default search action
Xinwen Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Shan Wang, Ming Yang, Shan Jiang, Fei Chen, Yue Zhang, Xinwen Fu:
BBS: A secure and autonomous blockchain-based big-data sharing system. J. Syst. Archit. 150: 103133 (2024) - [c130]Christopher Morales-Gonzalez, Matthew Harper, Pranathi Rayavaram, Manoj Yeddanapudi, Sashank Narain, Xinwen Fu:
Evaluating the Efficacy of Productivity Tools in Engineering Education. EDUCON 2024: 1-10 - [c129]Lan Luo, Christopher Morales-Gonzalez, Shan Wang, Zhen Ling, Xinwen Fu:
Unified View of IoT and CPS Security and Privacy. ICNC 2024: 495-499 - [c128]Christopher Morales-Gonzalez, Matthew Harper, Michael Cash, Qun Zhou Sun, Xinwen Fu:
On Building Automation Systems and Attacks. ICNC 2024: 536-542 - [c127]Shan Wang, Ming Yang, Jiannong Cao, Zhen Ling, Qiang Tang, Xinwen Fu:
CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains. ICDCS 2024: 322-332 - [c126]Xiangyu Xu, Yu Chen, Zhen Ling, Li Lu, Junzhou Luo, Xinwen Fu:
mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones. INFOCOM 2024: 351-360 - [c125]Shan Wang, Ming Yang, Wenxuan Dai, Yu Liu, Yue Zhang, Xinwen Fu:
Deanonymizing Ethereum Users behind Third-Party RPC Services. INFOCOM 2024: 1701-1710 - [c124]Kaizheng Liu, Ming Yang, Zhen Ling, Yuan Zhang, Chongqing Lei, Lan Luo, Xinwen Fu:
Samba: Detecting SSL/TLS API Misuses in IoT Binary Applications. INFOCOM 2024: 2029-2038 - [c123]Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu:
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems. NDSS 2024 - [c122]Kai Dong, Zheng Zhang, Chuang Jia, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu:
Relation Mining Under Local Differential Privacy. USENIX Security Symposium 2024 - [c121]Chongqing Lei, Zhen Ling, Yue Zhang, Yan Yang, Junzhou Luo, Xinwen Fu:
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. USENIX Security Symposium 2024 - 2023
- [c120]Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. CCS 2023: 1660-1674 - [c119]Xizhe Wang, Zhang Zhang, Jing Guo, Peng Zhang, Qilei Chen, Yu Cao, Xinwen Fu, Benyuan Liu:
A Greedy Algorithm-Based Self-Training Pipeline for Expansion of Dental Caries Dataset. HealthCom 2023: 26-32 - [c118]Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu:
On False Data Injection Attack against Building Automation Systems. ICNC 2023: 35-41 - [c117]Xizhe Wang, Jing Guo, Peng Zhang, Qilei Chen, Zhang Zhang, Yu Cao, Xinwen Fu, Benyuan Liu:
A Deep Learning Framework with Pruning RoI Proposal for Dental Caries Detection in Panoramic X-ray Images. ICONIP (3) 2023: 524-536 - [c116]Chunmian Wang, Junzhou Luo, Zhen Ling, Lan Luo, Xinwen Fu:
A Comprehensive and Long-term Evaluation of Tor V3 Onion Services. INFOCOM 2023: 1-10 - [c115]Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu:
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks. NDSS 2023 - 2022
- [j58]Lan Luo, Yue Zhang, Clayton White, Brandon Keating, Bryan Pearson, Xinhui Shao, Zhen Ling, Haofei Yu, Cliff C. Zou, Xinwen Fu:
On Security of TrustZone-M-Based IoT Systems. IEEE Internet Things J. 9(12): 9683-9699 (2022) - [j57]Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu:
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems. IEEE Internet Things J. 9(18): 17120-17135 (2022) - [j56]Qingyu Yang, Donghe Li, Dou An, Wei Yu, Xinwen Fu, Xinyu Yang, Wei Zhao:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. IEEE Trans. Dependable Secur. Comput. 19(1): 131-148 (2022) - [c114]Shan Wang, Ming Yang, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao:
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm. CNS 2022: 317-325 - [c113]Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu:
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. ESORICS (2) 2022: 531-548 - [c112]Shan Wang, Ming Yang, Tingjian Ge, Yan Luo, Xinwen Fu:
BBS: A Blockchain Big-Data Sharing System. ICC 2022: 4205-4210 - [c111]Shan Wang, Zhen Ling, Yue Zhang, Ruizhao Liu, Joshua Kraunelis, Kang Jia, Bryan Pearson, Xinwen Fu:
Implication of Animation on Android Security. ICDCS 2022: 1122-1132 - [c110]Zhen Ling, Gui Xiao, Wenjia Wu, Xiaodan Gu, Ming Yang, Xinwen Fu:
Towards an Efficient Defense against Deep Learning based Website Fingerprinting. INFOCOM 2022: 310-319 - [c109]Bryan Pearson, Yue Zhang, Cliff C. Zou, Xinwen Fu:
FUME: Fuzzing Message Queuing Telemetry Transport Brokers. INFOCOM 2022: 1699-1708 - [c108]Chunmian Wang, Zhen Ling, Wenjia Wu, Qi Chen, Ming Yang, Xinwen Fu:
Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery. INFOCOM 2022: 1709-1718 - [i9]Michael Cash, Christopher Morales, Shan Wang, Xipeng Jin, Alex Parlato, Qun Zhou Sun, Xinwen Fu:
On False Data Injection Attack against Building Automation Systems. CoRR abs/2208.02733 (2022) - [i8]Xinwen Fu:
A Unified View of IoT And CPS Security and Privacy. CoRR abs/2209.13793 (2022) - 2021
- [j55]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems. IEEE Internet Things J. 8(8): 6815-6827 (2021) - [j54]Zhen Ling, Huaiyu Yan, Xinhui Shao, Junzhou Luo, Yiling Xu, Bryan Pearson, Xinwen Fu:
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes. J. Syst. Archit. 119: 102240 (2021) - [c107]Michael Cash, Shan Wang, Bryan Pearson, Qun Zhou, Xinwen Fu:
On Automating BACnet Device Discovery and Property Identification. ICC 2021: 1-6 - [c106]Shan Wang, Ming Yang, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, Wei Zhao:
On Private Data Collection of Hyperledger Fabric. ICDCS 2021: 819-829 - [c105]Zhen Ling, Ruizhao Liu, Yue Zhang, Kang Jia, Bryan Pearson, Xinwen Fu, Junzhou Luo:
Prison Break of Android Reflection Restriction and Defense. INFOCOM 2021: 1-10 - [i7]Shan Wang, Ming Yang, Tingjian Ge, Yan Luo, Xinwen Fu:
BOSS: A Blockchain Off-State Sharing System. CoRR abs/2109.07626 (2021) - [i6]Shan Wang, Ming Yang, Tingjian Ge, Yan Luo, Xinwen Fu:
BBS: A Blockchain Big-Data Sharing System. CoRR abs/2111.08822 (2021) - 2020
- [j53]Zhen Ling, Chao Gao, Chuta Sano, Chukpozohn Toe, Zupei Li, Xinwen Fu:
STIR: A Smart and Trustworthy IoT System Interconnecting Legacy IR Devices. IEEE Internet Things J. 7(5): 3958-3967 (2020) - [j52]Bo Liu, Xiangguo Sun, Zeyang Ni, Jiuxin Cao, Junzhou Luo, Benyuan Liu, Xinwen Fu:
Co-Detection of crowdturfing microblogs and spammers in online social networks. World Wide Web 23(1): 573-607 (2020) - [c104]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M Based IoT Devices. GLOBECOM 2020: 1-7 - [c103]Bryan Pearson, Cliff C. Zou, Yue Zhang, Zhen Ling, Xinwen Fu:
SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors. ICPADS 2020: 372-381 - [c102]Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, Xinwen Fu:
BLESS: A BLE Application Security Scanning Framework. INFOCOM 2020: 636-645 - [c101]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [i5]Lan Luo, Yue Zhang, Cliff C. Zou, Xinhui Shao, Zhen Ling, Xinwen Fu:
On Runtime Software Security of TrustZone-M based IoT Devices. CoRR abs/2007.05876 (2020) - [i4]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems. CoRR abs/2007.11981 (2020)
2010 – 2019
- 2019
- [j51]Donghe Li, Qingyu Yang, Dou An, Wei Yu, Xinyu Yang, Xinwen Fu:
On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids. IEEE Internet Things J. 6(4): 5902-5915 (2019) - [j50]Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xinwen Fu:
Your clicks reveal your secrets: a novel user-device linking method through network and visual data. Multim. Tools Appl. 78(7): 8337-8362 (2019) - [j49]Zhongjie Ba, Zhan Qin, Xinwen Fu, Kui Ren:
CIM: Camera in Motion for Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 14(11): 2987-3002 (2019) - [j48]Bo Liu, Zeyang Ni, Junzhou Luo, Jiuxin Cao, Xudong Ni, Benyuan Liu, Xinwen Fu:
Analysis of and defense against crowd-retweeting based spam in social networks. World Wide Web 22(6): 2953-2975 (2019) - [c100]Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu:
I Know What You Enter on Gear VR. CNS 2019: 241-249 - [c99]Bryan Pearson, Lan Luo, Yue Zhang, Rajib Dey, Zhen Ling, Mostafa A. Bassiouni, Xinwen Fu:
On Misconception of Hardware and Cost in IoT Security and Privacy. ICC 2019: 1-7 - [c98]Peng Zhao, Dekui Quan, Wei Yu, Xinyu Yang, Xinwen Fu:
Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems. ICCCN 2019: 1-9 - [c97]Zupei Li, Chao Gao, Qinggang Yue, Xinwen Fu:
Toward Drone Privacy via Regulating Altitude and Payload. ICNC 2019: 562-566 - [c96]Chao Gao, Lan Luo, Yue Zhang, Bryan Pearson, Xinwen Fu:
Microcontroller Based IoT System Firmware Security: Case Studies. ICII 2019: 200-209 - [c95]Bryan Pearson, Lan Luo, Cliff C. Zou, Jacob Crain, Yier Jin, Xinwen Fu:
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory. IFIPIoT 2019: 289-306 - [c94]Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu:
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks. INFOCOM 2019: 1180-1188 - [e3]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9 [contents] - [e2]Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 305, Springer 2019, ISBN 978-3-030-37230-9 [contents] - [i3]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - 2018
- [j47]Fan Liang, Wei Yu, Dou An, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Survey on Big Data Market: Pricing, Trading and Protection. IEEE Access 6: 15132-15154 (2018) - [j46]Lan Luo, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, Xinwen Fu:
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring. Sensors 18(12): 4451 (2018) - [j45]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
User Differentiated Verifiable File Search on the Cloud. IEEE Trans. Serv. Comput. 11(6): 948-961 (2018) - [j44]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding. IEEE Trans. Syst. Man Cybern. Syst. 48(7): 1177-1190 (2018) - [c93]Qinggang Yue, Zupei Li, Chao Gao, Wei Yu, Xinwen Fu, Wei Zhao:
The Peeping Eye in the Sky. GLOBECOM 2018: 1-7 - [c92]Joshua Kraunelis, Xinwen Fu, Wei Yu, Wei Zhao:
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic. ICC 2018: 1-6 - [c91]Xiaofei He, Wei Yu, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu, Xinwen Fu:
Towards 3D Deployment of UAV Base Stations in Uneven Terrain. ICCCN 2018: 1-9 - [c90]Song Chen, Zupei Li, Fabrizio Dangelo, Chao Gao, Xinwen Fu:
A Case Study of Security and Privacy Threats from Augmented Reality (AR). ICNC 2018: 442-446 - [c89]Zhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu:
SecTap: Secure Back of Device Input System for Mobile Devices. INFOCOM 2018: 1520-1528 - [c88]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinwen Fu:
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee. IPCCC 2018: 1-8 - [c87]Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao:
SecT: A Lightweight Secure Thing-Centered IoT Communication System. MASS 2018: 46-54 - [c86]Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren:
ABC: Enabling Smartphone Authentication with Built-in Camera. NDSS 2018 - [c85]Chuta Sano, Chao Gao, Zupei Li, Zhen Ling, Xinwen Fu:
Turning Legacy IR Devices into Smart IoT Devices. WASA 2018: 412-424 - [i2]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j43]Wei Yu, Xinwen Fu, Houbing Song, Anastasios A. Economides, Minho Jo, Wei Zhao:
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems. IEEE Internet Things J. 4(6): 1798-1801 (2017) - [j42]Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu, Xinwen Fu:
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System. IEEE Internet Things J. 4(6): 1899-1909 (2017) - [j41]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids. IEEE Internet Things J. 4(6): 2260-2274 (2017) - [j40]Jesse Victors, Ming Li, Xinwen Fu:
The Onion Name System. Proc. Priv. Enhancing Technol. 2017(1): 21-41 (2017) - [j39]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 66(3): 2551-2566 (2017) - [j38]Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c84]Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu:
An End-to-End View of IoT Security and Privacy. GLOBECOM 2017: 1-7 - [c83]Zupei Li, Qinggang Yue, Chuta Sano, Wei Yu, Xinwen Fu:
3D vision attack against authentication. ICC 2017: 1-6 - [c82]Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. WASA 2017: 716-728 - [c81]Xinyu Yang, Cong Zhao, Wei Yu, Xianghua Yao, Xinwen Fu:
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems. WASA 2017: 755-767 - 2016
- [j37]Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
Disjoint multi mobile agent itinerary planning for big data analytics. EURASIP J. Wirel. Commun. Netw. 2016: 99 (2016) - [j36]Tao Xiang, Jianglin Sun, Xinwen Fu:
On the security of binary arithmetic coding based on interval shrinking. Multim. Tools Appl. 75(8): 4245-4258 (2016) - [j35]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, Xinwen Fu:
Password Extraction via Reconstructed Wireless Mouse Trajectory. IEEE Trans. Dependable Secur. Comput. 13(4): 461-473 (2016) - [j34]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones. IEEE Trans. Mob. Comput. 15(2): 432-446 (2016) - [c80]Bo Liu, Junzhou Luo, Jiuxin Cao, Xudong Ni, Benyuan Liu, Xinwen Fu:
On crowd-retweeting spamming campaign in social networks. ICC 2016: 1-6 - [c79]Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu:
Secure fingertip mouse for mobile devices. INFOCOM 2016: 1-9 - [c78]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Data integrity attacks against the distributed real-time pricing in the smart grid. IPCCC 2016: 1-8 - 2015
- [j33]Ming Yang, Junzhou Luo, Zhen Ling, Xinwen Fu, Wei Yu:
De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun. Mag. 53(4): 60-66 (2015) - [j32]Guobin Xu, Wei Yu, Zhijiang Chen, Hanlin Zhang, Paul Moulema, Xinwen Fu, Chao Lu:
A cloud computing based system for cyber security management. Int. J. Parallel Emergent Distributed Syst. 30(1): 29-45 (2015) - [j31]Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Computers 64(1): 4-18 (2015) - [j30]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor. IEEE Trans. Inf. Forensics Secur. 10(12): 2515-2530 (2015) - [j29]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation. IEEE Trans. Parallel Distributed Syst. 26(7): 1887-1899 (2015) - [j28]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. EAI Endorsed Trans. Ubiquitous Environ. 1(4): e1 (2015) - [c77]Fei Chen, Tao Xiang, Jianyong Chen, Wei Yu, Xinwen Fu, Shengyu Zhang:
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud. CBD 2015: 219-226 - [c76]Donghai Zhu, Xinyu Yang, Wei Yu, Chao Lu, Xinwen Fu:
INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks. ICC 2015: 3666-3671 - [c75]Xinyu Yang, Cong Zhao, Shusen Yang, Xinwen Fu, Julie A. McCann:
A Systematic Key Management mechanism for practical Body Sensor Networks. ICC 2015: 7310-7315 - [c74]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. ICDCS 2015: 61-72 - [c73]Hengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang, Xinwen Fu:
Pricing and revenue sharing in secondary market of mobile internet access. IPCCC 2015: 1-8 - [c72]Qingyu Yang, Dou An, Wei Yu, Xinyu Yang, Xinwen Fu:
On stochastic optimal bidding strategy for microgrids. IPCCC 2015: 1-8 - [c71]Zhongli Liu, Zupei Li, Benyuan Liu, Xinwen Fu, Ioannis A. Raptis, Kui Ren:
Rise of Mini-Drones: Applications and Issues. PAMCO@MobiHoc 2015: 7-12 - [c70]Qinggang Yue, Zhen Ling, Wei Yu, Benyuan Liu, Xinwen Fu:
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing. PAMCO@MobiHoc 2015: 19-24 - [c69]Hengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang, Biao Chen, Junda Zhu, Xinwen Fu:
Secondary Market Mobile Users for Internet Access. NCA 2015: 81-84 - [c68]Si Chen, Muyuan Li, Kui Ren, Xinwen Fu, Chunming Qiao:
Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing. SenSys 2015: 59-71 - [c67]Bo Liu, Jiuxin Cao, Jie Yin, Wei Yu, Benyuan Liu, Xinwen Fu:
On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor Networks. WASA 2015: 366-376 - [e1]Xinwen Fu, Nan Zhang:
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, PAMCO@MobiHoc 2015, Hangzhou, China, June 22, 2015. ACM 2015, ISBN 978-1-4503-3523-2 [contents] - 2014
- [j27]Donghai Zhu, Xinyu Yang, Wei Yu, Xinwen Fu:
Network coding versus traditional routing in adversarial wireless networks. Ad Hoc Networks 20: 119-131 (2014) - [j26]Longfei Wu, Xiaojiang Du, Xinwen Fu:
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. IEEE Commun. Mag. 52(3): 80-87 (2014) - [j25]Bhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan Liu, Jie Wang:
Providing service assurance in mobile opportunistic networks. Comput. Networks 74: 114-140 (2014) - [j24]Zhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao, Xinwen Fu:
HAWK: An Unmanned Mini-Helicopter-Based Aerial Wireless Kit for Localization. IEEE Trans. Mob. Comput. 13(2): 287-298 (2014) - [c66]Bhanu Kaushik, Honggang Zhang, Xinyu Yang, Xinwen Fu, Benyuan Liu:
CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices. AINA 2014: 164-171 - [c65]Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao:
Blind Recognition of Touched Keys on Mobile Devices. CCS 2014: 1403-1414 - [c64]Fei Chen, Tao Xiang, Xinwen Fu, Wei Yu:
Towards verifiable file search on the cloud. CNS 2014: 346-354 - [c63]Swathi Kurunji, Tingjian Ge, Xinwen Fu, Benyuan Liu, Amrith Kumar, Cindy X. Chen:
Optimizing Aggregate Query Processing in Cloud Data Warehouses. Globe 2014: 1-12 - [c62]Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, Cong Wang, Xinwen Fu:
Privacy-preserving outsourcing of image global feature detection. GLOBECOM 2014: 710-715 - [c61]Longfei Wu, Xiaojiang Du, Li Wang, Xinwen Fu, Ralph Oyini Mbouna, Seong G. Kong:
Analyzing mobile phone vulnerabilities caused by camera. GLOBECOM 2014: 4126-4130 - [c60]Sulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu:
On simulation studies of cyber attacks against LTE networks. ICCCN 2014: 1-8 - [c59]Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery of malicious traffic over Tor. INFOCOM 2014: 1402-1410 - [c58]Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure barcode-based visible light communication for smartphones. INFOCOM 2014: 2661-2669 - [c57]Bhanu Kaushik, Maria J. Brunette, Xinwen Fu, Benyuan Liu:
Customizable, scalable and reliable community-based mobile health interventions. MobileHealth@MobiHoc 2014: 43-48 - [p2]Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu:
Towards Neural Network Based Malware Detection on Android Mobile Devices. Cybersecurity Systems for Human Cognition Augmentation 2014: 99-117 - [i1]Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao:
Blind Recognition of Touched Keys: Attack and Countermeasures. CoRR abs/1403.4829 (2014) - 2013
- [j23]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. Comput. Networks 57(4): 869-886 (2013) - [j22]Swathi Kurunji, Tingjian Ge, Xinwen Fu, Benyuan Liu, Cindy X. Chen:
Optimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses. Int. J. Grid High Perform. Comput. 5(4): 113-130 (2013) - [j21]Wei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu:
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. Int. J. Networked Distributed Comput. 1(3): 144-158 (2013) - [j20]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind detection of spread spectrum flow watermarks. Secur. Commun. Networks 6(3): 257-274 (2013) - [j19]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. IEEE Trans. Computers 62(12): 2411-2426 (2013) - [j18]Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu:
How to block Tor's hidden bridges: detecting methods and countermeasures. J. Supercomput. 66(3): 1285-1305 (2013) - [j17]Peng Zhao, Xinyu Yang, Wei Yu, Xinwen Fu:
A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs. IEEE Trans. Veh. Technol. 62(5): 2290-2302 (2013) - [c56]Wei Yu, Sixiao Wei, Guanhui Ma, Xinwen Fu, Nan Zhang:
On effective localization attacks against Internet Threat monitors. ICC 2013: 2011-2015 - [c55]Bhanu Kaushik, Honggang Zhang, Xinwen Fu, Benyuan Liu, Jie Wang:
SmartParcel: A Collaborative Data Sharing Framework for Mobile Operating Systems. ICDCS Workshops 2013: 290-295 - [c54]Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu:
Protocol-level hidden server discovery. INFOCOM 2013: 1043-1051 - [c53]Yinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao:
Theory underlying measurement of AOA with a rotating directional antenna. INFOCOM 2013: 2490-2498 - [c52]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. MobiQuitous 2013: 512-523 - [c51]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu:
How Privacy Leaks From Bluetooth Mouse? NDSS 2013 - [c50]Wei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu:
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback. SNPD 2013: 101-106 - [c49]Yinjie Chen, Zhongli Liu, Xinwen Fu, Wei Zhao:
Effective RSS Sampling for Forensic Wireless Localization. WASA 2013: 402-413 - 2012
- [j16]Xinyu Yang, Xiaojing Fan, Wei Yu, Xinwen Fu, Shusen Yang:
HLLS: A History information based Light Location Service for MANETs. Comput. Networks 56(2): 731-744 (2012) - [j15]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
A context-aware scheme for privacy-preserving location-based services. Comput. Networks 56(11): 2551-2568 (2012) - [j14]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A WiFi Forensic Positioning Tool. IEEE Trans. Mob. Comput. 11(3): 377-389 (2012) - [j13]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A New Cell-Counting-Based Attack Against Tor. IEEE/ACM Trans. Netw. 20(4): 1245-1261 (2012) - [c48]Yang Zhang, Peng Xia, Junzhou Luo, Zhen Ling, Benyuan Liu, Xinwen Fu:
Fingerprint attack against touch-enabled devices. SPSM@CCS 2012: 57-68 - [c47]Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu:
How privacy leaks from bluetooth mouse? CCS 2012: 1013-1015 - [c46]Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. ICDCS 2012: 92-101 - [c45]Junwei Huang, Zhen Ling, Tao Xiang, Jie Wang, Xinwen Fu:
When Digital Forensic Research Meets Laws. ICDCS Workshops 2012: 542-551 - [c44]Zhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao, Xinwen Fu:
HAWK: An unmanned mini helicopter-based aerial wireless kit for localization. INFOCOM 2012: 2219-2227 - [c43]Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Extensive analysis and large-scale empirical evaluation of tor bridge discovery. INFOCOM 2012: 2381-2389 - [c42]Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu:
A novel network delay based side-channel attack: Modeling and defense. INFOCOM 2012: 2390-2398 - [c41]Zhongli Liu, Yinjie Chen, Benyuan Liu, Jie Wang, Xinwen Fu:
Aerial Localization with Smartphone. WASA 2012: 386-397 - 2011
- [j12]Yuefeng Huang, Xinyu Yang, Shusen Yang, Wei Yu, Xinwen Fu:
A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks. IEEE Trans. Veh. Technol. 60(3): 1045-1058 (2011) - [c40]Jie Lin, Xinyu Yang, Wei Yu, Xinwen Fu:
Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c39]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu:
Equal-Sized Cells Mean Equal-Sized Packets in Tor? ICC 2011: 1-6 - [c38]Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. INFOCOM 2011: 186-190 - [c37]Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, Wei Zhao:
Protection of query privacy for continuous location based services. INFOCOM 2011: 1710-1718 - [c36]Junwei Huang, Xian Pan, Xinwen Fu, Jie Wang:
Long PN code based DSSS watermarking. INFOCOM 2011: 2426-2434 - [c35]Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, Wei Zhao:
Identifying mobiles hiding behind wireless routers. INFOCOM 2011: 2651-2659 - [c34]William Gauvin, Cindy X. Chen, Xinwen Fu, Benyuan Liu:
Classification of commercial and personal profiles on MySpace. PerCom Workshops 2011: 276-281 - [c33]Yinjie Chen, Zhongli Liu, Yong Ding, Xinwen Fu:
On sampling signal strength for localization using a directional antenna. WOWMOM 2011: 1-6 - 2010
- [j11]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Trans. Computers 59(12): 1655-1668 (2010) - [j10]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 954-967 (2010) - [j9]Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 21(10): 1501-1514 (2010) - [j8]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks. IEEE Trans. Syst. Man Cybern. Part B 40(3): 597-611 (2010) - [c32]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity. GameSec 2010: 58-71 - [c31]Xiaojing Fan, Xinyu Yang, Wei Yu, Xinwen Fu:
HLLS: A History Information Based Light Location Service for MANETs. ICC 2010: 1-5 - [c30]Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang:
3DLoc: Three Dimensional Wireless Localization Toolkit. ICDCS 2010: 30-39 - [c29]Xinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo:
Cyber Crime Scene Investigations (C²SI) through Cloud Computing. ICDCS Workshops 2010: 26-31 - [c28]Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen Fu, Jie Wang:
Barrier coverage with sensors of limited mobility. MobiHoc 2010: 201-210 - [c27]Zhongli Liu, Yinjie Chen, Wei Yu, Xinwen Fu:
Generic network forensic data acquisition from household and small business wireless routers. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j7]Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, Yong Guan:
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 20(5): 695-709 (2009) - [j6]Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao:
An Invisible Localization Attack to Internet Threat Monitors. IEEE Trans. Parallel Distributed Syst. 20(11): 1611-1625 (2009) - [c26]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A new cell counter based attack against tor. CCS 2009: 578-589 - [c25]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
CAP: A Context-Aware Privacy Protection System for Location-Based Services. ICDCS 2009: 49-57 - [c24]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A New Threat to Location Privacy. ICDCS 2009: 589-596 - [c23]Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind Detection of Spread Spectrum Flow Watermarks. INFOCOM 2009: 2195-2203 - [c22]William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang:
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. WASA 2009: 561-569 - [c21]Nan Zhang, Min Song, Xinwen Fu, Wei Yu:
Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. WASA 2009: 570-578 - 2008
- [j5]Jangwon Lee, Wei Yu, Xinwen Fu:
Energy-efficient target detection in sensor networks using line proxies. Int. J. Commun. Syst. 21(3): 251-275 (2008) - [j4]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. Int. J. Netw. Secur. 7(1): 130-140 (2008) - [c20]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 - [c19]Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582 - [c18]Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508 - [c17]Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 - [c16]Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu:
On performance bottleneck of anonymous communication networks. IPDPS 2008: 1-11 - [p1]Steve Graham, Xinwen Fu, Bin Lu:
Network Security Fundamentals. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j3]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. Int. J. Secur. Networks 2(1/2): 137-153 (2007) - [c15]Xinwen Fu, Shu Jiang, Wei Yu, Steve Graham, Yong Guan:
On TCP Performance in Flow-Based Mix Networks. DASC 2007: 145-152 - [c14]Xun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan:
Detecting worms via mining dynamic program execution. SecureComm 2007: 412-421 - [c13]Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback. S&P 2007: 18-32 - 2006
- [c12]Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218 - 2005
- [c11]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Anonymity analysis of mix networks against flow-correlation attacks. GLOBECOM 2005: 5 - [c10]Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao:
SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461 - [c9]Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503 - [c8]Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. ICPADS (1) 2005: 57-63 - [c7]Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. NCA 2005: 215-218 - 2004
- [j2]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
A quantitative analysis of anonymous communications. IEEE Trans. Reliab. 53(1): 103-115 (2004) - [c6]Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281 - [c5]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225 - 2003
- [c4]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195 - [c3]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. ICDCS 2003: 340- - [c2]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492 - 2002
- [c1]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols. ICDCS 2002: 257-266 - 2001
- [j1]Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans. Syst. Man Cybern. Part A 31(4): 253-265 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint