On the security of permutation-only image encryption schemes A Jolfaei, XW Wu, V Muthukkumarasamy IEEE transactions on information forensics and security 11 (2), 235-246, 2015 | 212 | 2015 |
Comments on the security of “Diffusion–substitution based gray image encryption” scheme VM A Jolfaei, XW Wu Digital signal processing 23 (3), 894-901, 2014 | 158* | 2014 |
List decoding of q-ary Reed-Muller codes R Pellikaan, XW Wu IEEE Transactions on Information Theory 50 (4), 679-682, 2004 | 109 | 2004 |
Efficient root-finding algorithm with application to list decoding of algebraic-geometric codes XW Wu, PH Siegel IEEE Transactions on Information Theory 47 (6), 2579-2587, 2001 | 77 | 2001 |
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic M Usman, V Muthukkumarasamy, XW Wu IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015 | 56 | 2015 |
SP-CIDS: Secure and private collaborative IDS for VANETs G Raja, S Anbalagan, G Vijayaraghavan, S Theerthagiri, ... IEEE Transactions on Intelligent Transportation Systems 22 (7), 4385-4393, 2020 | 55 | 2020 |
Adaptive clustering with feature ranking for DDoS attacks detection L Zi, J Yearwood, XW Wu 2010 fourth international conference on network and system security, 281-286, 2010 | 53 | 2010 |
A study on reconstruction of linear scrambler using dual words of channel encoder XB Liu, SN Koh, CC Chui, XW Wu IEEE Transactions on information forensics and security 8 (3), 542-552, 2013 | 52 | 2013 |
Reconstructing a linear scrambler with improved detection capability and in the presence of noise XB Liu, SN Koh, XW Wu, CC Chui IEEE Transactions on information forensics and security 7 (1), 208-218, 2011 | 52 | 2011 |
Codes, cryptology and curves with computer algebra R Pellikaan, XW Wu, S Bulygin, R Jurrius Cambridge University Press, 2017 | 49 | 2017 |
A novel dynamic user authentication scheme X Ren, XW Wu 2012 International Symposium on Communications and Information Technologies …, 2012 | 48 | 2012 |
A 3D object encryption scheme which maintains dimensional and spatial stability A Jolfaei, XW Wu, V Muthukkumarasamy IEEE Transactions on Information Forensics and Security 10 (2), 409-422, 2014 | 42 | 2014 |
An analytical model for lifetime estimation of wireless sensor networks K Biswas, V Muthukkumarasamy, XW Wu, K Singh IEEE Communications Letters 19 (9), 1584-1587, 2015 | 33 | 2015 |
Performance evaluation of block ciphers for wireless sensor networks K Biswas, V Muthukkumarasamy, XW Wu, K Singh Advanced Computing and Communication Technologies: Proceedings of the 9th …, 2016 | 32 | 2016 |
Wireless smart home sensor networks: mobile agent based anomaly detection M Usman, V Muthukkumarasamy, XW Wu, S Khanum 2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012 | 32 | 2012 |
A novel framework for software defined wireless body area network K Hasan, XW Wu, K Biswas, K Ahmed 2018 8th International conference on intelligent systems, modelling and …, 2018 | 30 | 2018 |
Rbacs: Rootkit behavioral analysis and classification system D Lobo, P Watters, X Wu 2010 Third international conference on knowledge discovery and data mining …, 2010 | 30 | 2010 |
A secure lightweight texture encryption scheme A Jolfaei, XW Wu, V Muthukkumarasamy Image and Video Technology–PSIVT 2015 Workshops: RV 2015, GPID 2013, VG 2015 …, 2016 | 29 | 2016 |
Lightweight security protocols for the Internet of Things XW Wu, EH Yang, J Wang 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …, 2017 | 28 | 2017 |
Comments on the security of “Diffusion–substitution based gray image encryption” scheme A Jolfaei, XW Wu, V Muthukkumarasamy Digital signal processing 32, 34-36, 2014 | 26 | 2014 |