default search action
Xun Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c9]Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert:
Long-Term Study of Honeypots in a Public Cloud. DSN (Supplements) 2022: 1-4
2010 – 2019
- 2019
- [c8]Matt Calder, Xun Fan, Liang Zhu:
A Cloud Provider's View of EDNS Client-Subnet Adoption. TMA 2019: 129-136 - [i1]Hang Guo, Xun Fan, Anh Cao, Geoff Outhred, John S. Heidemann:
Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud. CoRR abs/1912.05590 (2019) - 2017
- [c7]Qian Chen, Xun Fan, Guohai Liu, Wenxiang Zhao, Jinghua Ji, Liang Xu, Gaohong Xu:
A new fault-tolerance motor with decoupled reluctance channel and PM channel. ISIE 2017: 214-219 - 2015
- [c6]Xun Fan, Ethan Katz-Bassett, John S. Heidemann:
Assessing Affinity Between Users and CDN Sites. TMA 2015: 95-110 - 2013
- [c5]Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John S. Heidemann, Ramesh Govindan:
Mapping the expansion of Google's serving infrastructure. Internet Measurement Conference 2013: 313-326 - [c4]Xun Fan, John S. Heidemann, Ramesh Govindan:
Evaluating anycast in the domain name system. INFOCOM 2013: 1681-1689 - 2010
- [c3]Xun Fan, John S. Heidemann:
Selecting representative IP addresses for internet topology studies. Internet Measurement Conference 2010: 411-423
2000 – 2009
- 2009
- [j6]Xiaoming Hu, Shangteng Huang, Xun Fan:
Practical Hierarchical Identity Based Encryption Scheme without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(6): 1494-1499 (2009) - 2008
- [c2]Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue:
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. ACSAC 2008: 215-224 - [c1]Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu:
Two Stochastic Models for Security Evaluation Based on Attack Graph. ICYCS 2008: 2198-2203 - 2007
- [j5]Rong Chen, Xun Fan, Youyun Xu, Haibin Zhang:
Newly-Built Iterative Receiver and Hardware Implementation for V-BLAST. IEICE Trans. Commun. 90-B(2): 377-380 (2007) - [j4]Guoqi Li, Huanye Sheng, Xun Fan:
Incorporating Metadata into Data Mining with Ontology. IEICE Trans. Inf. Syst. 90-D(6): 983-985 (2007) - [j3]Zhiwu Yin, Shangteng Huang, Xun Fan:
Rate-Sensitive Load Shedding in Data Stream Systems. IEICE Trans. Inf. Syst. 90-D(7): 1111-1112 (2007) - [j2]Debin Yin, Jianying Xie, Xun Fan:
A New Fair Queueing Algorithm with Dynamic Service Probability Adjustment. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(11): 2635-2640 (2007) - 2005
- [j1]Xun Fan, Youyun Xu, Hanwen Luo, Jianguo Huang:
Least-Squares Zero-Forcing User-Ordered Successive Interference Cancellation for Multi-User STBC Systems. IEICE Trans. Electron. 88-C(12): 2330-2337 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint