Dr. Xinwen Fu
Books
- Xinwen Fu, Traffic Analysis Attacks and Countermeasures: Pattern
Recognition Based Methodology, VDM Publishing, ISBN: 978-3-639-14777-3,
2009
Book Chapters
- Xinwen Fu, S. Graham, and Y. Guan, Location Privacy in Wireless
Networks, Handbook on Mobile Ad Hoc and Pervasive Communications,
American Scientific Publishers, 2012
- Xin Jin, Min Dan, Nan Zhang, Wei Yu, Xinwen Fu, and Sajal K.
Das, “Game Theory for Infrastructure Security – The Power of
Intent-Based Adversary Models”, Book Chapter, Handbook on Securing
Cyber-Physical Critical Infrastructure, Elsevier Inc., ISBN (Print)
9780124158153, Dec 1 2012
- Xinyu Yang, Jie Lin, Wei Yu, Xinwen Fu, Genshe Chen, and Erik
P. Blasch, “On Situational Aware En-route Filtering against Injected
False Data in Cyber Physical Networks,”. Book Chapter, Situational
Awareness in Computer Network Defense: Principles, Methods and
Applications, IGI-Global, 2012
- Wei Yu, Nan Zhang, Xinwen Fu, and Brian Rivera, “Evolution of
Widely-Spreading Worms and Countermeasures: Epidemic Theory and
Application,” Book Chapter, Handbook on Securing Cyber-physical
Infrastructures: Foundations and Challenges, Elsevier Science &
Technology, ISBN: 978-0-12-415815-3, 2012
- Steven Graham, Bin Lu and Xinwen Fu, Network Security
Fundamentals, Book chapter, Encyclopedia of Computer Science and
Engineering, John Wiley & Sons, Inc., 2008
Refereed Journal Publications
- Zhongjie Ba, Zhan Qin, Xinwen Fu and Kui Ren, CIM: Camera in Motion for Smartphone Authentication, Transactions on Information Forensics & Security (TIFS), Accepted 2019
- Lan Luo, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, Xinwen Fu, "On the Security and Data Integrity of Low-cost Sensor Networks for Air Quality Monitoring", Sensors 2018, 18(12), 4451; [PDF]. https://doi.org/10.3390/s18124451
- Fan Liang, Wei Yu, Dou An, Qingyu Yang, Xinwen Fu, Wei Zhao: A Survey on Big Data Market: Pricing, Trading and Protection. IEEE Access 6: 15132-15154 (2018). [PDF]
- Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding. IEEE Trans. Systems, Man, and Cybernetics: Systems 48(7): 1177-1190 (2018). [PDF
- Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
User Differentiated Verifiable File Search on the Cloud. IEEE Transactions on Services Computing 11(6): 948-961 (2018), [PDF]
- Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xinwen Fu, "Your Clicks Reveal Your Secrets: A Novel User-device Linking Method Through Network and Visual Data", accepted to appear in Multimedia Tools and Applications (MTA), October 2018. LINK. [PDF]. DOI https://doi.org/10.1007/s11042-018-6815-6
- Bo Liu, Zeyang Ni, Junzhou Luo, Jiuxin Cao, Xudong Ni, Benyuan Liu and Xinwen Fu, Analysis of and defense against crowd-retweeting based spam in social networks, World Wide Web (WWW), First Online: 27 June 2018, [PDF]. https://doi.org/10.1007/s11280-018-0613-y
- Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu, Xinwen Fu,
"Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System", IEEE Internet of Things Journal (IoT-J), 4(6): 1899-1909, 2017.
[Demo Video: This Smart Plug can "twitter" by itself]
[Media Impact: Sina,
GeekPwn, etc.]
[PDF]
- Dazhong Wu, Anqi Ren, Wenhui Zhang, Feifei Fan, Peng Liu, Xinwen Fu,Janis Terpenny, Cybersecurity for digital manufacturing, Journal of Manufacturing Systems, 4 April 2018, [pdf]
- Dou An ; Qingyu Yang; Wei Yu; Xinyu Yang; Xinwen Fu; Wei Zhao, Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids,
IEEE Internet of Things Journal (IoT-J), Volume: 4, Issue: 6, Dec. 2017. [pdf]
- Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao,
"Privacy Enhancing Keyboard (PEK): Design, Implementation and Usability Testing", Wireless Communications and Mobile Computing (WCMC), November 2017, [pdf]
- Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Transactions on Vehicular Technology 66(3): 2551-2566 (2017) [pdf]
- Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren,
Xinwen Fu: Password Extraction via Reconstructed Wireless Mouse
Trajectory. IEEE Transactions on Dependable Security Computing, 13(4):
461-473, 2016, [pdf]
- Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure Barcode-Based Visible Light Communication for
Smartphones. IEEE Transactions on Mobile Computing, 15(2): 432-446,
2016, [pdf]
- Tao Xiang, Jianglin Sun, Xinwen Fu: On the security of binary
arithmetic coding based on interval shrinking. Multimedia Tools and
Applications. 75(8): 4245-4258 (2016), [pdf]
- Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
Disjoint multi mobile agent itinerary planning for big data analytics.
EURASIP Journal on Wireless Communications and Networking, 2016: 99,
2016, [pdf]
- Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu,
De-anonymizing and countermeasures in anonymous communication networks,
IEEE Communications Magazine, 53(4): 60-66, 2015, [pdf]
- Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao,
On Malware Leveraging the Android Accessibility Framework, EAI Endorsed
Transactions on Ubiquitous Environments, 1(4): e1, 2015, [pdf]
- Guobin Xu, Wei Yu, Zhijiang Chen, Hanlin Zhang, Paul Moulema,
Xinwen Fu, Chao Lu: A cloud computing based system for cyber security
management. International Journal of Power Electronics and Drive Systems
(IJPEDS), 30(1): 29-45, 2015, [pdf]
- Zhen Ling, Junzhou Luo,Wei Yu, Ming Yang, Xinwen Fu, Tor
Bridge Discovery: Extensive Analysis and Large-scale Empirical
Evaluation, IEEE Transactions on Parallel Distributed System (TPDS),
26(7): 1887-1899, 2015, [pdf]
- Xinyu Yang, Jie Lin, Wei Yu, Paul Moulema, Xinwen Fu, and Wei
Zhao, A Novel En-route Filtering Scheme against False Data Injection
Attacks in Cyber-Physical Networked Systems, IEEE Transactions on
Computers (TC), 64(1): 4-18, 2015, [pdf]
- Donghai Zhu, Xinyu Yang, Wei Yu, Xinwen Fu, Network coding
versus traditional routing in adversarial wireless networks. Ad Hoc
Networks 20: 119-131, 2014, [pdf]
- Zhongli Liu, Y. Chen, B. Liu, C. Cao, and Xinwen Fu, HAWK: An
unmanned mini helicopter-based aerial wireless kit for localization,
IEEE Transactions on Mobile Computing (TMC), 13(2): 287-298, February,
2014, [pdf], Spotlight paper
- Longfei Wu, Xiaojiang Du, Xinwen Fu: Security threats to
mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Communications Magazine 52(3): 80-87, 2014, [pdf]
- Bhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan
Liu, Jie Wang: Providing service assurance in mobile opportunistic
networks. Computer Networks, 74: 114-140, 2014, [pdf]
- Zhen Ling, Junzhou Luo,Wei Yu, Xinwen Fu, Weijia Jia, andWei
Zhao, Protocol-level Attacks against Tor, Computer Networks, 57(4):
869-886, 2013, [pdf]
- W. Jia, F. TSO, Z. Ling, Xinwen Fu, D. Xuan and W. Yu, Blind
Detection of Spread Spectrum Flow Watermarks, Security and Communication
Networks (SCN), 6(3): 257-274, 2013, [pdf]
- Swathi Kurunji, Tingjian Ge, Xinwen Fu, Benyuan Liu, Cindy X.
Chen: Optimizing Communication for Multi-Join Query Processing in Cloud
Data Warehouses. International Journal of Grid and High Performance
Computing (IJGHPC) 5(4): 113-130, 2013, [pdf]
- Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou
Luo, Novel Packet Size Based Covert Channel Attacks against Anonymizer,
IEEE Transactions on Computers (TC), 62(12): 2411-2426, 2013, [pdf]
- Peng Zhao, Xinyu Yang, Wei Yu, Xinwen Fu: A
Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs.
IEEE Transactions on Vehicular Technology (TVT), 62(5): 2290-2302, 2013,
[pdf]
- Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu,
How to block Tor's hidden bridges: detecting methods and
countermeasures. The Journal of Supercomputing 66(3): 1285-1305, 2013, [pdf]
- Aniket Pingley, W. Yu, N. Zhang, Xinwen Fu and W. Zhao, A
Context-Aware Privacy Protection System for Location-Based Services,
Computer Networks - Elsevier, 56(11): 2551-2568, 2012, [pdf]
- Z. Ling, J. Luo, W. Yu, Xinwen Fu, D. Xuan and W. Jia, A New
Cell Counting Based Attack Against Tor, IEEE/ACM Transactions on
Networking (ToN), 20(4): 1245-1261, 2012, [pdf]
- X. Yang, X. Fan, W. Yu, Xinwen Fu, and Shusen Yang, HLLS: A
History information based Light Location Service for MANETs, Computer
Networks - Elsevier, 56(2), 2012, [pdf]
- Xinwen Fu, N. Zhang, A. Pingley, W. Yu, J. Wang and W. Zhao,
The Digital Marauder’s Map: a WiFi Forensic Positioning Tool, IEEE
Transactions on Mobile Computing (TMC), 11(3), 2012, [pdf]
- Xian Pan, Junwei Huang, Zhen Ling, Bin Lu, and Xinwen Fu, Long
PN Code Based Traceback in Wireless Networks, International Journal of
Performability Engineering (IJPE), 8(2), Mar. 2012, [pdf]
- Yuefeng Huang, Xinyu Yang, Shuseng Yang,Wei Yu, and Xinwen Fu,
A Cross Layer Approach Handling Link Asymmetry for Wireless Mesh Access
Networks, IEEE Transactions on Vehicular Technology (TVT), 60(3), March
2011, [pdf]
- W. Yu, N. Zhang, Xinwen Fu, R. Bettati and W. Zhao,
Localization Attacks to Internet Threat Monitors: Modeling and
Countermeasures, IEEE Transactions on Computers, 59(12): 1655-1668,
2010, [pdf]
- Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao,
Correlation-Based Traffic Analysis Attacks on Anonymity Networks, IEEE
Transactions on Parallel and Distributed Systems (TPDS), 21(7): 954-967,
2010, [pdf, Spotlight paper]
- Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das, Maintaining the
Defenders Reputation in Anomaly Detection Against Insider Attacks, IEEE
Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
(SMC-B), 40(3): 597-611, 2010, [pdf]
- Wei Yu, Nan Zhang, Xinwen Fu, and Wei Zhao, Self-Disciplinary
Worms and Countermeasures: Modeling and Analysis, IEEE Transactions on
Parallel and Distributed Systems (TPDS), 21(10): 1501-1514, 2010, [pdf]
- Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham and Yong Guan, TCP
Performance in Flow-Based Mix Networks: Modeling and Analysis, IEEE
Transactions on Parallel and Distributed Systems (TPDS), 20(5): 695-709,
2009, [pdf]
- Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, and Wei Zhao, An
Invisible Localization Attack to Internet Threat Monitors, IEEE
Transactions on Parallel and Distributed Systems (TPDS), 20(11):
1611-1625, 2009, [pdf]
- Y. Zhu, Xinwen Fu, and R. Bettati, On the Effectiveness of
Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks,
International Journal of Network Security (IJNS), 7(1): 130-140, 2008, [pdf
- J. Lee, W. Yu and Xinwen Fu, Energy-Efficient Target Detection
in Sensor Networks using Line Proxies, International Journal of
Communication Systems, 21(3): 251-275, 2008, [pdf]
- Xinwen Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, On
Flow Marking Attacks in Wireless Anonymous Communication Networks,
Journal of Ubiquitous Computing and Intelligence (JUCI), 1(1):42-53,
April 2007, [pdf]
- Y. Zhu, Xinwen Fu, R. Bettati, and W. Zhao, Analysis of
Flow-Correlation Attacks in Anonymity Network, Special Issue of
International Journal of Security and Networks (IJSN), 2(1/2): 137-153,
2007, [pdf]
- Y. Guan, Xinwen Fu, R. Bettati, and Wei Zhao, A Quantitative
Analysis of Anonymous Communications, IEEE Transactions on Reliability,
53(1), Mar. 2004, [pdf]
- Xinwen Fu, Y. Guan, R. Bettati, and Wei Zhao, Hiding Role
Assignment in Mission Critical Collaborative Systems, Quality and
Reliability Engineering International, Special Issue on Computer Network
Security, 18(3), 2002, [pdf]
- Y. Guan, Xinwen Fu, D. Xuan, Prashanth Shenoy, R. Bettati, and
Wei Zhao, NetCamo: Camouflaging Network Traffic for QoS-Guaranteed
Mission Critical Applications, in IEEE Transactions on System, Man, and
Cybernetics, Special Issue on Information Assurance, 31(4), Jul. 2001, [pdf]
- Xinwen Fu, M. Zhang, and X. Li, A Method of Texture Matching
Based on Feature Symbol Random Field Created By Wavelet, China Journal
of Image and Graphics, 4(3):243-247, Jun. 1999
Refereed Conference Publications
- Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, and Xinwen Fu, I Know What You Enter on Gear VR, in Proceedings of
IEEE Conference on Communications and Network Security (CNS), 10-12 June 2019, Washington, D.C., USA. [PDF]
- Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu, "Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks", accepted to appear in Proceedings of the 38th IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019. Acceptance Rate: 19.7%. [PDF]
- Bryan Pearson, Lan Luo, Yue Zhang, Rajib Dey, Zhen Ling, Mostafa Bassiouni and Xinwen Fu. "On Misconception of Hardware and Cost in IoT Security and Privacy" , in Proceedings of IEEE International Conference on Communications (ICC) , 20-24 May 2019 - Shanghai, China. [PDF]
- Zupei Li, Chao Gao, Qinggang Yue, Xinwen Fu, Toward Drone Privacy via Regulating Altitude and Payload, in Proceedings of International Conference on Computing, Networking and Communications (ICNC), Honolulu, Hawaii, USA, February 18-21, 2019. [PDF]. [PPT]
- Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu and Wei Zhao, SecT: A Lightweight Secure Thing-Centered IoT Communication System, in Proceedings of 15th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Chengdu, China Oct.9-12, 2018. [PDF]. DOI: 10.1109/MASS.2018.00018
- Qinggang Yue, Zupei Li, Chao Gao, Wei Yu, Xinwen Fu and Wei Zhao, The Peeping Eye in the Sky, in Proceedings of Globecom CISS, 9-13 December 2018, Abu Dhabi, UAE. [PDF]
- Xiaofei He, Wei Yu, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu and Xinwen Fu, Towards 3D Deployment of UAV Base Stations in Uneven Terrain, in Proceedings of The 27th International Conference on Computer Communications and Networks (ICCCN)
July 30 -August 2, 2018, Hangzhou,China. [PDF]
- Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren, ABC: Enabling Smartphone Authentication with Built-in Camera, in Proceedings of etwork and Distributed System Security Symposium (NDSS), February 18-21, 2018, San Diego, California. [PDF]. http://dx.doi.org/10.14722/ndss.2018.2309
- Zhen Ling, Luo Junzhou, Yaowen Liu and Ming Yang; Kui Wu; Xinwen Fu, SecTap: Secure Back of Device Input System for Mobile Devices,
in ceedings of IEEE International Conference on Computer Communications (INFOCOM), 15-19 April 2018 Honolulu, HI USA. [PDF]. 10.1109/INFOCOM.2018.8485939
- Joshua Kraunelis, Xinwen Fu, Wei Yu, Wei Zhao, A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic,
in Proceedings of IEEE International Conference on Communications (ICC) Communication and Information Systems Security Symposium (CISS), 20-24 May 2018, Kansas City, MO, USA. [PDF]
- Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu, "Turning Legacy IR Devices into Smart IoT Devices", in Proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA'18), Tianjin, China, June 20-22, 2018. [PDF]
- Song Chen, Zupei Li, Fabrizio DAngelo, Chao Gao, Xinwen Fu, A Case Study of Security and Privacy Threats from Augmented Reality (AR), in Proceedings of International Conference on Computing, Networking and Communications (ICNC), Maui, Hawaii, USA, March 5-8, 2018. [PDF]
- Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu,
"An End-to-End View of IoT Security and Privacy",
accepted to appear in Proceedings of the 60th IEEE Global Communications Conference (Globecom), Singapore, December 4-8, 2017. [PDF]
- Jesse Victors, Ming Li and Xinwen Fu, The Onion Name System: Tor-Powered Decentralized DNS for Tor Onion Services, in Proceedings on Privacy Enhancing Technologies (PoPETs), July 18–21, 2017 Minneapolis, MN, USA
- Zupei Li, Qinggang Yue, Chuta Sano, Wei Yu and Xinwen Fu, 3D Vision Attack against Authentication, in Proceedings
of IEEE International Conference on Communications (ICC) Communication
and Information Systems Security Symposium (CISS), 21-25 May 2017, Paris, France, [PDF]
- Xinyu Yang, Cong Zhao, Wei Yu, Xianghua Yao and Xinwen Fu, A
User Incentive-Based Scheme Against Dishonest Reporting in
Privacy-Preserving Mobile Crowdsensing Systems, in Proceedings of the
12th International Conference on Wireless Algorithms, Systems, and
Applications (WASA), June 19-21, 2017, Guilin, China,
[PDF], Best paper award
- Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid
Fadl, Wei Yu, Xinwen Fu and Wei Zhao, A Case Study of Usable Security:
Usability Testing of Android Privacy Enhancing Keyboard, in Proceedings
of the 12th International Conference on Wireless Algorithms, Systems,
and Applications (WASA), June 19-21, 2017, Guilin, China, [PDF]
- Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao, Data Integrity Attacks against the Distributed Real-time Pricing in the Smart Grid, in Proceedings of International Performance Computing and Communications Conference (IPCCC), December 9th – December 11th, 2016, Las Vegas, Nevada, USA, Best paper award
- Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu, "Secure Fingertip Mouse for Mobile Devices", in Proceedings of the 35th IEEE International Conference on Computer Communications (INFOCOM'16), San Francisco, CA, USA, April 10-15, 2016. Acceptance Rate: 18.25% (300 out of 1644), [PDF]
- James Palmer, Brea Llorens, Sarah Kaufman, Christopher
Gibbons, MdGayas Chowdhury, Cindy Chen, and Xinwen Fu, Modeling Cyber
Crimes and Investigations for Digital Forensics Education, in
Proceedings of the Colloquium for Information Security Education
(CISSE), Philadelphia, PA, June 13-15, 2016,[PDF], [PPT], Best student paper award
- Bo Liu, Junzhou Luo, Jiuxin Cao, Xudong Ni, Benyuan Liu,
Xinwen Fu: On crowd-retweeting spamming campaign in social networks. In
Proceedings of IEEE International Conference on Communications (ICC),
2016: 1-6, [PDF]
- Si Chen, Muyuan Li, Kui Ren, Xinwen Fu, Chunming Qiao, Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing, in Proceedings of SenSys, 2015, [PDF]
- Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. Proceedings of ICDCS, 2015: 61-72, [PDF]
- Zhongli Liu, Zupei Li, Benyuan Liu, Xinwen Fu,
Ioannis Raptis and Kui Ren, Rise of Mini-Drones: Applications and
Issues, in Proceedings of the Workshop on Privacy-Aware Mobile Computing
(PAMCO), 2015, [PDF]
- Qinggang Yue, Zhen Ling, Wei Yu, Benyuan Liu and Xinwen Fu, Blind Recognition of Text Input on Mobile Devices via Natural Language Processing, in Proceedings of the Workshop on Privacy-Aware Mobile Computing (PAMCO), 2015, [PDF]
- Donghai Zhu, Xinyu Yang, Wei Yu, Chao Lu, Xinwen Fu: INCOR:
Inter-flow Network Coding based Opportunistic Routing in wireless mesh
networks. In Proceedings of IEEE International Conference on
Communications (ICC), 3666-3671, 2015, [PDF]
- Xinyu Yang, Cong Zhao, Shusen Yang, Xinwen Fu, Julie A.
McCann: A Systematic Key Management mechanism for practical Body Sensor
Networks. In Proceedings of IEEE International Conference on
Communications (ICC), 7310-7315, 2015, [PDF]
- Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
On Computing Multi-Agent Itinerary Planning in Distributed Wireless
Sensor Networks. In Proceedings of International Conference on Wireless
Algorithms, Systems, and Applications (WASA) 2015: 366-376, [PDF]
- Hengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang,
Biao Chen, Junda Zhu, Xinwen Fu: Secondary Market Mobile Users for
Internet Access. In Proceedings of IEEE Network Computing and
Applications (NCA) 2015: 81-84, [PDF]
- Fei Chen, Tao Xiang, Jianyong Chen, Wei Yu, Xinwen Fu, Shengyu
Zhang: A Semantic Hash Tree Based Verifiable Data Access Protocol on
the Cloud. In Proceedings of The International Conference on Advanced
Cloud and Big Data (CBD), 2015: 219-226, [PDF]
- Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao, "Blind Recognition of Touched Keys on Mobile Devices", in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), Scottsdale, Arizona, USA, November 3-7, 2014, pp. 1403-1414. Acceptance Rate: 19.5% (114 out of 585), [PDF]
- Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Wei Yu, and Wei
Zhao My Google Glass Sees Your Passwords!, White paper, Black Hat USA
2014, [PDF]
- Zhen Ling, Luo Junzhou, Kui Wu, Wei Yu, and Xinwen Fu, TorWard: Discovery of Malicious Traffic over Tor, in Prooceedings of Infocom, April 27th - May 2nd, 2014, Toronto, Canada, [PDF]
- Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang,
SBVLC: Secure Barcode-based Visible Light Communication for Smartphones,
in Proceedings of IEEE IEEE International Conference on Computer
Communications (INFOCOM), 2014, [PDF]
- Bhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan
Liu, CollabAssure: A Collaborative Market Based Data Service Assurance
Framework for Mobile Devices, in Proceedings of IEEE International
Conference on Advanced Information Networking and Applications (AINA),
2014, [PDF]
- Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu: Towards verifiable
file search on the cloud. In Proceedings of IEEE Conference on
Communications and Network Security (CNS) 2014: 346-354, [PDF]
- Swathi Kurunji, Tingjian Ge, Xinwen Fu, Benyuan Liu, Amrith
Kumar, Cindy X. Chen: Optimizing Aggregate Query Processing in Cloud
Data Warehouses. In Proceedings of International Forum on Business and
the Environment (Globe), 2014: 1-12, [PDF]
- Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang,
Xinwen Fu: Privacy-preserving outsourcing of image global feature
detection. In Proceedings of IEEE Global Communications Conference
(GLOBECOM) 2014: 710-715, [PDF]
- Longfei Wu, Xiaojiang Du, Li Wang, Xinwen Fu, Ralph Oyini
Mbouna, Seong G. Kong: Analyzing mobile phone vulnerabilities caused by
camera. In Proceedings of IEEE Global Communications Conference
(GLOBECOM) 2014: 4126-4130, [PDF]
- Sulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei
Yu, Xinwen Fu: On simulation studies of cyber attacks against LTE
networks. In Proceedings of International Conference on Computer
Communications and Networks (ICCCN) 2014: 1-8, [PDF]
- Bhanu Kaushik, Maria J. Brunette, Xinwen Fu, Benyuan Liu:
Customizable, scalable and reliable community-based mobile health
interventions. In Proceedings of ACM 5th International Workshop on
Pervasive Wireless Healthcare (MobileHealth), 2014: 43-48, [PDF]
- Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, and Wei Zhao, On Malware Leveraging the Android Accessibility Framework - A Super Masquerade Attack, in Prooceedings of the 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), December 2–4, 2013 Tokyo, Japan, [PDF]
- Zhen Ling, Junzhou Luo, Kui Wu, and Xinwen Fu, Protocol-level Hidden Server Discovery, in Proceedings of IEEE Infocom, 2013, [PDF]
- Yinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao,
Theory underlying measurement of AOA with a rotating directional
antenna, in Proceedings of IEEE Conference on Computer Communications (INFOCOM), 2013, 2490-2498, [PDF]
- Yinjie Chen, Zhongli Liu, Xinwen Fu, and Wei Zhao, Effective RSS Sampling for Forensic Wireless Localization, in Proceedings of WASA, 2013, [PDF], Best paper award
- Wei Yu, Sixiao Wei, Guanhui Ma, Xinwen Fu, and Nan Zhang, On Effective Localization Attacks Against Internet Threat Monitors, in Proceedings of IEEE ICC, Communication and Information Systems Security Symposium, 2013, [PDF], Best paper award
- Bhanu Kaushik, Honggang Zhang, Xinwen Fu, Benyuan Liu and Jie Wang, "SmartParcel: A Collaborative Data Sharing Framework for Mobile Operating Systems." in Proceedings of The 33rd International Conference on Distributed Computing Systems,the Tenth Workshop on Wireless Ad hoc and Sensor Networks (WWASN), 2013, [PDF]
- Wei Yu, Xinwen Fu, Erik Blasch, Khanh Pham, Dan Shen, and Genshe
Chen, On Effectiveness of Hopping-Based Spread Spectrum Techniques for
Network Forensic Traceback, in Proceedings of 14th
IEEE/ACIS International Conference on Software Engineering, Artificial
Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2013, [PDF]
- Yang Zhang, P. Xia, J. Luo, Z. Ling, B. Liu and Xinwen Fu, Fingerprint Attack against Touch-enabled Devices, in Proceedings of Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012, [PDF], [Dusting iPad], [Dusting iPhone]
- Z. Liu, Y. Chen, B. Liu, C. Cao, and Xinwen Fu, HAWK: An unmanned mini helicopter-based aerial wireless kit for localization, in Proceedings of Infocom, 2012, Accept ratio: 18%, [PDF]
- Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang and Xinwen Fu, Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery, in Proceedings of Infocom, 2012, Accept ratio: 18%, [PDF]
- Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu and Wei Yu, A Novel Network Delay based Side-Channel Attack: Modeling and Defense, in Proceedings of Infocom, 2012, Accept ratio: 18%, [PDF]
- Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, and Wei Zhao, A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems, in Proceedings of IEEE ICDCS, 2012, Accept ratio: 13%, [PDF]
- Junwei Huang, Yinjie Chen, Zhen Ling, Kyungseok Choo, Xinwen Fu, A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation, in Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12), Vancouver, Canada, September 28, 2012, [PDF]
- Zhongli Liu, Yinjie Chen, Benyuan Liu, Jie Wang, Xinwen Fu, Aerial Localization with Smartphone, in Proceedings of International Conference on Wireless Algorithms, Systems and Applications (WASA), 2012, 386-397, [PDF]
- Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu, When Digital Forensics Research Meets Laws, in Proceedings of Workshop on Network Forensics, Security and Privacy (NSFP),
in conjunction with the 32th International Conference on Distributed
Computing System (ICDCS'12), Macau, China, June 18-21, 2012, [PDF]
- Jie Lin, Xinyu Yang, Wei Yu, and Xinwen Fu, Towards Effective En-route Filtering against Injected False Data in Wireless Sensor Network, in Proceedings of IEEE Globe Communication (Globecom), 2011, [PDF]
- Junwei Huang, Xian Pan, Xinwen Fu and Jie Wang, Long PN Code Based DSSS Watermarking, in Proceedings of Infocom, 2011, Accept ratio: 16%, [PDF]
- Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu and Wei Zhao, Identifying Mobiles Hiding behind Wireless Routers, in Proceedings of Infocom, 2011, Accept ratio: 16%, [PDF]
- Yinjie Chen, Zhongli Liu, Yong Ding, Xinwen Fu, On sampling signal strength for localization using a directional antenna, in Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011, 1-6, [PDF]
- Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, Wei Zhao, Protection of Query Privacy for Continuous Location Based Services, in Proceedings of Infocom, 2011, Accept ratio: 16%, [PDF]
- Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu and Dong Xuan, A Novel Packet Size Based Covert Channel Attack against Anonymizer, in Proceedings of Infocom Mini-Conference, 2011, Accept ratio: 23.4%, [PDF]
- Zhen Ling, Junzhou Luo, Wei Yu and Xinwen Fu, Equal-sized Cells Mean Equal-sized Packets in Tor?, in Proceedings of ICC Communication and Information System Security Symposium, Kyoto, Japan, June 5 ~ 9, 2011, [PDF]
- William Gauvin, Cindy Chen, Xinwen Fu, Benyuan Liu, Classification of Commercial and Personal Profiles on MySpace, in Proceedings of 3rd IEEE International Workshop on SEcurity and SOCial Networking (SESOC), 2011, [PDF]
- Nan Zhang, Wei Yu, Xinwen Fu and Sajal Das, gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity, in Proceedings of Conference on Decision and Game Theory for Security (GameSec), 2010, [PDF]
- Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, W. Yu and N. Zhang, 3DLoc: Three Dimensional Wireless Localization Toolkit, In Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS), 2010, Accept ratio 14.4%, [PDF]
- Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen Fu and Jie Wang, Barrier Coverage with Sensors of Limited Mobility, in Proceedings of The 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Chicago, USA, September 2010, [PDF]
- Xinwen Fu, Zhen Ling, Wei Yu and Junzhou Luo, Cyber Crime Scene Investigations (C2SI) through Cloud Computing, In Proceedings of First ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), 2010, [PDF]
- Zhongli Liu, Yinjie Chen, Wei Yu and Xinwen Fu, Generic Network Forensic Data Acquisition from Household and Small Business Wireless Routers, in Proceedings of First International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), 2010, [PDF]
- X. Fan, X. Yang, W. Yu and Xinwen Fu, HLLS: A History information based Light Location Service for MANETs, In Proceedings of IEEE International Conference on Communications (ICC), 2010, [PDF]
- Z. Ling, J. Luo, W. Yu, Xinwen Fu, D. Xuan and W. Jia, A New Cell Counter Based Attack Against Tor, in Proceedings of 16th ACM Conference on Computer and Communications Security (CCS), Chicago, Chicago, IL, 2009, Accept ratio 18.4%, [PDF]
- Xinwen Fu and Zhen Ling, One Cell is Enough to Break Tor's Anonymity, White Paper, Black Hat DC, February 18-19, 2009, [PDF]
- Xinwen Fu, N. Zhang, A. Pingley, W. Yu, J. Wang
and W. Zhao, The Digital Marauder.s Map: A New Threat to Location
Privacy in Wireless Networks, In Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS), June 22-26, 2009 Montreal, Quebec, Canada, Accept ratio 16.2%, [PDF]
- A. Pingley, W. Yu, N. Zhang, Xinwen Fu and W. Zhao, CAP: A Context-Aware Privacy Protection System for Location-Based Services, In Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS), June 22-26, 2009 Montreal, Quebec, Canada, Accept ratio 16.2%, [PDF]
- W. Jia, F. TSO, Z. Ling, Xinwen Fu, D. Xuan and W. Yu, Blind Detection of Spread Spectrum Flow Watermarks, In Proceedings of The 28th Conference on Computer Communications (Infocom), Rio de Janeiro, Brazil, April 19-25, 2009, Accept ratio 19.6%, [PDF]
- William Gauvin, Benyuan Liu, Xinwen Fu, and Jie Wang, Utopia: Providing Trusted Social Network Relationships within an Un-Trusted Environment, in Proceedings of Workshop on Social Networks, Applications, and Systems (SNAS), 2009[PDF]
- R. Pries, W. Yu, S. Graham, and Xinwen Fu, On Performance Bottleneck of Anonymous Communication Networks, In Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), Miami, Florida, April 14-28, 2008, [PDF]
- Nan Zhang, Min Song, Xinwen Fu, and Wei Yu, Discovery and
Protection of Sensitive Linkage Information for Online Social Networks
Services, in Proceedings of Workshop on Social Networks, Applications,
and Systems (SNAS), 2009, [PDF]
- X. Wang, W. Yu, Xinwen Fu, D. Xuan, and W. Zhao, iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems, In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) Minisymposia, Phoenix, AZ, April 13-28, 2008, [PDF]
- W. Yu, Xinwen Fu, R. Bettati, and W.
Zhao, On Localization Attacks to Internet Threat Monitors: An
Information-Theoretic Framework, In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Performance and Dependability Symposium (PDSosium (PDS), June 24-27, 2008, Anchorage, Alaska, USA, [PDF]
- Ryan Pries, W. Yu, Xinwen Fu and W. Zhao, A New Replay Attack Against Anonymous Communication Networks, In Proceedings of the IEEE International Conference on Communications (ICC) - Information and Network Security Symposium, Beijing, China, May 19-23, 2008, [PDF], Best paper award
- Nan Zhang, Wei Yu, Xinwen Fu, and Sajal K. Das, Towards Effective Defense Against Insider Attacks: The Establishment of Defender.s Reputation, In Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, Victoria, Australia, 8th-10th December, 2008, [PDF]
- W. Yu, Xinwen Fu, Steve Graham, D. Xuan and W. Zhao, DSSS-Based Flow Marking Technique for Invisible Traceback, In Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, California, USA, May 20-23, 2007 Accept ratio 8.3% [PDF]
- Xinwen Fu, Shu Jiang, Wei Yu, Steve Graham and Yong Guan, On TCP Performance in Flow-Based Mix Networks, In Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), Columbia, MD, USA 25-27, September, 2007, [PDF]
- Xun Wang, Wei Yu, Adam Champion, Xinwen Fu and Dong Xuan, Detecting Worms via Mining Dynamic Program Execution, In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm), September 17-20, 2007, Nice, France, [PDF]
- Xinwen Fu, W.Yu, D. Cheng, X. Tan, K. Streff, and S. Graham, On Recognizing Virtual Honeypots and Countermeasures, In Proceedings of the IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), Sep. 29-Oct. 1, 2006, [PDF]
- K. Streff, A. Rajagopalan, and Xinwen Fu, ABC: Adaptive Bank-Transaction Camouflaging Systems, in Proceedings of the International Conference on i-Warfare and Security (ICIW), University of Maryland Eastern Shore, USA, March 15-16 2006
- Xinwen Fu, Y. Zhu, B. Graham, R.
Bettati, and Wei Zhao, On Flow Marking Attacks in Wireless Anonymous
Communication Networks, in Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS), June 2005, Accept ratio 14% [PDF]
- Y. Zhu, Xinwen Fu, R. Bettati, W. Zhao, Anonymity Analysis of Mix Networks against Flow-Correlation Attacks, in Proceedings of Globecom Computer & Network Security (Globecom), St. Louis, Nov. 25 .Dec 2, 2005, Accept ratio 30%, [PDF]
- Y. Zhu, Xinwen Fu, and R. Bettati, On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks, in Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA), July, 2005, Accept ratio 30%, [PDF]
- H. Xu, Xinwen Fu, Y. Zhu, R. Bettati, J. Chen, and Wei Zhao, SAS: A Scalar Anonymous Communication System, in Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC), 2005, Accept ratio 25%, [PDF]
- B. Graham, Y. Zhu, Xinwen Fu, R. Bettati, Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures, in Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS), July 20-22, Japan, 2005, Accept ratio 34%, [PDF]
- Xinwen Fu, B. Graham, D. Xuan, R.
Bettati and Wei Zhao, Empirical and Theoretical Evaluation of
Active Probing Attacks and Their Countermeasures, in Proceedings of the 6th Information HidingWorkshop (IHW),May 2004, Accept ratio 25% [PDF]
- Y. Zhu, Xinwen Fu, B. Graham, R. Bettati and Wei Zhao, On Flow Correlation Attacks and Countermeasures in Mix Networks, in Proceedings of Workshop on Privacy Enhancing Technologies (PET), May 2004, Accept ratio 25% [PDF]
- Xinwen Fu, B. Graham, R. Bettati and
Wei Zhao, On Effectiveness of Link Padding for Statistical
Traffic Analysis Attacks, in Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), May 2003, Accept ratio 17.7% [PDF]
- Xinwen Fu, B. Graham, D. Xuan, R.
Bettati and Wei Zhao, Analytical and Empirical Analysis of
Countermeasures to Traffic Analysis Attacks, in Proceedings of the International Conference on Parallel Processing (ICPP), Oct. 2003, Accept ratio 35.9% [PDF]
- Xinwen Fu, B. Graham, R. Bettati and Wei Zhao, Active Traffic Analysis Attacks and Countermeasures, in Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC), Oct. 2003, [PDF]
- Xinwen Fu, B. Graham, R. Bettati and Wei Zhao, On Countermeasures to Traffic Analysis Attacks, in Proceedings of the 4th IEEE SMC Information Assurance Workshop, Jun. 2003, [PDF]
- Xinwen Fu, B. Graham, Y. Guan, R.
Bettati and Wei Zhao, NetCamo: Camouflaging Network Traffic for
Real-Time Applications, in Proceedings of Texas Workshop on Security of Information Systems, Apr. 2003 [PDF]
- Y. Guan, Xinwen Fu, R. Bettati, and Wei Zhao, An Optimal Strategy for Anonymous Communication Protocols, in Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), Jul. 2002, Accept ratio 18.1% [PDF]
- Xinwen Fu, Y. Guan, B. Graham, R. Bettati and Wei Zhao, Using Parasite Flows to Camouflage Flow Traffic, in Proceedings of the 3rd IEEE SMC Information Assurance Workshop, United States Military Academy, Jun. 2002, [PDF]
- Y. Guan, Xinwen Fu, R. Bettati, and Wei Zhao, Efficient Traffic Camouflaging in Mission Critical QoS-Guaranteed Networks, in Proceedings of the 1st IEEE SMC Information Assurance Workshop, Jun. 2000, [PDF]
- X. Ma, Xinwen Fu and C. Hou, Texture Classification Based on Feature Symbol Random Field, in Proceedings of the 4th International Conference on Signal Processing (ICSP), Oct. 1998
- Xinwen Fu, M. Zhang, and X. Li, A Method of Texture Classification Based on Vector Quantization, in Proceedings of the 9th Graphics and Image Technology Conference, Aug. 1998
Others
- Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, and Xinwen Fu,
How Privacy Leaks from Bluetooth Mouse, Annual Network &
Distributed System Security Symposium (NDSS), Short Talk, February 5 –
8, 2012
- Xian Pan, Zhen Ling, Aniket Pingley,Wei Yu, Nan Zhang and Xinwen Fu,
DEMO: How Privacy Leaks from Bluetooth Mouse, 19th ACM Conference on
Computer and Communications Security Oct. 16 - 18, 2012, Sheraton
Raleigh Hotel, Raleigh, NC, USA
- Zhongli Liu, Yinjie Chen, Benyuan Liu, and Xinwen Fu,
HAWK: An Unmanned Mini Helicopter - based Aerial Wireless Kit for
Search, Rescue and Surveillance, Poster and Student Research
Competition, ACM MobiCom 2011
- Xinwen Fu, Y. Guan and W. Zhao,
Forensic Analysis Techniques for Tracing Anonymous Cyber
Criminals, Position Paper, ARO Workshop on Digital Forensics,
Washington D.C, Feb. 10, 2009
- Y. Guan, Xinwen Fu, R. Bettati, and W. Zhao, Modeling and Optimizing Anonymous Communication Protocols, the 3rd Annual IEEE Information Assurance Workshop - Poster Session II, June 2002 West Point, New York
- Y. Guan, Xinwen Fu, R. Bettati, and W. Zhao, A Quantitative Analysis of Anonymous Communications, the 10th USENIX Security Symposium - Works In Progress Session, Wahsington D.C., August 2001