Research
Interests
Ψ Internet
of Things Security,
Mobile Device Security, Wireless Medical-Device Security
Ψ System
and Network Security, Security and Privacy in Cloud Computing and Big Data
Ψ
Wireless Networks, Computer Networks
Ψ Systems,
Controls, Communications
Publications (Total 268)
Ψ Book (1)
1.
X. Hei, X. Du, Security in Wireless Implantable
Medical Devices, Springer, hardcopy ISBN 978-1-4614-7152-3, online ISBN
978-1-4614-7153-0, published in April 2013.
Ψ Referred Journal Papers (97)
1.
L. Zhu, X. Tang, M. Shen,
X. Du, and M. Guizani, Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in
Software Defined Networks, IEEE Journal on Selected Areas in Communications
(JSAC), Volume: 36 Issue: 3, March 2018, DOI: 10.1109/JSAC.2018.2815442
2.
H. Cao, S. Liu, L. Wu, Z. Guan, X. Du,
Achieving Differential Privacy against Non-Intrusive Load Monitoring in Smart
Grid: a Fog Computing Approach, Concurrency and Computation: Practice and
Experience, Wiley, accepted, March 2018.
3.
E. Sifah, Q. Xia,
K. Obour A. Amofa, J. Gao, R. Chen, H. Xia, J. Gee, X. Du, M. Guizani,
Chain-based big data access control infrastructure, The Journal of
Supercomputing, Springer, pp. 1-20, March 2018, DOI: 10.1007/s11227-018-2308-7
4.
J. Gu; B. Sun; X.
Du*; J. Wang; Y. Zhuang; Z. Wang, Consortium Blockchain-based Malware Detection in Mobile Devices, IEEE
Access, Volume: 6, Issue: 1, Page(s): 12118-12128, Dec. 2018, DOI:
10.1109/ACCESS.2018.2803258
5.
Y. Su, X. Du, L. Huang, Z. Gao, and M. Guizani, LTE-U and
Wi-Fi Coexistence Algorithm Based on Q-learning in Multi-channel, IEEE Access,
Volume: 6, Issue:1, Page(s): 13644-13652, Dec. 2018, DOI: 10.1109/ACCESS.2018.2803258
6.
J. Wang, R. Zhang, J. Yuan, and X. Du, A
3-Dimensional Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks, IEEE Internet of Things Journal,
published online in Jan. 2018, DOI: 10.1109/JIOT.2018.2803111
7.
J. Liu, L. Zhang, R. Sun, X. Du, and M. Guizani, Mutual Heterogeneous Signcryption
Schemes for 5G Network Slicings, IEEE Access,
published online in Jan. 2018, Volume: 6, Issue:1, pp. 7854-7863, Dec. 2018,
DOI: 10.1109/ACCESS.2018.2797102
8.
Y. Zhang, B. Song, X. Du, and M. Guizani, Vehicle Tracking Using Surveillance with
Multimodal Data Fusion, IEEE Transactions on Intelligent Transportation
Systems, published online in Jan. 2018, DOI: 10.1109/TITS.2017.2787101
9.
R. Zhou, X. Zhang, X. Du, X. Wang, G. Yang,
M. Guizani, File-centric Multi-Key Aggregate Keyword
Searchable Encryption for Industrial Internet of Things, IEEE Transactions on
Intelligent Transportation Systems, published online in Jan. 2018, DOI:
10.1109/TII.2018.2794442
10. L.
Zhen, H. Qin, B. Song, R. Ding, X. Du, and M. Guizani,
Random Access Preamble Design and Detection for Mobile Satellite Communication
Systems, IEEE Journal on Selected Areas in Communications (JSAC), Volume: 36,
Issue: 2, Feb. 2018, DOI: 10.1109/JSAC.2018.2804138
11. Z.
Guan, J. Li, L. Zhu, Z. Zhang, X. Du, M. Guizani,
"Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with
Renewable Energy Resource", IEEE Transactions on Industrial Informatics,
Vol. 13, Issue 6, pp.3216-3225, Dec. 2017, DOI: 10.1109/TII.2017.2706760.
12. Z.
Guan, J. Li, L. Wu, Y. Zhang, J. Wu, X. Du, "Achieving Efficient and
Secure Data Acquisition for Cloud-supported Internet of Things in Smart
Grid", IEEE Internet of Things Journal, Vol. 4, Issue 6, pp. 1934-1944,
Dec. 2017.
13. J.
Lv, D. Man, W. Yang, X. Du, and M. Yu, Robust
WLAN-based Indoor Intrusion Detection Using PHY Layer Information, IEEE
ACCESS, published online on 20 Dec. 2017, Vol.: PP, Issue: 99, DOI:
10.1109/ACCESS.2017.2785444
14. D.
Xu, J. Pan, X. Du*, B. Wang, M. Liu, and Q. Kang, Massive Fishing Website URL
Parallel Filtering Method, IEEE ACCESS, published online on 13 Dec. 2017,
Vol.: PP, Issue: 99, DOI: 10.1109/ACCESS.2017.2782847
15. M.
Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, and J. Hu,
Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted
Graphs with Privacy Protection, IEEE Transactions on Information Forensics
& Security, Volume: PP, Issue: 99, Nov. 2017, DOI:
10.1109/TIFS.2017.2774451
16. X.
Zhu, R. Hao, H. Chi, X. Du, FineRoute:
Personalized and Time-Aware Route Recommendation Based on Check-ins, IEEE
Transactions on Vehicular Technology, Volume: 66, Issue: 11, Nov. 2017,
Page(s): 10461 10469, DOI: 10.1109/TVT.2017.2764999
17. J.
Liang, H. Feng, and X. Du, Intermittent Fault Diagnosability
of Interconnection Networks, Journal of Computer Science and Technology,
32(6): 19, Nov. 2017.
18. D.
Zhan, Lin Ye, B. Fang, X. Du, Z. Xu, Protecting Critical Files Using
Target-based Virtual Machine Introspection Approach, IEICE Transactions on
Information and Systems, Vol. E100-D, No.10, pp.2307-2318, Oct. 2017.
42. X.
Fu, X. Du* and B.
Luo, Data Correlation-based Analysis Method for Automatic Memory Forensics, Security and Communication Networks, Wiley, Article first published online: 6 SEP 2015,DOI: 10.1002/sec.1337.[pdf]
43. C.
Bian, T. Zhao, X. Li, X. Du, and W. Yan, Theoretical
analysis on caching effects in urban vehicular ad hoc networks, Wireless Communications and Mobile
Computing, Wiley, Article
first published online: 25 NOV 2015,DOI: 10.1002/wcm.2651.[pdf]
46. X.
Huang, and X. Du*, Achieving
Data Privacy on Hybrid Cloud, Security
and Communication Networks, Wiley, Volume 8, Issue 18, pages 37713781, December 2015.[pdf]
47. Z.
Lin, L. Huang, Z. Gao, and X. Du*, Efficient Device-to-Device Discovery and Access Procedure
for 5G Cellular Network, Wireless Communications and Mobile Computing, Wiley, Article first published online: 8 JUN 2015,DOI: 10.1002/wcm.2602.[pdf]
56. Y.
Li, G. Zhu, and X. Du*, Aligning Spectrum-Holes
of Massive MIMO in Cognitive Femtocell Networks, IEEE
Communications Letters, Issue
2, Vol. 18, pp. 229-232, 2014. DOI: 10.1109/LCOMM.2013.123113.131913[pdf]
59. L. Huang, G. Zhu, and X. Du*, Cognitive
Femtocell Networks: An Opportunistic Spectrum Access for Future Indoor Wireless
Coverage, IEEE
Wireless Communications Magazine,
Vol. 20, Issue 2, pp. 44
51, April, 2013.[pdf]
60. X.
Yao, X. Han, X. Du*, and X. Zhou, A
Lightweight Multicast Authentication Mechanism for Small Scale IoT
Applications,
http://dx.doi.org/10.1109/JSEN.2013.2266116, IEEE Sensors Journal, VOL. 13, NO. 10, pp. 3693-3701, Oct. 2013. [pdf]
61. H.
Zhang, L. Ye, J. Shi, X. Du*, and M.
Guizani, Verifying
Cloud Service Level Agreement by a Third Party Auditor, Security
and Communication Networks, Wiley, Article first published online: 28 FEB 2013,DOI: 10.1002/sec.740.[pdf]
62. M.
Su, H. Zhang, X. Du*, B. Fang, and
M. Guizani A
Measurement Study on the Topologies of BitTorrent
Networks, IEEE Journal on
Selected Areas in Communications (JSAC), VOL. 31, NO. 9, pages 338 347, Sept. 2013.[pdf]
63. H.
Zhang, L. Ye, J. Shi, X. Du*, and
H.H. Chen Preventing
Piracy Content Propagation in Peer-to-Peer Networks, IEEE Journal on Selected Areas in Communications
(JSAC), VOL. 31, NO. 9, pages
105 - 114, Sept. 2013.[pdf]
64. J.
Chen, H. Zhang, X. Du*, and B. Fang,
Designing
Secure Routing Protocols to Protect Base Stations in Wireless Sensor Networks, Wireless Communications and Mobile Computing,
Wiley, Oct. 2012, DOI: 10.1002/wcm.2300.[pdf]
65. X. Li, J. Wu, S. Lin, and X. Du, Channel Switching Control for Wireless Mesh Networks, Journal of Parallel and Distributed Computing, Vol. 72, Issue 10, Pages 12951305, Oct. 2012.[pdf]
66. W.
Zhang, F. Kandah, X. Du*, and C. Wang, Self-protecting Networking using Dynamic
p-cycle Construction within Link Capacity Constraint, Security and Communication Networks, Wiley, Vol 5, Issue 6, pp. 689708,
May, 2012, DOI: 10.1002/sec.364.[pdf]
67. J.
Chen, X. Du*, and B. Fang, An
Efficient Anonymous Communication Protocol for Wireless Sensor Networks, Wireless Communications and Mobile Computing,
Oct. 2011, DOI: 10.1002/wcm.1205.[pdf]
68. A.
Olteanu, Y. Xiao, K. Wu, and X. Du, Weaving
a Proper Net to Catch Large Objects in Wireless Sensor Networks, IEEE Transactions on Wireless Communications,
Vol. 9, No. 4, Apr. 2010, pp. 1360 - 1369. DOI: 10.1109/TWC.2010.081098[pdf]
69. J.
Y. Lin, Q. Wu, X. Cai, X. Du, and K.
Kwon, On
Deployment of Multiple Base Stations for Energy-Efficient Communication in
Wireless Sensor Networks, International
Journal of Distributed Sensor Networks, Hindawi, Vol. 2010, Article ID 563156, 8 pages, 2010.
DOI:10.1155/2010/563156[pdf]
70. J.
Brown, X. Du*, and M. Guizani, Efficient
Rekeying Algorithms for WiMAX Networks, Security and Communication Networks, Wiley,
Vol. 2, Issue 5, pp. 392 - 400, Sept./Oct. 2009.[pdf]
71. Y.
Xiao, H. Chen, X. Du, Y. Zhang, H.
Chen, and M. Guizani, On
Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular
Networks, IEEE
Transactions on Wireless Communications, Vol.
8, No. 9, Sept. 2009, pp. 4406 - 4410, DOI: 10.1109/TWC.2009.080717[pdf]
72. Y.
Xiao, Y. Zhang, M. Peng, H. Chen, X. Du,
Bo. Sun, and K. Wu, Two
and three-dimensional intrusion object detection under randomized scheduling
algorithms in sensor networks,
Computer Networks, Elsevier, Vol. 53, Issue 14, Sept. 2009, pp. 2458-2475.
DOI=10.1016/j.comnet.2009.05.002,
http://dx.doi.org/10.1016/j.comnet.2009.05.002[pdf]
73. X. Du*, M.
Guizani, Y. Xiao and H. H. Chen, A
Routing-Driven Elliptic Curve
Cryptography based Key Management Scheme for Heterogeneous Sensor
Networks, IEEE
Transactions on Wireless Communications, Vol.
8, No. 3, pp. 1223 - 1229, March
2009. [pdf]
74. Y.
Xiao, H. H. Chen, X. Du and M.
Guizani, Stream-based
Cipher Feedback Mode in Wireless Error Channel, IEEE Transactions on Wireless
Communications, Vol. 8, No. 2, pp. 662 - 666, February 2009. DOI: 10.1109/TWC.2009.071278[pdf]
75. S.
Guizani, H. Hamam, X. Du and H. H. Chen, Ad hoc Systems Backboned by Fibres:
Limitation and Solutions, International
Journal of Sensor Networks, Vol. 5, No. 2, pp. 90 - 97, 2009.
76. X. Du* and
H. H. Chen, Security
in Wireless Sensor Networks, IEEE
Wireless Communications Magazine, Vol. 15, Issue 4, pp. 60-66, Aug. 2008.
[pdf]
77. X. Du*, M.
Guizani, Y. Xiao, and H. H. Chen, Secure
and Efficient Time Synchronization in Heterogeneous Sensor Networks, IEEE
Transactions on Vehicular Technology,
Vol. 57, Issue 4,
pp. 2387-2394, July 2008.[pdf]
78. D.
Mandala, X. Du*, F. Dai, and C. You,
Load Balance
and Energy Efficient Data Gathering in Wireless Sensor Networks, Wireless Communications and Mobile Computing,
Vol. 8 Issue 5, pp. 645 659, June 2008. [pdf]
79. X. Du*, M. Shayman and R. Skoog, Designing
Fault Tolerant Networks to Prevent Poison Message Failure, Security and Communication Networks, Wiley,
Vol. 1, Issue 1, pp. 117,
Jan. 2008.[pdf]
80. X. Du*, Y.
Xiao and F. Dai Increasing
Network Lifetime by Balancing Node Energy Consumption in Heterogeneous Sensor
Networks, Wireless Communications and Mobile Computing,
Wiley, Volume 8 Issue 1, pp. 125136,
Jan. 2008.[pdf]
81. Y.
Xiao, X. Du, J. Zhang, and S. Guizani, Internet
Protocol Television (IPTV): the Killer Application for the Next Generation
Internet, IEEE
Communications Magazine, Vol. 45, No. 11, pp. 126134,
Nov. 2007.
[pdf]
82. X. Du*, M.
Guizani, Y. Xiao, and H. H. Chen, Two
Tier Secure Routing Protocol for Heterogeneous Sensor Networks, IEEE
Transactions on Wireless Communications Vol. 6, Issue 9, pp.
33953401,
Sept. 2007. [pdf]
83. Y.
Xiao, H. Chen, X. Du, and M.
Guizani, Performance
Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline
Probability Paging for Wireless Systems, IEEE
Transactions on Vehicular Technology,
Vol. 56, Issue 5,
pp. 2745
2755, Sept. 2007.[pdf]
84. Y.
Xiao, V. Rayi,
B. Sun, X. Du, F. Hu, and M. Galloway, A
Survey of Key Management Schemes in Wireless Sensor Networks, Journal of Computer Communications, Vol. 30, Issue 11-12, pp. 2314-2341,
Sept. 2007. [pdf]
85. X. Du*, Y.
Xiao, M. Guizani, and H. H. Chen, An
Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier,
Vol. 5, Issue 1, pp 2434,
Jan. 2007. [pdf]
86. Q.
Wu, N. Rao, X. Du, et al., On
Efficient Deployment of Sensors on Planar Grid, Computer Communications, Elsevier,
Vol. 30,
pp. 27212734, 2007.[pdf]
87. X. Du*, M.
Zhang, K. Nygard, S. Guizani, and H. H. Chen, Self-Healing Sensor Networks with Distributed
Decision Making, International
Journal of Sensor Networks, Vol.
2, Nos. 5/6, pp. 289 298,
2007.[pdf]
88. X. Du*, and
D. Wu, Joint
Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks, ACM Mobile
Networks and Applications (MONET), Vol.
12, No. 1, pp. 5768,
Feb., 2007.[pdf]
89. X. Du*, Identifying
Control and Management Plane Poison Message Failure by K-Nearest Neighbor
Method, Journal
of Network and Systems Management, Vol.
14, No. 2, pp. 243259,
June 2006.[pdf]
90. X. Du*, Y.
Xiao, H. H. Chen, and Q. Wu, Secure
Cell Relay Routing Protocol for Sensor Networks, Wireless Communications and Mobile Computing,
Wiley, Vol. 6, Issue 3, pp. 375391,
May 2006.[pdf]
91. X. Du* and
D. Wu, Adaptive
Cell-Relay Routing Protocol for Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, Vol. 55, Issue 1, pp. 270277,
Jan. 2006. [pdf]
92. X. Du*, D.
Wu, W. Liu, and Y. Fang, Multi-Class
Routing and Medium Access Control for Heterogeneous Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, Vol. 55, Issue 1, pp. 278285,
Jan. 2006. [pdf]
93. X. Du* and
Y. Xiao, Energy
Efficient Chessboard Clustering and Routing in Heterogeneous Sensor Network, International Journal of Wireless and Mobile
Computing
(IJWMC), Vol. 1, No. 2, pp. 121 130,
Jan. 2006. [pdf]
94. Y.
Xiao, C. Bandela, X. Du, Y. Pan, and K. Dass, Security
Mechanisms, Attacks, and Security Enhancements for the IEEE 802.11 WLANs, International
Journal of Wireless and Mobile Computing (IJWMC),
Vol. 1, No. 3/4, pp. 276 288,
Jan. 2006.[pdf]
95. Y.
Xiao, K. K. Leung, Y. Pan, and X. Du,
Architecture,
Mobility Management and Quality of Service for Integrated 3G and WLAN Networks, Wireless Communications and Mobile Computing, Wiley, Vol.
5, Issue 7, pp 805823,
Nov. 2005. [pdf]
96. X. Du* and
F. Lin, Maintaining
Differentiated Coverage in Heterogeneous Sensor Networks, EURASIP
Journal on Wireless Communications and Networking,
Vol. 5, Issue 4, pp. 565572,
Sept. 2005. [pdf]
97. X. Du*, QoS
Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks, Ad Hoc Networks,
Elsevier, Vol. 2, Issue 3, pp
241254, July 2004. Ranked as one of the ScienceDirect's TOP 25 Hottest Articles within the journal Ad
Hoc Networks. [pdf]
Ψ Referred Conference Papers (166)
1.
L.
Luo, H. Yu, Z. Ye, and X. Du, Online Deadline-aware Bulk Transfer over
Inter-Datacenter WANs, IEEE INFOCOM 2018, accepted, April 2018, Honolulu, HI, USA, acceptance rate = 19.2%.
2.
Y.
Sang, B. Ji, G. Gupta, X. Du, and L. Ye, Provably
Efficient Algorithms for Joint Placement and Allocation of Virtual Network
Functions, to appear in Proc. of IEEE INFOCOM 2017, Atlanta, Ga, May 2017, acceptance rate = 20%.
3.
L.
Ye, H. Zhang, and X. Du, Modeling Leechers
Attack in BitTorrent, in Proc. of IEEE GLOBECOM 2014, Austin, TX, Dec. 2014. Best Paper Award![pdf]
4.
X.
Hei, X. Du and S. Lin, Near Field Communication based Access
Control for Wireless Medical Devices, Best Poster Runner-up Award! ACM MobiHoc 2014, Philadelphia, PA,
August 2014.[pdf]
5.
Y. Lin, Q. Wu, X. Cai,
and X. Du, Deploying Multiple Base Stations for Lifetime Maximization in
Wireless Sensor Networks, in Proc. of the 4th International Symposium on
Innovations and Real-time Applications of Distributed Sensor Networks,
Hangzhou, China, Oct. 2009 (IRA-DSN09). Best Paper Award!
6.
D. Mandala, F. Dai, X. Du, and C. You, Load
Balance and Energy Efficient Data Gathering in Wireless Sensor Networks,
in Proc. of the First IEEE International Workshop on Intelligent Systems Techniques
for Wireless Sensor Networks,
in conjunction with IEEE MASS'06, Vancouver, Canada, Oct., 2006. Best Paper Award![pdf]
7.
H. Chi, L. Wu, X.
Du, Q. Zeng, P. Ratazzi, e-SAFE: Secure, Efficient
and Forensics-Enabled Access to Implantable Medical Devices, in Proc. of the IEEE Conference on
Communications and Network Security (IEEE CNS 2018), acceptance rate = 28%, 30 May-1 June,
2018, Beijing, China.
8.
K. Chi, L. Wu, X.
Du, G. Yin, J. Wu, B. Ji, and X. Hei, Enabling Fair Spectrum
Sharing between Wi-Fi and LTE-Unlicensed, to appear in Proc. of IEEE ICC 2018, Kansas City, USA, May 2018.
9.
J. Zhao and K.
Kong, X. Hei and Y. Tu, and
X. Du, A Visible Light Channel based Access Control Scheme for Wireless
Insulin Pump Systems, to appear in Proc.
of IEEE ICC 2018, Kansas City, USA, May 2018
10.
J. Liu, Q. Li, R.
Sun, X. Du, and M. Guizani, An Efficient Anonymous Authentication Scheme for
Internet of Vehicles, to appear in Proc.
of IEEE ICC 2018, Kansas City, USA, May 2018.
11.
J. Liu, X. Li, R.
Sun, X. Du, and P. Ratazzi, An Efficient
Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing
Network, to appear in Proc. of IEEE ICC
2018, Kansas City, USA, May 2018.
12.
C. Fu, T. Kezmane,
X. Du, Y. Fu, and C. Morrisseau, An Location-aware Authentication Scheme
for Cross-domain Internet of Thing Systems,
in Proc. of IEEE ICNC 2018, Maui, Hawaii,
USA, March 2018.
13.
K. Li, X. Yu, H. Zhang, L. Wu, X. Du, P. Ratazzi, M. Guizani, Security Mechanisms to Defend against New
Attacks on Software-Defined Radio, in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA,
March 2018.
14.
L. Wu, X. Du, W. Wang, B. Lin, An Out-of-band Authentication Scheme for
Internet of Things Using Blockchain Technology, in Proc. of
IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.
15.
D. Man, X. Wang, W. Yang, J. Lv, X. Du, M. Yu, PWiG: A Phase-based
Wireless Gesture Recognition System, in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA,
March 2018.
16.
C. Zhao, Z. Cai, M. Huang, M. Shi, X. Du, M. Guizani, The Identification of Secular Variation
in IoT Based on Transfer Learning, in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA,
March 2018.
17.
Q. Xia, E. Sifah,
K. Huang, R. Chen, X. Du, J. Gao, Secure Payment Routing Protocol for
Economic Systems Based on Blockchain, in Proc. of
IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.
18.
X. Liu, X. Fu, B.
Luo,
and X. Du, Distributed Cloud Forensic
System with Decentralization and Multi-participation, in Proc. of the 10th EAI International Wireless Internet Conference (WICON) 2017,
Tianjin, China, Dec. 2017.
19.
S. Dai, M. Liwang, Y. Liu, Z. Gao, L. Huang and X. Du, Hybrid
Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation
Offloading in Internet of Things,
in Proc. of the 13th International Conference on Mobile Ad-hoc and Sensor Networks,
MSN 2017, Beijing, China,
Dec. 2017
20.
K. Huang, X.
Zhang, X. Wang, X. Du, and R. Zhang, EBD-MLE
Enabling Block Dynamics under BL-MLE for Cloud, in Proc. of the 16th IEEE
International Conference on Ubiquitous Computing and Communications, Guangzhou, China, Dec. 2017.
21.
B. Zheng, L. Zhu, M. Shen, X. Du, et al., Malicious Bitcoin Transaction
Tracing Using Incidence Relation Clustering, in Proc. of 9th EAI International Conference on Mobile Networks and
Management (MONAMI), Melbourne, Australia, Dec. 2017.
22.
Y. Li, L. Zhu, M. Shen, F. Gao, B. Zheng, X. Du, S. Liu, and S. Yin, CloudShare: Towards a Cost-Efficient and Privacy-Preserving
Alliance Cloud Using Permissioned Blockchains, in Proc.
of 9th EAI International Conference on Mobile Networks and Management (MONAMI), Melbourne,
Australia, Dec. 2017.
23.
A. Burns, L. Wu,
X. Du, and T. Ge, "A Novel Traceroute-based Detection Scheme for Wi-Fi
Evil Twin Attacks", in Proc.
of IEEE Global Communications
Conference (GLOBECOM), Dec
2017.
24.
J. Liu, F. Cai, L. Wu, R. Sun, L. Zhu, and X.
Du, "EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd
Sensing", in Proc.
of IEEE Global Communications
Conference (GLOBECOM), Dec
2017.
25.
S. Chen, B. Song,
J. Guo, X. Du, An Unbalanced Data Hybrid-Sampling Algorithm Based
on Multi - Information Fusion, in
Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.
26.
J. Lv, W. Yang, D. Man, X. Du, M. Yu, M. Guizani, Wii: Device-free Passive Identity Identification via
WiFi Signals, in
Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.
27.
H. Rathore, A. Al-Ali, A. Mohamed, X. Du, M. Guizani, DLRT: Deep Learning Approach for Reliable Diabetic
Treatment, in
Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.
28.
T. Belkhouja, X. Du, A. Mohamed, A. Al-Ali and M. Guizani, New Plain-Text Authentication Secure Scheme for Implantable
Medical Devices with Remote Controls, in
Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.
29.
J. Song, P. Dong,
H. Zhou, T. Zheng, X. Du, M. Guizani, A Performance Analysis Model for TCP over Multiple
Heterogeneous Paths in 5G networks, in
Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.
30.
Y. Su, L. Huang, M. Guizani, X. Du, A. Mohamed, Q-Learning-based LTE-U and
WiFi Coexistence Algorithm for Wireless Healthcare Systems Proc. of the 5th International Conference
on Control Engineering & Information Technology (CEIT-2017), Tunisia, Dec.
2017.
31.
T. Belkhouja, A. Mohamed, A.
Al-Ali, X. Du and M. Guizani, Using Chaotic Henon System for Symmetric Keys Generation to Encrypt
Wireless Communication of Implantable Medical Devices, in Proc. of the
International Conference on Wireless Networks and Mobile Communications
(WINCOM'17), Nov. 2017, Rabat, Morocco.
32.
L. Wu, X. Du, M. Guizani, and A. Mohamed, A Review of Access Control
Schemes for Implantable Medical Devices in Proc. of the
5th International Conference on Control & Signal Processing (CSP) 2017,
Tunisia, Oct. 2017.
33.
S. Wei, X. Du, C. Hu, and C. Shan, "Predicting Vulnerable Software
Components using software network graph," The 9th International Symposium
on Cyberspace Safety and Security(CSS), 2017, Xi'an, China.
34.
L. Wu, X. Du, J.
Wu, and B. Song, "Achieving Fair Spectrum Allocation for Co-Existing
Heterogeneous Secondary User Networks", International Conference on Computer
Communication and Networks (ICCCN), Vancouver, Canada, July 2017.
35.
H. Ruan, X. Fu, X. Du, B. Luo, Analyzing Android Application in Real-time at Kernel Level", International
Conference on Computer Communication and Networks (ICCCN), Vancouver, Canada,
July 2017.
36.
S. Xuan, D.
Man, W. Wang, J. Zhang, W. Yang, and X. Du, Two-Stage Mixed Queuing Model for Web Security Gateway
Performance Evaluation, in Proc. of International Conference on Computer
Communication and Networks (ICCCN), Vancouver, Canada, July 2017.
37.
L. Yao, P.
Dong, X. Du, and H. Zhang, Security Analysis based on Petri Net for Separation
Mechanisms in Smart Identifier Network, in Proc. of IEEE ICCCN 2017 Workshop
-7th International Workshop on Internet on Things: Privacy, Security and Trust
(IoTPST), July
31 -August 3, 2017, Vancouver, Canada.
38.
H. Rathore, A. Mohamed, A. Al-Ali, X.
Du, M. Guizani, A Review of Security
Challenges, Attacks and Resolutions for Wireless Medical Devices, IEEE IWCMC, June
26 - 30, 2017, Valencia, Spain.
39.
X. Huang, X. Du and B. Song, An
Effective DDoS Defense Scheme for SDN, IEEE International
Communication Conference (ICC), 2017, Paris, France.
40.
J. Xie, X. Fu, X.
Du, B. Luo, and M. Guizani, AutoPatchDroid:
A Framework For Patching Inter-app Vulnerabilities In Android Application, IEEE International
Communication Conference (ICC), 2017, Paris, France.
41.
Z. Shi, M. Huang, C Zhao, L. Huang, X. Du
and Y. Zhao, Detection
of LSSUAV Using Hash Fingerprint based SVDD, IEEE International Communication Conference (ICC), 2017, Paris, France.
42.
J. Li, Z. Guan, X. Du, Z. Zhang and J. Wu, An
Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile
Cloud Computing, IEEE International
Communication Conference (ICC), 2017, Paris, France.
43.
J. Liu, J. Han, L. Wu, R. Sun and X. Du, VDAS:
Verifiable Data Aggregation Scheme for Internet of Things, IEEE International
Communication Conference (ICC), 2017, Paris, France.
44.
F. Zhou, J. Jin, X. Du, B. Zhang and X. Yin,
A
Calculation Method for Social Network User Credibility, IEEE International Communication Conference (ICC), 2017, Paris, France.
45.
Z. Guan, G. Si, X. Du, P. Liu, Z. Zhang and
Z. Zhou, Protecting
User Privacy Based on Secret Sharing with Fault Tolerance for Big Data in Smart
Grid, IEEE International
Communication Conference (ICC), 2017, Paris, France.
46.
Y.
Li, Z. Gao, L. Huang, Z. Tang,
and X.
Du, A wideband spectrum data segment compression
algorithm in cognitive radio networks, to appear in Proc. of IEEE WCNC 2017, San Francisco, CA, March 19-22, 2017.
47.
J. Li, Z. Guan, X. Du, Z.
Zhang, Z. Zhou, A Low-latency Secure Data Outsourcing Scheme
for Cloud-WSN, to appear in Proc. of
IEEE WCNC 2017, San Francisco, CA, March 19-22, 2017.
48.
X. Cai, B. Song
and X. Du, Large
Scale Structure Optimization for Texture Synthesis, to appear in Proc. of the 2016 Conference on
Technologies and Applications of Artificial Intelligence (TAAI), Hsinchu, Taiwan, Nov. 2016.
49.
L. Zhen, H. Qin,
R. Ding, X. Sun, B. Song and X. Du, Sounding Reference Signal Based Timing Advance
Adjustment for LTE-Satellite Mobile Communication Systems,
to appear in Proc. of the 19th International Symposium on Wireless
Personal Multimedia Communications (WPMC) 2016, Shenzhen, China, Nov. 2016.
50.
L. Wu, B. Brandt, X.
Du, and B. Ji,
Analysis
of Clickjacking Attacks and An Effective Defense Scheme for Android Devices, to
appear in Proc. of IEEE Conference on Communications and
Network Security (IEEE CNS) 2016,
acceptance rate 29% =38/131, Philadelphia,
PA, Oct. 2016.[pdf]
51.
J. Lv, W. Yang, L.
Gong, D. Man, and X. Du Robust
WLAN-based Indoor Fine-grained Intrusion Detection, to
appear in Proc. of IEEE GLOBECOM 2016, Washington D.C.,
Dec. 2016. [pdf]
52.
C. Zhao, M. Tai, L. Huang, M. Huang and X.
Du Power
Optimization for Secure Communications in Full-duplex System Under
Residual Self-Interference,
to appear in Proc. of IEEE GLOBECOM 2016, Washington D.C.,
Dec. 2016. [pdf]
53.
X. Zhu, R. Hao, H.
Chi, and X. Du Personalized
Location Recommendations with Local Feature Awareness, to
appear in Proc. of IEEE GLOBECOM 2016, Washington D.C.,
Dec. 2016. [pdf]
54.
R. Yang, X. Fu, X. Du, and B. Luo, Investigating
Timing Channel in IaaS,
in Proc. of the 9th EAI International Conference on Mobile Multimedia Communications
(MobiMedia), June 2016, Xi'An, China.
55.
H. Zhang, Z. Xu, X.
Yu, and
X. Du, LPPS: Location Privacy Protection for
Smartphones, to appear in Proc. of the
IEEE ICC 2016, Kuala Lumpur, Malaysia, May 2016. [pdf]
56.
D. Zhan, L. Ye, B. Fang, X. Du and S. Su,
CFWatcher: A Novel Target-based Real-time Approach to
Monitor Critical Files using VMI, to appear in Proc. of the IEEE ICC 2016, Kuala Lumpur, Malaysia, May 2016. [pdf]
57.
P. Dong, X. Du, H. Zhang, and T. Xu,
A Detection Method for a Novel DDoS Attack
against SDN Controllers by Vast New Low-Traffic Flows, to appear in Proc. of the IEEE ICC 2016, Kuala
Lumpur, Malaysia, May 2016. [pdf]
58.
Z.
Wang, R. Yang, X. Fu, X. Du, and L. Bin, A Shared Memory based Cross-VM Side
Channel Attacks in IaaS Cloud, in Proc.
of the IEEE INFOCOM'2016 Workshops, San Francisco, CA, April 2016.[pdf]
59.
P. Dong, X. Du, J. Sun, and H. Zhang, Energy-Efficient
Cluster Management in Heterogeneous Vehicular Networks, in Proc. of the IEEE INFOCOM'2016 Workshops,
San Francisco, CA, April 2016.[pdf]
60.
C.
Bian, T. Zhao, X. Li, X. Du, and W. Yan, Quantifying
Caching Effects in Urban VANETs, in Proc.
of the IEEE WCNC 2016, Doha, Qatar, April 2016. [pdf]
61.
Z.
Guan, T. Yang, and X. Du, A Secure and Efficient Data Access Control Scheme
for Cloud-Integrated Body Sensor Networks, in Proc. of the IEEE WCNC 2016, Doha, Qatar, April 2016.[pdf]
62.
Z.
Lin, L. Du, Z. Gao, L. Huang, X. Du, and M. Guizani, Analysis of Discovery and
Access Procedure for D2D Communication in 5G Cellular Network, in Proc. of the IEEE WCNC 2016, Doha,
Qatar, April 2016.[pdf]
63.
S.
Liang, X. Du, and P. Dong, Public Scene Recognition Using Mobile Phone
Sensors, in Proc. of IEEE International
Conference on Computing, Networking and Communications. (ICNC) 2016, Kauai,
Hawaii, USA. February 15-18, 2016.[pdf]
64.
J.
Chen, Z. Lin, and X. Du, Protecting Sink Location Against Global
Traffic Monitoring Attacker, in Proc. of
IEEE International Conference on Computing, Networking and Communications.
(ICNC) 2016, Kauai, Hawaii, USA. February 15-18, 2016.[pdf]
65.
L.
Yao, P. Dong, T. Zheng, H. Zhang, X. Du, and
M. Guizani, Network Security Analyzing and Modeling
based on Petri net and Attack tree for SDN, in Proc. of IEEE International Conference on Computing, Networking and
Communications. (ICNC) 2016, Kauai, Hawaii, USA. February 15-18, 2016.[pdf]
66.
Y.
Gao, X. Fu, B.
Luo, X.
Du, and M. Guizani, Haddle: a framework for investigating data leakage
attacks in Hadoop, in Proc. of IEEE
GLOBECOM 2015, San Diego, CA, Dec. 2015.[pdf]
67.
Y.
Sun, Y. Zhang, H.
Zhang, B.
Fang, and X. Du, Geometric Routing on Flat Names for ICN, in
Proc. of IEEE GLOBECOM 2015, San
Diego, CA, Dec. 2015.[pdf]
68.
P. Riesch, X. Du, H. Ling and M.
Mayhew, Face Recognition with
Environment Tolerance on a Mobile Device, in Proc.
of the IEEE CS Cloud 2015, New York City, NY, Nov. 2015.[pdf]
69.
Y. Wang, H. Zhang, C. Tan, X. Du and B. Sheng,
WiGroup: A Lightweight
Cellular-assisted Device-to-Device Network Formation Framework, in Proc.
of the 12th IEEE International
Conference on Ubiquitous Intelligence and Computing (UIC 2015), Aug. 2015, Beijing, China.[pdf]
70.
L. Zhang, L. Wang and X. Du, Secrecy-oriented Adaptive
Clustering Scheme for Device-to-Device Communications, in Proc.
of the 10th International Conference on Wireless Algorithms, Systems, and Applications
(WASA 2015), Aug. 2015, Shandong, China
71.
L. Wu, X. Du, H. Zhang, W. Yu, and C. Wang, Effective Task
Scheduling in Proximate Mobile Device based Communication Systems, in Proc.
of IEEE ICC 2015, London, UK, June 2015. [pdf]
72.
H. Zhang, Z. Zhou, Z. Xu, J. Shi, and X. Du, CLPP: Context-aware Location Privacy
Protection for Location-based Social Network, in Proc. of IEEE ICC 2015, London, UK, June 2015.[pdf]
73.
Y. Duan, X. Fu, B. Luo, J. Shi, and X.
Du, Detective: Automatically Identify and Analyze Malware Processes in
Forensic Scenarios via DLLs,
in Proc. of IEEE ICC 2015, London,
UK, June 2015. [pdf]
74.
M. Su, H. Zhang, X. Du, and Q. Dai, A Novel
Stochastic-Encryption-Based P2P Digital Rights Management Scheme, in Proc.
of IEEE ICC 2015, London, UK, June 2015. [pdf]
75.
P. Dong, X. Du, T. Zheng, H. Zhang, Improving QoS on high-speed
vehicle by multipath transmission based on practical experiment, in Proc.
of IEEE Vehicular Networking
Conference (VNC), 2015, Pages: 32 - 35, DOI: 10.1109/VNC.2015.7385543
76.
L. Wu, X. Du, and H. Zhang, "An Effective Access Control
Scheme for Preventing Permission Leak in Android", in Proc. of International Conference on Computing, Networking and
Communications (ICNC), Anaheim, CA, Feb. 2015.[pdf]
77.
A. Pawloski, L. Wu, X. Du, and L.
Qian, "A Practical Approach to the Attestation of Computational Integrity
in Hybrid Cloud", in Proc. of
International Conference on Computing, Networking and Communications
(ICNC), Anaheim, CA, Feb. 2015.[pdf]
78.
L.
Wu, and X. Du, Analyzing Mobile Phone Vulnerabilities
Caused by Camera, in Proc. of IEEE
GLOBECOM 2014, Austin, TX, Dec. 2014.[pdf]
79.
Q. Zhang, H. Zhang, X. Du, et
al., Contention-based Adaptive Position Update
for Intermittently Connected VANETs, in Proc.
of IEEE GLOBECOM 2014, Austin, TX, Dec. 2014.[pdf]
80.
J. Tan, X. Du, P. Hao,
and Y. Wang, Application
of Text Mining for Customer Evaluations in Commercial Banking, in Proc.
of the International Conference on Communications and Networks, Shenzhen , China, Nov. 2014.[pdf]
81.
X.
Yao, X. Han, and X. Du, A
Lightweight Dynamic Multicast Authentication Scheme, in Proc.
of CHINACOM 2014, Maoming, China, August
2014.[pdf]
82.
L.
Wu, and X. Du, MobiFish: A Lightweight Anti-Phishing Scheme for
Mobile Phones, in Proc. of the 23rd
International Conference on Computer Communications and Networks (ICCCN),
Shanghai, China, August 2014.[pdf]
83.
S.
Liang, X. Du, C.C. Tan, and W. Yu, An Effective Online Scheme for Detecting
Android Malware, in Proc. of the 23rd
International Conference on Computer Communications and Networks (ICCCN),
Shanghai, China, August 2014.[pdf]
84.
X.
Yao, X. Han, and X. Du, A Light-Weight Certificate-Less Public Key
Cryptography Based on ECC, in Proc. of
the 23rd International Conference on Computer Communications and Networks
(ICCCN), Shanghai, China, August 2014.[pdf]
85.
S.
Liang, and X. Du, Permission-Combination-based Scheme for Android Mobile
Malware Detection, in Proc. of IEEE ICC
2014, Sydney, Australia, June 2014.[pdf]
86.
R. Houlihan, X.
Du, C. Tan, J. Wu, and M. Guizani, Auditing Cloud Service
Level Agreement on VM CPU Speed, in Proc.
of IEEE ICC 2014, Sydney, Australia, June 2014.[pdf]
87.
X. Huang; X. Du, Achieving
big data privacy via hybrid cloud, in Proc.
of 2014
IEEE INFOCOM Workshops, Pages: 512 - 517, DOI:
10.1109/INFCOMW.2014.6849284
88.
X Yao, X Han, X Du, A
lightweight access control mechanism for mobile cloud computing, in Proc.
of 2014
IEEE INFOCOM Workshops, Pages: 380 - 385, DOI: 10.1109/INFCOMW.2014
.6849262
89.
K. Bian, J. Park,
X. Du, and X. Li, Ecology-Inspired Coexistence of Heterogeneous
Wireless Networks, in Proc. of
IEEE GLOBECOM 2013, Atlanta, GA, USA,
Dec. 2013.[pdf]
90.
H. Zhang, Z. Zhou, X. Du, P. Li, and X. Yu, Practical
and Privacy-assured Data Indexes for Outsourced Cloud Data, in Proc. of
IEEE GLOBECOM 2013, Atlanta, GA, USA,
Dec. 2013.[pdf]
91.
H. Zhang, L. Ye, X. Du, and M. Guizani, Protecting
Private Cloud Located within Public Cloud, in Proc. of IEEE GLOBECOM 2013, Atlanta, GA, USA,
Dec. 2013.[pdf]
92.
O. Omotere, L.
Qian, X. Du, Performance
Bound of Ad Hoc Device-to-Device Communications using Cognitive Radio, in Proc. of
IEEE GLOBECOM 2013 Workshop -
International Workshop on Device-to-Device (D2D) Communication With and Without
Infrastructure, Atlanta, GA, USA, Dec. 2013.[pdf]
93.
X. Yao, P. Geng,
X. Du, A Task Scheduling
Algorithm for Multi-core Processors, in Proc. of the 14th
International Conference on Parallel and Distributed Computing, Applications and
Technologies (PDCAT'13), Taipei, Taiwan, Dec. 2013.[pdf]
94.
Y. Jiang, R.
Zhang, X. Du, A New Efficient Random Key Revocation Protocol for
Wireless Sensor Networks, in Proc. of
the 14th International Conference on Parallel
and Distributed Computing, Applications and Technologies (PDCAT'13),
Taipei, Taiwan, Dec. 2013.[pdf]
95.
X. Liu, Z. Zhou, X. Du, H. Zhang, and J. Wu,
Glaucus:
Predicting Computing-Intensive Programs
Performance for Cloud Customers, in Proc. of
2013 International Conference on
Intelligent Computing (ICIC 2013), Lecture Notes in Computer Sciences
(LNCS) 7995, p.285-290, Nanning, Guangxi, China, July, 2013.[pdf]
96.
Q. Huang, L. Ye, X. Liu, and X. Du, Auditing
CPU Performance in Public Cloud, in Proc. of
IEEE Cloud Security Auditing Workshop, Santa Clara, CA, June 2013. [pdf]
97.
X. Huang, and X. Du, Ensuring
Data Privacy by Hybrid Cloud, in Proc. of
IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]
98.
H. Zhang, P. Li, Z. Zhou, X. Du, and W.
Zhang, A
Performance Prediction Scheme for Computation-Intensive Applications on Cloud, in Proc. of
IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]
99.
S. Finley,
and X. Du, Dynamic
Cache Cleaning on Android, in Proc. of
IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]
100.
X. Hei, X. Du, and
S. Lin, Two
Vulnerabilities in Android OS Kernel with Tegra 2 CPU, in Proc. of
IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]
101.
X. Hei, X. Du, S.
Lin, and I. Lee, PIPAC:
Patient Infusion Pattern based Access Control Scheme for Wireless Insulin Pump
System,
in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]
102.
Z. Zhou, H. Zhang, X. Du, P. Li, and X. Yu, 'Prometheus:
Privacy-Aware Data Retrieval on Hybrid Cloud, in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]
103.
H. Zhang, J. Shi, L. Ye, and X. Du, PPBD:A
Piracy Preventing System for BT DHT Networks, in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]
104.
L. Huang, G. Zhu, X. Du, and K. Bian, Stable
Multiuser Channel Allocations in Opportunistic Spectrum Access, in Proc. of IEEE WCNC 2013, Shanghai,
China, Apr. 2013.[pdf]
105.
D. Wang, Y. Yang, G. Zhu, and X. Du, 'Distributed
Precoder Design for Inter-cell Interference
Suppressing in Multi-cell MU-MIMO Systems, in Proc. of IEEE WCNC 2013, Shanghai,
China, Apr. 2013.[pdf]
106.
R. Houlihan, and
X. Du, An
Effective Auditing Scheme for Cloud Computing, in Proc. of IEEE GLOBECOM 2012, Anaheim,
CA, USA, Dec. 2012. [pdf]
107.
