Research - Dr. Xiao-Jiang Du (James)


Research Interests

Ψ  Internet of Things Security, Mobile Device Security, Wireless Medical-Device Security

Ψ  System and Network Security, Security and Privacy in Cloud Computing and Big Data

Ψ  Wireless Networks, Computer Networks

Ψ  Systems, Controls, Communications

 

Publications (Total 268)        

Ψ  Book (1) 

1.      X. Hei, X. Du, “Security in Wireless Implantable Medical DevicesSpringer, hardcopy ISBN 978-1-4614-7152-3, online ISBN 978-1-4614-7153-0, published in April 2013.

 

Ψ  Referred Journal Papers (97) 

1.      L. Zhu, X. Tang, M. Shen, X. Du, and M. Guizani, “Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks”, IEEE Journal on Selected Areas in Communications (JSAC), Volume: 36 Issue: 3, March 2018, DOI: 10.1109/JSAC.2018.2815442

2.      H. Cao, S. Liu, L. Wu, Z. Guan, X. Du, “Achieving Differential Privacy against Non-Intrusive Load Monitoring in Smart Grid: a Fog Computing Approach”, Concurrency and Computation: Practice and Experience, Wiley, accepted, March 2018.

3.      E. Sifah, Q. Xia, K. Obour A. Amofa, J. Gao, R. Chen, H. Xia, J. Gee, X. Du, M. Guizani, “Chain-based big data access control infrastructure”, The Journal of Supercomputing, Springer, pp. 1-20, March 2018, DOI: 10.1007/s11227-018-2308-7

4.      J. Gu; B. Sun; X. Du*; J. Wang; Y. Zhuang; Z. Wang, “Consortium Blockchain-based Malware Detection in Mobile Devices”, IEEE Access, Volume: 6, Issue: 1, Page(s): 12118-12128, Dec. 2018, DOI: 10.1109/ACCESS.2018.2803258

5.      Y. Su, X. Du, L. Huang, Z. Gao, and M. Guizani, “LTE-U and Wi-Fi Coexistence Algorithm Based on Q-learning in Multi-channel”, IEEE Access, Volume: 6, Issue:1, Page(s): 13644-13652, Dec. 2018, DOI: 10.1109/ACCESS.2018.2803258

6.      J. Wang, R. Zhang, J. Yuan, and X. Du, “A 3-Dimensional Energy-Harvesting-Aware Routing Scheme for Space Nanosatellite Networks”, IEEE Internet of Things Journal, published online in Jan. 2018, DOI: 10.1109/JIOT.2018.2803111

7.      J. Liu, L. Zhang, R. Sun, X. Du, and M. Guizani, “Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings”, IEEE Access, published online in Jan. 2018, Volume: 6, Issue:1, pp. 7854-7863, Dec. 2018, DOI: 10.1109/ACCESS.2018.2797102

8.      Y. Zhang, B. Song, X. Du, and M. Guizani, “Vehicle Tracking Using Surveillance with Multimodal Data Fusion”, IEEE Transactions on Intelligent Transportation Systems, published online in Jan. 2018, DOI: 10.1109/TITS.2017.2787101

9.      R. Zhou, X. Zhang, X. Du, X. Wang, G. Yang, M. Guizani, “File-centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things”, IEEE Transactions on Intelligent Transportation Systems, published online in Jan. 2018, DOI: 10.1109/TII.2018.2794442

10.  L. Zhen, H. Qin, B. Song, R. Ding, X. Du, and M. Guizani, “Random Access Preamble Design and Detection for Mobile Satellite Communication Systems”, IEEE Journal on Selected Areas in Communications (JSAC), Volume: 36, Issue: 2, Feb. 2018, DOI: 10.1109/JSAC.2018.2804138

11.  Z. Guan, J. Li, L. Zhu, Z. Zhang, X. Du, M. Guizani, "Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resource", IEEE Transactions on Industrial Informatics, Vol. 13, Issue 6, pp.3216-3225, Dec. 2017, DOI: 10.1109/TII.2017.2706760.

12.  Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, X. Du, "Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid", IEEE Internet of Things Journal, Vol. 4, Issue 6, pp. 1934-1944, Dec. 2017.

13.  J. Lv, D. Man, W. Yang, X. Du, and M. Yu, “Robust WLAN-based Indoor Intrusion Detection Using PHY Layer Information”, IEEE ACCESS, published online on 20 Dec. 2017, Vol.: PP, Issue: 99, DOI: 10.1109/ACCESS.2017.2785444

14.  D. Xu, J. Pan, X. Du*, B. Wang, M. Liu, and Q. Kang, “Massive Fishing Website URL Parallel Filtering Method”, IEEE ACCESS, published online on 13 Dec. 2017, Vol.: PP, Issue: 99, DOI: 10.1109/ACCESS.2017.2782847

15.  M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, and J. Hu, “Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection”, IEEE Transactions on Information Forensics & Security, Volume: PP, Issue: 99, Nov. 2017, DOI: 10.1109/TIFS.2017.2774451

16.  X. Zhu, R. Hao, H. Chi, X. Du, “FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-ins”, IEEE Transactions on Vehicular Technology, Volume: 66, Issue: 11, Nov. 2017, Page(s): 10461 – 10469, DOI: 10.1109/TVT.2017.2764999

17.  J. Liang, H. Feng, and X. Du, “Intermittent Fault Diagnosability of Interconnection Networks”, Journal of Computer Science and Technology, 32(6): 1–9, Nov. 2017.

18.  D. Zhan, Lin Ye, B. Fang, X. Du, Z. Xu, “Protecting Critical Files Using Target-based Virtual Machine Introspection Approach”, IEICE Transactions on Information and Systems, Vol. E100-D, No.10, pp.2307-2318, Oct. 2017.

