Skip to Main Content

Xinwen Fu

Xinwen Fu
Xinwen FuProfessor
  • CollegeCollege of Sciences
  • DepartmentComputer Science
  • Phone(978) 934-3623
  • EmailXinwen_Fu@uml.edu

Research Interests

Network Security and Privacy, Digital Forensics

Anonymous communication, traffic analysis, hardware security and privacy, smart device security and privacy, network forensics

Education

  • Ph D: Computer Engineering, (2005), Texas A&M University - Texas, U.S.A.
    Dissertation/Thesis Title: Dissertation: On Traffic Analysis Attacks and Countermeasures
  • MS: Electrical Engineering, (1998), Graduate School of University of Science and Technology of China - China
    Dissertation/Thesis Title: Thesis: Texture Classification Based on Feature Symbol Random Field
  • BS: Electronic & Information Engineering, (1995), Xi'an Jiaotong University, China - China
    Dissertation/Thesis Title: Thesis: NOVELL Network and Network Database Management of the 2nd Workshop of Xi?an Switch Factory

Biography

Xinwen Fu's research interests are in network security and privacy, information assurance, digital forensics, system reliability and networking QoS.??He has published in conferences such as the IEEE Symposium on Security and Privacy (S&P), IEEE International Conference on Computer Communications (INFOCOM), and IEEE International Conference on Distributed Computing Systems (ICDCS), journals such as IEEE Transactions on Parallel and Distributed Systems (TPDS), and book chapters.??Fu's research is supported by the National Science Foundation.

Selected Awards and Honors

  • Excellent Student Scholarship - Xiêan Jiaotong University
  • Teaching award (2011), Teaching - Department of Computer Science, UMass Lowell
  • Best paper award, International Conference on Communications (ICC) (2008) - International Conference on Communications (ICC): Information and Network Security Sympo- sium
  • The Merrill Hunter Award for Excellence in Research (2008) - Dakota State University
  • 1st place, Oral Competition in the Student Research Week (2005) - Texas A&M University
  • Graduate Student Research Excellence Award (2004), Scholarship/Research - Department of Computer Science, Texas A&M University
  • 2nd Place Graduate Winner, ACM International Student Research Contest (2002), Scholarship/Research
  • Elite Scholarship (1996) - Chinese Academy of Sciences
  • Excellent Student Scholarship (1991), Scholarship/Research - Xi’an Jiaotong University

Selected Publications

  • Victors, J., Li, M., Fu, X. (2017) "The Onion Name System," Proceedings on Privacy Enhancing Technologies 2017:1 pp. 21–41
  • Lin, J., Yu, W., Yang, X., Yang, Q., Fu, X., Zhao, W. (2016) "A Real-Time En-route Route Guidance Decision Scheme for Transportation-based Cyber-Physical Systems," IEEE Transactions on Vehicular Technology
  • Liu, B., Cao, J., Yin, J., Yu, W., Liu, B., Fu, X. (2016) "Disjoint multi mobile agent itinerary planning for big data analytics.," EURASIP Journal on Wireless Communications & Networking!!! 2016:1 pp. 1
  • Liu, B., Luo, J., Cao, J., Ni, X., Liu, B., Fu, X. (2016) "On crowd-retweeting spamming campaign in social networks," pp. 1–6
  • Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Ren, K., Fu, X. (2016) "Password extraction via reconstructed wireless mouse trajectory," IEEE Transactions on Dependable and Secure Computing 13:4 pp. 461–473
  • Zhang, B., Ren, K., Xing, G., Fu, X., Wang, C. (2016) "SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.," IEEE Transactions on Mobile Computing 15:2 pp. 432
  • Ling, Z., Luo, J., Chen, Q., Yue, Q., Yang, M., Yu, W., Fu, X. (2016) "Secure fingertip mouse for mobile devices.," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications pp. 1
  • Chen, F., Xiang, T., Fu, X., Yu, W. (2016) "User Differentiated Verifiable File Search on the Cloud," IEEE Transactions on Services Computing
  • Susanto, H., Liu, B., Kim, B.G., Zhang, H., Fu, X. (2015) "Pricing and Revenue Sharing in Secondary Market of Mobile Internet Access,"
  • Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., Lu, C. (2015) "A cloud computing based system for cyber security management," International Journal of Parallel, Emergent and Distributed Systems 30:1 pp. 29–45
  • Yang, X., Lin, J., Yu, W., Moulema, P., Fu, X., Zhao, W. (2015) "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," Computers, IEEE Transactions on 64:1 pp. 4–18
  • Yang, X., Zhao, C., Yang, S., Fu, X., McCann, J. (2015) "A Systematic Key Management mechanism for practical Body Sensor Networks," pp. 7310–7315
  • Yue, Q., Ling, Z., Yu, W., Liu, B., Fu, X. (2015) "Blind Recognition of Text Input on Mobile Devices via Natural Language Processing," pp. 19–24
  • Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W. (2015) "De-anonymizing and countermeasures in anonymous communication networks," Communications Magazine, IEEE 53:4 pp. 60–66
  • Kraunelis, J., Chen, Y., Ling, Z., Fu, X., Zhao, W. (2015) "EAI Endorsed Transactions,"
  • Zhu, D., Yang, X., Yu, W., Lu, C., Fu, X. (2015) "INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks," pp. 3666–3671
  • Xiang, T., Sun, J., Fu, X. (2015) "On the security of binary arithmetic coding based on interval shrinking," Multimedia Tools and Applications pp. 1–14
  • Chen, S., Li, M., Ren, K., Fu, X., Qiao, C. (2015) "Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing," pp. 59–71
  • Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X. (2015) "TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor," Information Forensics and Security, IEEE Transactions on 10:12 pp. 2515–2530
  • Susanto, H., Liu, B., Kim, B., Zhang, H., Chen, B., Zhu, J., Fu, X. (2015) "Secondary Market Mobile Users for Internet Access," pp. 81–84
  • Liu, Z., Li, Z., Liu, B., Fu, X., Ioannis, R., Ren, K. (2015) "Rise of Mini-Drones: Applications and Issues," pp. 7–12
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B., Wang, J. (2014) "Providing service assurance in mobile opportunistic networks," Computer Networks 74: pp. 114–140
  • Wu, L., Du, X., Wang, L., Fu, X., Mbouna, R.O., Kong, S.G. (2014) "Analyzing mobile phone vulnerabilities caused by camera," pp. 4126–4130
  • Saipulla, A., Cui, J., Fu, X., Liu, B., Wang, J. (2014) "Barrier coverage: Foundations and design," Springer Berlin Heidelberg pp. 59–115
  • Yue, Q., Ling, Z., Liu, B., Fu, X., Zhao, W. (2014) "Blind Recognition of Touched Keys: Attack and Countermeasures," arXiv preprint arXiv:1403.4829
  • Kaushik, B., Zhang, H., Yang, X., Fu, X., Liu, B. (2014) "CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices," pp. 164–171
  • Liu, Z., Chen, Y., Liu, B., Cao, C., Fu, X. (2014) "HAWK: An unmanned mini-helicopter-based aerial wireless kit for localization," Mobile Computing, IEEE Transactions on 13:2 pp. 287–298
  • Yue, Q., Ling, Z., Fu, X., Liu, B., Yu, W., Zhao, W. (2014) "My Google Glass Sees Your Passwords!,"
  • Zhu, D., Yang, X., Yu, W., Fu, X. (2014) "Network coding versus traditional routing in adversarial wireless networks," Ad Hoc Networks 20: pp. 119–131
  • Kraunelis, J., Chen, Y., Ling, Z., Fu, X., Zhao, W. (2014) "On Malware Leveraging the Android Accessibility Framework," Springer International Publishing pp. 512–523
  • Bhattarai, S., Rook, S., Ge, L., Wei, S., Yu, W., Fu, X. (2014) "On simulation studies of cyber attacks against lte networks," pp. 1–8
  • Kurunji, S., Ge, T., Fu, X., Liu, B., Kumar, A., Chen, C. (2014) "Optimizing Aggregate Query Processing in Cloud Data Warehouses," The International Conference on Data Management in Cloud, Grid and P2P Systems pp. 1-12
  • Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C., Fu, X. (2014) "Privacy-preserving outsourcing of image global feature detection," pp. 710–715
  • Zhang, B., Ren, K., Xing, G., Fu, X., Wang, C. (2014) "SBVLC: Secure barcode-based visible light communication for smartphones," pp. 2661–2669
  • Wu, L., Du, X., Fu, X. (2014) "Security threats to mobile multimedia applications: Camera-based attacks on mobile phones," Communications Magazine, IEEE 52:3 pp. 80–87
  • Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X. (2014) "TorWard: Discovery of malicious traffic over Tor," pp. 1402–1410
  • Yu, W., Ge, L., Xu, G., Fu, X. (2014) "Towards Neural Network Based Malware Detection on Android Mobile Devices," Springer International Publishing pp. 99–117
  • Chen, F., Xiang, T., Fu, X., Yu, W. (2014) "Towards verifiable file search on the cloud," pp. 346–354
  • Yue, Q., Ling, Z., Fu, X., Liu, B., Ren, K., Zhao, W. (2014) "Blind Recognition of Touched Keys on Mobile Devices," pp. 1403–1414
  • Kurunji, S., Ge, T., Fu, X., Liu, B., Chen, C. (2013) "Optimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses," International Journal of Grid and High Performance Computing (IJGHPC) 5:4 pp. 113–130
  • Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W. (2012) "A Context-Aware Privacy Protection System for Location-Based Services," Computer Networks - Elsevier 56:11 pp. 2551-2568
  • Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W. (2012) "A New Cell Counting Based Attack Against Tor," IEEE/ACM Transactions on Networking (ToN) 20:4 pp. 1245-1261
  • Fu, X., Yang, X., Lin, J., Moulema, P., Yu, W., Zhao, W. (2012) "A Novel En-Route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems," Proceedings of IEEE ICDCS
  • Fu, X., Ling, Z., Luo, J., Zhang, Y., Yang, M., Yu, W. (2012) "A Novel Network Delay Based Side-Channel Attack: Modeling and Defense," Proceedings of Infocom
  • Fu, X., Ling, Z., Chen, Y., Liu, B., Wang, J. (2012) "Aerial Localization with Smartphone," Proceedings of WASA
  • Jia, W., Tso, F.P., Ling, Z., Fu, X., Xuan, D., Yu, W. (2012) "Blind Detection of Spread Spectrum Flow Watermarks," Security and Communication Networks (SCN)
  • Fu, X., Ling, Z., Luo, J., Yu, W., Yang, M. (2012) "Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery," Proceedings of Infocom
  • Fu, X., Zhang, Y., Xia, P., Luo, J., Ling, Z., Liu, B. (2012) "Fingerprint Attack against Touch-Enabled Devices," Proceedings of Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
  • Fu, X., Liu, Z., Chen, Y., Liu, B., Cao, C. (2012) "Hawk: An Unmanned Mini Helicoptor-Based Aerial Wireless Kit for Localization," Proceedings of Infocom
  • Yang, X., Fan, X., Yu, W., Fu, X., Yang, S. (2012) "HLLS: A History information based Light Location Service for MANETs," Computer Networks - Elsevier 56:2 pp. 731-744
  • Fu, X., Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., Ren, K. (2012) "How Privacy Leaks from Bluetooth Mouse," 20th Annual Network & Distributed System Security Symposium (NDSS)
  • Fu, X., Graham, S., Guan, Y. (2012) "Location Privacy in Wireless Networks," American Scientific Publishers
  • Ling, Z., Luo, J., Yu, W., Fu, X., Jia, W., Zhao, W. (2012) "Protocol-level attacks against Tor," Computer Networks
  • Fu, X., Zhang, N., Pingley, A., Yu, W., Wang, J., Zhao, W. (2012) "The Digital Marauder's Map: A WiFi Forensic Positioning Tool," IEEE Transactions on Mobile Computing (TMC) 11:3 pp. 377-389
  • Fu, X., Huang, J., Ling, Z., Xiang, T., Wang, J. (2012) "When Digital Forensic Research Meets Laws," Proceedings of International Workshop on Network Forensics, Security and Privacy (NFSP)
  • Fu, X., Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N. (2012) "DEMO: How Privacy Leaks from Bluetooth Mouse," 19th ACM Conference on Computer and Communications Security
  • Huang, J., Chen, Y., Ling, Z., Choo, K., Fu, X. (2012) "A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation," Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12)
