2009 | ||
---|---|---|
39 | Qing Chen, Xiaodong Lin, Sherman Shen, Kazuo Hashimoto, Nei Kato: A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. GLOBECOM 2009: 1-5 | |
38 | Xiaodong Lin: CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks. GLOBECOM 2009: 1-6 | |
37 | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen: SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. INFOCOM 2009: 1413-1421 | |
36 | Xiaodong Lin, Rongxing Lu, Xuemin Shen, Y. Nemoto, N. Kato: Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications 27(4): 365-378 (2009) | |
35 | Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino: A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009) | |
2008 | ||
34 | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Pin-Han Ho: BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. GLOBECOM 2008: 1882-1886 | |
33 | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ICC 2008: 1436-1440 | |
32 | Chenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han Ho: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. ICC 2008: 1451-1457 | |
31 | Rongxing Lu, Xiaodong Lin, Chenxi Zhang, Haojin Zhu, Pin-Han Ho, Xuemin Shen: AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. ICC 2008: 1499-1504 | |
30 | Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen: Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ICC 2008: 1530-1535 | |
29 | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. INFOCOM 2008: 1229-1237 | |
28 | Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. INFOCOM 2008: 246-250 | |
27 | Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin, Pin-Han Ho: A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC 2008: 1069-1074 | |
26 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin: RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626 | |
25 | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Chenxi Zhang, Pin-Han Ho, Xuemin Shen: A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. WCNC 2008: 3237-3242 | |
24 | Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248 | |
23 | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications 7(10): 3858-3868 (2008) | |
22 | Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zhang, Pin-Han Ho, Xuemin Shen: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Transactions on Wireless Communications 7(12-1): 4987-4998 (2008) | |
21 | Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008) | |
20 | Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho, Xuemin Shen: A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. IJSN 3(2): 122-132 (2008) | |
19 | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008) | |
18 | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008) | |
2007 | ||
17 | Xiaodong Lin, Chenxi Zhang, Xiaoting Sun, Pin-Han Ho, Xuemin Shen: Performance Enhancement for Secure Vehicular Communications. GLOBECOM 2007: 480-485 | |
16 | Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen: Secure Localized Authentication and Billing for Wireless Mesh Networks. GLOBECOM 2007: 486-491 | |
15 | Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen: Two-Factor Localized Authentication Scheme for WLAN Roaming. ICC 2007: 1172-1178 | |
14 | Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253 | |
13 | Xiaoting Sun, Xiaodong Lin, Pin-Han Ho: Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. ICC 2007: 1539-1545 | |
12 | Xingquan Zhu, Peng Zhang, Xiaodong Lin, Yong Shi: Active Learning from Data Streams. ICDM 2007: 757-762 | |
11 | Xiaodong Lin, Jennifer Pittman, Bertrand Clarke: Information Conversion, Effective Samples, and Parameter Size. IEEE Transactions on Information Theory 53(12): 4438-4456 (2007) | |
2006 | ||
10 | Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen: A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. GLOBECOM 2006 | |
9 | Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen: Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154 | |
8 | Hao Helen Zhang, Jeongyoun Ahn, Xiaodong Lin, Cheolwoo Park: Gene selection using support vector machines with non-convex penalty. Bioinformatics 22(1): 88-95 (2006) | |
2005 | ||
7 | Xiaodong Lin, Chris Clifton, Michael Y. Zhu: Privacy-preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8(1): 68-81 (2005) | |
2004 | ||
6 | Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerome P. Reiter: Regression on Distributed Databases via Secure Multi-Party Computation. DG.O 2004 | |
5 | Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerome P. Reiter: Privacy preserving regression modelling via distributed computation. KDD 2004: 677-682 | |
4 | Young Truong, Xiaodong Lin, Chris Beecher: Learning a complex metabolomic dataset using random forests and support vector machines. KDD 2004: 835-840 | |
2003 | ||
3 | Jianping Fan, Hangzai Luo, Xiaodong Lin: Semantic video classification by integrating flexible mixture model with adaptive EM algorithm. Multimedia Information Retrieval 2003: 9-16 | |
2002 | ||
2 | Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu: Tools for Privacy Preserving Data Mining. SIGKDD Explorations 4(2): 28-34 (2002) | |
2000 | ||
1 | Xiaodong Lin, Johnny W. Wong, Weidong Kou: Performance Analysis of Secure Web Server Based on SSL. ISW 2000: 249-261 |