  1. L. Xiao; Y. Li; X. Huang; X. Du, “Cloud-based Malware Detection Game for Mobile Devices with Offloading”, IEEE Transactions on Mobile Computing, Volume: PP, Issue: 99, published online 27 March 2017. 10.1109/TMC.2017.2687918
  2. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du and M. Guizani, “MeDShare: Trust-less Medical Data Sharing Among Cloud Service Providers Via Blockchain”, IEEE Access, Volume: 5, Pages: 14757 - 14767, July 2017, DOI 10.1109/ACCESS.2017.2730843
  3. Y. Li, Z. Gao, L. Huang, X. Du, and G. Mohsen, "Resource Management of Future Mobile Networks: Architecture and Technologies'', Computer Networks, accepted, April. 2017, https://doi.org/10.1016/j.comnet.2017.04.007
  4. Z. Luo, M. LiWang, Z. Lin, L. Huang, X. Du and M. Guizani, "Energy-Efficient Caching for Mobile Edge Computing in 5G Networks'', Applied Sciences, 2017, 7(6), 557; doi:10.3390/app7060557. 
  5. L. Wu, X. Du, M. Guizani, and A. Mohamed, "Access Control Schemes for Implantable Medical Devices: A Survey'', IEEE Internet of Things Journal, Volume: PP 1-8, Issue: 99, May 2017, DOI: 10.1109/JIOT.2017.2708042.
  6. D. Zhan, L. Ye, B. Fang, X. Du, et al., “Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach”, Soft Computing, 2017: 1-11.
  7. C. Zhao, M. Huang, L. Huang, X. Du, M. Guizani, “A Robust Authentication Scheme Based on Physical-Layer Phase Noise Fingerprint for Emerging Wireless Networks”, Computer Networks, May 2017, DOI: 10.1016/j.comnet.2017.05.028
  8. R. Xu, R. Wang, Z. Guan, L. Wu, J. Wu, X. Du, “Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid”, IEEE Access, Vol. 5, pp.13787 - 13798, July 2017.
  9. C. Zhao, L. Huang, and X Du*, “Secure Machine Type Communications toward LTE Heterogeneous Networks”, IEEE Wireless Communications Magazine, accepted, Oct. 2016.
  10. Y. Zhang, B. Song, Y. Zhang, X. Du, M. Guizani, “Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning”, Sensors (ISSN 1424-8220), MDPI, published online in Nov. 2016, doi:10.3390/s16122021 [pdf]
  11. F. Yang, S. Zou, Y. Tang, and X Du*, “A Multi-Channel Cooperative Clustering-Based MAC Protocol for V2V Communications”, Wireless Communications and Mobile Computing, Hindawi, accepted, Oct. 2016.
  12. D. Man, Y. Wu, S. Xuan and X Du*, “Thwarting Non-Intrusive Occupancy Detection Attacks from Smart Meters”, Security and Communication Networks, Hindawi, accepted, Oct. 2016.
  13. Z. Zhou, H. Zhang, Y. Lin, and X. Du*, “Cuckoo: Flexible Compute-Intensive Task Offloading in Mobile Cloud Computing”, Wireless Communications and Mobile Computing, Hindawi, accepted, Sept. 2016.
  14. Y. Cheng, X. Fu, X. Du, B. Luo, M. Guizani, “A lightweight live memory forensic approach based on hardware virtualization,” Vol. 379, pp. 23-41, Elsevier Information Sciences, Feb. 2017.
  15. K. Wang, X. Li, H. Ji, and X. Du*, “Modeling and Optimizing the LTE Discontinuous Reception Mechanism under Self-Similar Traffic,” IEEE Transactions on Vehicular Technology, Issue 7, Vol. 65, pp. 5595 - 5610, July 2016. DOI: 10.1109/TVT.2014.2328232. [pdf]
  16. P. Dong, B. Song, H. Zhang, and X. Du, “Improving Onboard Internet Services for High-Speed Vehicles by Multipath Transmission in Heterogeneous Wireless Networks,” IEEE Transactions on Vehicular Technology, accepted, May 2016.[pdf]
  17. Y. Zhang, F. Tian, B. Song, and X. Du, “Social Vehicle Swarms: A Novel Perspective on Socially Aware Vehicular Communication Architecture,” IEEE Wireless Communications, Volume: 23, Issue: 4, August 2016.
  18. J. Guo, B. Song and X. Du*, “Significance Evaluation of Video Data over Media Cloud Based on Compressed Sensing IEEE IEEE Transactions on Multimedia, accepted, Apr. 2016. [pdf]
  19. X. Fu, Y. Gao, B. Luo, X. Du*, M. Guizani, “Security Threats to Hadoop: Data Leakage Attacks and Investigation,” IEEE Network Magazine, accepted, Oct. 2015.
  20. H. Zhang, Z. Xu, and X. Du*, “Context-aware Participant Recruitment Mechanism in Mobile Crowdsourcing,” Wireless Communications and Mobile Computing, Wiley, accepted, July 2015. [pdf]
  21. H. Zhang, Q. Zhang, and X. Du*, “Toward Vehicle-Assisted Cloud Computing for Smartphones,” IEEE Transactions on Vehicular Technology, Issue 12, Vol.64, pp. 5610-5618, 2015. DOI: 10.1109/TVT.2015.2480004 [pdf]
  22. J. Chen, Z. Lin, Y. Liu, Y. Hu and X. Du, “Sink Location Protection Protocols Based on Packet Sending Rate Adjustment,” International Journal of Distributed Sensor Networks, Hindawi, Vol. 2016, Article ID 6354514, 10 pages, 2015. DOI: 10.1155/2016/6354514[pdf]
  23. Z. Guan, T. Yang and X. Du, “Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks,” International Journal of Distributed Sensor Networks, Hindawi, Vol. 2015, Article ID 101287, 11 pages, 2015. DOI: 10.1155/2015/101287 [pdf]

42.  X. Fu, X. Du* and B. Luo, “Data Correlation-based Analysis Method for Automatic Memory Forensics,” Security and Communication Networks, Wiley, Article first published online: 6 SEP 2015DOI: 10.1002/sec.1337.[pdf]

43.  C. Bian, T. Zhao, X. Li, X. Du, and W. Yan, “Theoretical analysis on caching effects in urban vehicular ad hoc networks,” Wireless Communications and Mobile Computing, Wiley, Article first published online: 25 NOV 2015DOI: 10.1002/wcm.2651.[pdf]

  1. L. Wu, X. Du, and J. Wu, “Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms,” IEEE Transactions on Vehicular Technology, Issue 99, Vol. PP, pp. 1-1, 2015. DOI: 10.1109/TVT.2015.2472993[pdf]
  2. H. Zhang, Z. Zhou, L. Ye and X. Du*, “Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud,” IEEE Transactions on Cloud Computing, Issue 99, Vol.PP , pp. 1-1, 2015. DOI: 10.1109/TCC.2015.2430316 [pdf]

46.  X. Huang, and X. Du*, “Achieving Data Privacy on Hybrid Cloud,” Security and Communication Networks, Wiley, Volume 8, Issue 18, pages 3771–3781, December 2015.[pdf]

47.  Z. Lin, L. Huang, Z. Gao, and X. Du*, “Efficient Device-to-Device Discovery and Access Procedure for 5G Cellular Network,” Wireless Communications and Mobile Computing, Wiley, Article first published online: 8 JUN 2015DOI: 10.1002/wcm.2602.[pdf]

  1. X. Hei, X. Du*, S. Lin, I. Lee, and O. Sokolsky, “Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System,” IEEE Transactions on Parallel and Distributed Computing, Issue 11, Vol.26, pp: 3108-3121, Nov. 2015.[pdf]
  2. K. Li, H. Zheng, J. Wu, and X. Du, "Virtual Machine Placement in Cloud Systems through Migration Process," International Journal of Parallel, Emergent and Distributed Systems, August 2014.[pdf]
  3. Y. Jiang, W. Cheng, X. Du"Group-based key array authentication protocol in radio frequency identification systems" IET Information Security, Issue 6, Dec. 2014.[pdf]
  4. K. Bian, J. Chen, X. Du*, and X. Li, “Multi-channel Broadcast via Channel Hopping in Cognitive Radio Networks,” IEEE Transactions on Vehicular Technology, Issue 7, Vol.64, pp. 3004-3017, 2015. DOI: 10.1109/TVT.2014.2349996[pdf]
  5. H. Zhang, Q. Zhang, Z. Zhou, and X. Du*, “Processing Geo-dispersed Big Data in Advanced MapReduce Framework,” IEEE Network Magazine, Volume: 29 , Issue: 5, Sept. - Oct. 2015.[pdf]
  6. K. Wang, X. Li, H. Ji, and X. Du*, “Modeling and Optimizing the LTE Discontinuous Reception Mechanism under Self-Similar Traffic,” IEEE Transactions on Vehicular Technology, Issue 99, Vol. PP, pp. 1-1, 2014. DOI: 10.1109/TVT.2014.2328232[pdf]
  7. Q. Xu, X. Li, H. Ji, and X. Du*, “Energy-Efficient Resource Allocation for Heterogeneous Services in OFDMA Downlink Networks: Systematic PerspectiveIEEE Transactions on Vehicular Technology, Issue 5, Vol. 63, pp. 2071-2082, 2014. DOI: 10.1109/TVT.2014.2312288[pdf]
  8. H. Zhang, S. Chen, X. Li, H. Ji, and X. Du*, “Interference Management for Heterogeneous Network with Spectral Efficiency Improvement,” IEEE Wireless Communications Magazine, Issue 2, Vol. 22, pp. 101-107, 2015. DOI: 10.1109/MWC.2015.7096292[pdf]

56.  Y. Li, G. Zhu, and X. Du*, “Aligning Spectrum-Holes of Massive MIMO in Cognitive Femtocell Networks,” IEEE Communications Letters, Issue 2, Vol. 18, pp. 229-232, 2014. DOI: 10.1109/LCOMM.2013.123113.131913[pdf]

  1. L. Wu, X. Du*, and X. Fu, “Security Threats to Mobile Multimedia Applications: Camera-based Attacks on Mobile Phones,” IEEE Communications Magazine, Vol. 52, Issue 3, March 2014. [pdf]
  2. K. Bian, J. Park, X. Du*, and X. Li, “Enabling Fair Spectrum Sharing: Mitigating Selfish Misbehaviors in Spectrum,” IEEE Network Magazine, Vol. 27, Issue 3, pp. 16-21, May/June, 2013. [pdf]

59.  L. Huang, G. Zhu, and X. Du*, “Cognitive Femtocell Networks: An Opportunistic Spectrum Access for Future Indoor Wireless Coverage,” IEEE Wireless Communications Magazine, Vol. 20, Issue 2, pp. 44 – 51, April, 2013.[pdf]

