2008 | ||
---|---|---|
21 | Chenxi Wang, Xiaobo Wang, Guohong Wang: A Target Recognition Method of Multi-radar. FSKD (1) 2008: 162-166 | |
20 | Michael K. Reiter, Asad Samar, Chenxi Wang: Self-optimizing distributed trees. IPDPS 2008: 1-12 | |
19 | Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jure Leskovec, Christos Faloutsos: Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 10(4): (2008) | |
2007 | ||
18 | Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang: SWorD - A Simple Worm Detection Scheme. OTM Conferences (2) 2007: 1752-1769 | |
2006 | ||
17 | Ahren Studer, Chenxi Wang: Adaptive Detection of Local Scanners. ACNS 2006: 1-17 | |
16 | Ginger Perng, Michael K. Reiter, Chenxi Wang: M2: Multicasting Mixes for Efficient and Anonymous Communication. ICDCS 2006: 59 | |
2005 | ||
15 | Ginger Perng, Michael K. Reiter, Chenxi Wang: Censorship Resistance Revisited. Information Hiding 2005: 62-76 | |
14 | Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang: Empirical Analysis of Rate Limiting Mechanisms. RAID 2005: 22-42 | |
13 | Michael K. Reiter, Asad Samar, Chenxi Wang: Distributed Construction of a Fault-Tolerant Network from a Tree. SRDS 2005: 155-165 | |
12 | Philip Koopman, Howie Choset, Rajeev Gandhi, Bruce H. Krogh, Diana Marculescu, Priya Narasimhan, JoAnn M. Paul, Ragunathan Rajkumar, Daniel P. Siewiorek, Asim Smailagic, Peter Steenkiste, Donald E. Thomas, Chenxi Wang: Undergraduate embedded system education at Carnegie Mellon. ACM Trans. Embedded Comput. Syst. 4(3): 500-528 (2005) | |
2004 | ||
11 | Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger: Dynamic Quarantine of Internet Worms. DSN 2004: 73-82 | |
10 | Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright: Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 | |
9 | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang: A study of mass-mailing worms. WORM 2004: 1-10 | |
2003 | ||
8 | Yang Wang, Deepayan Chakrabarti, Chenxi Wang, Christos Faloutsos: Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. SRDS 2003: 25-34 | |
7 | Michael K. Reiter, Asad Samar, Chenxi Wang: The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003: 339-348 | |
6 | Yang Wang, Chenxi Wang: Modeling the effects of timing parameters on virus propagation. WORM 2003: 61-66 | |
2002 | ||
5 | Theodore M. Wong, Chenxi Wang, Jeannette M. Wing: Verifiable Secret Redistribution for Archive System. IEEE Security in Storage Workshop 2002: 94-106 | |
2001 | ||
4 | Chenxi Wang, Jonathan Hill, John C. Knight, Jack W. Davidson: Protection of Software-Based Survivability Mechanisms. DSN 2001: 193-202 | |
2000 | ||
3 | Chenxi Wang, John C. Knight, Matthew C. Elder: On Computer Viral Infection and the Effect of Immunization. ACSAC 2000: 246-256 | |
1999 | ||
2 | Chenxi Wang, William A. Wulf: Towards a Scalable PKI for Electronic Commerce Systems. WECWIS 1999: 132-136 | |
1 | Steve J. Chapin, Chenxi Wang, William A. Wulf, Frederick Knabe, Andrew S. Grimshaw: A new model of security for metasystems. Future Generation Comp. Syst. 15(5-6): 713-722 (1999) |