default search action
Xin-Wen Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Mohammad Jabed Morshed Chowdhury, Xin-Wen Wu, Kalvinder Singh:
Lifetime Modelling of Wireless Sensor Networks with Multipath Routing. PerCom Workshops 2024: 178-183 - [c25]Xin-Wen Wu, Yongtao Cao, Richard Dankwa:
Pareto-Optimal Machine Learning Models for Security of IoT Applications. SmartNets 2024: 1-6 - 2023
- [j29]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Mohammad Jabed Morshed Chowdhury, Xin-Wen Wu, Kalvinder Singh:
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks. Comput. Networks 232: 109842 (2023) - 2022
- [c24]Maria Balega, Waleed Farag, Soundararajan Ezekiel, Xin-Wen Wu, Alicia Deak, Zaryn Good:
IoT Anomaly Detection Using a Multitude of Machine Learning Algorithms. AIPR 2022: 1-7 - [c23]Xin-Wen Wu, Yongtao Cao, Richard Dankwa:
Accuracy vs Efficiency: Machine Learning Enabled Anomaly Detection on the Internet of Things. IoTaIS 2022: 245-251 - 2021
- [j28]Zihui Liu, Xin-Wen Wu:
Notes on LCD Codes Over Frobenius Rings. IEEE Commun. Lett. 25(2): 361-364 (2021) - [j27]Gunasekaran Raja, Sudha Anbalagan, Geetha Vijayaraghavan, Sudhakar Theerthagiri, Saran Vaitangarukav Suryanarayan, Xin-Wen Wu:
SP-CIDS: Secure and Private Collaborative IDS for VANETs. IEEE Trans. Intell. Transp. Syst. 22(7): 4385-4393 (2021) - 2020
- [j26]Peter Beelen, Olav Geil, Edgar Martínez-Moro, Xin-Wen Wu:
Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan. Des. Codes Cryptogr. 88(8): 1477-1478 (2020) - [j25]Xin-Wen Wu, Alireza Jolfaei:
Securing the Internet of Everything through Adaptive and Resource-Efficient Mechanisms. IEEE Internet Things Mag. 3(4): 16-19 (2020) - [j24]Guangsong Yang, Xin-Wen Wu, Ying Li, Qiubo Ye:
Energy efficient protocol for routing and scheduling in wireless body area networks. Wirel. Networks 26(2): 1265-1273 (2020)
2010 – 2019
- 2019
- [j23]Junhu Wang, Xuguang Ren, Shikha Anirban, Xin-Wen Wu:
Correct filtering for subgraph isomorphism search in compressed vertex-labeled graphs. Inf. Sci. 482: 363-373 (2019) - [c22]Laurent Njilla, Larry Pearlstein, Xin-Wen Wu, Adam Lutz, Soundararajan Ezekiel:
Internet of Things Anomaly Detection using Machine Learning. AIPR 2019: 1-6 - [c21]En-Hui Yang, Xin-Wen Wu:
On Optimal Information-Theoretically Secure Key Management. CWIT 2019: 1-6 - [c20]Xin-Wen Wu, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni:
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices. UEMCON 2019: 679-685 - [i2]Khalid Hasan, Xin-Wen Wu, Kamanashis Biswas, Khandakar Ahmed:
A Novel Framework for Software Defined Wireless Body Area Network. CoRR abs/1903.09285 (2019) - 2018
- [c19]Guangsong Yang, Xin-Wen Wu:
A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks. ADHOCNETS 2018: 237-246 - 2017
- [c18]En-Hui Yang, Xin-Wen Wu:
Information-theoretically secure key generation and management. ISIT 2017: 1529-1533 - [c17]Xin-Wen Wu, En-Hui Yang, Junhu Wang:
Lightweight security protocols for the Internet of Things. PIMRC 2017: 1-7 - 2016
- [j22]Zihui Liu, Xin-Wen Wu:
Trellis complexity and pseudoredundancy of relative two-weight codes. Appl. Algebra Eng. Commun. Comput. 27(2): 139-158 (2016) - [j21]Zihui Liu, Xin-Wen Wu:
The fullrank value function. Des. Codes Cryptogr. 81(2): 297-315 (2016) - [j20]Wayne J. Pullan, Xin-Wen Wu, Zihui Liu:
Construction of optimal constant-dimension subspace codes. J. Comb. Optim. 31(4): 1709-1719 (2016) - [j19]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
On the Security of Permutation-Only Image Encryption Schemes. IEEE Trans. Inf. Forensics Secur. 11(2): 235-246 (2016) - [c16]Gul Zameen Khan, Ruben Gonzalez, Xin-Wen Wu, Eun-Chan Park:
On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN. FIT 2016: 164-169 - 2015
- [j18]Zihui Liu, Xin-Wen Wu:
On relative constant-weight codes. Des. Codes Cryptogr. 75(1): 127-144 (2015) - [j17]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh:
An Analytical Model for Lifetime Estimation of Wireless Sensor Networks. IEEE Commun. Lett. 19(9): 1584-1587 (2015) - [j16]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks. J. Networks 10(6): 353-368 (2015) - [j15]Anisur Rahman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB). J. Networks 10(8): 462-469 (2015) - [j14]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh:
An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks. J. Networks 10(11): 616-624 (2015) - [j13]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consumer Electron. 61(2): 197-205 (2015) - [j12]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability. IEEE Trans. Inf. Forensics Secur. 10(2): 409-422 (2015) - [c15]Gul Zameen Khan, Ruben Gonzalez, Eun-Chan Park, Xin-Wen Wu:
A reliable multicast MAC protocol for Wi-Fi Direct 802.11 networks. EuCNC 2015: 224-228 - [c14]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
A Secure Lightweight Texture Encryption Scheme. PSIVT Workshops 2015: 344-356 - 2014
- [j11]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
Comments on the security of "Diffusion-substitution based gray image encryption" scheme. Digit. Signal Process. 32: 34-36 (2014) - [j10]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks. J. Networks 9(12): 3427-3444 (2014) - [c13]Zihui Liu, Jens Zumbrägel, Marcus Greferath, Xin-Wen Wu:
Notes on the pseudoredundancy. ISIT 2014: 2789-2793 - [i1]Zihui Liu, Jens Zumbrägel, Marcus Greferath, Xin-Wen Wu:
New Results on the Pseudoredundancy. CoRR abs/1410.1627 (2014) - 2013
- [j9]Xiaobei Liu, Soo Ngee Koh, Chee-Cheon Chui, Xin-Wen Wu:
A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder. IEEE Trans. Inf. Forensics Secur. 8(3): 542-552 (2013) - [c12]Bafrin Zarei, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks. AINA 2013: 197-204 - [c11]Alireza Jolfaei, Xin-Wen Wu, Vallipuram Muthukkumarasamy:
On the Feasibility and Performance of Pass-Thought Authentication Systems. EST 2013: 33-38 - [c10]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks. LCN Workshops 2013: 1001-1009 - 2012
- [j8]Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers. IET Inf. Secur. 6(3): 183-189 (2012) - [j7]Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Reconstructing a Linear Scrambler With Improved Detection Capability and in the Presence of Noise. IEEE Trans. Inf. Forensics Secur. 7(1): 208-218 (2012) - [c9]Xin-Wen Wu, Alan Wee-Chung Liew:
Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution. CSS 2012: 352-361 - [c8]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum:
Securing mobile agent based Wireless Sensor Network applications on middleware. ISCIT 2012: 707-712 - [c7]Xuguang Ren, Xin-Wen Wu:
A novel dynamic user authentication scheme. ISCIT 2012: 713-717 - [c6]Zihui Liu, Xin-Wen Wu:
On a class of three-weight codes with cryptographic applications. ISIT 2012: 2551-2555 - [c5]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum:
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection. UIC/ATC 2012: 322-329 - 2011
- [j6]Zihui Liu, Xin-Wen Wu, Yuan Luo, Wende Chen:
New code equivalence based on relative generalized Hamming weights. Inf. Sci. 181(19): 4309-4317 (2011) - [c4]Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Investigation on Scrambler Reconstruction with Minimum A Priori Knowledge. GLOBECOM 2011: 1-5 - 2010
- [j5]Zihui Liu, Jie Wang, Xin-Wen Wu:
On the Relative Generalized Hamming Weights of Linear Codes and their Subcodes. SIAM J. Discret. Math. 24(4): 1234-1241 (2010) - [c3]Xin-Wen Wu, Soo Ngee Koh, Chee-Cheon Chui:
Primitive polynomials for robust scramblers and stream ciphers against reverse engineering. ISIT 2010: 2473-2477
2000 – 2009
- 2005
- [j4]Xin-Wen Wu, Margreta Kuijper, Parampalli Udaya:
A root-finding algorithm for list decoding of Reed-Muller codes. IEEE Trans. Inf. Theory 51(3): 1190-1196 (2005) - [c2]Xin-Wen Wu, Margreta Kuijper, Parampalli Udaya:
On the decoding radius of Lee-metric decoding of algebraic-geometric codes. ISIT 2005: 1191-1195 - 2004
- [j3]Ruud Pellikaan, Xin-Wen Wu:
List decoding of q-ary Reed-Muller codes. IEEE Trans. Inf. Theory 50(4): 679-682 (2004) - [c1]Xin-Wen Wu, Margreta Kuijper, Parampalli Udaya:
A class of algebraic-geometric codes for Lee-Metric and their decoding. ISIT 2004: 77 - 2001
- [j2]Xin-Wen Wu, Paul H. Siegel:
Efficient root-finding algorithm with application to list decoding of Algebraic-Geometric codes. IEEE Trans. Inf. Theory 47(6): 2579-2587 (2001)
1990 – 1999
- 1999
- [j1]Gui Liang Feng, Xin-Wen Wu, T. R. N. Rao:
Correction to "New double-byte error-correcting codes for memory systems". IEEE Trans. Inf. Theory 45(6): 2209 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint