Year |
Citation |
Score |
2020 |
Zhang G, Ji X, Li Y, Xu W. Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors (Basel, Switzerland). 20. PMID 32605307 DOI: 10.3390/S20133635 |
0.326 |
|
2020 |
Cheng Y, Ji X, Lu T, Xu W. On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach Ieee Transactions On Mobile Computing. 19: 907-921. DOI: 10.1109/Tmc.2019.2900919 |
0.405 |
|
2020 |
Han W, Cao C, Chen H, Li D, Fang Z, Xu W, Wang XS. senDroid: Auditing Sensor Access in Android System-Wide Ieee Transactions On Dependable and Secure Computing. 17: 407-421. DOI: 10.1109/Tdsc.2017.2768536 |
0.344 |
|
2020 |
Xu W, Tian J, Cao Y, Wang S. Challenge-Response Authentication Using In-Air Handwriting Style Verification Ieee Transactions On Dependable and Secure Computing. 17: 51-64. DOI: 10.1109/Tdsc.2017.2752164 |
0.341 |
|
2020 |
Zhang T, Ji X, Xu W. Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks Mobile Networks and Applications. 1-14. DOI: 10.1007/S11036-020-01634-Z |
0.462 |
|
2019 |
Zhang T, Ji X, Zhuang Z, Xu W. JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors (Basel, Switzerland). 19. PMID 30795598 DOI: 10.3390/S19040909 |
0.414 |
|
2019 |
Yan C, Zhang G, Ji X, Zhang T, Zhang T, Xu W. The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2906165 |
0.304 |
|
2018 |
Zhou X, Ji X, Wang B, Cheng Y, Ma Z, Choi F, Helmuth B, Xu W. Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors (Basel, Switzerland). 18. PMID 29738467 DOI: 10.3390/S18051464 |
0.425 |
|
2018 |
Zhou X, Ji X, Chen YC, Li X, Xu W. LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors (Basel, Switzerland). 18. PMID 29494557 DOI: 10.3390/S18030747 |
0.378 |
|
2018 |
Ji X, Cheng Y, Xu W, Zhou X. User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes Security and Communication Networks. 2018: 1-10. DOI: 10.1155/2018/3980371 |
0.433 |
|
2018 |
Han W, Li Z, Ni M, Gu G, Xu W. Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis Ieee Transactions On Dependable and Secure Computing. 15: 309-320. DOI: 10.1109/Tdsc.2016.2568187 |
0.343 |
|
2018 |
Xu W, Yan C, Jia W, Ji X, Liu J. Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles Ieee Internet of Things Journal. 5: 5015-5029. DOI: 10.1109/Jiot.2018.2867917 |
0.32 |
|
2017 |
Guo Z, Han W, Liu L, Xu W, Ni M, Zhao Y, Wang XS. Socialized policy administration Computers & Security. 67: 232-243. DOI: 10.1016/J.Cose.2017.03.005 |
0.316 |
|
2016 |
Xu M, Xu W, Han T, Lin Z. Energy-efficient time synchronization in wireless sensor networks via temperature-aware compensation Acm Transactions On Sensor Networks. 12. DOI: 10.1145/2876508 |
0.392 |
|
2016 |
Han W, Li Z, Yuan L, Xu W. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords Ieee Transactions On Information Forensics and Security. 11: 258-272. DOI: 10.1109/Tifs.2015.2490620 |
0.309 |
|
2016 |
Mustafa HA, Xu W, Sadeghi A, Schulz S. End-to-End Detection of Caller ID Spoofing Attacks Ieee Transactions On Dependable and Secure Computing. 15: 423-436. DOI: 10.1109/Tdsc.2016.2580509 |
0.659 |
|
2014 |
Xia M, Dong Y, Xu W, Li X, Lu D. MC 2 : Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring Acm Transactions On Sensor Networks. 10: 52. DOI: 10.1145/2509856 |
0.456 |
|
2014 |
Liu Z, Liu H, Xu W, Chen Y. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 25: 508-517. DOI: 10.1109/Tpds.2013.33 |
0.346 |
|
2013 |
Dey S, Roy N, Xu W, Nelakuditi S. ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones Mobile Computing and Communications Review. 17: 21-22. DOI: 10.1145/2542095.2542107 |
0.304 |
|
2012 |
Chai G, Xu M, Xu W, Lin Z. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity International Journal of Distributed Sensor Networks. 8: 648058. DOI: 10.1155/2012/648058 |
0.44 |
|
2012 |
Liu Z, Liu H, Xu W, Chen Y. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Ieee Transactions On Parallel and Distributed Systems. 23: 547-555. DOI: 10.1109/Tpds.2011.154 |
0.374 |
|
2012 |
Mustafa H, Zhang X, Liu Z, Xu W, Perrig A. Jamming-resilient multipath routing Ieee Transactions On Dependable and Secure Computing. 9: 852-864. DOI: 10.1109/Tdsc.2012.69 |
0.65 |
|
2012 |
O'Kane JM, Xu W. Energy-efficient information routing in sensor networks for robotic target tracking Wireless Networks. 18: 713-733. DOI: 10.1007/S11276-012-0471-Y |
0.403 |
|
2011 |
Liu Z, Xu W. Determining sink location through Zeroing-In attackers in wireless sensor networks Wireless Networks. 18: 335-349. DOI: 10.1007/S11276-011-0403-2 |
0.453 |
|
2010 |
Xia M, Dong Y, Xu W, Lu D, Li X. Multi-mode user-centric design of wireless sensor networks for long-term monitoring Mobile Computing and Communications Review. 14: 25-27. DOI: 10.1145/1837188.1837198 |
0.446 |
|
2010 |
Liu H, Liu Z, Chen Y, Xu W. Determining the position of a jammer using a virtual-force iterative approach Wireless Networks. 17: 531-547. DOI: 10.1007/S11276-010-0295-6 |
0.437 |
|
2009 |
Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks: Theory and practice Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1614379.1614380 |
0.45 |
|
2009 |
Xu W. A novel strategy of clustered structure for intrusion detection of wireless sensor network 2009 2nd International Conference On Information and Computing Science, Icic 2009. 4: 312-314. DOI: 10.1109/ICIC.2009.389 |
0.341 |
|
2008 |
Xu W, Trappe W, Zhang Y. Defending wireless sensor networks from radio interference through channel adaptation Acm Transactions On Sensor Networks. 4. DOI: 10.1145/1387663.1387664 |
0.401 |
|
2006 |
Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: Attack and defense strategies Ieee Network. 20: 41-47. DOI: 10.1109/Mnet.2006.1637931 |
0.439 |
|
Show low-probability matches. |