D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 7,723 166 World Ranking 9523 National Ranking 952

Research.com Recognitions

Awards & Achievements

2017 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Wenyuan Xu spends much of his time researching Computer security, Computer network, Wireless, Wireless network and Speech recognition. The various areas that Wenyuan Xu examines in his Computer network study include Key distribution in wireless sensor networks and Communication channel, Channel surfing. He has included themes like Wireless sensor network, Shared medium and Mobile wireless sensor network in his Channel surfing study.

In Wireless, he works on issues like Spoofing attack, which are connected to Electricity, Smart meter, Automatic meter reading, Tire-pressure monitoring system and Identifier. His Wireless network study focuses on Wi-Fi array in particular. His Speech recognition study incorporates themes from S Voice, Exploit and Microphone.

His most cited work include:

  • The feasibility of launching and detecting jamming attacks in wireless networks (1078 citations)
  • Jamming sensor networks: attack and defense strategies (514 citations)
  • Channel surfing and spatial retreats: defenses against wireless denial of service (333 citations)

What are the main themes of his work throughout his whole career to date?

Wenyuan Xu focuses on Computer network, Wireless sensor network, Computer security, Wireless and Jamming. His Computer network research is multidisciplinary, incorporating perspectives in Wireless network, Smart grid and Cryptography. His Wireless sensor network research is multidisciplinary, relying on both Distributed computing, Sensor node, Key distribution in wireless sensor networks, Channel surfing and Efficient energy use.

His Channel surfing research includes elements of Denial-of-service attack and Shared medium. His Computer security research is multidisciplinary, incorporating elements of Android and Internet privacy. He has researched Wireless in several fields, including Process, Real-time computing and Network packet.

He most often published in these fields:

  • Computer network (34.87%)
  • Wireless sensor network (26.32%)
  • Computer security (24.34%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer network (34.87%)
  • Real-time computing (18.42%)
  • Wireless sensor network (26.32%)

In recent papers he was focusing on the following fields of study:

Wenyuan Xu mainly investigates Computer network, Real-time computing, Wireless sensor network, Smart grid and Anomaly detection. His study on Scheduling is often connected to Jamming as part of broader study in Computer network. Wenyuan Xu interconnects Network security and Feature in the investigation of issues within Real-time computing.

The Wireless sensor network study combines topics in areas such as Wireless, Network packet, Identification, User Friendly and SwIPe. The study incorporates disciplines such as Backup, Routing protocol, Node, IPv6 and Packet loss in addition to Smart grid. His research integrates issues of Industrial control system, Code, Testbed, Side channel attack and Condition monitoring in his study of Anomaly detection.

Between 2019 and 2021, his most popular works were:

  • Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. (2 citations)
  • SoK: A Minimalist Approach to Formalizing Analog Sensor Security (2 citations)
  • On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach (2 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

Real-time computing, Android, Human–computer interaction, Adversarial machine learning and Poltergeist are his primary areas of study. His studies in Real-time computing integrate themes in fields like Testbed, Anomaly detection, Smart grid and Condition monitoring. His work carried out in the field of Android brings together such families of science as Airfield traffic pattern, Wireless sensor network, Encryption and Network packet.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

The feasibility of launching and detecting jamming attacks in wireless networks

Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)

1573 Citations

The feasibility of launching and detecting jamming attacks in wireless networks

Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)

1573 Citations

Jamming sensor networks: attack and defense strategies

Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)

774 Citations

Jamming sensor networks: attack and defense strategies

Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)

774 Citations

Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study

Ishtiaq Rouf;Rob Miller;Hossen Mustafa;Travis Taylor.
usenix security symposium (2010)

493 Citations

Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study

Ishtiaq Rouf;Rob Miller;Hossen Mustafa;Travis Taylor.
usenix security symposium (2010)

493 Citations

Channel surfing and spatial retreats: defenses against wireless denial of service

Wenyuan Xu;Timothy Wood;Wade Trappe;Yanyong Zhang.
workshop on wireless security (2004)

469 Citations

Channel surfing and spatial retreats: defenses against wireless denial of service

Wenyuan Xu;Timothy Wood;Wade Trappe;Yanyong Zhang.
workshop on wireless security (2004)

469 Citations

DolphinAttack: Inaudible Voice Commands

Guoming Zhang;Chen Yan;Xiaoyu Ji;Tianchen Zhang.
computer and communications security (2017)

467 Citations

DolphinAttack: Inaudible Voice Commands

Guoming Zhang;Chen Yan;Xiaoyu Ji;Tianchen Zhang.
computer and communications security (2017)

467 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Wenyuan Xu

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 111

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 110

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 108

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 66

Wade Trappe

Wade Trappe

Rutgers, The State University of New Jersey

Publications: 37

Yingying Chen

Yingying Chen

Rutgers, The State University of New Jersey

Publications: 27

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 26

Kui Ren

Kui Ren

Zhejiang University

Publications: 23

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 19

Peng Ning

Peng Ning

Google (United States)

Publications: 19

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 16

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 15

Kang G. Shin

Kang G. Shin

University of Michigan–Ann Arbor

Publications: 15

Srikanth V. Krishnamurthy

Srikanth V. Krishnamurthy

University of California, Riverside

Publications: 14

H. Vincent Poor

H. Vincent Poor

Princeton University

Publications: 14

Radha Poovendran

Radha Poovendran

University of Washington

Publications: 13

Trending Scientists

Adrian F. M. Smith

Adrian F. M. Smith

Imperial College London

Boqing Gong

Boqing Gong

Google (United States)

Tamer Kadous

Tamer Kadous

XCOM Labs

Andreas R. Bausch

Andreas R. Bausch

Technical University of Munich

Tapas Kuila

Tapas Kuila

Central Mechanical Engineering Research Institute

Patrick S. G. Chain

Patrick S. G. Chain

Los Alamos National Laboratory

Dale A. Ramsden

Dale A. Ramsden

University of North Carolina at Chapel Hill

Karolien De Bosscher

Karolien De Bosscher

Ghent University

Carmala N. Garzione

Carmala N. Garzione

University of Rochester

William C. Keene

William C. Keene

University of Virginia

Karunesh Ganguly

Karunesh Ganguly

University of California, San Francisco

John R. Gordon

John R. Gordon

University of Saskatchewan

David I. Watkins

David I. Watkins

University of Wisconsin–Madison

Kimberlee Gauvreau

Kimberlee Gauvreau

Boston Children's Hospital

Rainer Rupprecht

Rainer Rupprecht

Max Planck Society

Donald W. Light

Donald W. Light

Rowan University

Something went wrong. Please try again later.