![]() | 2009 | |
---|---|---|
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Chen, Xiaodong Lin, Sherman Shen, Kazuo Hashimoto, Nei Kato: A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. GLOBECOM 2009: 1-5 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin: CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks. GLOBECOM 2009: 1-6 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen: SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. INFOCOM 2009: 1413-1421 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Rongxing Lu, Xuemin Shen, Y. Nemoto, N. Kato: Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications 27(4): 365-378 (2009) |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino: A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009) |
2008 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Pin-Han Ho: BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. GLOBECOM 2008: 1882-1886 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ICC 2008: 1436-1440 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han Ho: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. ICC 2008: 1451-1457 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, Xuemin Shen: AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. ICC 2008: 1499-1504 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen: Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ICC 2008: 1530-1535 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. INFOCOM 2008: 1229-1237 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. INFOCOM 2008: 246-250 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin, Pin-Han Ho: A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC 2008: 1069-1074 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Chenxi Zhang, Pin-Han Ho, Xuemin Shen: A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. WCNC 2008: 3237-3242 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications 7(10): 3858-3868 (2008) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zhang, Pin-Han Ho, Xuemin Shen: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications 7(12-1): 4987-4998 (2008) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho, Xuemin Shen: A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. IJSN 3(2): 122-132 (2008) |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008) |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008) |
2007 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Chenxi Zhang, Xiaoting Sun, Pin-Han Ho, Xuemin Shen: Performance Enhancement for Secure Vehicular Communications. GLOBECOM 2007: 480-485 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: Secure Localized Authentication and Billing for Wireless Mesh Networks. GLOBECOM 2007: 486-491 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen: Two-Factor Localized Authentication Scheme for WLAN Roaming. ICC 2007: 1172-1178 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoting Sun, Xiaodong Lin, Pin-Han Ho: Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. ICC 2007: 1539-1545 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Xingquan Zhu, Peng Zhang, Xiaodong Lin, Yong Shi: Active Learning from Data Streams. ICDM 2007: 757-762 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Jennifer Pittman, Bertrand Clarke: Information Conversion, Effective Samples, and Parameter Size. IEEE Transactions on Information Theory 53(12): 4438-4456 (2007) |
2006 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen: A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. GLOBECOM 2006 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen: Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Helen Zhang, Jeongyoun Ahn, Xiaodong Lin, Cheolwoo Park: Gene selection using support vector machines with non-convex penalty. Bioinformatics 22(1): 88-95 (2006) |
2005 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Chris Clifton, Michael Y. Zhu: Privacy-preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8(1): 68-81 (2005) |
2004 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerome P. Reiter: Regression on Distributed Databases via Secure Multi-Party Computation. DG.O 2004 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerome P. Reiter: Privacy preserving regression modelling via distributed computation. KDD 2004: 677-682 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Young Truong, Xiaodong Lin, Chris Beecher: Learning a complex metabolomic dataset using random forests and support vector machines. KDD 2004: 835-840 |
2003 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianping Fan, Hangzai Luo, Xiaodong Lin: Semantic video classification by integrating flexible mixture model with adaptive EM algorithm. Multimedia Information Retrieval 2003: 9-16 |
2002 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu: Tools for Privacy Preserving Data Mining. SIGKDD Explorations 4(2): 28-34 (2002) |
2000 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Lin, Johnny W. Wong, Weidong Kou: Performance Analysis of Secure Web Server Based on SSL. ISW 2000: 249-261 |