  • Fu, X., Ling, Z., Jia, W., Yu, W., Xuan, D., Luo, J. (2012) "Novel Packet Size Based Covert Channel Attacks against Anonymizer," IEEE Transactions on Computers (TC)
  • Pan, X., Huang, J., Ling, Z., Lu, B., Fu, X. (2012) "Long PN Code Based Traceback in Wireless Networks," International Journal of Performability Engineering (IJPE) 8:2 pp. 173-182
  • Fu, X., Gauvin, W., Chen, C., Liu, B. (2011) "Classification of Commercial and Personal Profiles on MySpace," Proceedings of 3rd IEEE International Workshop on Security and Social Networking (SESOC)
  • Fu, X., Jin, X., Dan, M., Zhang, N., Yu, W., Das, S.K. (2011) "Game Theory for Infrastructure Security - The Power of Intent-Based Adversary Models,"
  • Fu, X., Chen, Y., Liu, Z., Liu, B., Zhao, W. (2011) "Identifying Mobiles Hiding behind Wireless Routers," Proceedings of Infocom
  • Fu, X., Huang, J., Pan, X., Wang, J. (2011) "Long PN Code Based DSSS Watermarking," Proceedings of Infocom
  • Fu, X., Ling, Z., Jia, W., Yu, W., Xuan, D. (2011) "Novel Packet Size Based Covert Channel Attacks against Anonymizer," Proceedings of Infocom Mini-Conference
  • Fu, X., Pingley, A., Zhang, N., Choi, H., Subramaniam, S., Zhao, W. (2011) "Protection of Query Privacy for Continuous Location Based Services," Proceedings of Infocom
  • Fu, X., Lin, J., Yang, X., Yu, W. (2011) "Towards Effective En-route Filtering against Injected False Data in Wireless Sensor Networks," Proceedings of IEEE GLOBECOM - Communication & System Security
  • Fu, X., Yu, W., Zhang, N., Rivera, B. (2011) "Evolution of Widely-Spread Worms and Countermeasures: Epidemic Theory and Application,"
  • Fu, X., Liu, Z., Chen, Y., Liu, B. (2011) "HAWK: An Unmanned Mini Helicoptor-Based Aerial Wireless Kit for Search, Rescue, and Surveillance," ACM Annual International Conference on Mobile Computing and Networking
  • Fu, X., Yang, X., Lin, J., Yu, W., Chen, G., Blasch, E.P. (2011) "On Situational Aware En-Route Filtering against Injected False Data in Cyber Physical Networks," IGI-Global
  • Fu, X., Ling, Z., Luo, J., Yu, W. (2011) "Equal-Sized Cells Mean Equal-Sized Packets in Tor?," Proceedings of ICC Communication and Information System Security Symposium
  • Fu, X., Chen, Y., Liu, Z., Ding, Y. (2011) "On Sampling Signal Strength for Localization Using a Directional Antenna," Proceedings of IEEE International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
  • Huang, Y., Yang, X., Yang, S., Yu, W., Fu, X. (2011) "A Cross Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks," IEEE Transactions on Vehicular Technology (TVT) 60:3 pp. 1045-1058
  • Fu, X., Pingley, A., Pan, X., Zhang, N. (2011) "Bluetooth Mice Can Leak Your Passwords!," Hakin9
  • Chen, C., Gauvin, W., Fu, X., Liu, B. (2011) "Classification of Commercial and Personal Profiles on MySpace," Percom
  • Fu, X., Wang, J., Chen, Y., Wang, J., Yu, W., Zhang, N. (2010) "3DLoc: Three Dimensional Wireless Localization Toolkit," Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Zhu, Y., Fu, X., Graham, B., Bettati, R., Zhao, W. (2010) "Correlation-Based Traffic Analysis Attacks on Anonymity Networks," IEEE Transactions on Parallel and Distributed Systems 21:7 pp. 954-967
  • Fu, X., Ling, Z., Yu, W., Luo, J. (2010) "Cyber Crime Scene Investigation (C²SI) through Cloud Computing," Proceedings of First ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC)
  • Fu, X., Liu, Z., Chen, Y., Yu, W. (2010) "Generic Network Forensic Data Acquisition from Household and Small Business Wireless Routers," Proceedings of First International Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
  • Fu, X., Zhang, N., Yu, W., Das, S. (2010) "gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity," Proceedings of Conference on Decision and Game Theory for Security (GameSec)
  • Fu, X., Fan, X., Yang, X., Yu, W. (2010) "HLLS: A History Information Based Light Location Service for MANETs," Proceedings of IEEE International Conference on Communications (ICC)
  • Yu, W., Zhang, N., Fu, X., Bettati, R., Zhao, W. (2010) "Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures," IEEE Transactions on Computers 59:12 pp. 1655-1668
  • Zhang, N., Yu, W., Fu, X., Das, S.K. (2010) "Maintaining the Defender's Reputation in Anomaly Detection Against Insider Attacks," IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics (SMC-B) 40:3 pp. 597-611
  • Yu, W., Zhang, N., Fu, X., Zhao, W. (2010) "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis," IEEE Transactions on Parallel and Distributed Systems (TPDS) 21:10 pp. 1501-1514
