Dong Xuan

According to our database1, Dong Xuan authored at least 136 papers between 1998 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data.
IEEE Trans. Parallel Distrib. Syst., 2017

SurvSurf: human retrieval on large surveillance video data.
Multimedia Tools Appl., 2017

BridgeLoc: Bridging Vision-Based Localization for Robots.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

On human mobility predictability via WLAN logs.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
A mobile phone-based physical-social location proof system for mobile social network service.
Security and Communication Networks, 2016

Simultaneous body part and motion identification for human-following robots.
Pattern Recognition, 2016

S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Robust object tracking in the X-Z domain.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

Flash-Loc: Flashing mobile phones for accurate indoor localization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Traffic at-a-glance: Time-bounded analytics on large visual traffic data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Sequential Sample Consensus: A Robust Algorithm for Video-Based Face Recognition.
IEEE Trans. Circuits Syst. Video Techn., 2015

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices.
CoRR, 2015

An iterative clustering algorithm for classification of object motion direction using infrared sensor array.
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015

VM-tracking: Visual-motion sensing integration for real-time human tracking.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Local face-view barrier coverage in camera sensor networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Human feet tracking guided by locomotion model.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Connected Coverage in Wireless Networks with Directional Antennas.
TOSN, 2014

EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization.
IEEE/ACM Trans. Netw., 2014

TurfCast: A Service for Controlling Information Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., 2014

E-Shadow: Lubricating Social Interaction Using Mobile Phones.
IEEE Trans. Computers, 2014

EV-sounding: A visual assisted electronic channel sounding system.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity.
IEEE Trans. Parallel Distrib. Syst., 2013

DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains.
IEEE Trans. Mob. Comput., 2013

Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013

Blind detection of spread spectrum flow watermarks.
Security and Communication Networks, 2013

Side-view face authentication based on wavelet and random forest with subsets.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

On wireless network coverage in bounded areas.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

EV-Human: Human localization via visual estimation of body electronic interference.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Effective epidemic control and source tracing through mobile social sensing over WBANs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Robust video-based face recognition by sequential sample consensus.
Proceedings of the 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2013

2012
Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Pattern mutation in wireless sensor deployment.
IEEE/ACM Trans. Netw., 2012

A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012

Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

JSGuard: Shellcode Detection in JavaScript.
Proceedings of the Security and Privacy in Communication Networks, 2012

EV-Loc: integrating electronic and visual signals for accurate localization.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

E-V: Efficient visual surveillance with electronic footprints.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

TurfCast: A service for controlling information dissemination in wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Epidemic Control Based on Fused Body Sensed and Social Network Information.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization.
IEEE Trans. Vehicular Technology, 2011

Modeling and Detection of Camouflaging Worm.
IEEE Trans. Dependable Sec. Comput., 2011

On detecting active worms with varying scan rate.
Computer Communications, 2011

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Ad Hoc & Sensor Wireless Networks, 2011

P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Connected coverage in wireless networks with directional antennas.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

DragonNet: A robust mobile Internet service system for long distance trains.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Optimal multiple-coverage of sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

E-Shadow: Lubricating Social Interaction Using Mobile Phones.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs.
IEEE Trans. Parallel Distrib. Syst., 2010

Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2010

Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Toward statistical QoS guarantees in a differentiated services network.
Telecommunication Systems, 2010

Mobile phone-based pervasive fall detection.
Personal and Ubiquitous Computing, 2010

Constructing low-connectivity and full-coverage three dimensional sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

Turning heterogeneity into an advantage in wireless ad-hoc network routing.
Ad Hoc Networks, 2010

Mobile phone based drunk driving detection.
Proceedings of the 4th International Conference on Pervasive Computing Technologies for Healthcare, 2010

PerFallD: A pervasive fall detection system using mobile phones.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Mobility: a double-edged sword for HSPA networks: a large-scale test on Hong Kong mobile HSPA networks.
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010

Malicious Shellcode Detection with Virtual Memory Snapshots.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Pattern Mutation in Wireless Sensor Deployment.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distrib. Syst., 2009

Measuring and guaranteeing quality of barrier coverage for general belts with wireless sensors.
TOSN, 2009

Sensor network configuration under physical attacks.
IJAHUC, 2009

Link-layer protection in 802.11i WLANS with dummy authentication.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Stealthy video capturer: a new video-based spyware in 3G smartphones.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Low-connectivity and full-coverage three dimensional wireless sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

DiffUser: Differentiated User Access Control on Smartphone.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Blind Detection of Spread Spectrum Flow Watermarks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Computer Communications, 2008

Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2007

Mobility Limited Flip-Based Sensor Networks Deployment.
IEEE Trans. Parallel Distrib. Syst., 2007

Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput., 2007

DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Detecting worms via mining dynamic program execution.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Localization-Based Anti-Sensor Network System.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Design and Implementation of QoS-Provisioning System for Voice over IP.
IEEE Trans. Parallel Distrib. Syst., 2006

On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks.
IEEE Trans. Parallel Distrib. Syst., 2006

Mutual anonymous overlay multicast.
J. Parallel Distrib. Comput., 2006

Distributed policy processing in active-service based infrastructures.
Int. J. Communication Systems, 2006

Effective query aggregation for data services in sensor networks.
Computer Communications, 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

A dynamic geographic hash table for data-centric storage in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Effective Detection of Active Worms with Varying Scan Rate.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Deploying wireless sensors to achieve both coverage and connectivity.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

Network Decoupling for Secure Communications in Wireless Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

A design of overlay anonymous multicast protocol.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

On Detecting Camouflaging Worm.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Analyzing and enhancing the resilience of structured peer-to-peer systems.
J. Parallel Distrib. Comput., 2005

P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Generation Comp. Syst., 2005

Defending against search-based physical attacks in sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Sensor networks deployment using flip-based sensors.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Sensor Network Configuration Under Physical Attacks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Peer-to-peer system-based active worm attacks: modeling and analysis.
Proceedings of IEEE International Conference on Communications, 2005

Lifetime optimization of sensor networks under physical attacks.
Proceedings of IEEE International Conference on Communications, 2005

On defending peer-to-peer system-based active worm attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An adaptive zone-based storage architecture for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Distributed Admission Control for Anycast Flows.
IEEE Trans. Parallel Distrib. Syst., 2004

Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw., 2004

Query aggregation for providing efficient data services in sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Utilization-Based Admission Control for Scalable Real-Time Communication.
Real-Time Systems, 2003

A Study of Providing Statistical QoS in a Differentiated Sevices Network.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Group aggregation for scalable anycast routing.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
Proceedings of the IEEE Systems, 2003

On resilience of structured peer-to-peer systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
Implementation of QoS-Provisioning System for Voice over IP.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2001

Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
Proceedings of the 7th IEEE Real-Time Technology and Applications Symposium (RTAS 2001), 30 May, 2001

Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Distributed Admission Control for Anycast Flows with QoS Requirements.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
A Routing Protocol for Anycast Messages.
IEEE Trans. Parallel Distrib. Syst., 2000

Utilization-Based Admission Control for Real-Time Applications.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

Scalable QoS Guaranteed Communication Services for Real-Time Applications.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
IEEE Trans. Parallel Distrib. Syst., 1999

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques.
Proceedings of the International Conference on Parallel Processing 1999, 1999

1998
Routing Algorithms for Anycast Messages.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998


  Loading...