for Secure Communications in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  49. Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. [Citation Graph (, )][DBLP]


  50. Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. [Citation Graph (, )][DBLP]


  51. Low-connectivity and full-coverage three dimensional wireless sensor networks. [Citation Graph (, )][DBLP]


  52. PerFallD: A pervasive fall detection system using mobile phones. [Citation Graph (, )][DBLP]


  53. Link-layer protection in 802.11i WLANS with dummy authentication. [Citation Graph (, )][DBLP]


  54. Stealthy video capturer: a new video-based spyware in 3G smartphones. [Citation Graph (, )][DBLP]


  55. Turning heterogeneity into an advantage in wireless ad-hoc network routing. [Citation Graph (, )][DBLP]


  56. Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.455secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002