Skip to Main Content

Xinwen Fu

Xinwen Fu
Xinwen FuAssociate Professor
  • CollegeCollege of Sciences
  • DepartmentComputer Science
  • Phone(978) 934-3623
  • EmailXinwen_Fu@uml.edu

Research Interests

Network Security and Privacy, Digital Forensics

Anonymous communication, traffic analysis, hardware security and privacy, smart device security and privacy, network forensics

Education

  • Ph D: Computer Engineering, (2005), Texas A&M University - Texax, US
    Dissertation/Thesis Title: On Traffic Analysis Attacks and Countermeasures
  • Ph D: Computer Engineering, (2005), Texas A&M University - Texas, U.S.A.
    Dissertation/Thesis Title: Dissertation: On Traffic Analysis Attacks and Countermeasures
  • MS: Electrical Engineering, (1998), Graduate School of University of Science and Technology of China - China
    Dissertation/Thesis Title: Texture Classification Based on Feature Symbol Random Field
  • MS: Electrical Engineering, (1998), Graduate School of University of Science and Technology of China - China
    Dissertation/Thesis Title: Thesis: Texture Classification Based on Feature Symbol Random Field
  • BS: Electronic & Information Engineering, (1995), Xi'an Jiaotong University - China
    Dissertation/Thesis Title: NOVELL Network and Network Database Management of the 2nd Workshop of Xi'an Switch Factory
  • BS: Electronic & Information Engineering, (1995), Xi?an Jiaotong University, China - China
    Dissertation/Thesis Title: Thesis: NOVELL Network and Network Database Management of the 2nd Workshop of Xi?an Switch Factory

Awards and Honors

  • Excellent Student Scholarship - Xiêan Jiaotong University
  • Teaching award (2011), Teaching - Department of Computer Science, UMass Lowell
  • Teaching award (2011) - Department of Computer Science, UMass Lowell
  • Best paper award (2008), Scholarship/Research - International Conference on Communications (ICC): Information and Network Security Symposium
  • Best paper award, International Conference on Communications (ICC) (2008) - International Conference on Communications (ICC): Information and Network Security Sympo- sium
  • The Merrill Hunter Award for Excellence in Research (2008) - Dakota State University
  • The Merrill Hunter Award for Excellence in Research (2008), Scholarship/Research - Dakota State University
  • 1st place, Oral Competition in the Student Research Week (2005), Scholarship/Research - Texas A&M University
  • 1st place, Oral Competition in the Student Research Week (2005) - Texas A&M University
  • Graduate Student Research Excellence Award (2004), Scholarship/Research - Department of Computer Science, Texas A&M University
  • Graduate Student Research Excellence Award (2004) - Department of Computer Science, Texas A&M University
  • 2nd Place Graduate Winner (2002) - ACM International Student Research Contest
  • 2nd Place Graduate Winner, ACM International Student Research Contest (2002), Scholarship/Research
  • Elite Scholarship (1996) - Chinese Academy of Sciences
  • Elite Scholarship (1996) - Chinese Academy of Sciences
  • Excellent Student Scholarship (1991), Scholarship/Research - Xi’an Jiaotong University

Publications

  • Victors, J., Li, M., Fu, X. (2017) "The Onion Name System," Proceedings on Privacy Enhancing Technologies 2017:1 pp. 21–41
  • Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., Zhao, W. (2016) "A Real-Time En-route Route Guidance Decision Scheme for Transportation-based Cyber-Physical Systems," IEEE Transactions on Vehicular Technology
  • Liu, B., Cao, J., Yin, J., Yu, W., Liu, B., Fu, X. (2016) "Disjoint multi mobile agent itinerary planning for big data analytics.," EURASIP Journal on Wireless Communications & Networking!!! 2016:1 pp. 1
  • Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X. (2016) "On crowd-retweeting spamming campaign in social networks," pp. 1–6
  • Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Ren, K., Fu, X. (2016) "Password extraction via reconstructed wireless mouse trajectory," IEEE Transactions on Dependable and Secure Computing 13:4 pp. 461–473
  • Zhang, B., Ren, K., Xing, G., Fu, X., Wang, C. (2016) "SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.," IEEE Transactions on Mobile Computing 15:2 pp. 432
  • Ling, Z., Luo, J., Chen, Q., Yue, Q., Yang, M., Yu, W., Fu, X. (2016) "Secure fingertip mouse for mobile devices.," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications pp. 1
  • Chen, F., Xiang, T., Fu, X., Yu, W. (2016) "User Differentiated Verifiable File Search on the Cloud," IEEE Transactions on Services Computing
  • Susanto, H., Liu, B., Kim, B.G., Zhang, H., Fu, X. (2015) "Pricing and Revenue Sharing in Secondary Market of Mobile Internet Access,"
  • Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., Lu, C. (2015) "A cloud computing based system for cyber security management," International Journal of Parallel, Emergent and Distributed Systems 30:1 pp. 29–45
  • Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., Zhao, W. (2015) "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," Computers, IEEE Transactions on 64:1 pp. 4–18
  • Yang, X., Zhao, C., Yang, S., Fu, X., McCann, J. (2015) "A Systematic Key Management mechanism for practical Body Sensor Networks," pp. 7310–7315
  • Yue, Q., Ling, Z., Yu, W., Liu, B., Fu, X. (2015) "Blind Recognition of Text Input on Mobile Devices via Natural Language Processing," pp. 19–24
  • Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W. (2015) "De-anonymizing and countermeasures in anonymous communication networks," Communications Magazine, IEEE 53:4 pp. 60–66
  • Kraunelis, J., Chen, Y., Ling, Z., Fu, X., Zhao, W. (2015) "EAI Endorsed Transactions,"
  • Zhu, D., Yang, X., Yu, W., Lu, C., Fu, X. (2015) "INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks," pp. 3666–3671
  • Xiang, T., Sun, J., Fu, X. (2015) "On the security of binary arithmetic coding based on interval shrinking," Multimedia Tools and Applications pp. 1–14
  • Chen, S., Li, M., Ren, K., Fu, X., Qiao, C. (2015) "Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing," pp. 59–71
  • Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X. (2015) "TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor," Information Forensics and Security, IEEE Transactions on 10:12 pp. 2515–2530
  • Susanto, H., Liu, B., Kim, B., Zhang, H., Chen, B., Zhu, J., Fu, X. (2015) "Secondary Market Mobile Users for Internet Access," pp. 81–84
  • Liu, Z., Li, Z., Liu, B., Fu, X., Ioannis, R., Ren, K. (2015) "Rise of Mini-Drones: Applications and Issues," pp. 7–12
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B., Wang, J. (2014) "Providing service assurance in mobile opportunistic networks," Computer Networks 74: pp. 114–140
  • Wu, L., Du, X., Wang, L., Fu, X., Mbouna, R.O., Kong, S.G. (2014) "Analyzing mobile phone vulnerabilities caused by camera," pp. 4126–4130
  • Saipulla, A., Cui, J., Fu, X., Liu, B., Wang, J. (2014) "Barrier coverage: Foundations and design," Springer Berlin Heidelberg pp. 59–115
  • Yue, Q., Ling, Z., Liu, B., Fu, X., Zhao, W. (2014) "Blind Recognition of Touched Keys: Attack and Countermeasures," arXiv preprint arXiv:1403.4829
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B. (2014) "CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices," pp. 164–171
  • Liu, Z., Chen, Y., Liu, B., Cao, C., Fu, X. (2014) "HAWK: An unmanned mini-helicopter-based aerial wireless kit for localization," Mobile Computing, IEEE Transactions on 13:2 pp. 287–298
  • Yue, Q., Ling, Z., Fu, X., Liu, B., Yu, W., Zhao, W. (2014) "My Google Glass Sees Your Passwords!,"
  • Zhu, D., Yang, X., Yu, W., Fu, X. (2014) "Network coding versus traditional routing in adversarial wireless networks," Ad Hoc Networks 20: pp. 119–131
  • Kraunelis, J., Chen, Y., Ling, Z., Fu, X., Zhao, W. (2014) "On Malware Leveraging the Android Accessibility Framework," Springer International Publishing pp. 512–523
  • Bhattarai, S., Rook, S., Ge, L., Wei, S., Yu, W., Fu, X. (2014) "On simulation studies of cyber attacks against lte networks," pp. 1–8
  • Kurunji, S., Ge, T., Fu, X., Liu, B., Kumar, A., Chen, C. (2014) "Optimizing aggregate query processing in cloud data warehouses," The International Conference on Data Management in Cloud, Grid and P2P Systems pp. 1-12
  • Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C., Fu, X. (2014) "Privacy-preserving outsourcing of image global feature detection," pp. 710–715
  • Zhang, B., Ren, K., Xing, G., Fu, X., Wang, C. (2014) "SBVLC: Secure barcode-based visible light communication for smartphones," pp. 2661–2669
  • Wu, L., Du, X., Fu, X. (2014) "Security threats to mobile multimedia applications: Camera-based attacks on mobile phones," Communications Magazine, IEEE 52:3 pp. 80–87
  • Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X. (2014) "TorWard: Discovery of malicious traffic over Tor," pp. 1402–1410
  • Yu, W., Ge, L., Xu, G., Fu, X. (2014) "Towards Neural Network Based Malware Detection on Android Mobile Devices," Springer International Publishing pp. 99–117
  • Chen, F., Xiang, T., Fu, X., Yu, W. (2014) "Towards verifiable file search on the cloud," pp. 346–354
  • Yue, Q., Ling, Z., Fu, X., Liu, B., Ren, K., Zhao, W. (2014) "Blind Recognition of Touched Keys on Mobile Devices," pp. 1403–1414
  • Kaushik, B., Brunette, M., Fu, X., Liu, B. (2014) "Customizable, Scalable and Reliable Community based Mobile Health Interventions," 4th ACM MobiHoc Workshop on Pervasive Wireless Healthcare (MobileHealth), in conjunction with ACM Mobihoc
  • Kurunji, S., Ge, T., Fu, X., Liu, B., Chen, C. (2013) "Optimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses," International Journal of Grid and High Performance Computing (IJGHPC) 5:4 pp. 113–130
  • Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W. (2012) "A Context-Aware Privacy Protection System for Location-Based Services," Computer Networks - Elsevier 56:11 pp. 2551-2568
  • Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W. (2012) "A New Cell Counting Based Attack Against Tor," IEEE/ACM Transactions on Networking (ToN) 20:4 pp. 1245-1261
  • Fu, X., Yang, X., Lin, J., Moulema, P., Yu, W., Zhao, W. (2012) "A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems," Proceedings of IEEE ICDCS
  • Fu, X., Ling, Z., Luo, J., Zhang, Y., Yang, M., Yu, W. (2012) "A Novel Network Delay Based Side-Channel Attack: Modeling and Defense," Proceedings of Infocom
  • Fu, X., Ling, Z., Chen, Y., Liu, B., Wang, J. (2012) "Aerial Localization with Smartphone," Proceedings of WASA
  • Jia, W., Tso, F.P., Ling, Z., Fu, X., Xuan, D., Yu, W. (2012) "Blind Detection of Spread Spectrum Flow Watermarks," Security and Communication Networks (SCN)
  • Fu, X., Ling, Z., Luo, J., Yu, W., Yang, M. (2012) "Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery," Proceedings of Infocom
  • Fu, X., Zhang, Y., Xia, P., Luo, J., Ling, Z., Liu, B. (2012) "Fingerprint Attack against Touch-Enabled Devices," Proceedings of Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
  • Fu, X., Liu, Z., Chen, Y., Liu, B., Cao, C. (2012) "Hawk: An Unmanned Mini Helicoptor-Based Aerial Wireless Kit for Localization," Proceedings of Infocom
  • Yang, X., Fan, X., Yu, W., Fu, X., Yang, S. (2012) "HLLS: A History information based Light Location Service for MANETs," Computer Networks - Elsevier 56:2 pp. 731-744
  • Fu, X., Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Ren, K. (2012) "How Privacy Leaks from Bluetooth Mouse," 20th Annual Network & Distributed System Security Symposium (NDSS)
  • Fu, X., Graham, S., Guan, Y. (2012) "Location Privacy in Wireless Networks," American Scientific Publishers
  • Ling, Z., Luo, J., Yu, W., Fu, X., Jia, W., Zhao, W. (2012) "Protocol-level attacks against Tor," Computer Networks
  • Fu, X., Zhang, N., Pingley, A., Yu, W., Wang, J., Zhao, W. (2012) "The Digital Marauder's Map: A WiFi Forensic Positioning Tool," IEEE Transactions on Mobile Computing (TMC) 11:3 pp. 377-389
  • Fu, X., Huang, J., Ling, Z., Xiang, T., Wang, J. (2012) "When Digital Forensic Research Meets Laws," Proceedings of International Workshop on Network Forensics, Security and Privacy (NFSP)
  • Fu, X., Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N. (2012) "DEMO: How Privacy Leaks from Bluetooth Mouse," 19th ACM Conference on Computer and Communications Security
  • Huang, J., Chen, Y., Ling, Z., Choo, K., Fu, X. (2012) "A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation," Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12)
  • Fu, X., Ling, Z., Jia, W., Yu, W., Xuan, D., Luo, J. (2012) "Novel Packet Size Based Covert Channel Attacks against Anonymizer," IEEE Transactions on Computers (TC)
  • Pan, X., Huang, J., Ling, Z., Lu, B., Fu, X. (2012) "Long PN Code Based Traceback in Wireless Networks," International Journal of Performability Engineering (IJPE) 8:2 pp. 173-182
  • Fu, X., Gauvin, W., Chen, C., Liu, B. (2011) "Classification of Commercial and Personal Profiles on MySpace," Proceedings of 3rd IEEE International Workshop on Security and Social Networking (SESOC)
  • Fu, X., Jin, X., Dan, M., Zhang, N., Yu, W., Das, S.K. (2011) "Game Theory for Infrastructure Security - The Power of Intent-Based Adversary Models,"
  • Fu, X., Chen, Y., Liu, Z., Liu, B., Zhao, W. (2011) "Identifying Mobiles Hiding behind Wireless Routers," Proceedings of Infocom
  • Fu, X., Huang, J., Pan, X., Wang, J. (2011) "Long PN Code Based DSSS Watermarking," Proceedings of Infocom
  • Fu, X., Ling, Z., Jia, W., Yu, W., Xuan, D. (2011) "Novel Packet Size Based Covert Channel Attacks against Anonymizer," Proceedings of Infocom Mini-Conference
  • Fu, X., Pingley, A., Zhang, N., Choi, H., Subramaniam, S., Zhao, W. (2011) "Protection of Query Privacy for Continuous Location Based Services," Proceedings of Infocom
  • Fu, X., Lin, J., Yang, X., Yu, W. (2011) "Towards Effective En-route Filtering against Injected False Data in Wireless Sensor Networks," Proceedings of IEEE GLOBECOM - Communication & System Security
  • Fu, X., Yu, W., Zhang, N., Rivera, B. (2011) "Evolution of Widely-Spread Worms and Countermeasures: Epidemic Theory and Application,"
  • Fu, X., Liu, Z., Chen, Y., Liu, B. (2011) "HAWK: An Unmanned Mini Helicoptor-Based Aerial Wireless Kit for Search, Rescue, and Surveillance," ACM Annual International Conference on Mobile Computing and Networking
  • Fu, X., Yang, X., Lin, J., Yu, W., Chen, G., Blasch, E.P. (2011) "On Situational Aware En-Route Filtering against Injected False Data in Cyber Physical Networks," IGI-Global
  • Fu, X., Ling, Z., Luo, J., Yu, W. (2011) "Equal-Sized Cells Mean Equal-Sized Packets in Tor?," Proceedings of ICC Communication and Information System Security Symposium
  • Fu, X., Chen, Y., Liu, Z., Ding, Y. (2011) "On Sampling Signal Strength for Localization Using a Directional Antenna," Proceedings of IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
  • Huang, Y., Yang, X., Yang, S., Yu, W., Fu, X. (2011) "A Cross Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks," IEEE Transactions on Vehicular Technology (TVT) 60:3 pp. 1045-1058
  • Fu, X., Pingley, A., Pan, X., Zhang, N. (2011) "Bluetooth Mice Can Leak Your Passwords!," Hakin9
  • Chen, C., Gauvin, W., Fu, X., Liu, B. (2011) "Classification of Commercial and Personal Profiles on MySpace," Percom
  • Fu, X., Wang, J., Chen, Y., Wang, J., Yu, W., Zhang, N. (2010) "3DLoc: Three Dimensional Wireless Localization Toolkit," Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Zhu, Y., Fu, X., Graham, B., Bettati, R., Zhao, W. (2010) "Correlation-Based Traffic Analysis Attacks on Anonymity Networks," IEEE Transactions on Parallel and Distributed Systems 21:7 pp. 954-967
  • Fu, X., Ling, Z., Yu, W., Luo, J. (2010) "Cyber Crime Scene Investigation (C²SI) through Cloud Computing," Proceedings of First ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC)
  • Fu, X., Liu, Z., Chen, Y., Yu, W. (2010) "Generic Network Forensic Data Acquisition from Household and Small Business Wireless Routers," Proceedings of First International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
  • Fu, X., Zhang, N., Yu, W., Das, S. (2010) "gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity," Proceedings of Conference on Decision and Game Theory for Security (GameSec)
  • Fu, X., Fan, X., Yang, X., Yu, W. (2010) "HLLS: A History Information Based Light Location Service for MANETs," Proceedings of IEEE International Conference on Communications (ICC)
  • Yu, W., Zhang, N., Fu, X., Bettati, R., Zhao, W. (2010) "Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures," IEEE Transactions on Computers 59:12 pp. 1655-1668
  • Zhang, N., Yu, W., Fu, X., Das, S.K. (2010) "Maintaining the Defender's Reputation in Anomaly Detection Against Insider Attacks," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics (SMC-B) 40:3 pp. 597-611
  • Yu, W., Zhang, N., Fu, X., Zhao, W. (2010) "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis," IEEE Transactions on Parallel and Distributed Systems (TPDS) 21:10 pp. 1501-1514
  • Fu, X., Saipulla, A., Liu, B., Xing, G., Wang, J. (2010) "Barrier Coverage with Sensors of Limited Mobility," Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
  • Fu, X., Ling, Z., Luo, J., Yu, W., Xuan, D., Jia, W. (2009) "A New Cell Counter Based Attack against Tor," Proceedings of 16th ACM Conference on Computer and Communications Security (CCS)
  • Yu, W., Wang, X., Fu, X., Xuan, D., Zhao, W. (2009) "An Invisible Localization Attack to Internet Threat Monitors," IEEE Transactions on Parallel and Distributed Systems (TPDS) 20:11 pp. 1611-1625
  • Fu, X., Zhang, N., Song, M., Yu, W. (2009) "Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services," Proceedings of Workshop on Social Networks, Applications and Systems (SNAS)
  • Fu, X., Yu, W., Jiang, S., Graham, S., Guan, Y. (2009) "TCP Performance in Flow-Based Mix Networks: Modeling and Analysis," IEEE Transactions on Parallel and Distributed Systems (TPDS) 20:5 pp. 695-709
  • Fu, X. (2009) "Traffic Analysis Attacks and Countermeasures - Pattern Recognition Based Methodology," VDM Publishing
  • Fu, X., Gauvin, W., Liu, B., Wang, J. (2009) "Utopia: Providing Trusted Social Network Relationships within an Un-Trusted Environment," Proceedings of Workshop on Social Networks, Applications and Systems (SNAS)
  • Fu, X., Guan, Y., Zhao, W. (2009) "Forensic Analysis Techniques for Tracing Anonymous Cyber Criminals," ARO Workshop on Digital Forensics
  • Fu, X., Zhang, N., Pingley, A., Yu, W., Wang, J., Zhao, W. (2009) "The Digital Marauder's Map: A New Threat to Location Privacy in Wireless Networks," Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Pingley, A., Yu, W., Zhang, N., Zhao, W. (2009) "CAP: A Context-Aware Privacy Protection System for Location-Based Services," Proceedings of the 29th IEEE International Conference on Distributed computing Systems (ICDCS)
  • Fu, X., Jia, W., Tso, F., Ling, Z., Xuan, D., Yu, W. (2009) "Blind Detection of Spread Spectrum Flow Watermarks," Proceedings of the 28th Conference on Computer Communications (Infocom)
  • Fu, X., Ling, Z. (2009) "One Cell is Enough to Break Tor's Anonymity," Proceedings of Black Hat DC
  • Lee, J., Yu, W., Fu, X. (2008) "Energy-Efficient Target Detection in Sensor Networks using Line Proxies," International Journal of Communication Systems 21:3 pp. 251-275
  • Zhu, Y., Fu, X., Bettati, R. (2008) "On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks," International Journal of Network Security (IJNS) 7:1 pp. 130-140
  • Fu, X., Zhang, N., Yu, W., Das, S.K. (2008) "Towards Effective Defense against Insider Attacks: The Establishment of Defenders Reputation," Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
  • Fu, X., Yu, W., Zhang, N., Bettati, R., Zhao, W. (2008) "On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework," Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Performance and Dependability Symposium (PDS)
  • Fu, X., Pries, R., Yu, W., Zhao, W. (2008) "A New Replay Attack against Anonymous Communication Networks," Proceedings of the IEEE International Conference on Communications (ICC) - Information and Network Security Symposium
  • Fu, X., Pries, R., Yu, W., (2008) "On Performance Bottleneck of Anonymous Communication Networks," Proceedings of the 22nd IEEE International Parallel and Distributed Pricessing Symposium (IPDPS)
  • , X., Wang, X., Yu, W., Xuan, D., Zhao, W. (2008) "iLOC: An Invisible LOCilization Attack to Internet Threat Monitoring Systems," Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM)
  • Fu, X., Zhu, Y., Bettati, R., Zhao, W. (2007) "Analysis of Flow-Correlation Attacks in Anonymity Network," Special Issue of International Journal of Security and Networks (IJSN) 2:1/2 pp. 137-153
  • Fu, X., Graham, S., Lu, B. (2007) "Network Security Fundamentals," John Wiley & Sons, Inc.
  • Fu, X., Yu, W., Zou, X., Streff, K., Graham, S. (2007) "On Recognizing Virtual Honeypots and Countermeasures," Journal of Autonomic and Trusted Computing (JoATC)
  • Fu, X., Jiang, S., Yu, W., Graham, S., Guan, Y. (2007) "On TCP Performance in Flow-Based Mix Networks," Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
  • Fu, X., Yu, W., Graham, S., Xuan, D., Zhao, W. (2007) "DSSS-Based Flow Marking Technique for Invisible Traceback," Proceedings of IEEE Symposium on Security and Privacy (S&P)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2007) "On Flow Marking Attacks in Wireless Anonymous Communication Networks," Journal of Ubiquitous Computing and Intelligence (JUCI) 1:1 pp. 42-53
  • Fu, X., Wang, X., Yu, W., Champion, A., Xuan, D. (2006) "Detecting Worms via Mining Dynamic Program Execution," Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm)
  • Fu, X., Yu, W., Cheng, D., Tan, X., Streff, K., Graham, S. (2006) "On Recognizing Virtual Honeypots and Countermeasures," Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
  • Fu, X., Streff, K., Rajagopalan, A. (2006) "ABC: Adaptive Bank-Transaction Camouflaging Systems," Proceeding of the International Conference on i-Warfare and Security (ICIW)
  • Fu, X., Xu, H., Zhu, Y., Bettati, R., Chen, J., Zhao, W. (2005) "SAS: A Scalar Anonymous Communication System," Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC)
  • Fu, X., Zhu, Y., Bettati, R., Zhao, W. (2005) "Anonymity Analysis of Mix Networks against Flow-Correlation Attacks," Proceedings of Globecom Computer & Network Security
  • Fu, X., Zhu, Y., Bettati, R. (2005) "On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks," Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA)
  • Fu, X., Graham, B., Zhu, Y., Bettati, R. (2005) "Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures," Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2005) "On Flow Marking Attacks in Wireless Anonymous Communication Networks," Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Graham, B., Xuan, D., Bettati, R., Zhao, W. (2004) "Empirical and Theoretical Evaluation of Active Probing Attacks and their Countermeasures," Proceedings of the 6th Information Hiding Workshop (IHW)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2004) "On Flow Correlation Attacks and Countermeasures in Mix Networks," Proceedings of Workshop on Privacy Enhancing Technologies (PET)
  • Guan, Y., Fu, X., Bettati, R., Zhao, W. (2004) "A Quantitative Analysis of Anonymous Communications," IEEE Transactions on Reliability 53:1 pp. 103-115
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "Active Traffic Analysis Attacks and Countermeasures," Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC)
  • Fu, X., Graham, B., Xuan, D., Bettati, R., Zhao, W. (2003) "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks," Proceedings of the International Conference on Parallel Processing (ICPP)
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "On Countermeasures to Traffic Analysis Attacks," Proceedings of the 4th IEEE SMC Information Assurance Workshop
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks," Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Graham, B., Guan, Y., Bettati, R., Zhao, W. (2003) "NetCamo: Camouflaging Network Traffic for Real-Time Applications," Proceedings of Texas Workshop on Security of Information Systems
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "Hiding Role Assignment for Mission Critical Collaborative Systems," Quality and Reliability Engineering International, Special Issue on Computer Network Security 18:3 pp. 201-216
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "An Optimal Strategy for Anonymous Communication Protocols," Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "Modeling and Optimizing Anonymous Communication Protocols," 3rd Annual IEEE Information Assurance Workshop - Poster Session II
  • Fu, X., Guan, Y., Graham, B., Bettati, R., Zhao, W. (2002) "Using Parasite Flows to Camouflage Flow Traffic," Proceedings of the 3rd IEEE SMC Information Assurance Workshop
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2001) "A Quantitative Analysis of Anonymous Communications," 10th USENIX Security Symposium - Works in Progress Session
  • Guan, Y., Fu, X., Xuan, D., Shenoy, P.U., Bettati, R., Zhao, W. (2001) "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications," IEEE Transactions on Systems, Man, and Cybernetics, Special Issue on Information Assurance 31:4 pp. 253-265
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2000) "Efficient Traffic Comouflaging in Mission Critical QoS-Guaranteed Networks," Proceedings of the 1st IEEE SMC Information Assurance Workshop
  • Fu, X., Zhang, M., Li, X. (1999) "A Method of Texture Matching Based on Feature Symbol Random Field Created by Wavelet," China Journal of Image and Graphics 4:3 pp. 243-247
  • Fu, X., Ma, X., Hou, C. (1998) "Texture Classification Based on Feature Symbol Random Field," Proceedings of the 4th International Conference on Signal Processing (ICSP)
  • Fu, X., Zhang, M., Li, X. (1998) "A Method of Texture Classification Based on Vector Quantization," Proceedings of the 9th Graphics and Image Technology Conference

Presentations

  • \ - EEE International Conference on Communications (ICC),
  • - IEEE GlobeCom,
  • - IEEE GlobeCom 05, 06, 07, 08,
  • . IEEE Infocom 6. IEEE International Conference on Distributed Computing Systems (ICDCS) - IEEE Infocom,
  • - IEEE International Conference on Communications (ICC),
  • - IEEE International Conference on Distributed Computing Systems (ICDCS),
  • IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) - IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),
  • - IEEE Real-Time Symposium,
  • - IEEE Real-Time Systems Symposium (RTSS),
  • - International Conference on Information Warfare and Security,
  • International Conference on Information Warfare and Security (ICIW06, 07) - International Conference on Information Warfare and Security,
  • - International Conference on Parallel Processing (ICPP),
  • - International Conference on Parallel Processing (ICPP),
  • - International Symposium on Ubisafe Computing (UbiSafe07),
  • International Workshop on Smart Home (IWSH06) - International Workshop on Smart Home,
  • - Ubiquitous Computing and Intelligence (UCI07),
  • Third Party Wireless Localization: Theory and Implementation - Third Party Wireless Localization: Theory and Implementation, April 2012 - HP Labs, Palo Alto, CA
  • Third Party Wireless Localization: Theory and Implementation - HP Labs, April 2012 - Alto, CA
  • - Third Party Wireless Localization: Theory and Implementation, Ericsson Research, March 2012 - San Jose, CA
  • Third Party Wireless Localization: Theory and Implementation, March 2012 - San Jose, CA
  • CSI-WLAN: Wireless Network Crime Scene Investigation, IIT (Illinois Institute of Technology) - CSI-WLAN: Wireless Network Crime Scene Investigation, IIT (Illinois Institute of Technology), April 2011 - (Illinois Institute of Technology)
  • - Wireless Network Crime Scene Investigation, April 2011 - Southeast University
  • CSI-WLAN: Wireless Network Crime Scene Investigation, April 2011 - IL
  • Wireless Network Crime Scene Investigation, April 2011
  • 3DLoc: Three Dimensional Wireless Localization Toolkit, The 30th International Conference on Distributed Comput- ing Systems - 3DLoc: Three Dimensional Wireless Localization Toolkit, The 30th International Conference on Distributed Computing Systems, June 2010 - Genoa, Italy
  • 3DLoc: Three Dimensional Wireless Localization Toolkit - The 30th International Conference on Distributed Computing Systems, June 2010 - Genoa, Italy
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics - 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, April 2010 - University of Connecticut
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, April 2010 - CT
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics - 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, March 2010 - George Washington University
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, ECE Colloquia. - 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, ECE Colloquia, March 2010 - University of Massachusetts Dartmouth
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics - ECE Colloquia, March 2010 - Dartmouth, MA
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, March 2010 - Washington, D.C.
  • One Cell is Enough to Break Torês Anonymity - One Cell is Enough to Break Torês Anonymity, 2009
  • A New Cell Counter Based Attack Against Tor - A New Cell Counter Based Attack Against Tor, November 2009
  • A New Cell Counter Based Attack Against Tor - ECE Graduate Seminar Lecture Series, November 2009 - Worcester Polytechnic Institute
  • A New Cell Counter Based Attack against Tor - ACM Comference on Computer and Communications Security, November 2009
  • A New Cell Counter Based Attack against Tor - ECE Graduate Seminar Lecture Series, November 2009 - Worcester, MA
  • Forensic Analysis Techniques for Tracing Anonymous Cyber Criminals - ARO Workshop on Digital Forensics, September 2009 - Washington, D.C.
  • - The Digital Marauderês Map, September 2009 - Miami, FL
  • The Digital Marauder's Map - Hacker Halted USA, September 2009 - Miami, FL
  • Forensic Analysis Techniques for Tracing Anonymous Cyber Criminals - ARO Workshop on Digital Forensics, September 2009 - Washington, D.C.
  • A New Cell Counter Based Attack against Tor (Are Equal-sized Cells Equal?), Department of Computing, Hong Kong Polytechnic University, Aug. 25, 2009 - A New Cell Counter Based Attack against Tor (Are Equal-sized Cells Equal?), August 2009 - Hong Kong Polytechnic University
  • The Digital Marauderês Map - The Digital Marauderês Map, August 2009 - Southeast University, China
  • A New Cell Counter Based Attack against Tor (Are Equal-Sized Cells Equal?), August 2009 - Hong Kong
  • The Digital Marauder's Map, August 2009 - China
  • Blind Detection of Spread Spectrum Flow Watermarks - Infocom 2009, May 2009 - Rio de Janeiro, Brazil
  • Blind Detection of Spread Spectrum Flow Watermarks - Infocom 2009, April 2009 - Rio de janeiro, Brazil
  • One Cell is Enough to Break Torês Anonymity - One Cell is Enough to Break Torês Anonymity, February 2009 - George Mason University
  • One Cell is Enough to Break Tor's Anonymity, February 2009 - Fairfax, VA
  • One Cell is Enough to Break Tor's Anonymity - Black Hat DC 2009, February 2009
  • - IEEE Infocom (Infocom08), 2008
  • - IEEE Infocom (Infocom08), 2008
  • A New Replay Attack Against Anonymous Communication Networks, ICC, May 21, 2008 - A New Replay Attack Against Anonymous Communication Networks, May 2008
  • A New Replay Attack against Anonymous Communication Networks - ICC, May 2008
  • On TCP Performance in Flow Based Anonymous Communication Networks - IEEE International Symposium on De- pendable, Autonomic and Secure Computing (DASC), 2007
  • On TCP Performance in Flow Based Anonymous Communication Networks - IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2007
  • DSSS-Based Flow Marking Technique for Invisible Traceback - IEEE Symposium on Security and Privacy (S&P), 2007 - Oakland, California
  • DSSS-Based Flow Marking Technique for Invisible Tracebacks - IEEE Symposium on Security and Privacy (S&P), 2007 - Oakland, CA
  • IEEE Wireless and Communications and Networking Conference (WCNC07) - IEEE Wireless and Communications and Networking Conference, 2007
  • - IEEE Wireless and Communications and Networking Conference (WCNC07), 2007
  • - International Conference on Information Warfare and Security, 2007
  • - The 28th IEEE Real-Time Systems Symposium, 2007
  • - The 28th IEEE Real-Time Systems Symposium (RTSS), 2007
  • Ubiquitous Computing and Intelligence (UCI07) - Ubiquitous Computing and Intelligence (UCI07), 2007
  • Location Privacy in Wireless Networks - Location Privacy in Wireless Networks, October 2007 - Dakota State University
  • Location Privacy in Wireless Networks - Faculty Development at Dakota State University, October 2007
  • On Recognizing Virtual Honeypots and Countermeasures - IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006
  • On Recognizing Virtual Honeypots and Countermeasures - IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006
  • - International Conference on High Performance Computing and Communications, 2006
  • - International Conference on i-Warfare and Security (ICIW), 2006
  • - International Conference on i-Warfare and Security (ICIW), 2006
  • - International Workshop on Smart Home (IWSH06), 2006
  • On Recognizing Virtual Honeypots and Countermeasures - On Recognizing Virtual Honeypots and Countermeasures, 2006
  • Camouflaging Virtual Honeypots - Camouflaging Virtual Honeypots, April 2006 - North Dakota State University, ND
  • Camouflaging Virtual Honeypots, April 2006
  • - Faculty Research and Education Seminar Hour (FRESH), February 2006
  • - Faculty Research and Education Seminar Hour (FRESH), February 2006
  • - International Conference on Distributed Computing Systems (ICDCS), 2005
  • - International Conference on Distributed Computing Systems (ICDCS), 2005
  • - SMC Information Assurance Workship (IAW), 2003
  • - SMC Information Assurance Workshop (IAW), 2003
  • - ACM International Student Research Contest, 2002
  • . ACM International Student Research Contest, 2002 - ACM International Student Research Contest, 2002
  • - SMC Information Assurance Workship (IAW), 2002
  • - SMC Information Assurance Workshop (IAW), 2002

Contracts, Fellowships, Grants and Sponsored Research

  • TC: Small: Collaborative Research: Membership Inference in a Differentially Private World and Beyond (2011), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • I-Corps: Commercialization Feasibility Research and Demonstration Preparation for Third-Party Localization Toolkits (2012), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • II-New: A Network Forensics Lab for Integrated Research and Education at University of Massachusetts Lowell (2010), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Creating Learning Materials and Strategies for Network Forensics Education (2010), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Collaborative Research: EAGER: Novel Theoretical Foundation for Wireless Positioning in Challenging Environments (2009), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Center for Cyber Forensics (2010), Grant - University of Massachusetts Lowell
    Fu, X.
  • Collaborative Research: WN: Proper Location Identification in Wireless Networks (2007), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • MRI: Acquisition of Equipment to Establish an Information Assurance Infrastructure for Research and Education at Dakota State University (2007), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • A New Replay Attack Against Anonymous Communication Networks (2007), Grant - Faculty Research Initiative Grant at Dakota State University
    Fu, X.
  • Effectively and Efficiently Tracking Malicious Use of Anonymous Communication (2006), Grant - South Dakota Governor Individual Research Seed Grant Program
    Fu, X. (Principal)
  • South Dakota Health Information Security and Privacy Study (Senior Personnel) (2006), Grant - South Dakota Department of Health
    Fu, X.
  • Improving TCP Performance in Flow Based Anonymous Communication Networks (2007), Grant - Faculty Research Initiative Grant at Dakota State University
    Fu, X. (Principal)
  • Traffice Analysis Attacks and Countermeasures (2007), Grant - Proposal Initiative Award at Dakota State University
    Fu, X.
  • Measuring and Improving Anonymous Network Performance (2006), Grant - Student Research Initiative Awards at Dakota State University
    Fu, X.
  • Faculty Research Initiative Grants - Camouflaging Virtual Honeypots (2005), Grant - Dakota State University
    Fu, X. (Principal)
  • Political Data Mining and Voter Decision Support Systems: Implementation and Security Research (2005), Grant - Student Research Initiative Awards at Dakota State University
    Fu, X.