60.  X. Yao, X. Han, X. Du*, and X. Zhou, “A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications,” http://dx.doi.org/10.1109/JSEN.2013.2266116, IEEE Sensors Journal, VOL. 13, NO. 10, pp. 3693-3701, Oct. 2013. [pdf]

61.  H. Zhang, L. Ye, J. Shi, X. Du*, and M. Guizani, “Verifying Cloud Service Level Agreement by a Third Party Auditor,” Security and Communication Networks, Wiley, Article first published online: 28 FEB 2013DOI: 10.1002/sec.740.[pdf]

62.  M. Su, H. Zhang, X. Du*, B. Fang, and M. Guizani “A Measurement Study on the Topologies of BitTorrent Networks,” IEEE Journal on Selected Areas in Communications (JSAC), VOL. 31, NO. 9, pages 338 – 347, Sept. 2013.[pdf]

63.  H. Zhang, L. Ye, J. Shi, X. Du*, and H.H. Chen “Preventing Piracy Content Propagation in Peer-to-Peer Networks,” IEEE Journal on Selected Areas in Communications (JSAC), VOL. 31, NO. 9, pages 105 - 114, Sept. 2013.[pdf]

64.  J. Chen, H. Zhang, X. Du*, and B. Fang, “Designing Secure Routing Protocols to Protect Base Stations in Wireless Sensor Networks,” Wireless Communications and Mobile Computing, Wiley, Oct. 2012, DOI: 10.1002/wcm.2300.[pdf]

65.  X. Li, J. Wu, S. Lin, and X. Du, “Channel Switching Control for Wireless Mesh Networks,” Journal of Parallel and Distributed Computing, Vol. 72, Issue 10, Pages 1295–1305, Oct. 2012.[pdf]

66.  W. Zhang, F. Kandah, X. Du*, and C. Wang, “Self-protecting Networking using Dynamic p-cycle Construction within Link Capacity Constraint,” Security and Communication Networks, Wiley, Vol 5, Issue 6, pp. 689–708, May, 2012, DOI: 10.1002/sec.364.[pdf]

67.  J. Chen, X. Du*, and B. Fang, “An Efficient Anonymous Communication Protocol for Wireless Sensor Networks,” Wireless Communications and Mobile Computing, Oct. 2011, DOI: 10.1002/wcm.1205.[pdf]

68.  A. Olteanu, Y. Xiao, K. Wu, and X. Du, “Weaving a Proper Net to Catch Large Objects in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 9, No. 4, Apr. 2010, pp. 1360 - 1369. DOI: 10.1109/TWC.2010.081098[pdf]

69.  J. Y. Lin, Q. Wu, X. Cai, X. Du, and K. Kwon, “On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, Hindawi, Vol. 2010, Article ID 563156, 8 pages, 2010. DOI:10.1155/2010/563156[pdf]

70.  J. Brown, X. Du*, and M. Guizani, “Efficient Rekeying Algorithms for WiMAX Networks,” Security and Communication Networks, Wiley, Vol. 2, Issue 5, pp. 392 - 400, Sept./Oct. 2009.[pdf]

71.  Y. Xiao, H. Chen, X. Du, Y. Zhang, H. Chen, and M. Guizani, “On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 9, Sept. 2009, pp. 4406 - 4410, DOI: 10.1109/TWC.2009.080717[pdf]

72.  Y. Xiao, Y. Zhang, M. Peng, H. Chen, X. Du, Bo. Sun, and K. Wu, “Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks,” Computer Networks, Elsevier, Vol. 53, Issue 14, Sept. 2009, pp. 2458-2475. DOI=10.1016/j.comnet.2009.05.002, http://dx.doi.org/10.1016/j.comnet.2009.05.002[pdf]

73.  X. Du*, M. Guizani, Y. Xiao and H. H. Chen, “A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1223 - 1229, March 2009. [pdf]

74.  Y. Xiao, H. H. Chen, X. Du and M. Guizani, “Stream-based Cipher Feedback Mode in Wireless Error Channel,” IEEE Transactions on Wireless Communications, Vol. 8, No. 2, pp. 662 - 666, February 2009. DOI: 10.1109/TWC.2009.071278[pdf]

75.  S. Guizani, H. Hamam, X. Du and H. H. Chen, “Ad hoc Systems Backboned by Fibres: Limitation and Solutions,” International Journal of Sensor Networks, Vol. 5, No. 2, pp. 90 - 97,  2009.

76.  X. Du* and H. H. Chen, “Security in Wireless Sensor Networks,” IEEE Wireless Communications Magazine, Vol. 15, Issue 4, pp. 60-66, Aug. 2008. [pdf]

77.  X. Du*, M. Guizani, Y. Xiao, and H. H. Chen, “Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks,” IEEE Transactions on Vehicular Technology, Vol. 57, Issue 4, pp. 2387-2394, July 2008.[pdf]

78.  D. Mandala, X. Du*, F. Dai, and C. You, “Load Balance and Energy Efficient Data Gathering in Wireless Sensor Networks,” Wireless Communications and Mobile Computing, Vol. 8 Issue 5, pp. 645 – 659, June 2008. [pdf]

79.  X. Du*, M. Shayman and R. Skoog, “Designing Fault Tolerant Networks to Prevent Poison Message Failure”, Security and Communication Networks, Wiley, Vol. 1, Issue 1, pp. 1–17, Jan. 2008.[pdf]

80.  X. Du*, Y. Xiao and F. Dai “Increasing Network Lifetime by Balancing Node Energy Consumption in Heterogeneous Sensor Networks,” Wireless Communications and Mobile Computing, Wiley, Volume 8 Issue 1, pp. 125–136, Jan. 2008.[pdf]

81.  Y. Xiao, X. Du, J. Zhang, and S. Guizani, “Internet Protocol Television (IPTV): the Killer Application for the Next Generation Internet,” IEEE Communications Magazine, Vol. 45, No. 11, pp. 126–134, Nov. 2007. [pdf]

82.  X. Du*, M. Guizani, Y. Xiao, and H. H. Chen, “Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications Vol. 6, Issue 9, pp. 3395–3401, Sept. 2007. [pdf]

83.  Y. Xiao, H. Chen, X. Du, and M. Guizani, “Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems,” IEEE Transactions on Vehicular Technology, Vol. 56, Issue 5, pp. 2745 – 2755, Sept. 2007.[pdf]

84.  Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A Survey of Key Management Schemes in Wireless Sensor Networks,” Journal of Computer Communications, Vol. 30, Issue 11-12, pp. 2314-2341, Sept. 2007.  [pdf]

85.  X. Du*, Y. Xiao, M. Guizani, and H. H. Chen, “An Effective Key Management Scheme for Heterogeneous Sensor Networks,” Ad Hoc Networks, Elsevier, Vol. 5, Issue 1, pp 24–34, Jan. 2007. [pdf]

86.  Q. Wu, N. Rao, X. Du, et al., “On Efficient Deployment of Sensors on Planar Grid,” Computer Communications, Elsevier, Vol. 30, pp. 2721–2734, 2007.[pdf]

87.  X. Du*, M. Zhang, K. Nygard, S. Guizani, and H. H. Chen, “Self-Healing Sensor Networks with Distributed Decision Making,” International Journal of Sensor Networks, Vol. 2, Nos. 5/6, pp. 289 –298,  2007.[pdf]

88.  X. Du*, and D. Wu, “Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks,” ACM Mobile Networks and Applications (MONET), Vol. 12, No. 1, pp. 57–68, Feb., 2007.[pdf]

89.  X. Du*, “Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method,” Journal of Network and Systems Management, Vol. 14, No. 2, pp. 243–259, June 2006.[pdf]

90.  X. Du*, Y. Xiao, H. H. Chen, and Q. Wu, “Secure Cell Relay Routing Protocol for Sensor Networks,” Wireless Communications and Mobile Computing, Wiley, Vol. 6, Issue 3, pp. 375–391, May 2006.[pdf]

91.  X. Du* and D. Wu, “Adaptive Cell-Relay Routing Protocol for Mobile Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 55, Issue 1, pp. 270–277, Jan. 2006.  [pdf]

