A survey on big data market: Pricing, trading and protection F Liang, W Yu, D An, Q Yang, X Fu, W Zhao Ieee Access 6, 15132-15154, 2018 | 369 | 2018 |
DSSS-based flow marking technique for invisible traceback W Yu, X Fu, S Graham, D Xuan, W Zhao 2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007 | 265 | 2007 |
Security vulnerabilities of internet of things: A case study of the smart plug system Z Ling, J Luo, Y Xu, C Gao, K Wu, X Fu IEEE Internet of Things Journal 4 (6), 1899-1909, 2017 | 251 | 2017 |
On flow correlation attacks and countermeasures in mix networks Y Zhu, X Fu, B Graham, R Bettati, W Zhao Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005 | 244 | 2005 |
Protection of query privacy for continuous location based services A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao 2011 Proceedings IEEE INFOCOM, 1710-1718, 2011 | 205 | 2011 |
Cybersecurity for digital manufacturing D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu, J Terpenny Journal of manufacturing systems 48, 3-12, 2018 | 172 | 2018 |
Barrier coverage with sensors of limited mobility A Saipulla, B Liu, G Xing, X Fu, J Wang Proceedings of the eleventh ACM international symposium on Mobile ad hoc …, 2010 | 171 | 2010 |
A real-time en-route route guidance decision scheme for transportation-based cyberphysical systems J Lin, W Yu, X Yang, Q Yang, X Fu, W Zhao IEEE Transactions on Vehicular Technology 66 (3), 2551-2566, 2016 | 152 | 2016 |
Cap: A context-aware privacy protection system for location-based services A Pingley, W Yu, N Zhang, X Fu, W Zhao 2009 29th IEEE international conference on distributed computing systems, 49-57, 2009 | 143 | 2009 |
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems X Yang, J Lin, W Yu, PM Moulema, X Fu, W Zhao IEEE Transactions on Computers 64 (1), 4-18, 2013 | 141 | 2013 |
SBVLC: Secure barcode-based visible light communication for smartphones B Zhang, K Ren, G Xing, X Fu, C Wang IEEE Transactions on Mobile Computing 15 (2), 432-446, 2015 | 136 | 2015 |
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001 | 132 | 2001 |
A new cell counter based attack against tor Z Ling, J Luo, W Yu, X Fu, D Xuan, W Jia Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 128 | 2009 |
A new replay attack against anonymous communication networks R Pries, W Yu, X Fu, W Zhao 2008 IEEE International Conference on Communications, 1578-1582, 2008 | 122 | 2008 |
Blind recognition of touched keys on mobile devices Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 113 | 2014 |
Fingerprint attack against touch-enabled devices Y Zhang, P Xia, J Luo, Z Ling, B Liu, X Fu Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 106 | 2012 |
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones L Wu, X Du, X Fu IEEE Communications Magazine 52 (3), 80-87, 2014 | 102 | 2014 |
An optimal strategy for anonymous communication protocols Y Guan, X Fu, R Bettati, W Zhao Proceedings 22nd International Conference on Distributed Computing Systems …, 2002 | 102 | 2002 |
Detecting worms via mining dynamic program execution X Wang, W Yu, A Champion, X Fu, D Xuan 2007 Third International Conference on Security and Privacy in …, 2007 | 93 | 2007 |
An end-to-end view of IoT security and privacy Z Ling, K Liu, Y Xu, Y Jin, X Fu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 92 | 2017 |