Follow
Xin-Wen Wu
Title
Cited by
Cited by
Year
On the security of permutation-only image encryption schemes
A Jolfaei, XW Wu, V Muthukkumarasamy
IEEE transactions on information forensics and security 11 (2), 235-246, 2015
2042015
Comments on the security of “Diffusion–substitution based gray image encryption” scheme
VM A Jolfaei, XW Wu
Digital signal processing 23 (3), 894-901, 2014
153*2014
List decoding of q-ary Reed-Muller codes
R Pellikaan, XW Wu
IEEE Transactions on Information Theory 50 (4), 679-682, 2004
1062004
Efficient root-finding algorithm with application to list decoding of algebraic-geometric codes
XW Wu, PH Siegel
IEEE Transactions on Information Theory 47 (6), 2579-2587, 2001
752001
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic
M Usman, V Muthukkumarasamy, XW Wu
IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015
542015
Reconstructing a linear scrambler with improved detection capability and in the presence of noise
XB Liu, SN Koh, XW Wu, CC Chui
IEEE Transactions on information forensics and security 7 (1), 208-218, 2011
512011
Adaptive clustering with feature ranking for DDoS attacks detection
L Zi, J Yearwood, XW Wu
2010 fourth international conference on network and system security, 281-286, 2010
512010
A study on reconstruction of linear scrambler using dual words of channel encoder
XB Liu, SN Koh, CC Chui, XW Wu
IEEE Transactions on information forensics and security 8 (3), 542-552, 2013
492013
A novel dynamic user authentication scheme
X Ren, XW Wu
2012 International Symposium on Communications and Information Technologies …, 2012
482012
SP-CIDS: Secure and private collaborative IDS for VANETs
G Raja, S Anbalagan, G Vijayaraghavan, S Theerthagiri, ...
IEEE Transactions on Intelligent Transportation Systems 22 (7), 4385-4393, 2020
432020
Codes, cryptology and curves with computer algebra
R Pellikaan, XW Wu, S Bulygin, R Jurrius
Cambridge University Press, 2017
432017
A 3D object encryption scheme which maintains dimensional and spatial stability
A Jolfaei, XW Wu, V Muthukkumarasamy
IEEE Transactions on Information Forensics and Security 10 (2), 409-422, 2014
412014
Wireless smart home sensor networks: mobile agent based anomaly detection
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
342012
Performance evaluation of block ciphers for wireless sensor networks
K Biswas, V Muthukkumarasamy, XW Wu, K Singh
Advanced Computing and Communication Technologies: Proceedings of the 9th …, 2016
312016
An analytical model for lifetime estimation of wireless sensor networks
K Biswas, V Muthukkumarasamy, XW Wu, K Singh
IEEE Communications Letters 19 (9), 1584-1587, 2015
312015
Rbacs: Rootkit behavioral analysis and classification system
D Lobo, P Watters, X Wu
2010 Third international conference on knowledge discovery and data mining …, 2010
292010
A novel framework for software defined wireless body area network
K Hasan, XW Wu, K Biswas, K Ahmed
2018 8th International conference on intelligent systems, modelling and …, 2018
282018
Lightweight security protocols for the Internet of Things
XW Wu, EH Yang, J Wang
2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …, 2017
282017
A secure lightweight texture encryption scheme
A Jolfaei, XW Wu, V Muthukkumarasamy
Image and Video Technology–PSIVT 2015 Workshops: RV 2015, GPID 2013, VG 2015 …, 2016
282016
Comments on the security of “Diffusion–substitution based gray image encryption” scheme
A Jolfaei, XW Wu, V Muthukkumarasamy
Digital signal processing 32, 34-36, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20