92.  X. Du*, D. Wu, W. Liu, and Y. Fang, “Multi-Class Routing and Medium Access Control for Heterogeneous Mobile Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 55, Issue 1, pp. 278–285, Jan. 2006. [pdf]

93.  X. Du* and Y. Xiao, “Energy Efficient Chessboard Clustering and Routing in Heterogeneous Sensor Network,” International Journal of Wireless and Mobile Computing (IJWMC), Vol. 1, No. 2, pp. 121 –130, Jan. 2006. [pdf]

94.  Y. Xiao, C. Bandela, X. Du, Y. Pan, and K. Dass, “Security Mechanisms, Attacks, and Security Enhancements for the IEEE 802.11 WLANs,” International Journal of Wireless and Mobile Computing (IJWMC), Vol. 1, No. 3/4, pp. 276 – 288, Jan. 2006.[pdf]

95.  Y. Xiao, K. K. Leung, Y. Pan, and X. Du, “Architecture, Mobility Management and Quality of Service for Integrated 3G and WLAN Networks,” Wireless Communications and Mobile Computing, Wiley, Vol. 5, Issue 7, pp 805–823, Nov. 2005. [pdf]

96.  X. Du* and F. Lin, “Maintaining Differentiated Coverage in Heterogeneous Sensor Networks,” EURASIP Journal on Wireless Communications and Networking, Vol. 5, Issue 4, pp. 565–572, Sept. 2005. [pdf]

97.  X. Du*, “QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks,” Ad Hoc Networks, Elsevier, Vol. 2, Issue 3, pp 241–254, July 2004. Ranked as one of the ScienceDirect's TOP 25 Hottest Articles within the journal Ad Hoc Networks. [pdf]

 

Ψ  Referred Conference Papers (166)

1.            L. Luo, H. Yu, Z. Ye, and X. Du, “Online Deadline-aware Bulk Transfer over Inter-Datacenter WANs,” IEEE INFOCOM 2018, accepted, April 2018, Honolulu, HI, USA, acceptance rate = 19.2%.

2.            Y. Sang, B. Ji, G. Gupta, X. Du, and L. Ye, “Provably Efficient Algorithms for Joint Placement and Allocation of Virtual Network Functions,” to appear in Proc. of IEEE INFOCOM 2017, Atlanta, Ga, May 2017, acceptance rate = 20%.

3.            L. Ye, H. Zhang, and X. Du, “Modeling Leechers Attack in BitTorrent,” in Proc. of IEEE GLOBECOM 2014, Austin, TX, Dec. 2014. Best Paper Award![pdf]

4.            X. Hei, X. Du and S. Lin, “Near Field Communication based Access Control for Wireless Medical Devices,” Best Poster Runner-up Award! ACM MobiHoc 2014, Philadelphia, PA, August 2014.[pdf]

5.            Y. Lin, Q. Wu, X. Cai, and X. Du, “Deploying Multiple Base Stations for Lifetime Maximization in Wireless Sensor Networks in Proc. of the 4th International Symposium on Innovations and Real-time Applications of Distributed Sensor Networks, Hangzhou, China, Oct. 2009 (IRA-DSN09). Best Paper Award!

6.            D. Mandala, F. Dai, X. Du, and C. You, “Load Balance and Energy Efficient Data Gathering in Wireless Sensor Networks,” in Proc. of the First IEEE International Workshop on Intelligent Systems Techniques for Wireless Sensor Networks, in conjunction with IEEE MASS'06, Vancouver, Canada, Oct., 2006. Best Paper Award![pdf]

7.            H. Chi, L. Wu, X. Du, Q. Zeng, P. Ratazzi, “e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices in Proc. of the IEEE Conference on Communications and Network Security (IEEE CNS 2018), acceptance rate = 28%, 30 May-1 June, 2018, Beijing, China.

8.            K. Chi, L. Wu, X. Du, G. Yin, J. Wu, B. Ji, and X. Hei, “Enabling Fair Spectrum Sharing between Wi-Fi and LTE-Unlicensed,” to appear in Proc. of IEEE ICC 2018, Kansas City, USA, May 2018.

9.            J. Zhao and K. Kong, X. Hei and Y. Tu, and X. Du, “A Visible Light Channel based Access Control Scheme for Wireless Insulin Pump Systems,” to appear in Proc. of IEEE ICC 2018, Kansas City, USA, May 2018

10.        J. Liu, Q. Li, R. Sun, X. Du, and M. Guizani, “An Efficient Anonymous Authentication Scheme for Internet of Vehicles,” to appear in Proc. of IEEE ICC 2018, Kansas City, USA, May 2018.

11.        J. Liu, X. Li, R. Sun, X. Du, and P. Ratazzi, “An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network,” to appear in Proc. of IEEE ICC 2018, Kansas City, USA, May 2018.

12.        C. Fu, T. Kezmane, X. Du, Y. Fu, and C. Morrisseau, “An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

13.        K. Li, X. Yu, H. Zhang, L. Wu, X. Du, P. Ratazzi, M. Guizani, “Security Mechanisms to Defend against New Attacks on Software-Defined Radio,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

14.        L. Wu, X. Du, W. Wang, B. Lin, “An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

15.        D. Man, X. Wang, W. Yang, J. Lv, X. Du, M. Yu, “PWiG: A Phase-based Wireless Gesture Recognition System,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

16.        C. Zhao, Z. Cai, M. Huang, M. Shi, X. Du, M. Guizani, “The Identification of Secular Variation in IoT Based on Transfer Learning,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

17.        Q. Xia, E. Sifah, K. Huang, R. Chen, X. Du, J. Gao, “Secure Payment Routing Protocol for Economic Systems Based on Blockchain,” in Proc. of IEEE ICNC 2018, Maui, Hawaii, USA, March 2018.

18.        X. Liu, X. Fu, B. Luo, and X. Du, “Distributed Cloud Forensic System with Decentralization and Multi-participation in Proc. of the 10th EAI International Wireless Internet Conference (WICON) 2017, Tianjin, China, Dec. 2017.

19.        S. Dai, M. Liwang, Y. Liu, Z. Gao, L. Huang and X. Du, “Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things in Proc. of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, Beijing, China, Dec. 2017

20.        K. Huang, X. Zhang, X. Wang, X. Du, and R. Zhang, “EBD-MLE Enabling Block Dynamics under BL-MLE for Cloud,” in Proc. of the 16th IEEE International Conference on Ubiquitous Computing and Communications, Guangzhou, China, Dec. 2017.

21.        B. Zheng, L. Zhu, M. Shen, X. Du, et al., “Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering,” in Proc. of 9th EAI International Conference on Mobile Networks and Management (MONAMI), Melbourne, Australia, Dec. 2017.

22.        Y. Li, L. Zhu, M. Shen, F. Gao, B. Zheng, X. Du, S. Liu, and S. Yin, “CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains  in Proc. of 9th EAI International Conference on Mobile Networks and Management (MONAMI), Melbourne, Australia,  Dec. 2017.

23.        A. Burns, L. Wu, X. Du, and T. Ge, "A Novel Traceroute-based Detection Scheme for Wi-Fi Evil Twin Attacks", in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

24.        J. Liu, F. Cai, L. Wu, R. Sun, L. Zhu, and X. Du, "EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing", in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

25.        S. Chen, B. Song, J. Guo, X. Du, “An Unbalanced Data Hybrid-Sampling Algorithm Based on Multi - Information Fusion,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

26.        J. Lv, W. Yang, D. Man, X. Du, M. Yu, M. Guizani, “Wii: Device-free Passive Identity Identification via WiFi Signals,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

27.        H. Rathore, A. Al-Ali, A. Mohamed, X. Du, M. Guizani, “DLRT: Deep Learning Approach for Reliable Diabetic Treatment,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

28.        T. Belkhouja, X. Du, A. Mohamed, A. Al-Ali and M. Guizani, “New Plain-Text Authentication Secure Scheme for Implantable Medical Devices with Remote Controls,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

29.        J. Song, P. Dong, H. Zhou, T. Zheng, X. Du, M. Guizani, “A Performance Analysis Model for TCP over Multiple Heterogeneous Paths in 5G networks,” in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec 2017.

