Xiaogang Wang

Affiliations:
  • Changzhou College of Information Technology, Changzhou, China
  • Southeast University, School of Computer Science and Engineering, Nanjing, China


According to our database1, Xiaogang Wang authored at least 11 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
How to block Tor's hidden bridges: detecting methods and countermeasures.
J. Supercomput., 2013

A novel sequential watermark detection model for efficient traceback of secret network attack flows.
J. Netw. Comput. Appl., 2013

2012
An interval centroid based spread spectrum watermarking scheme for multi-flow traceback.
J. Netw. Comput. Appl., 2012

An efficient sequential watermark detection model for tracing network attack flows.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
A potential HTTP-based application-level attack against Tor.
Future Gener. Comput. Syst., 2011

2010
A Double Interval Centroid-Based Watermark for network flow traceback.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme.
J. Univers. Comput. Sci., 2009

An Interval Centroid Based Spread Spectrum Watermark for Tracing Multiple Network Flows.
Proceedings of the IEEE International Conference on Systems, 2009

A novel flow multiplication attack against Tor.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

2008
A collaboration scheme for making peer-to-peer anonymous routing resilient.
Proceedings of the 12th International Conference on CSCW in Design, 2008

A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008


  Loading...