X. Huang, X. Du, X. Li, and K. Bian, Efficient
Communications in Mobile Hybrid Wireless Networks, in Proc. of IEEE GLOBECOM 2012, Anaheim,
CA, USA, Dec. 2012. [pdf]
108.
M. Su, H. Zhang, X. Du, and B. Fang, Understanding
the Topologies of BitTorrent Networks: A Measurement
View,
in Proc. of IEEE GLOBECOM 2012,
Anaheim, CA, USA, Dec. 2012. [pdf]
109.
L. Ye, H. Zhang, J. Shi, and X. Du, Verifying
Cloud Service Level Agreement,
in Proc. of IEEE GLOBECOM 2012,
Anaheim, CA, USA, Dec. 2012.[pdf]
110.
J. Chen, H. Zhang, B. Fang, X. Du, Y. Liu,
and H. Yu, An
Efficient and Sustainable Self-healing Protocol for Unattended Wireless Sensor
Networks,
in Proc. of IEEE GLOBECOM 2012,
Anaheim, CA, USA, Dec. 2012.[pdf]
111.
P. Riesch, and X.
Du, An
Audit-Based Privacy Preservation Scheme for the OpenID Authentication Protocol, in Proc. of IEEE International Conference on
Technologies for Homeland Security (HST),
Boston, USA, Nov. 2012.[pdf]
112.
X. Hei, X. Du, and
B. Song, Two
Matrices for Blakleys
Secret Sharing Scheme,
in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]
113.
X. Hei, X. Du, and
B. Song, A
Distributed Login Framework for Semi-structured Peer-to-Peer Networks,
in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]
114.
J. Chen, H. Zhang, X. Du, B. Fang, Y. Liu,
and H. Yu, Base
Station Location Protection in Wireless Sensor Networks: Attacks and Defense,
in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]
115.
M. Su, H. Zhang, B. Fang, and X. Du, DDoS
Vulnerability of BitTorrent Peer Exchange Extension:
Analysis and Defense,
in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]
116.
P. Reindl, X. Du,
and K. Nygard, and H. Zhang, Lightweight
Source Anonymity in Wireless Sensor Networks, in Proc.
of IEEE GLOBECOM 2011, Houston,
TX, USA, Nov. 2011. [pdf]
117.
J. Chen, H. Zhang, B. Fang, and X. Du, Towards
Efficient Anonymous Communications in Sensor Networks, in Proc.
of IEEE GLOBECOM 2011, Houston,
TX, USA, Nov. 2011.[pdf]
118.
F. Kandah, W.
Zhang, X. Du, and Y. Singh, A
Secure Key Management Scheme in Wireless Mesh Networks, in Proc.
of the IEEE ICC 2011, Kyoto,
Japan, June 2011.[pdf]
119.
X. Hei, and X. Du,
Biometric-based
Two-level Secure Access Control for Implantable Medical Devices during
Emergency, in Proc. of IEEE
INFOCOM 2011, Shanghai, China, April 2011. [pdf]
120.
B. Bengfort, W. Zhang and X. Du, Efficient
Resource Allocation in Hybrid Wireless Networks, in Proc. of IEEE WCNC 2011, Cancun,
Mexico, March 2011. [pdf]
121.
P. Reindl, X. Du,
and K. Nygard, Defending
Malicious Collision Attacks in Wireless Sensor Networks, in Proc. of IEEE TrustCom
2010, Hong Kong, Dec. 2010.[pdf]
122.
X. Hei, X. Du, J.
Wu, and F. Hu, Defending
Resource Depletion Attacks on Implantable Medical Devices, in Proc. of IEEE GLOBECOM 2010, Miami, Florida, USA, Dec. 2010. [pdf]
123.
W. Zhang, X. Du, J. Wu, S. Soysa, and Y. Liu, Near-Minimum-Energy
Routing in Heterogeneous Wireless Sensor Networks, in
Proc. of IEEE GLOBECOM 2010, Miami, Florida, USA, Dec. 2010. [pdf]
124.
G. Mathew, and X. Du, Securing
Multi-Tiered Web Applications,
in Proc. of 2010 IEEE International Conference on Wireless Communications,
Networking and Information Security (WCNIS 2010), Beijing, China, June
2010.[pdf]
125.
P. Loree, X. Du,
and K. Nygard, An
Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor
Networks,
in Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009. [pdf]
126.
J. Brown, and X. Du, Towards
Efficient and Secure Rekeying for IEEE 802.16e WiMAX Networks, in Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009.
127.
X. Du, X. Liu, and Y. Xiao, Density-Varying
High-end Sensor Placement in Heterogeneous Wireless Sensor Networks, in Proc. of the IEEE International Conference
on Communications (ICC 2009), Dresden, Germany, June 2009.
128.
A. Olteanu, Y.
Xiao, K. Wu, and X. Du, An
Optimal Sensor Network for Intrusion Detection, in Proc. of the IEEE International Conference
on Communications (ICC 2009), Dresden, Germany, June 2009.
129.
W. Zhang and X. Du, Self-protecting
Networking using Dynamic p-cycle Construction within Link Capacity Constraint, in Proc. of the IEEE International Conference
on Communications (ICC 2009), Dresden, Germany, June 2009.
130.
K. Kaur; X. Du; K. Nygard,
Enhanced
Routing in Heterogeneous Sensor Networks, in Proc. of 2009 Computation World: Future
Computing, Service Computation, Cognitive, Adaptive, Content, Patterns,
Pages: 569 - 574, DOI: 10.1109/ComputationWorld.2009.43
131.
Y. Xiao, A. Olteanu,
K. Wu, and X. Du, Weaving
a Proper Net to Catch Large Objects,
in Proc. of IEEE GLOBECOM 2008, New Orleans, Louisiana, USA, Dec. 2008.
132.
Y. Xiao, H. Chen, Y. Zhang, X. Du, et al., Intrusion Objects with Shapes under Randomized Scheduling
Algorithm in Sensor Networks,
in Proc. of the 28th International
Conference on Distributed Computing Systems (ICDCS 2008) Workshops,
Beijing, China, June 2008.
133.
Y. Zhang, Y.
Xiao, K. Wu, X. Du, and B. Sun, Three
Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm
in Sensor Networks,
in Proc. of the 4th International
Conference on Mobile Ad-hoc and Sensor Networks (MSN'08), Wuhan, China, Dec. 2008.
134.
X. Du, Detection
of Compromised Sensor Nodes in Heterogeneous Sensor Networks, in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing,
China, May 2008.
135.
J. Brown, and X. Du, Detection
of Selective Forwarding Attacks in Heterogeneous Sensor Networks, in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing,
China, May 2008.
136.
X. Du, M. Guizani, Y. Xiao, and H. H. Chen, Defending
DoS Attacks on Broadcast Authentication in Wireless Sensor Networks, in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing,
China, May 2008.
137.
Y. Xiao, X. Du, F. Hu, and J. Zhang, A
Cross-layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e
Wireless Local Area Networks,
in Proc. of IEEE Wireless Communications and Networking Conference (WCNC) 2008, March 2008, Las Vegas, NV.
138.
J. Brown, X. Du, and K. Nygard,
An
Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution
Scheme, in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.
139.
X. Du, M. Guizani, Y. Xiao, and H. H. Chen, A
Secure Time Synchronization Scheme for Heterogeneous Sensor Networks, in Proc. of IEEE GLOBECOM, Nov. 2007, Washington, D.C.
140.
X. Du, H. H. Chen, Y. Xiao, and M. Guizani, A
Pseudo-Random Function based Key Management Scheme for Heterogeneous Sensor
Networks,
in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.
141.
Y. Xiao, H. Chen, X. Du, and M. Guizani, Paging
Schemes Performance for Wireless Systems, in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.
142.
X. Du, D. Mandala, C. You, and Y. Xiao, A
Boundary-Node based Localization Scheme for Heterogeneous Wireless Sensor
Networks,
in Proc. of IEEE MILCOM 2007, Oct. 2007,
Orlando, FL.
143.
X. Du, M. Guizani, Y. Xiao, and H. H. Chen, A Routing-Driven
Key Management Scheme for Heterogeneous Sensor Networks, in Proc. of IEEE International Conference on Communications (ICC 2007), Glasgow,
Scotland, June 2007.
144.
Y. Xiao, M. Nolen, X. Du, and J. Zhang, Simulating
MPEG-4 over the IEEE 802.11 Wireless Local Area Networks, in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), Hong
Kong, March 2007.
145.
X. Du, Y. Xiao, S. Guizani, and H. H. Chen, An
Efficient Key Management Scheme for Heterogeneous Sensor Networks,
in Proc. of IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
146.
X. Du, Y. Xiao, S. Guizani, and H. H. Chen, A Secure Routing Protocol for Heterogeneous Sensor
Networks,
in Proc. of IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
147.
Y. Xiao, X. Zhang, X. Du, and J. Zhang, Channel
Allocation Algorithms for Three-tier Wireless Local Loop, to appear in Proc. of IEEE GLOBECOM 2006,
Nov. 2006, San Francisco, CA.
148.
M. Naznin, X. Du,
and K. Nygard, Scheduling
Duty Cycles in Differentiated Sensor Networks, in Proc.
of IASTED International Conference on
Knowledge Sharing and Collaborative Engineering (KSCE), St. Thomas, Virgin
Islands, USA, Nov. 2006.
149.
X. Du, M. Zhang, K. Nygard,
M. Guizani, and H. H. Chen, Distributed Decision Making Algorithm for
Self-Healing Sensor Networks, in Proc.
of IEEE ICC 2006,
Istanbul, Turkey, June 2006.
150.
H. H. Chen, J. Li, Y. Yang, X. Du, H. Liu
and M. Guizani, Challenges
and Futuristic Perspective of CDMA Technologies: OCC-CDMA/OS for 4G Wireless
Networks,
in Proc. of IEEE ICC 2006, Istanbul, Turkey, June 2006.
151.
M. Zhang, X. Du, and K. Nygard,
Improving
Coverage Performance in Sensor Networks by Using Mobile Sensors, in Proc. of IEEE MILCOM 2005, Atlantic City, NJ, Oct. 2005.
152.
X. Du and D. Wu, Efficient
Multi-Class Routing Protocol for Heterogeneous Mobile Ad Hoc Networks, in Proc. of The Second IEEE International Conference on Broadband Networks (BroadNets 2005), pp. 698705, Boston, MA, Oct. 2005.
153.
X. Du and F. Lin, Efficient
Energy Management Protocol for Target Tracking Sensor Network, in
Proc. of The Ninth IFIP/IEEE
International Symposium on Integrated Network Management (IM 2005), pp. 4558, Nice, France, May 2005. (Acceptance rate:
23.5 %)
154.
X. Du, Improving
Routing in Sensor Networks with Heterogeneous Sensor Nodes, in Proc. of IEEE VTC Spring 2005,
Stockholm, Sweden, May 2005. (Acceptance rate: 40.0 %)
155.
X. Du and F. Lin, Designing
Efficient Routing Protocol for Heterogeneous Sensor Networks, in Proc. of The 24th
IEEE International Performance,
Computing, and Communications Conference (IPCCC), April 2005, Phoenix, AZ.
(Acceptance rate: 32.2 %)
156.
X. Du, and F. Lin, Improving
Sensor Network Performance by Deploying Mobile Sensors, in Proc. of The 24th
IEEE International
Performance, Computing, and Communications Conference (IPCCC), Apr. 2005,
Phoenix, AZ. (Acceptance rate: 32.2 %)
157.
X. Du, Secure
Cell Relay Routing Protocol for Sensor Networks, in Proc. of First IEEE Workshop on Information Assurance in Wireless Sensor
Networks (WSNIA 2005), in conjunction with IPCCC 2005, Apr.
2005, Phoenix, AZ.
158.
X. Du, Using
K-Nearest Neighbor Method to Identify Poison Message Failure, in Proc. of IEEE GLOBECOM 2004, pp. 21132117, Nov., 2004, Dallas, TX. (Acceptance rate:
37.7 %)
159.
X. Du, Toward Efficient Distributed Network Monitoring, in Proc. of The 23rd IEEE International Performance, Computing, and
Communications Conference (IPCCC), Apr., 2004, Phoenix, AZ. (Acceptance
rate: 28.0 %)
160.
X. Du, A Simulation
Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks, in Proc. of
The 37th Annual Simulation
Symposium, Apr., 2004, Arlington, VA.
161. X.
Du, Effective
Fault Diagnosis in Communication Networks, in Proc. of The 38th Annual Conference on Information Sciences
and Systems (CISS), March 2004,
Princeton University, NJ.
162.
X. Du, M. Shayman
and R.A. Skoog,
Distributed
Fault Management to Prevent
Network Instability from Control and
Management Plane Poison Messages, in Proc. of IEEE Military Communication
(MILCOM) 2003, pp. 458463, Boston, MA, Oct. 2003.
163.
X. Du, M. Shayman
and R. Skoog, Using Neural Networks to Identify Control and
Management Plane Poison Messages, in Proc. of The Eighth IFIP/IEEE International Symposium on Integrated Network
Management (IM 2003), pp. 621-634, Colorado
Spring, Colorado, Mar. 2003. (rate: 27.5 %)
164.
X. Du, M. Shayman
and R. Skoog, Markov
Decision Based Filtering to Prevent Network Instability from Control Plane
Poison Messages,
in Proc. of Conference on
Information Sciences and Systems (CISS) 2003, Baltimore, Maryland, March
2003.
165.
X. Du, M. Shayman
and R. Skoog, Preventing
Network Instability Caused by Propagation of Control Plane Poison Messages, in Proc. of IEEE Military Communication
(MILCOM), pp.
9398, Anaheim,
CA, Oct. 2002.
166.
X. Du, M. Rozenblit
and M. Shayman, Implementation
and Performance Analysis of SNMP on a TLS/TCP Base, in Proc. of The Seventh IFIP/IEEE International Symposium on Integrated Network
Management (IM 2001), pp. 453466, Seattle, WA, May 2001. (Acceptance rate:
28.0 %)
·
Peer-Reviewed
Book Chapters (4)
1.
J. Chen and X. Du, Wireless Security, Future Wireless Networks: Architecture,
Protocols and Services, M. Guizani, H, Chen, and C. Wang (Eds.), CRC Press, Taylor & Francis Group,
2014.
2.
X. Du and Y.
Xiao, A
Survey on Sensor Network Security, Wireless
Sensor Networks and Applications, SECTION
IV. Security, pp. 594626, Y. Li, M. Thai, and W. Wu (Eds.), Springer, 2005.
3. X. Du, Backbone Quality-of-Service Routing Protocol for
Heterogeneous Mobile Ad Hoc Networks, Advances in Wireless Networks and
Mobile Computing, D.-Z. Du and G. Xue (Eds.),
Springer, 2006.
4. V. K. Rayi, Y. Xiao, X. Du, B. Sun and F. Hu, Key Management
Schemes in Sensor Networks, Wireless/Mobile
Network Security, Y. Xiao, X. Shen,
and D.-Z. Du (Eds.), Springer, 2006.