30.          Y. Su, L. Huang, M. Guizani, X. Du, A. Mohamed, “Q-Learning-based LTE-U and WiFi Coexistence Algorithm for Wireless Healthcare Systems” Proc. of the 5th International Conference on Control Engineering & Information Technology (CEIT-2017), Tunisia, Dec. 2017.

31.        T. Belkhouja, A. Mohamed, A. Al-Ali, X. Du and M. Guizani, “Using Chaotic Henon System for Symmetric Keys Generation to Encrypt Wireless Communication of Implantable Medical Devices,” in Proc. of the International Conference on Wireless Networks and Mobile Communications (WINCOM'17), Nov. 2017, Rabat, Morocco.

32.        L. Wu, X. Du, M. Guizani, and A. Mohamed, “A Review of Access Control Schemes for Implantable Medical Devices” in  Proc. of the 5th International Conference on Control & Signal Processing (CSP) 2017, Tunisia, Oct. 2017.

33.        S. Wei, X. Du, C. Hu, and C. Shan, "Predicting Vulnerable Software Components using software network graph," The 9th International Symposium on Cyberspace Safety and Security(CSS), 2017, Xi'an, China.

34.        L. Wu, X. Du, J. Wu, and B. Song, "Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks", International Conference on Computer Communication and Networks (ICCCN), Vancouver, Canada, July 2017.

35.        H. Ruan, X. Fu, X. Du, B. Luo, “Analyzing Android Application in Real-time at Kernel Level", International Conference on Computer Communication and Networks (ICCCN), Vancouver, Canada, July 2017.

36.        S. Xuan, D. Man, W. Wang, J. Zhang, W. Yang, and X. Du, “Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation,” in Proc. of International Conference on Computer Communication and Networks (ICCCN), Vancouver, Canada, July 2017.

37.        L. Yao, P. Dong, X. Du, and H. Zhang, “Security Analysis based on Petri Net for Separation Mechanisms in Smart Identifier Network,” in Proc. of IEEE ICCCN 2017 Workshop -7th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST),  July 31 -August 3, 2017, Vancouver, Canada.

38.        H. Rathore, A. Mohamed, A. Al-Ali, X. Du, M. Guizani, “A Review of Security Challenges, Attacks and Resolutions for Wireless Medical Devices,” IEEE IWCMC, June 26 - 30, 2017, Valencia, Spain.

39.        X. Huang, X. Du and B. Song, “An Effective DDoS Defense Scheme for SDN,” IEEE International Communication Conference (ICC), 2017, Paris, France.

40.        J. Xie, X. Fu, X. Du, B. Luo, and M. Guizani, “AutoPatchDroid: A Framework For Patching Inter-app Vulnerabilities In Android Application,” IEEE International Communication Conference (ICC), 2017, Paris, France.

41.        Z. Shi, M. Huang, C Zhao, L. Huang, X. Du and Y. Zhao, “Detection of LSSUAV Using Hash Fingerprint based SVDD,” IEEE International Communication Conference (ICC), 2017, Paris, France.

42.        J. Li, Z. Guan, X. Du, Z. Zhang and J. Wu, “An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing,” IEEE International Communication Conference (ICC), 2017, Paris, France.

43.        J. Liu, J. Han, L. Wu, R. Sun and X. Du, “VDAS: Verifiable Data Aggregation Scheme for Internet of Things,” IEEE International Communication Conference (ICC), 2017, Paris, France.

44.        F. Zhou, J. Jin, X. Du, B. Zhang and X. Yin, “A Calculation Method for Social Network User Credibility,” IEEE International Communication Conference (ICC), 2017, Paris, France.

45.        Z. Guan, G. Si, X. Du, P. Liu, Z. Zhang and Z. Zhou, “Protecting User Privacy Based on Secret Sharing with Fault Tolerance for Big Data in Smart Grid,” IEEE International Communication Conference (ICC), 2017, Paris, France.

46.        Y. Li, Z. Gao, L. Huang, Z. Tang, and X. Du, “A wideband spectrum data segment compression algorithm in cognitive radio networks,” to appear in Proc. of IEEE WCNC 2017, San Francisco, CA, March 19-22, 2017.

47.        J. Li, Z. Guan, X. Du, Z. Zhang, Z. Zhou, “A Low-latency Secure Data Outsourcing Scheme for Cloud-WSN,” to appear in Proc. of IEEE WCNC 2017, San Francisco, CA, March 19-22, 2017.

48.        X. Cai, B. Song and X. Du, “Large Scale Structure Optimization for Texture Synthesis,” to appear in Proc. of the 2016 Conference on Technologies and Applications of Artificial Intelligence (TAAI), Hsinchu, Taiwan, Nov. 2016. 

49.        L. Zhen, H. Qin, R. Ding, X. Sun, B. Song and X. Du, “Sounding Reference Signal Based Timing Advance Adjustment for LTE-Satellite Mobile Communication Systems,” to appear in Proc. of the 19th International Symposium on Wireless Personal Multimedia Communications (WPMC) 2016, Shenzhen, China, Nov. 2016.

50.        L. Wu, B. Brandt, X. Du, and B. Ji, “Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices”, to appear in Proc. of IEEE Conference on Communications and Network Security (IEEE CNS) 2016, acceptance rate 29% =38/131, Philadelphia, PA, Oct. 2016.[pdf]

51.        J. Lv, W. Yang, L. Gong, D. Man, and X. Du “Robust WLAN-based Indoor Fine-grained Intrusion Detection”, to appear in Proc. of IEEE GLOBECOM 2016, Washington D.C., Dec. 2016. [pdf]

52.        C. Zhao, M. Tai, L. Huang, M. Huang and X. Du “Power Optimization for Secure Communications in Full-duplex System Under Residual Self-Interference”, to appear in Proc. of IEEE GLOBECOM 2016, Washington D.C., Dec. 2016. [pdf]

53.        X. Zhu, R. Hao, H. Chi, and X. Du “Personalized Location Recommendations with Local Feature Awareness”, to appear in Proc. of IEEE GLOBECOM 2016, Washington D.C., Dec. 2016. [pdf]

54.        R. Yang, X. Fu, X. Du, and B. Luo, “Investigating Timing Channel in IaaS,” in Proc. of the 9th EAI International Conference on Mobile Multimedia Communications (MobiMedia), June 2016, Xi'An, China.

55.        H. Zhang, Z. Xu, X. Yu, and X. Du, “LPPS: Location Privacy Protection for Smartphones,” to appear in Proc. of the IEEE ICC 2016, Kuala Lumpur, Malaysia, May 2016. [pdf]

56.        D. Zhan, L. Ye, B. Fang, X. Du and S. Su, “CFWatcher: A Novel Target-based Real-time Approach to Monitor Critical Files using VMI,” to appear in Proc. of the IEEE ICC 2016, Kuala Lumpur, Malaysia, May 2016. [pdf]

57.        P. Dong, X. Du, H. Zhang, and T. Xu, “A Detection Method for a Novel DDoS Attack against SDN Controllers by Vast New Low-Traffic Flows,” to appear in Proc. of the IEEE ICC 2016, Kuala Lumpur, Malaysia, May 2016. [pdf]

58.        Z. Wang, R. Yang, X. Fu, X. Du, and L. Bin, “A Shared Memory based Cross-VM Side Channel Attacks in IaaS Cloud,” in Proc. of the IEEE INFOCOM'2016 Workshops, San Francisco, CA, April 2016.[pdf]

59.        P. Dong, X. Du, J. Sun, and H. Zhang, “Energy-Efficient Cluster Management in Heterogeneous Vehicular Networks,” in Proc. of the IEEE INFOCOM'2016 Workshops, San Francisco, CA, April 2016.[pdf]

60.        C. Bian, T. Zhao, X. Li, X. Du, and W. Yan, “Quantifying Caching Effects in Urban VANETs,” in Proc. of the IEEE WCNC 2016, Doha, Qatar, April 2016. [pdf]

61.        Z. Guan, T. Yang, and X. Du, “A Secure and Efficient Data Access Control Scheme for Cloud-Integrated Body Sensor Networks,” in Proc. of the IEEE WCNC 2016, Doha, Qatar, April 2016.[pdf]

62.        Z. Lin, L. Du, Z. Gao, L. Huang, X. Du, and M. Guizani, “Analysis of Discovery and Access Procedure for D2D Communication in 5G Cellular Network,” in Proc. of the IEEE WCNC 2016, Doha, Qatar, April 2016.[pdf]

63.        S. Liang, X. Du, and P. Dong, “Public Scene Recognition Using Mobile Phone Sensors,” in Proc. of IEEE International Conference on Computing, Networking and Communications. (ICNC) 2016, Kauai, Hawaii, USA. February 15-18, 2016.[pdf]

64.        J. Chen, Z. Lin, and X. Du, “Protecting Sink Location Against Global Traffic Monitoring Attacker,” in Proc. of IEEE International Conference on Computing, Networking and Communications. (ICNC) 2016, Kauai, Hawaii, USA. February 15-18, 2016.[pdf]

65.        L. Yao, P. Dong, T. Zheng, H. Zhang, X. Du, and M. Guizani, “Network Security Analyzing and Modeling based on Petri net and Attack tree for SDN,” in Proc. of IEEE International Conference on Computing, Networking and Communications. (ICNC) 2016, Kauai, Hawaii, USA. February 15-18, 2016.[pdf]

66.        Y. Gao, X. Fu, B. Luo, X. Du, and M. Guizani, “Haddle: a framework for investigating data leakage attacks in Hadoop,” in Proc. of IEEE GLOBECOM 2015, San Diego, CA, Dec. 2015.[pdf]

67.        Y. Sun, Y. Zhang, H. Zhang, B. Fang, and X. Du, “Geometric Routing on Flat Names for ICN,” in Proc. of IEEE GLOBECOM 2015, San Diego, CA, Dec. 2015.[pdf]

68.        P. Riesch, X. Du, H. Ling and M. Mayhew, “Face Recognition with Environment Tolerance on a Mobile Device,” in Proc. of the IEEE CS Cloud 2015, New York City, NY, Nov. 2015.[pdf]

69.        Y. Wang, H. Zhang, C. Tan, X. Du and B. Sheng, “WiGroup: A Lightweight Cellular-assisted Device-to-Device Network Formation Framework,” in Proc. of the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2015), Aug. 2015, Beijing, China.[pdf]

70.        L. Zhang, L. Wang and X. Du, “Secrecy-oriented Adaptive Clustering Scheme for Device-to-Device Communications,” in Proc. of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015), Aug. 2015, Shandong, China

71.        L. Wu, X. Du, H. Zhang, W. Yu, and C. Wang, “Effective Task Scheduling in Proximate Mobile Device based Communication Systems,” in Proc. of IEEE ICC 2015, London, UK, June 2015. [pdf]

72.        H. Zhang, Z. Zhou, Z. Xu, J. Shi, and X. Du, “CLPP: Context-aware Location Privacy Protection for Location-based Social Network,” in Proc. of IEEE ICC 2015, London, UK, June 2015.[pdf]

73.        Y. Duan, X. Fu, B. Luo, J. Shi, and X. Du, “Detective: Automatically Identify and Analyze Malware Processes in Forensic Scenarios via DLLs,” in Proc. of IEEE ICC 2015, London, UK, June 2015. [pdf]

74.        M. Su, H. Zhang, X. Du, and Q. Dai, “A Novel Stochastic-Encryption-Based P2P Digital Rights Management Scheme,” in Proc. of IEEE ICC 2015, London, UK, June 2015. [pdf]

75.        P. Dong, X. Du, T. Zheng, H. Zhang, “Improving QoS on high-speed vehicle by multipath transmission based on practical experiment”, in Proc. of IEEE Vehicular Networking Conference (VNC), 2015, Pages: 32 - 35, DOI: 10.1109/VNC.2015.7385543

76.        L. Wu, X. Du, and H. Zhang, "An Effective Access Control Scheme for Preventing Permission Leak in Android", in Proc. of International Conference on Computing, Networking and Communications (ICNC), Anaheim, CA, Feb. 2015.[pdf]

77.        A. Pawloski, L. Wu, X. Du, and L. Qian, "A Practical Approach to the Attestation of Computational Integrity in Hybrid Cloud", in Proc. of International Conference on Computing, Networking and Communications (ICNC), Anaheim, CA, Feb. 2015.[pdf]

78.        L. Wu, and X. Du, “Analyzing Mobile Phone Vulnerabilities Caused by Camera,” in Proc. of IEEE GLOBECOM 2014, Austin, TX, Dec. 2014.[pdf]

79.        Q. Zhang, H. Zhang, X. Du, et al., “Contention-based Adaptive Position Update for Intermittently Connected VANETs,” in Proc. of IEEE GLOBECOM 2014, Austin, TX, Dec. 2014.[pdf]

80.        J. Tan, X. Du, P. Hao, and Y. Wang, “Application of Text Mining for Customer Evaluations in Commercial Banking,” in Proc. of the International Conference on Communications and Networks, Shenzhen , China, Nov. 2014.[pdf]

81.        X. Yao, X. Han, and X. Du, “A Lightweight Dynamic Multicast Authentication Scheme,” in Proc. of CHINACOM 2014, Maoming, China, August 2014.[pdf]

82.        L. Wu, and X. Du, “MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones,” in Proc. of the 23rd International Conference on Computer Communications and Networks (ICCCN), Shanghai, China, August 2014.[pdf]

83.        S. Liang, X. Du, C.C. Tan, and W. Yu, “An Effective Online Scheme for Detecting Android Malware,” in Proc. of the 23rd International Conference on Computer Communications and Networks (ICCCN), Shanghai, China, August 2014.[pdf]

84.        X. Yao, X. Han, and X. Du, “A Light-Weight Certificate-Less Public Key Cryptography Based on ECC,” in Proc. of the 23rd International Conference on Computer Communications and Networks (ICCCN), Shanghai, China, August 2014.[pdf]

85.        S. Liang, and X. Du, “Permission-Combination-based Scheme for Android Mobile Malware Detection,” in Proc. of IEEE ICC 2014, Sydney, Australia, June 2014.[pdf]

86.        R. Houlihan, X. Du, C. Tan, J. Wu, and M. Guizani, “Auditing Cloud Service Level Agreement on VM CPU Speed,” in Proc. of IEEE ICC 2014, Sydney, Australia, June 2014.[pdf]

87.        X. Huang; X. Du, “Achieving big data privacy via hybrid cloud,” in Proc. of 2014 IEEE INFOCOM Workshops, Pages: 512 - 517, DOI: 10.1109/INFCOMW.2014.6849284

88.        X Yao, X Han, X Du, “A lightweight access control mechanism for mobile cloud computing,” in Proc. of 2014 IEEE INFOCOM Workshops, Pages: 380 - 385, DOI: 10.1109/INFCOMW.2014 .6849262

89.        K. Bian, J. Park, X. Du, and X. Li, “Ecology-Inspired Coexistence of Heterogeneous Wireless Networks,” in Proc. of IEEE GLOBECOM 2013, Atlanta, GA, USA, Dec. 2013.[pdf]

90.        H. Zhang, Z. Zhou, X. Du, P. Li, and X. Yu, “Practical and Privacy-assured Data Indexes for Outsourced Cloud Data,” in Proc. of IEEE GLOBECOM 2013, Atlanta, GA, USA, Dec. 2013.[pdf]

91.        H. Zhang, L. Ye, X. Du, and M. Guizani, “Protecting Private Cloud Located within Public Cloud,” in Proc. of IEEE GLOBECOM 2013, Atlanta, GA, USA, Dec. 2013.[pdf]

92.        O. Omotere, L. Qian, X. Du, “Performance Bound of Ad Hoc Device-to-Device Communications using Cognitive Radio,” in Proc. of IEEE GLOBECOM 2013 Workshop - International Workshop on Device-to-Device (D2D) Communication With and Without Infrastructure, Atlanta, GA, USA, Dec. 2013.[pdf]

93.        X. Yao, P. Geng, X. Du, “A Task Scheduling Algorithm for Multi-core Processors,” in Proc. of the 14th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'13), Taipei, Taiwan, Dec. 2013.[pdf]

94.        Y. Jiang, R. Zhang, X. Du, “A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks,” in Proc. of the 14th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'13), Taipei, Taiwan, Dec. 2013.[pdf]

95.        X. Liu, Z. Zhou, X. Du, H. Zhang, and J. Wu, “Glaucus: Predicting Computing-Intensive Program’s Performance for Cloud Customers,” in Proc. of 2013 International Conference on Intelligent Computing (ICIC 2013), Lecture Notes in Computer Sciences (LNCS) 7995, p.285-290, Nanning, Guangxi, China, July, 2013.[pdf]

96.        Q. Huang, L. Ye, X. Liu, and X. Du, “Auditing CPU Performance in Public Cloud,” in Proc. of IEEE Cloud Security Auditing Workshop, Santa Clara, CA, June 2013. [pdf]

97.        X. Huang, and X. Du, “Ensuring Data Privacy by Hybrid Cloud,” in Proc. of IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]

98.        H. Zhang, P. Li, Z. Zhou, X. Du, and W. Zhang, “A Performance Prediction Scheme for Computation-Intensive Applications on Cloud,” in Proc. of IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]

99.        S. Finley, and X. Du, “Dynamic Cache Cleaning on Android,” in Proc. of IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]

100.    X. Hei, X. Du, and S. Lin, “Two Vulnerabilities in Android OS Kernel with Tegra 2 CPU,” in Proc. of IEEE ICC 2013, Budapest, Hungary, June 2013. [pdf]

101.    X. Hei, X. Du, S. Lin, and I. Lee, “PIPAC: Patient Infusion Pattern based Access Control Scheme for Wireless Insulin Pump System,” in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]

102.    Z. Zhou, H. Zhang, X. Du, P. Li, and X. Yu, “'Prometheus: Privacy-Aware Data Retrieval on Hybrid Cloud,” in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]

103.    H. Zhang, J. Shi, L. Ye, and X. Du, “PPBDA Piracy Preventing System for BT DHT Networks,” in Proc. of IEEE INFOCOM 2013, Turin, Italy, Apr. 2013. (Acceptance rate = 17%)[pdf]

104.    L. Huang, G. Zhu, X. Du, and K. Bian, “Stable Multiuser Channel Allocations in Opportunistic Spectrum Access,” in Proc. of IEEE WCNC 2013, Shanghai, China, Apr. 2013.[pdf]

105.    D. Wang, Y. Yang, G. Zhu, and X. Du, “'Distributed Precoder Design for Inter-cell Interference Suppressing in Multi-cell MU-MIMO Systems,” in Proc. of IEEE WCNC 2013, Shanghai, China, Apr. 2013.[pdf]

106.    R. Houlihan, and X. Du, “An Effective Auditing Scheme for Cloud Computing,” in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012. [pdf]

107.    X. Huang, X. Du, X. Li, and K. Bian, “Efficient Communications in Mobile Hybrid Wireless Networks,” in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012. [pdf]

108.    M. Su, H. Zhang, X. Du, and B. Fang, “Understanding the Topologies of BitTorrent Networks: A Measurement View,” in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012. [pdf]

109.    L. Ye, H. Zhang, J. Shi, and X. Du, “Verifying Cloud Service Level Agreement,” in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012.[pdf]

110.    J. Chen, H. Zhang, B. Fang, X. Du, Y. Liu, and H. Yu, “An Efficient and Sustainable Self-healing Protocol for Unattended Wireless Sensor Networks,” in Proc. of IEEE GLOBECOM 2012, Anaheim, CA, USA, Dec. 2012.[pdf]

111.    P. Riesch, and X. Du, “An Audit-Based Privacy Preservation Scheme for the OpenID Authentication Protocol,” in Proc. of IEEE International Conference on Technologies for Homeland Security (HST), Boston, USA, Nov. 2012.[pdf]

112.    X. Hei, X. Du, and B. Song, “Two Matrices for Blakley’s Secret Sharing Scheme,” in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]

113.    X. Hei, X. Du, and B. Song, “A Distributed Login Framework for Semi-structured Peer-to-Peer Networks,” in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]

114.    J. Chen, H. Zhang, X. Du, B. Fang, Y. Liu, and H. Yu, “Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense,” in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]

115.    M. Su, H. Zhang, B. Fang, and X. Du, “DDoS Vulnerability of BitTorrent Peer Exchange Extension: Analysis and Defense,” in Proc. of IEEE ICC 2012, Ottawa, Canada, June 2012. [pdf]

116.    P. Reindl, X. Du, and K. Nygard, and H. Zhang, “Lightweight Source Anonymity in Wireless Sensor Networks,” in Proc. of IEEE GLOBECOM 2011, Houston, TX, USA, Nov. 2011. [pdf]

117.    J. Chen, H. Zhang, B. Fang, and X. Du, “Towards Efficient Anonymous Communications in Sensor Networks,” in Proc. of IEEE GLOBECOM 2011, Houston, TX, USA, Nov. 2011.[pdf]

118.    F. Kandah, W. Zhang, X. Du, and Y. Singh, “A Secure Key Management Scheme in Wireless Mesh Networks,” in Proc. of the IEEE ICC 2011, Kyoto, Japan, June 2011.[pdf]

119.    X. Hei, and X. Du, “Biometric-based Two-level Secure Access Control for Implantable Medical Devices during Emergency,” in Proc. of IEEE INFOCOM 2011, Shanghai, China, April 2011. [pdf]

120.    B. Bengfort, W. Zhang and X. Du, “Efficient Resource Allocation in Hybrid Wireless Networks,” in Proc. of IEEE WCNC 2011, Cancun, Mexico, March 2011. [pdf]

121.    P. Reindl, X. Du, and K. Nygard, “Defending Malicious Collision Attacks in Wireless Sensor Networks,” in Proc. of IEEE TrustCom 2010, Hong Kong, Dec. 2010.[pdf]

122.    X. Hei, X. Du, J. Wu, and F. Hu, “Defending Resource Depletion Attacks on Implantable Medical Devices,” in Proc. of IEEE GLOBECOM 2010, Miami, Florida, USA, Dec. 2010. [pdf]

123.    W. Zhang, X. Du, J. Wu, S. Soysa, and Y. Liu, “Near-Minimum-Energy Routing in Heterogeneous Wireless Sensor Networks,” in Proc. of IEEE GLOBECOM 2010, Miami, Florida, USA, Dec. 2010. [pdf]

124.    G. Mathew, and X. Du, “Securing Multi-Tiered Web Applications,” in Proc. of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), Beijing, China, June 2010.[pdf]

125.    P. Loree, X. Du, and K. Nygard, “An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks,” in Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009. [pdf]

126.    J. Brown, and X. Du, “Towards Efficient and Secure Rekeying for IEEE 802.16e WiMAX Networks,” in Proc. of IEEE GLOBECOM 2009, Honolulu, Hawaii, USA, Dec. 2009.

127.    X. Du, X. Liu, and Y. Xiao, “Density-Varying High-end Sensor Placement in Heterogeneous Wireless Sensor Networks”, in Proc. of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009.

128.    A. Olteanu, Y. Xiao, K. Wu, and X. Du, “An Optimal Sensor Network for Intrusion Detection”, in Proc. of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009.

129.    W. Zhang and X. Du, “Self-protecting Networking using Dynamic p-cycle Construction within Link Capacity Constraint”, in Proc. of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009.

130.    K. Kaur; X. Du; K. Nygard, “Enhanced Routing in Heterogeneous Sensor Networks”, in Proc. of 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, Pages: 569 - 574, DOI: 10.1109/ComputationWorld.2009.43

131.    Y. Xiao, A. Olteanu, K. Wu, and X. Du, “Weaving a Proper Net to Catch Large Objects,” in Proc. of IEEE GLOBECOM 2008, New Orleans, Louisiana, USA, Dec. 2008.

132.    Y. Xiao, H. Chen, Y. Zhang, X. Du, et al., “Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks,” in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008) Workshops, Beijing, China, June 2008.

133.    Y. Zhang, Y. Xiao, K. Wu, X. Du, and B. Sun, “Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks,” in Proc. of the 4th International Conference on Mobile Ad-hoc and Sensor Networks (MSN'08), Wuhan, China, Dec. 2008.

134.    X. Du, “Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks,” in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing, China, May 2008.

135.    J. Brown, and X. Du, “Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks,” in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing, China, May 2008.

136.    X. Du, M. Guizani, Y. Xiao, and H. H. Chen, “Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks,” in Proc. of IEEE International Conference on Communications (ICC 2008), Beijing, China, May 2008.

137.    Y. Xiao, X. Du, F. Hu, and J. Zhang, “A Cross-layer Approach for Frame Transmissions of MPEG-4 over the IEEE 802.11e Wireless Local Area Networks,” in Proc. of IEEE Wireless Communications and Networking Conference (WCNC) 2008, March 2008, Las Vegas, NV.

138.    J. Brown, X. Du, and K. Nygard, “An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme,” in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.

139.    X. Du, M. Guizani, Y. Xiao, and H. H. Chen, “A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks,” in Proc. of IEEE GLOBECOM, Nov. 2007, Washington, D.C.

140.    X. Du, H. H. Chen, Y. Xiao, and M. Guizani, “A Pseudo-Random Function based Key Management Scheme for Heterogeneous Sensor Networks,” in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.

141.    Y. Xiao, H. Chen, X. Du, and M. Guizani, “Paging Schemes Performance for Wireless Systems,” in Proc. of IEEE GLOBECOM 2007, Nov. 2007, Washington, D.C.

142.    X. Du, D. Mandala, C. You, and Y. Xiao, “A Boundary-Node based Localization Scheme for Heterogeneous Wireless Sensor Networks,” in Proc. of IEEE MILCOM 2007, Oct. 2007, Orlando, FL.

143.    X. Du, M. Guizani, Y. Xiao, and H. H. Chen, “A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks,” in Proc. of IEEE International Conference on Communications (ICC 2007), Glasgow, Scotland, June 2007.

144.    Y. Xiao, M. Nolen, X. Du, and J. Zhang, “Simulating MPEG-4 over the IEEE 802.11 Wireless Local Area Networks,” in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, March 2007.

145.    X. Du, Y. Xiao, S. Guizani, and H. H. Chen, “An Efficient Key Management Scheme for Heterogeneous Sensor Networks,” in Proc. of IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.

146.    X. Du, Y. Xiao, S. Guizani, and H. H. Chen, “A Secure Routing Protocol for Heterogeneous Sensor Networks,” in Proc. of IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.

147.    Y. Xiao, X. Zhang, X. Du, and J. Zhang, “Channel Allocation Algorithms for Three-tier Wireless Local Loop,” to appear in Proc. of IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.

148.    M. Naznin, X. Du, and K. Nygard, “Scheduling Duty Cycles in Differentiated Sensor Networks,” in Proc. of IASTED International Conference on Knowledge Sharing and Collaborative Engineering (KSCE), St. Thomas, Virgin Islands, USA, Nov. 2006.

149.    X. Du, M. Zhang, K. Nygard, M. Guizani, and H. H. Chen, “Distributed Decision Making Algorithm for Self-Healing Sensor Networks,” in Proc. of IEEE ICC 2006, Istanbul, Turkey, June 2006.

150.    H. H. Chen, J. Li, Y. Yang, X. Du, H. Liu and M. Guizani, “Challenges and Futuristic Perspective of CDMA Technologies: OCC-CDMA/OS for 4G Wireless Networks,” in Proc. of IEEE ICC 2006, Istanbul, Turkey, June 2006.

151.    M. Zhang, X. Du, and K. Nygard, “Improving Coverage Performance in Sensor Networks by Using Mobile Sensors,” in Proc. of IEEE MILCOM 2005, Atlantic City, NJ, Oct. 2005.

152.    X. Du and D. Wu, “Efficient Multi-Class Routing Protocol for Heterogeneous Mobile Ad Hoc Networks,” in Proc. of The Second IEEE International Conference on Broadband Networks (BroadNets 2005), pp. 698–705, Boston, MA, Oct. 2005.

153.    X. Du and F. Lin, “Efficient Energy Management Protocol for Target Tracking Sensor Network,” in Proc. of The Ninth IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), pp. 45–58, Nice, France, May 2005. (Acceptance rate: 23.5 %)

154.    X. Du, “Improving Routing in Sensor Networks with Heterogeneous Sensor Nodes,” in Proc. of IEEE VTC Spring 2005, Stockholm, Sweden, May 2005. (Acceptance rate: 40.0 %)

155.    X. Du and F. Lin, “Designing Efficient Routing Protocol for Heterogeneous Sensor Networks,” in Proc. of The 24th IEEE International Performance, Computing, and Communications Conference (IPCCC), April 2005, Phoenix, AZ. (Acceptance rate: 32.2 %)

156.    X. Du, and F. Lin, “Improving Sensor Network Performance by Deploying Mobile Sensors,” in Proc. of The 24th IEEE International Performance, Computing, and Communications Conference (IPCCC), Apr. 2005, Phoenix, AZ. (Acceptance rate: 32.2 %) 

157.    X. Du, “Secure Cell Relay Routing Protocol for Sensor Networks,” in Proc. of First IEEE Workshop on Information Assurance in Wireless Sensor Networks (WSNIA 2005), in conjunction with IPCCC 2005, Apr. 2005, Phoenix, AZ. 

158.    X. Du, “Using K-Nearest Neighbor Method to Identify Poison Message Failure,” in Proc. of IEEE GLOBECOM 2004, pp. 2113–2117, Nov., 2004, Dallas, TX. (Acceptance rate: 37.7 %)

159.    X. Du, “Toward Efficient Distributed Network Monitoring,” in Proc. of The 23rd IEEE International Performance, Computing, and Communications Conference (IPCCC), Apr., 2004, Phoenix, AZ. (Acceptance rate: 28.0 %)

160.    X. Du, “A Simulation Study of An Energy Efficient Routing Protocol for Mobile Ad Hoc Networks,” in Proc. of  The 37th Annual Simulation Symposium, Apr., 2004, Arlington, VA.

161.    X. Du, “Effective Fault Diagnosis in Communication Networks,” in Proc. of The 38th Annual Conference on Information Sciences and Systems (CISS), March 2004, Princeton University, NJ.

162.    X. Du, M. Shayman and R.A.  Skoog, “Distributed Fault Management to Prevent Network Instability from Control and Management Plane Poison Messages,” in Proc. of IEEE Military Communication (MILCOM) 2003, pp. 458–463, Boston, MA, Oct. 2003.

163.    X. Du, M. Shayman and R. Skoog, “Using Neural Networks to Identify Control and Management Plane Poison Messages,” in Proc. of The Eighth IFIP/IEEE International Symposium on Integrated Network Management (IM 2003), pp. 621-634, Colorado Spring, Colorado, Mar. 2003. (rate: 27.5 %)

164.    X. Du, M. Shayman and R. Skoog, “Markov Decision Based Filtering to Prevent Network Instability from Control Plane Poison Messages,” in Proc. of Conference on Information Sciences and Systems (CISS) 2003, Baltimore, Maryland, March 2003.

165.    X. Du, M. Shayman and R. Skoog, “Preventing Network Instability Caused by Propagation of Control Plane Poison Messages,” in Proc. of IEEE Military Communication (MILCOM), pp. 93–98, Anaheim, CA, Oct. 2002. 

166.    X. Du, M. Rozenblit and M. Shayman, “Implementation and Performance Analysis of SNMP on a TLS/TCP Base,” in Proc. of The Seventh IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), pp. 453–466, Seattle, WA, May 2001. (Acceptance rate: 28.0 %)

 

·         Peer-Reviewed Book Chapters (4)

 

1.      J. Chen and X. Du, “Wireless Security,”  Future Wireless Networks: Architectu​re, Protocols and Services, M. Guizani, H, Chen, and C. Wang (Eds.), CRC Press, Taylor & Francis Group, 2014.

2.      X. Du and Y. Xiao, “A Survey on Sensor Network SecurityWireless Sensor Networks and Applications, SECTION IV. Security, pp. 594–626, Y. Li, M. Thai, and W. Wu (Eds.), Springer, 2005.

3.      X. Du, “Backbone Quality-of-Service Routing Protocol for Heterogeneous Mobile Ad Hoc Networks,” Advances in Wireless Networks and Mobile Computing, D.-Z. Du and G. Xue (Eds.), Springer, 2006.

4.      V. K. Rayi, Y. Xiao, X. Du, B. Sun and F. Hu, “Key Management Schemes in Sensor Networks,” Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Springer, 2006.

 

 

 

 


Back to my homepage