default search action
Yuan Xue 0001
Person information
- affiliation: Vanderbilt University, Department of Electrical Engineering and Computer Science, Nashville, TN, USA
- affiliation (former): University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA
Other persons with the same name
- Yuan Xue — disambiguation page
- Yuan Xue 0002 — Johns Hopkins University, Baltimore, MD, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j27]Shuo Wen, Yuan Xue, Jing Xu, Liying Yuan, Wenli Song, Hongji Yang, Guannan Si:
Lom: Discovering logic flaws within MongoDB-based web applications. Int. J. Autom. Comput. 14(1): 106-118 (2017) - 2016
- [c61]Shuo Wen, Yuan Xue, Jing Xu, Hongji Yang, Xiaohong Li, Wenli Song, Guannan Si:
Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications. COMPSAC 2016: 143-153 - 2015
- [j26]Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
A language for describing attacks on cyber-physical systems. Int. J. Crit. Infrastructure Prot. 8: 40-52 (2015) - [c60]Wei Yan, Yuan Xue:
Coordinated Resource Management for Large Scale Interactive Data Query Systems. CCGRID 2015: 677-686 - 2014
- [j25]Xiaowei Li, Yuan Xue:
A survey on server-side approaches to securing web applications. ACM Comput. Surv. 46(4): 54:1-54:29 (2014) - [j24]Elizabeth Ashley Durham, Murat Kantarcioglu, Yuan Xue, Csaba Tóth, Mehmet Kuzu, Bradley A. Malin:
Composite Bloom Filters for Secure Record Linkage. IEEE Trans. Knowl. Data Eng. 26(12): 2956-2968 (2014) - [j23]Fan Qiu, Yuan Xue:
Robust Joint Congestion Control and Scheduling for Time-Varying Multi-Hop Wireless Networks With Feedback Delay. IEEE Trans. Wirel. Commun. 13(9): 5211-5222 (2014) - [c59]Csaba Tóth, Elizabeth Ashley Durham, Murat Kantarcioglu, Yuan Xue, Bradley A. Malin:
SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage. AMIA 2014 - [c58]Xiaowei Li, Xujie Si, Yuan Xue:
Automated black-box detection of access control vulnerabilities in web applications. CODASPY 2014: 49-60 - 2013
- [c57]Wei Yan, Yuan Xue, Bradley A. Malin:
Scalable and robust key group size estimation for reducer load balancing in MapReduce. IEEE BigData 2013: 156-162 - [c56]Xiaowei Li, Yuan Xue:
LogicScope: automatic discovery of logic vulnerabilities within web applications. AsiaCCS 2013: 481-486 - [c55]Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
Taxonomy for description of cross-domain attacks on CPS. HiCoNS 2013: 135-142 - [c54]Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:
Reliability Analysis of Wireless Real-Time Control Networks. ICCCN 2013: 1-7 - [c53]Péter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos:
Low-complexity multicarrier physical layer for wireless real-time control networks. ICCPS 2013: 257 - [c52]Wei Yan, Yuan Xue, Bradley A. Malin:
Scalable load balancing for mapreduce-based record linkage. IPCCC 2013: 1-10 - 2012
- [j22]Xiaowei Li, Yi Cui, Yuan Xue:
Towards an Automatic Parameter-Tuning Framework for Cost Optimization on Video Encoding Cloud. Int. J. Digit. Multim. Broadcast. 2012: 935724:1-935724:11 (2012) - [j21]Elizabeth Durham, Yuan Xue, Murat Kantarcioglu, Bradley A. Malin:
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage. Inf. Fusion 13(4): 245-259 (2012) - [j20]Emeka Eyisi, Jia Bai, Derek Riley, Jiannian Weng, Wei Yan, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:
NCSWT: An integrated modeling and simulation tool for networked control systems. Simul. Model. Pract. Theory 27: 90-111 (2012) - [c51]Xiaowei Li, Wei Yan, Yuan Xue:
SENTINEL: securing database from logic flaws in web applications. CODASPY 2012: 25-36 - [c50]Wei Yan, Yuan Xue, Xiaowei Li, Jiannian Weng, Timothy Busch, Janos Sztipanovits:
Integrated simulation and emulation platform for cyber-physical system security experimentation. HiCoNS 2012: 81-88 - [c49]Emeka Eyisi, Jia Bai, Derek Riley, Jiannian Weng, Yan Wei, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits:
NCSWT: an integrated modeling and simulation tool for networked control systems. HSCC 2012: 287-290 - [c48]Fan Qiu, Jia Bai, Yuan Xue:
Towards optimal rate allocation in multi-hop wireless networks with delay constraints: A double-price approach. ICC 2012: 5280-5285 - [c47]Jia Bai, Emeka Eyisi, Fan Qiu, Yuan Xue, Xenofon D. Koutsoukos:
Optimal Cross-Layer Design of Sampling Rate Adaptation and Network Scheduling for Wireless Networked Control Systems. ICCPS 2012: 107-116 - [c46]Jia Bai, Fan Qiu, Yuan Xue:
End-to-end fairness over non-convex capacity region in IEEE 802.11-based wireless networks. MASS 2012: 145-154 - [c45]Fan Qiu, Yuan Xue:
Robust joint congestion control and scheduling for time-varying multihop wireless networks with time delay. SECON 2012: 407-415 - [c44]Xiaowei Li, Yuan Xue, Bradley A. Malin:
Detecting Anomalous User Behaviors in Workflow-Driven Web Applications. SRDS 2012: 1-10 - [c43]Xiaowei Li, Yuan Xue:
Protecting Web-based Patient Portal for the Security and Privacy of Electronic Medical Records. HealthSec 2012 - 2011
- [j19]Bo Liu, Fan Qiu, Yanchuan Cao, Bin Chang, Yi Cui, Yuan Xue:
Maximizing Resilient Throughput in Peer-to-Peer Network. Commun. Netw. 3(3): 168-183 (2011) - [j18]Shanshan Jiang, Yuan Xue:
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. J. Netw. Comput. Appl. 34(2): 443-454 (2011) - [c42]Xiaowei Li, Yuan Xue:
BLOCK: a black-box approach for detection of state violation attacks towards web applications. ACSAC 2011: 247-256 - [c41]Bo Liu, Yanchuan Cao, Yi Cui, Yuan Xue, Fan Qiu, Yansheng Lu:
Minimizing service disruption in peer-to-peer streaming. CCNC 2011: 1066-1071 - [c40]Fan Qiu, Jia Bai, Yi Cui, Yuan Xue:
Optimal rate allocation in Peer-to-Peer streaming overwireless networks. CTS 2011: 532-539 - [c39]Derek Riley, Emeka Eyisi, Jia Bai, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits:
Networked control system wind tunnel (NCSWT): an evaluation tool for networked multi-agent systems. SimuTools 2011: 9-18 - [c38]Xiaowei Li, Yuan Xue, You Chen, Bradley A. Malin:
Context-Aware Anomaly Detection for Electronic Medical Record Systems. HealthSec 2011 - [c37]Xiaowei Li, Yuan Xue, Bradley A. Malin:
Towards understanding the usage pattern of web-based electronic medical record systems. WOWMOM 2011: 1-7 - 2010
- [j17]Jonathan Wellons, Liang Dai, Yuan Xue, Yui Cui:
Augmenting predictive with oblivious routing for wireless mesh networks under traffic uncertainty. Comput. Networks 54(2): 178-195 (2010) - [j16]Jonathan Wellons, Yuan Xue:
The impact of topology in robust routing on wireless mesh networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(4): 46-48 (2010) - [c36]Bo Liu, Yanchuan Cao, Yi Cui, Yansheng Lu, Yuan Xue:
Locality Analysis of BitTorrent-Like Peer-to-Peer Systems. CCNC 2010: 1-5 - [c35]Jia Bai, Emeka Eyisi, Yuan Xue, Xenofon D. Koutsoukos:
Dynamic Tuning Retransmission Limit of IEEE 802.11 MAC Protocol for Networked Control Systems. GreenCom/CPSCom 2010: 666-671
2000 – 2009
- 2009
- [j15]Shanshan Jiang, Yuan Xue, Douglas C. Schmidt:
Minimum disruption service composition and recovery in mobile ad hoc networks. Comput. Networks 53(10): 1649-1665 (2009) - [j14]Liang Dai, Yanchuan Cao, Yi Cui, Yuan Xue:
On scalability of proximity-aware peer-to-peer streaming. Comput. Commun. 32(1): 144-153 (2009) - [j13]Yi Cui, Yanchuan Cao, Liang Dai, Yuan Xue:
Optimizing P2P streaming throughput under peer churning. Multim. Syst. 15(2): 83-99 (2009) - [j12]Bo Liu, Yi Cui, Yansheng Lu, Yuan Xue:
Locality-Awareness in BitTorrent-Like P2P Applications. IEEE Trans. Multim. 11(3): 361-371 (2009) - [c34]Tareq Hossain, Yi Cui, Yuan Xue:
Minimizing Rate Distortion in Peer-to-Peer Video Streaming. CCNC 2009: 1-5 - [c33]Tareq Hossain, Yi Cui, Yuan Xue:
Vanets: Case Study of a Peer-to-Peer Video Conferencing System. CCNC 2009: 1-2 - [c32]Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy:
Robust Medical Data Delivery for Wireless Pervasive Healthcare. DASC 2009: 802-807 - [c31]Tareq Hossain, Yi Cui, Yuan Xue:
Rate Distortion Optimization for Mesh-Based P2P Video Streaming. ICC 2009: 1-6 - [c30]Tareq Hossain, Yi Cui, Yuan Xue:
On the Optimality of Layered Video Streaming Rate in a P2P Mesh Network. ICCCN 2009: 1-6 - [c29]Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy:
Providing QoS support for wireless remote healthcare system. ICME 2009: 1692-1695 - [c28]Nilabja Roy, Yuan Xue, Aniruddha S. Gokhale, Larry W. Dowdy, Douglas C. Schmidt:
A Component Assignment Framework for Improved Capacity and Assured Performance in Web Portals. OTM Conferences (1) 2009: 671-689 - [p2]Jonathan Wellons, Liang Dai, Bin Chang, Yuan Xue:
Wireless Mesh Network Routing Under Uncertain Demands. Guide to Wireless Mesh Networks 2009: 171-198 - [p1]Wenbo He, Yuan Xue, Klara Nahrstedt:
Delay Management in Wireless Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 311-331 - 2008
- [j11]Liang Dai, Yuan Xue, Bin Chang, Yanchuan Cao, Yi Cui:
Optimal Routing for Wireless Mesh Networks With Dynamic Traffic Demand. Mob. Networks Appl. 13(1-2): 97-116 (2008) - [j10]Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas C. Schmidt, Yuan Xue, Chenyang Lu:
Hierarchical control of multiple resources in distributed real-time and embedded systems. Real Time Syst. 39(1-3): 237-282 (2008) - [c27]Shanshan Jiang, Yanchuan Cao, Sameer Iyengar, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen B. Wicker:
CareNet: an integrated wireless sensor networking environment for remote healthcare. BODYNETS 2008: 9 - [c26]Bin Chang, Liang Dai, Yi Cui, Yuan Xue:
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis. ICDCS Workshops 2008: 7-11 - [c25]Liang Dai, Yuan Xue, Bin Chang, Yanchuan Cao, Yi Cui:
Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh Networks. INFOCOM 2008: 71-75 - [c24]Bin Chang, Yi Cui, Yuan Xue:
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach. INFOCOM 2008: 2458-2466 - [c23]Bo Liu, Yi Cui, Bin Chang, Ben Gotow, Yuan Xue:
BitTube: Case Study of a Web-Based Peer-Assisted Video-on-Demand System. ISM 2008: 242-249 - [c22]Jonathan Wellons, Liang Dai, Yuan Xue, Yi Cui:
Predictive or Oblivious: A Comparative Study of Routing Strategies for Wireless Mesh Networks under Uncertain Demand. SECON 2008: 215-223 - 2007
- [c21]Yi Cui, Liang Dai, Yuan Xue:
Optimizing P2P Streaming Throughput Under Peer Churning. GLOBECOM 2007: 231-235 - [c20]Yanchuan Cao, Yuan Xue, Yi Cui:
Network-Calculus-Based Analysis of Power Management in Video Sensor Networks. GLOBECOM 2007: 981-985 - [c19]Liang Dai, Yi Cui, Yuan Xue:
Maximizing Throughput in Layered Peer-to-Peer Streaming. ICC 2007: 1734-1739 - [c18]Yi Cui, Yuan Xue, Klara Nahrstedt:
Optimal Distributed Multicast Routing using Network Coding. ICC 2007: 3610-3615 - [c17]Yuan Xue, Hoang Nguyen, Klara Nahrstedt:
CA-AQM: Channel-Aware Active Queue Management for Wireless Networks. ICC 2007: 4773-4778 - [c16]Liang Dai, Yi Cui, Yuan Xue:
On Scalability of Proximity-Aware Peer-to-Peer Streaming. INFOCOM 2007: 2561-2565 - [c15]Liang Dai, Yuan Xue, Bin Chang, Yi Cui:
Throughput Optimization Routing Under Uncertain Demand for Wireless Mesh Networks. MASS 2007: 1-11 - [c14]Shanshan Jiang, Yuan Xue, Douglas C. Schmidt:
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks. MobiQuitous 2007: 1-8 - 2006
- [j9]Yuan Xue, Baochun Li, Klara Nahrstedt:
Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach. IEEE Trans. Mob. Comput. 5(4): 347-364 (2006) - [j8]Yi Cui, Yuan Xue, Klara Nahrstedt:
Optimal Resource Allocation in Overlay Multicast. IEEE Trans. Parallel Distributed Syst. 17(8): 808-823 (2006) - [j7]Yi Cui, Yuan Xue, Klara Nahrstedt:
A utility-based distributed maximum lifetime routing algorithm for wireless networks. IEEE Trans. Veh. Technol. 55(3): 797-805 (2006) - [j6]Yuan Xue, Baochun Li, Klara Nahrstedt:
Channel-relay price pair: towards arbitrating incentives in wireless ad hoc networks. Wirel. Commun. Mob. Comput. 6: 235-245 (2006) - [c13]Nishanth Shankaran, Xenofon D. Koutsoukos, Douglas C. Schmidt, Yuan Xue, Chenyang Lu:
Hierarchical Control of Multiple Resources in Distributed Real-time and Embedded Systems. ECRTS 2006: 151-160 - [c12]Taojun Wu, Liang Dai, Yuan Xue, Yi Cui:
Digital Rights Management for Video Sensor Network. ISM 2006: 131-138 - [c11]Taojun Wu, Yuan Xue, Yi Cui:
Preserving Traffic Privacy in Wireless Mesh Networks. WOWMOM 2006: 459-461 - 2005
- [b1]Yuan Xue:
Price -Based Optimal Resource Allocation in Multi-Hop Wireless Networks. University of Illinois Urbana-Champaign, USA, 2005 - [j5]Yuan Xue, Yi Cui, Klara Nahrstedt:
Maximizing Lifetime for Data Aggregation in Wireless Sensor Networks. Mob. Networks Appl. 10(6): 853-864 (2005) - [c10]Yuan Xue, Yi Cui, Klara Nahrstedt:
A Utility-based Distributed Maximum Lifetime Routing Algorithm forWireless Networks. QSHINE 2005: 18 - 2004
- [j4]Kai Chen, Yuan Xue, Samarth H. Shah, Klara Nahrstedt:
Understanding bandwidth-delay product in mobile ad hoc networks. Comput. Commun. 27(10): 923-934 (2004) - [j3]Yi Cui, Yuan Xue, Klara Nahrstedt:
Optimal distributed multicast routing using network coding: theory and applications. SIGMETRICS Perform. Evaluation Rev. 32(2): 47-49 (2004) - [j2]Yuan Xue, Kai Chen, Klara Nahrstedt:
Achieving proportional delay differentiation in wireless LAN via cross-layer scheduling. Wirel. Commun. Mob. Comput. 4(8): 849-866 (2004) - [j1]Yuan Xue, Klara Nahrstedt:
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments. Wirel. Pers. Commun. 29(3-4): 367-388 (2004) - [c9]Yuan Xue, Kai Chen, Klara Nahrstedt:
Distributed end-to-end proportional delay differentiation in wireless LAN. ICC 2004: 4367-4371 - [c8]Chui Sian Ong, Yuan Xue, Klara Nahrstedt:
A middleware for service adaptation in differentiated 802.11 wireless networks. ICON 2004: 364-368 - [c7]Yi Cui, Yuan Xue, Klara Nahrstedt:
Maxmin overlay multicast: rate allocation and tree construction. IWQoS 2004: 221-231 - 2003
- [c6]Kai Chen, Yuan Xue, Klara Nahrstedt:
On setting TCP's congestion window limit in mobile ad hoc networks. ICC 2003: 1080-1084 - [c5]Yi Cui, Yuan Xue, Klara Nahrstedt:
Optimal Resource Allocation in Overlay Multicast. ICNP 2003: 71- - [c4]Yuan Xue, Baochun Li, Klara Nahrstedt:
Price-Based Resource Allocation in Wireless Ad Hoc Networks. IWQoS 2003: 79-96 - [c3]Yuan Xue, Klara Nahrstedt:
Fault tolerant routing in mobile ad hoc networks. WCNC 2003: 1174-1179 - 2001
- [c2]Yuan Xue, Baochun Li:
A location-aided power-aware routing protocol in mobile ad hoc networks. GLOBECOM 2001: 2837-2841 - [c1]Yuan Xue, Baochun Li, Klara Nahrstedt:
A Scalable Location Management Scheme in Mobile Ad-Hoc Networks. LCN 2001: 102-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint