Follow
Xin-Wen Wu
Title
Cited by
Cited by
Year
On the security of permutation-only image encryption schemes
A Jolfaei, XW Wu, V Muthukkumarasamy
IEEE transactions on information forensics and security 11 (2), 235-246, 2015
1642015
Comments on the security of “Diffusion–substitution based gray image encryption” scheme
VM A Jolfaei, XW Wu
Digital signal processing 23 (3), 894-901, 2014
139*2014
List decoding of q-ary Reed-Muller codes
R Pellikaan, XW Wu
IEEE Transactions on Information Theory 50 (4), 679-682, 2004
1022004
Efficient root-finding algorithm with application to list decoding of algebraic-geometric codes
XW Wu, PH Siegel
IEEE Transactions on Information Theory 47 (6), 2579-2587, 2001
752001
Adaptive clustering with feature ranking for DDoS attacks detection
L Zi, J Yearwood, XW Wu
2010 fourth international conference on network and system security, 281-286, 2010
482010
A study on reconstruction of linear scrambler using dual words of channel encoder
XB Liu, SN Koh, CC Chui, XW Wu
IEEE Transactions on information forensics and security 8 (3), 542-552, 2013
462013
Reconstructing a linear scrambler with improved detection capability and in the presence of noise
XB Liu, SN Koh, XW Wu, CC Chui
IEEE Transactions on information forensics and security 7 (1), 208-218, 2011
462011
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic
M Usman, V Muthukkumarasamy, XW Wu
IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015
442015
A novel dynamic user authentication scheme
X Ren, XW Wu
2012 International Symposium on Communications and Information Technologies …, 2012
442012
Codes, cryptology and curves with computer algebra
R Pellikaan, XW Wu, S Bulygin, R Jurrius
Cambridge University Press, 2017
362017
Wireless smart home sensor networks: mobile agent based anomaly detection
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
322012
Rbacs: Rootkit behavioral analysis and classification system
D Lobo, P Watters, X Wu
2010 Third international conference on knowledge discovery and data mining …, 2010
292010
Lightweight security protocols for the Internet of Things
XW Wu, EH Yang, J Wang
2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …, 2017
262017
Performance evaluation of block ciphers for wireless sensor networks
K Biswas, V Muthukkumarasamy, XW Wu, K Singh
Advanced Computing and Communication Technologies, 443-452, 2016
262016
An analytical model for lifetime estimation of wireless sensor networks
K Biswas, V Muthukkumarasamy, XW Wu, K Singh
IEEE Communications Letters 19 (9), 1584-1587, 2015
262015
A 3D object encryption scheme which maintains dimensional and spatial stability
A Jolfaei, XW Wu, V Muthukkumarasamy
IEEE Transactions on Information Forensics and Security 10 (2), 409-422, 2014
252014
Comments on the security of “Diffusion–substitution based gray image encryption” scheme
A Jolfaei, XW Wu, V Muthukkumarasamy
Digital signal processing 32, 34-36, 2014
252014
A secure lightweight texture encryption scheme
A Jolfaei, XW Wu, V Muthukkumarasamy
Image and video technology, 344-356, 2015
212015
SP-CIDS: Secure and private collaborative IDS for VANETs
G Raja, S Anbalagan, G Vijayaraghavan, S Theerthagiri, ...
IEEE Transactions on Intelligent Transportation Systems 22 (7), 4385-4393, 2020
192020
Securing mobile agent based wireless sensor network applications on middleware
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 International symposium on communications and information technologies …, 2012
192012
The system can't perform the operation now. Try again later.
Articles 1–20