Wenyuan Xu - Publications

Affiliations: 
Computer Science & Engineering University of South Carolina, Columbia, SC 
Area:
Computer Science, Computer Engineering

30 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Zhang G, Ji X, Li Y, Xu W. Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors (Basel, Switzerland). 20. PMID 32605307 DOI: 10.3390/S20133635  0.326
2020 Cheng Y, Ji X, Lu T, Xu W. On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach Ieee Transactions On Mobile Computing. 19: 907-921. DOI: 10.1109/Tmc.2019.2900919  0.405
2020 Han W, Cao C, Chen H, Li D, Fang Z, Xu W, Wang XS. senDroid: Auditing Sensor Access in Android System-Wide Ieee Transactions On Dependable and Secure Computing. 17: 407-421. DOI: 10.1109/Tdsc.2017.2768536  0.344
2020 Xu W, Tian J, Cao Y, Wang S. Challenge-Response Authentication Using In-Air Handwriting Style Verification Ieee Transactions On Dependable and Secure Computing. 17: 51-64. DOI: 10.1109/Tdsc.2017.2752164  0.341
2020 Zhang T, Ji X, Xu W. Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks Mobile Networks and Applications. 1-14. DOI: 10.1007/S11036-020-01634-Z  0.462
2019 Zhang T, Ji X, Zhuang Z, Xu W. JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors (Basel, Switzerland). 19. PMID 30795598 DOI: 10.3390/S19040909  0.414
2019 Yan C, Zhang G, Ji X, Zhang T, Zhang T, Xu W. The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2906165  0.304
2018 Zhou X, Ji X, Wang B, Cheng Y, Ma Z, Choi F, Helmuth B, Xu W. Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors (Basel, Switzerland). 18. PMID 29738467 DOI: 10.3390/S18051464  0.425
2018 Zhou X, Ji X, Chen YC, Li X, Xu W. LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors (Basel, Switzerland). 18. PMID 29494557 DOI: 10.3390/S18030747  0.378
2018 Ji X, Cheng Y, Xu W, Zhou X. User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes Security and Communication Networks. 2018: 1-10. DOI: 10.1155/2018/3980371  0.433
2018 Han W, Li Z, Ni M, Gu G, Xu W. Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis Ieee Transactions On Dependable and Secure Computing. 15: 309-320. DOI: 10.1109/Tdsc.2016.2568187  0.343
2018 Xu W, Yan C, Jia W, Ji X, Liu J. Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles Ieee Internet of Things Journal. 5: 5015-5029. DOI: 10.1109/Jiot.2018.2867917  0.32
2017 Guo Z, Han W, Liu L, Xu W, Ni M, Zhao Y, Wang XS. Socialized policy administration Computers & Security. 67: 232-243. DOI: 10.1016/J.Cose.2017.03.005  0.316
2016 Xu M, Xu W, Han T, Lin Z. Energy-efficient time synchronization in wireless sensor networks via temperature-aware compensation Acm Transactions On Sensor Networks. 12. DOI: 10.1145/2876508  0.392
2016 Han W, Li Z, Yuan L, Xu W. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords Ieee Transactions On Information Forensics and Security. 11: 258-272. DOI: 10.1109/Tifs.2015.2490620  0.309
2016 Mustafa HA, Xu W, Sadeghi A, Schulz S. End-to-End Detection of Caller ID Spoofing Attacks Ieee Transactions On Dependable and Secure Computing. 15: 423-436. DOI: 10.1109/Tdsc.2016.2580509  0.659
2014 Xia M, Dong Y, Xu W, Li X, Lu D. MC 2 : Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring Acm Transactions On Sensor Networks. 10: 52. DOI: 10.1145/2509856  0.456
2014 Liu Z, Liu H, Xu W, Chen Y. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Ieee Transactions On Parallel and Distributed Systems. 25: 508-517. DOI: 10.1109/Tpds.2013.33  0.346
2013 Dey S, Roy N, Xu W, Nelakuditi S. ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones Mobile Computing and Communications Review. 17: 21-22. DOI: 10.1145/2542095.2542107  0.304
2012 Chai G, Xu M, Xu W, Lin Z. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity International Journal of Distributed Sensor Networks. 8: 648058. DOI: 10.1155/2012/648058  0.44
2012 Liu Z, Liu H, Xu W, Chen Y. Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Ieee Transactions On Parallel and Distributed Systems. 23: 547-555. DOI: 10.1109/Tpds.2011.154  0.374
2012 Mustafa H, Zhang X, Liu Z, Xu W, Perrig A. Jamming-resilient multipath routing Ieee Transactions On Dependable and Secure Computing. 9: 852-864. DOI: 10.1109/Tdsc.2012.69  0.65
2012 O'Kane JM, Xu W. Energy-efficient information routing in sensor networks for robotic target tracking Wireless Networks. 18: 713-733. DOI: 10.1007/S11276-012-0471-Y  0.403
2011 Liu Z, Xu W. Determining sink location through Zeroing-In attackers in wireless sensor networks Wireless Networks. 18: 335-349. DOI: 10.1007/S11276-011-0403-2  0.453
2010 Xia M, Dong Y, Xu W, Lu D, Li X. Multi-mode user-centric design of wireless sensor networks for long-term monitoring Mobile Computing and Communications Review. 14: 25-27. DOI: 10.1145/1837188.1837198  0.446
2010 Liu H, Liu Z, Chen Y, Xu W. Determining the position of a jammer using a virtual-force iterative approach Wireless Networks. 17: 531-547. DOI: 10.1007/S11276-010-0295-6  0.437
2009 Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks: Theory and practice Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1614379.1614380  0.45
2009 Xu W. A novel strategy of clustered structure for intrusion detection of wireless sensor network 2009 2nd International Conference On Information and Computing Science, Icic 2009. 4: 312-314. DOI: 10.1109/ICIC.2009.389  0.341
2008 Xu W, Trappe W, Zhang Y. Defending wireless sensor networks from radio interference through channel adaptation Acm Transactions On Sensor Networks. 4. DOI: 10.1145/1387663.1387664  0.401
2006 Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: Attack and defense strategies Ieee Network. 20: 41-47. DOI: 10.1109/Mnet.2006.1637931  0.439
Show low-probability matches.