  • Fu, X., Saipulla, A., Liu, B., Xing, G., Wang, J. (2010) "Barrier Coverage with Sensors of Limited Mobility," Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
  • Fu, X., Ling, Z., Luo, J., Yu, W., Xuan, D., Jia, W. (2009) "A New Cell Counter Based Attack against Tor," Proceedings of 16th ACM Conference on Computer and Communications Security (CCS)
  • Yu, W., Wang, X., Fu, X., Xuan, D., Zhao, W. (2009) "An Invisible Localization Attack to Internet Threat Monitors," IEEE Transactions on Parallel and Distributed Systems (TPDS) 20:11 pp. 1611-1625
  • Fu, X., Zhang, N., Song, M., Yu, W. (2009) "Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services," Proceedings of Workshop on Social Networks, Applications and Systems (SNAS)
  • Fu, X., Yu, W., Jiang, S., Graham, S., Guan, Y. (2009) "TCP Performance in Flow-Based Mix Networks: Modeling and Analysis," IEEE Transactions on Parallel and Distributed Systems (TPDS) 20:5 pp. 695-709
  • Fu, X. (2009) "Traffic Analysis Attacks and Countermeasures - Pattern Recognition Based Methodology," VDM Publishing
  • Fu, X., Gauvin, W., Liu, B., Wang, J. (2009) "Utopia: Providing Trusted Social Network Relationships within an Un-Trusted Environment," Proceedings of Workshop on Social Networks, Applications and Systems (SNAS)
  • Fu, X., Guan, Y., Zhao, W. (2009) "Forensic Analysis Techniques for Tracing Anonymous Cyber Criminals," ARO Workshop on Digital Forensics
  • Fu, X., Zhang, N., Pingley, A., Yu, W., Wang, J., Zhao, W. (2009) "The Digital Marauder's Map: A New Threat to Location Privacy in Wireless Networks," Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Pingley, A., Yu, W., Zhang, N., Zhao, W. (2009) "CAP: A Context-Aware Privacy Protection System for Location-Based Services," Proceedings of the 29th IEEE International Conference on Distributed computing Systems (ICDCS)
  • Fu, X., Jia, W., Tso, F., Ling, Z., Xuan, D., Yu, W. (2009) "Blind Detection of Spread Spectrum Flow Watermarks," Proceedings of the 28th Conference on Computer Communications (Infocom)
  • Fu, X., Ling, Z. (2009) "One Cell is Enough to Break Tor's Anonymity," Proceedings of Black Hat DC
  • Lee, J., Yu, W., Fu, X. (2008) "Energy-Efficient Target Detection in Sensor Networks using Line Proxies," International Journal of Communication Systems 21:3 pp. 251-275
  • Zhu, Y., Fu, X., Bettati, R. (2008) "On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks," International Journal of Network Security (IJNS) 7:1 pp. 130-140
  • Fu, X., Zhang, N., Yu, W., Das, S.K. (2008) "Towards Effective Defense against Insider Attacks: The Establishment of Defenders Reputation," Proceedings of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
  • Fu, X., Yu, W., Zhang, N., Bettati, R., Zhao, W. (2008) "On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework," Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) - Performance and Dependability Symposium (PDS)
  • Fu, X., Pries, R., Yu, W., Zhao, W. (2008) "A New Replay Attack against Anonymous Communication Networks," Proceedings of the IEEE International Conference on Communications (ICC) - Information and Network Security Symposium
  • Fu, X., Pries, R., Yu, W., (2008) "On Performance Bottleneck of Anonymous Communication Networks," Proceedings of the 22nd IEEE International Parallel and Distributed Pricessing Symposium (IPDPS)
  • , X., Wang, X., Yu, W., Xuan, D., Zhao, W. (2008) "iLOC: An Invisible LOCilization Attack to Internet Threat Monitoring Systems," Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM)
  • Fu, X., Zhu, Y., Bettati, R., Zhao, W. (2007) "Analysis of Flow-Correlation Attacks in Anonymity Network," Special Issue of International Journal of Security and Networks (IJSN) 2:1/2 pp. 137-153
  • Fu, X., Graham, S., Lu, B. (2007) "Network Security Fundamentals," John Wiley & Sons, Inc.
  • Fu, X., Yu, W., Zou, X., Streff, K., Graham, S. (2007) "On Recognizing Virtual Honeypots and Countermeasures," Journal of Autonomic and Trusted Computing (JoATC)
  • Fu, X., Jiang, S., Yu, W., Graham, S., Guan, Y. (2007) "On TCP Performance in Flow-Based Mix Networks," Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
  • Fu, X., Yu, W., Graham, S., Xuan, D., Zhao, W. (2007) "DSSS-Based Flow Marking Technique for Invisible Traceback," Proceedings of IEEE Symposium on Security and Privacy (S&P)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2007) "On Flow Marking Attacks in Wireless Anonymous Communication Networks," Journal of Ubiquitous Computing and Intelligence (JUCI) 1:1 pp. 42-53
  • Fu, X., Wang, X., Yu, W., Champion, A., Xuan, D. (2006) "Detecting Worms via Mining Dynamic Program Execution," Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm)
  • Fu, X., Yu, W., Cheng, D., Tan, X., Streff, K., Graham, S. (2006) "On Recognizing Virtual Honeypots and Countermeasures," Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
  • Fu, X., Streff, K., Rajagopalan, A. (2006) "ABC: Adaptive Bank-Transaction Camouflaging Systems," Proceeding of the International Conference on i-Warfare and Security (ICIW)
  • Fu, X., Xu, H., Zhu, Y., Bettati, R., Chen, J., Zhao, W. (2005) "SAS: A Scalar Anonymous Communication System," Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC)
  • Fu, X., Zhu, Y., Bettati, R., Zhao, W. (2005) "Anonymity Analysis of Mix Networks against Flow-Correlation Attacks," Proceedings of Globecom Computer & Network Security
  • Fu, X., Zhu, Y., Bettati, R. (2005) "On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks," Proceedings of the 4th IEEE International Symposium on Network Computing and Applications (NCA)
  • Fu, X., Graham, B., Zhu, Y., Bettati, R. (2005) "Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures," Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2005) "On Flow Marking Attacks in Wireless Anonymous Communication Networks," Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Graham, B., Xuan, D., Bettati, R., Zhao, W. (2004) "Empirical and Theoretical Evaluation of Active Probing Attacks and their Countermeasures," Proceedings of the 6th Information Hiding Workshop (IHW)
  • Fu, X., Zhu, Y., Graham, B., Bettati, R., Zhao, W. (2004) "On Flow Correlation Attacks and Countermeasures in Mix Networks," Proceedings of Workshop on Privacy Enhancing Technologies (PET)
  • Guan, Y., Fu, X., Bettati, R., Zhao, W. (2004) "A Quantitative Analysis of Anonymous Communications," IEEE Transactions on Reliability 53:1 pp. 103-115
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "Active Traffic Analysis Attacks and Countermeasures," Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC)
  • Fu, X., Graham, B., Xuan, D., Bettati, R., Zhao, W. (2003) "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks," Proceedings of the International Conference on Parallel Processing (ICPP)
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "On Countermeasures to Traffic Analysis Attacks," Proceedings of the 4th IEEE SMC Information Assurance Workshop
  • Fu, X., Graham, B., Bettati, R., Zhao, W. (2003) "On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks," Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Graham, B., Guan, Y., Bettati, R., Zhao, W. (2003) "NetCamo: Camouflaging Network Traffic for Real-Time Applications," Proceedings of Texas Workshop on Security of Information Systems
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "Hiding Role Assignment for Mission Critical Collaborative Systems," Quality and Reliability Engineering International, Special Issue on Computer Network Security 18:3 pp. 201-216
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "An Optimal Strategy for Anonymous Communication Protocols," Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS)
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2002) "Modeling and Optimizing Anonymous Communication Protocols," 3rd Annual IEEE Information Assurance Workshop - Poster Session II
  • Fu, X., Guan, Y., Graham, B., Bettati, R., Zhao, W. (2002) "Using Parasite Flows to Camouflage Flow Traffic," Proceedings of the 3rd IEEE SMC Information Assurance Workshop
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2001) "A Quantitative Analysis of Anonymous Communications," 10th USENIX Security Symposium - Works in Progress Session
  • Guan, Y., Fu, X., Xuan, D., Shenoy, P.U., Bettati, R., Zhao, W. (2001) "NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications," IEEE Transactions on Systems, Man, and Cybernetics, Special Issue on Information Assurance 31:4 pp. 253-265
  • Fu, X., Guan, Y., Bettati, R., Zhao, W. (2000) "Efficient Traffic Camouflaging in Mission Critical QoS-Guaranteed Networks," Proceedings of the 1st IEEE SMC Information Assurance Workshop
  • Fu, X., Zhang, M., Li, X. (1999) "A Method of Texture Matching Based on Feature Symbol Random Field Created by Wavelet," China Journal of Image and Graphics 4:3 pp. 243-247
  • Fu, X., Ma, X., Hou, C. (1998) "Texture Classification Based on Feature Symbol Random Field," Proceedings of the 4th International Conference on Signal Processing (ICSP)
  • Fu, X., Zhang, M., Li, X. (1998) "A Method of Texture Classification Based on Vector Quantization," Proceedings of the 9th Graphics and Image Technology Conference

Selected Presentations

  • - IEEE GlobeCom 05, 06, 07, 08,
  • . IEEE Infocom 6. IEEE International Conference on Distributed Computing Systems (ICDCS) - IEEE Infocom,
  • - IEEE International Conference on Communications (ICC),
  • - IEEE International Conference on Distributed Computing Systems (ICDCS),
  • IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) - IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),
  • - IEEE Real-Time Systems Symposium (RTSS),
  • International Conference on Information Warfare and Security (ICIW06, 07) - International Conference on Information Warfare and Security,
  • - International Conference on Parallel Processing (ICPP),
  • - International Symposium on Ubisafe Computing (UbiSafe07),
  • International Workshop on Smart Home (IWSH06) - International Workshop on Smart Home,
  • - Ubiquitous Computing and Intelligence (UCI07),
  • Third Party Wireless Localization: Theory and Implementation - HP Labs, April 2012 - Alto, CA
  • Third Party Wireless Localization: Theory and Implementation, March 2012 - San Jose, CA
  • CSI-WLAN: Wireless Network Crime Scene Investigation, IIT (Illinois Institute of Technology) - CSI-WLAN: Wireless Network Crime Scene Investigation, IIT (Illinois Institute of Technology), April 2011 - (Illinois Institute of Technology)
  • CSI-WLAN: Wireless Network Crime Scene Investigation, April 2011 - IL
  • Wireless Network Crime Scene Investigation, April 2011 - Southeast University
  • 3DLoc: Three Dimensional Wireless Localization Toolkit - The 30th International Conference on Distributed Computing Systems, June 2010 - Genoa, Italy
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, April 2010 - CT
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics - 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, March 2010 - George Washington University
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics - ECE Colloquia, March 2010 - Dartmouth, MA
  • 3DLoc: Three Dimensional Wireless Localization Toolkit for Network Forensics, March 2010 - Washington, D.C.
  • A New Cell Counter Based Attack Against Tor - A New Cell Counter Based Attack Against Tor, November 2009
  • A New Cell Counter Based Attack against Tor - ACM Conference on Computer and Communications Security, November 2009
  • A New Cell Counter Based Attack against Tor - ECE Graduate Seminar Lecture Series, November 2009 - Worcester, MA
  • The Digital Marauder's Map - Hacker Halted USA, September 2009 - Miami, FL
  • Forensic Analysis Techniques for Tracing Anonymous Cyber Criminals - ARO Workshop on Digital Forensics, September 2009 - Washington, D.C.
  • A New Cell Counter Based Attack against Tor (Are Equal-sized Cells Equal?), Department of Computing, Hong Kong Polytechnic University, Aug. 25, 2009 - A New Cell Counter Based Attack against Tor (Are Equal-sized Cells Equal?), August 2009 - Hong Kong Polytechnic University
  • A New Cell Counter Based Attack against Tor (Are Equal-Sized Cells Equal?), August 2009 - Hong Kong
  • The Digital Marauder's Map, August 2009 - China
  • Blind Detection of Spread Spectrum Flow Watermarks - Infocom 2009, May 2009 - Rio de Janeiro, Brazil
  • Blind Detection of Spread Spectrum Flow Watermarks - Infocom 2009, April 2009 - Rio de janeiro, Brazil
  • One Cell is Enough to Break Tor's Anonymity, February 2009 - Fairfax, VA
  • One Cell is Enough to Break Tor's Anonymity - Black Hat DC 2009, February 2009
  • - IEEE Infocom (Infocom08), 2008
  • A New Replay Attack against Anonymous Communication Networks - ICC, May 2008
  • On TCP Performance in Flow Based Anonymous Communication Networks - IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2007
  • DSSS-Based Flow Marking Technique for Invisible Tracebacks - IEEE Symposium on Security and Privacy (S&P), 2007 - Oakland, CA
  • IEEE Wireless and Communications and Networking Conference (WCNC07) - IEEE Wireless and Communications and Networking Conference, 2007
  • - International Conference on Information Warfare and Security, 2007
  • - The 28th IEEE Real-Time Systems Symposium (RTSS), 2007
  • Ubiquitous Computing and Intelligence (UCI07) - Ubiquitous Computing and Intelligence (UCI07), 2007
  • Location Privacy in Wireless Networks - Location Privacy in Wireless Networks, October 2007 - Dakota State University
  • Location Privacy in Wireless Networks - Faculty Development at Dakota State University, October 2007
  • On Recognizing Virtual Honeypots and Countermeasures - IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), 2006
  • - International Conference on High Performance Computing and Communications, 2006
  • - International Conference on i-Warfare and Security (ICIW), 2006
  • - International Workshop on Smart Home (IWSH06), 2006
  • On Recognizing Virtual Honeypots and Countermeasures - On Recognizing Virtual Honeypots and Countermeasures, 2006
  • Camouflaging Virtual Honeypots - Camouflaging Virtual Honeypots, April 2006 - North Dakota State University, ND
  • - Faculty Research and Education Seminar Hour (FRESH), February 2006
  • - International Conference on Distributed Computing Systems (ICDCS), 2005
  • - SMC Information Assurance Workshop (IAW), 2003
  • . ACM International Student Research Contest, 2002 - ACM International Student Research Contest, 2002
  • - SMC Information Assurance Workshop (IAW), 2002

Selected Contracts, Fellowships, Grants and Sponsored Research

  • TC: Small: Collaborative Research: Membership Inference in a Differentially Private World and Beyond (2011), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • I-Corps: Commercialization Feasibility Research and Demonstration Preparation for Third-Party Localization Toolkits (2012), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • II-New: A Network Forensics Lab for Integrated Research and Education at University of Massachusetts Lowell (2010), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Creating Learning Materials and Strategies for Network Forensics Education (2010), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Collaborative Research: EAGER: Novel Theoretical Foundation for Wireless Positioning in Challenging Environments (2009), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • Center for Cyber Forensics (2010), Grant - University of Massachusetts Lowell
    Fu, X.
  • Collaborative Research: WN: Proper Location Identification in Wireless Networks (2007), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • MRI: Acquisition of Equipment to Establish an Information Assurance Infrastructure for Research and Education at Dakota State University (2007), Grant - National Science Foundation (NSF)
    Fu, X. (Principal)
  • A New Replay Attack Against Anonymous Communication Networks (2007), Grant - Faculty Research Initiative Grant at Dakota State University
    Fu, X.
  • Effectively and Efficiently Tracking Malicious Use of Anonymous Communication (2006), Grant - South Dakota Governor Individual Research Seed Grant Program
    Fu, X. (Principal)
  • South Dakota Health Information Security and Privacy Study (Senior Personnel) (2006), Grant - South Dakota Department of Health
    Fu, X.
  • Improving TCP Performance in Flow Based Anonymous Communication Networks (2007), Grant - Faculty Research Initiative Grant at Dakota State University
    Fu, X. (Principal)
  • Traffic Analysis Attacks and Countermeasures (2007), Grant - Proposal Initiative Award at Dakota State University
    Fu, X.
  • Measuring and Improving Anonymous Network Performance (2006), Grant - Student Research Initiative Awards at Dakota State University
    Fu, X.
  • Faculty Research Initiative Grants - Camouflaging Virtual Honeypots (2005), Grant - Dakota State University
    Fu, X. (Principal)
  • Political Data Mining and Voter Decision Support Systems: Implementation and Security Research (2005), Grant - Student Research Initiative Awards at Dakota State University
    Fu, X.