M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks, Springer, 2018.
R. Pellikaan, X.-W. Wu, S. Bulygin, and R. Jurrius, Codes, Cryptology and Curves with Computer Algebra, Cambridge University Press, Cambridge, UK, 2017.
G.-L. Feng, X.-W. Wu, Algebraic-Geometric Codes, Science Press, Beijing, China, 1998.
K. Biswas, V. Muthu, M. J. M. Chowdhury, X.-W. Wu, K. Singh, "A multipath routing protocol for secure energy efficient communication in wireless sensor networks," Computer Networks (Elsevier, impact factor: 5.493), June 2023.
Z. Good, W. Farag, X.-W. Wu, S. Ezekiel, M. Balega, F. May, and A. Deak, "Comparative Analysis of Machine Learning Techniques for IoT Anomaly Detection Using the NSL-KDD Dataset," International Journal of Computer Science and Network Security, Vol.23, No.1, pp.46-52, 2023.
X.-W. Wu, Y. Cao, and R. Dankwa, "Accuracy vs Efficiency: Machine Learning Enabled Anomaly Detection on the Internet of Things," Proceedings of the 2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Nov. 2022, pp. 245-251.
M. Balega, W. Farag, S. Ezekiel, X.-W. Wu, A. Deak, and Z. Good, “IoT Anomaly Detection Using a Multitude of Machine Learning Algorithms,” Proceedings of the 2022 IEEE Applied Imagery Pattern Recognition Workshop, Washington, DC., Oct. 11-13, 2022, pp. 1-6.
G. Raja, S. Anbalagan, G. Vijayaraghavan, S. Theerthagiri, S. Suryanarayan, X.-W. Wu, "SP-CIDS: Secure and Private Collaborative IDS for VANETs," IEEE Transactions on Intelligent Transportation Systems, Vol. 22, No. 7, pp. 4385 - 4393, July 2021.
Z. Liu, X.-W. Wu, “Notes on LCD codes over Frobenius rings,” IEEE Communications Letters, Vol. 25, No. 2, pp. 361-364, February 2021.
A. Robbins, W. Farag, X.-W. Wu, and P. Chaudhary, "Zigbee as a candidate standard for use in anomaly detection in IoT LANs", Proc. SPIE 11751, Disruptive Technologies in Information Sciences V, 117510K (12 April 2021); https://doi.org/10.1117/12.2588155
X.-W. Wu, A. Jolfaei, “Securing the Internet of Everything Through Adaptive and Resource-Efficient Mechanisms," IEEE Internet of Things Magazine, Vol. 3, No. 4, pp. 16-19, December 2020.
S. Ezekiel, A. Ali Alshehri, L. Pearlstein, X.-W. Wu, A. Lutz, “IoT Anomaly Detection using Multivariate,” International Journal of Innovative Technology and Exploring Engineering, Vol.9, No.4, 2020, pp. 1662-1669.
P. Beelen, O. Geil, E. Martínez-Moro, and X.-W. Wu, “Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan,” Designs, Codes and Cryptography, 88(8), 1477-1478, 2020.
T. Valentine, K. Ravindran, P. Chaudhary, S. Ezekiel, X.-W. Wu, “Mitigating Security Risk of IoT with A Blockchain-Based Solution,” Proceedings of the 2020 Annual IEEE Applied Imagery Pattern Recognition Workshop, virtual online conference, Oct 13-15, 2020.
W. Farag, S. Ali, and X.-W. Wu, "Comparing Achievement of Learning Outcomes and Success Indicators in Online Computer Literacy Classes with Blended Offerings," Proceedings of 12th Annual International Conference on Education and New Learning Technologies, July 6-7, 2020.
G. Yang, X.-W. Wu, Li Ying, “Energy Efficient Protocol for Routing and Scheduling for Wireless Body Area Networks,” Wireless Networks (Springer), Vol. 25, No.9, pp.1-9, 2019.
M. Greferath, Z. Liu, X.-W. Wu, J. ZumbrÄage, “New Results on the Pseudoredundancy,” Bulletin of the Korean Mathematical Society, Vol. 56, No. 1, pp. 111-130, 2019.
J. Wang, X. Ren, S. Anirban, X.-W. Wu, “Correct Filtering for Subgraph Isomorphism Search in Compressed Vertex-Labelled Graphs,” Information Sciences, (Elsevier), Vol. 482, pp. 363-373, 2019.
X.-W. Wu, W. Farag, S. Ali, and S. Kulkarni, “An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices”, Proceedings of the 10thIEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, Columbia University, New York, USA, October 10-12, pp. 676-682, 2019.
L. Njilla, L. Pearlstein, X.-W. Wu, A. Lutz, S. Ezekiel, “Internet of Things Anomaly Detection using Machine Learning,” Proceedings of the 48th Annual IEEE Applied Imagery Pattern Recognition: Cognition, Collaboration, and Cloud, Washington, D.C., USA, Oct 15-17, 2019., 6 pages.
S. Chavan, A. Inamdar, A. Dorle, S. Kulkarni, X.-W. Wu, “Phishing Detection: Malicious and Benign Websites Classification using Machine Learning Techniques,” Proceedings of International Conference on Computational Science and Applications (ICCSA 2019), Pune, India, August 7-9, 2019.
E.-H. Yang, X.-W. Wu, “On Optimal Information-Theoretical Secure Key Management,” Proceedings of the 16th Canadian Workshop on Information Theory, Hamilton, Ontario, Canada, June 2-5, 2019.
G. Yang, X.-W. Wu, “A Distributed Secure Monitoring System based on Blockchain,” International Journal of Performability Engineering, Vol.14, No.10, pp.2393-2402, Oct. 2018.
R. Kulkarni, K. Khadilkar, S. Kulkarni, X.-W. Wu, “A Wide & Deep Neural Network and Ensemble Based Approach for Phishing Detection,” Proceedings of the International Conference on Machine Learning and Data Science (ICMLDS 2018), Hyderabad, India, Dec. 21-22, 2018.
G. Yang, X.-W. Wu, “A Lightweight Security and Energy-efficient Clustering Protocol for Wireless Sensor Networks,” Proceedings of the 10th EAI International Conference on Ad Hoc Networks, Cairns, Australia, September 20-23, 2018, 6 pages.
K. Hasan, X.-W. Wu, K. Biswas and K. Ahmed, “A Novel Framework for Software Defined Wireless Body Area Network,” Proceedings of the 8th International Conference on Intelligent Systems, Modelling and Simulation, Kuala Lumpur, Malaysia, May 8-10, 2018, 6 pages.
X.-W. Wu, E.-H. Yang, and J. Wang, “Lightweight Security Protocols for the Internet of Things,” Proceedings of the 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2017), Montreal, Canada, October 8 - 13, 2017, 7 pages (invited paper).
E.-H. Yang, X.-W. Wu, “Information-Theoretically Secure Key Generation and Management,” Proceedings of 2017 IEEE International Symposium on Information Theory (ISIT 2017), Aachen, Germany, June 25 - 30, 2017, pp.1529-1533.
Jolfaei, X.-W. Wu, V. Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes,” IEEE Transactions on Information Forensics and Security, Vol.11, No.2, pp.235-246, 2016.
Z. Liu, X.-W. Wu, “The fullrank value function,” Designs, Codes and Cryptography, Vol.81, No.2, pp.297-315, 2016.
W. Pullan, X.-W. Wu, Z. Liu, “Construction of optimal constant-dimension subspace codes,” Journal of Combinatorial Optimization, Vol.31, No.4, 1709-1719, 2016.
Z. Liu, X.-W. Wu, “Trellis complexity and pseudoredundancy of relative two-weight codes,” Applicable Algebra in Engineering, Communication and Computing, 27(2): 139-158, 2016.
G.Z. Khan, R. Gonzalez, E.-C. Park, X.-W. Wu, “Analysis of Very High Throughput (VHT) at MAC and PHY Layers under MIMO Channel in IEEE 802.11ac WLAN,” ICACT Transactions on Advanced Communications Technology, Vol.5, No.4, 877-888, 2016.
K. Biswas, V. Muthukkumarasamy, X.-W. Wu, and K. Singh, “Performance Evaluation of Block Ciphers for Wireless Sensor Networks,” in: Advanced Computing and Communication Technologies, (Eds: R. Choudhary, et al), Springer, Singapore, 2016, pp.443-452.
G.Z. Khan, R. Gonzalez, X.-W. Wu, E.-C. Park, “On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN,” Proceedings of 15th International Conference on Frontiers of Information Technology (FIT 2016), Islamabad, Pakistan, Dec. 18-20, 2016, pp.164-169.
A. Jolfaei, X.-W. Wu, V.Muthukkumarasamy, “A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability,” IEEE Transactions on Information Forensics and Security, Vol.10, No.2, pp.409-422, 2015.
M. Usman, V. Muthukkumarasamy, and X.-W. Wu, “Mobile Agent-Based Cross-Layer Anomaly Detection in Smart Home Sensor Networks Using Fuzzy logic,” IEEE Transactions on Consumer Electronics, Vol.61, No.2, pp.197-205, 2015.
M. Usman, V. Muthukkumarasamy, and X.-W. Wu, “Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection in Resource Constrained Networks,” Journal of Networks, Vol.10, No.6, pp.353-368, 2015.
K. Biswas, V. Muthukkumarasamy, X.-W. Wu, and K. Singh, “An Analytical Model for Lifetime Estimation of Wireless Sensor Networks,” IEEE Communications Letters, Vol.19, No.9, pp.1584-1587, 2015.
Z. Liu, X.-W. Wu, “On Relative Constant-Weight Codes,” Designs, Codes and Cryptography, Vol.75, No.1, pp.127-144, 2015.
K. Biswas, V. Muthukkumarasamy, X.-W. Wu, and K. Singh, “An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks,” Journal of Networks, Vol.10, No.11, pp.616-624, 2015.
A. Rahman, V. Muthukkumarasamy, and X.-W. Wu, “Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB),” Journal of Networks, Vol.10, No.8, pp.462-469, 2015.
A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, “A Secure Lightweight Texture Encryption Scheme,” Proceedings of 7th Pacific Rim Symposium on Image and Video Technology (PSIVT), Auckland, New Zealand, 23 - 27 November 2015, Lecture Notes in Computer Science Vol. 9555, pp.344-356.
G.Z. Khan, R. Gonzalez, E.-C. Park, X.-W. Wu, “A reliable multicast MAC protocol for Wi-Fi Direct 802.11 networks,” Proceedings of 2015 European Conference on Networks and Communications (EuCNC 2015), Paris, France, June 29 - July 2, 2015, pp.224-228.
A. Jolfaei, X.-W.Wu, V. Muthukkumarasamy, “Comments on the security of ‘Diffusion-substitution based gray image encryption’ scheme,” Digital Signal Processing, Vol.32, pp.34-36, 2014.
M. Usmana, V. Muthukkumarasamy, and X.-W. Wu, “A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks,” Journal of Networks, Vol.9, No.12, pp.3427-3444, 2014.
M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, “Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends,” in: Security for Multihop Wireless Networks, (Eds: S. Mauri and L. Mauri), CRC Press, USA, 2014, pp.273-304.
B. Zarei, V. Muthukkumarasay, and X.-W. Wu, “Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder,” Proceedings of the 2014 International Conference on Advances in Computer and Electronics Technology (ACET 2014), Hong Kong, 26-27 August 2014, pp.69-73.
X.-W. Wu, “Dynamic Traitor Tracing with Near Optimal Codes,” Proceedings of the 21st International Symposium on Mathematical Theory of Networks and Systems, (MTNS),Groningen, the Netherlands, July 7-11, 2014, pp. 920-922.
Z. Liu, J. Zumbragel, M. Greferath, X.-W. Wu, “Notes on the Pseudoredundancy,” Proceedings of 2014 IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA, 29 June - 4 July 2014, pp.2789-2793.
X.-B. Liu, S. N. Koh, C.-C. Chui, and X.-W. Wu, “A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder,” IEEE Transactions on Information Forensics and Security, Vol.8, No.3, pp.542-552, 2013.
M. Usman, V. Muthukkumarasamy, X.-W. Wu, “Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks,” Proceedings of the 8th IEEE Workshop on Network Security, Sydney, Australia, October 24, 2013, pp. 1029-1037.
A. Jolfaei, X.-W. Wu, and V. Muthukkumarasamy, “On the Feasibility and Performance of Pass-thought Authentication Systems,” Proceedings of the 3013 Fourth International Conference on Emerging Security Technologies (EST-2013), Cambridge, UK, September 9-11, 2013, pp.33-38.
B. Zarei, V. Muthukkumarasay, and X.-W. Wu, “A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks,” Proceedings of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013, pp.197-204.
X.-B. Liu, S. N. Koh, X.-W. Wu, and C.-C. Chui, “Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers,” IET Information Security, Vol.6, No.3, pp.183-189, 2012.
X. Ren, X.-W. Wu, and K. Tang, “TSPass: A Dynamic User Authentication Scheme Based on Time and Space,” International Journal of Computer Science and Network Security, Vol.12, No.10, pp.45-53, 2012.
X.-B. Liu, S. N. Koh, X.-W. Wu, and C.-C. Chui, “Reconstructing a Linear Scrambler with Improved Detection Capability and in the Presence of Noise,” IEEE Transactions on Information Forensics and Security, Vol.7, No.1, pp.208-218, 2012.
X.-W. Wu, A. W.-C. Liew, “Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution,” presented at the International Symposium on Cyberspace Safety and Security (CSS 2012) (Melbourne, Australia, December 12-13, 2012); published in: Lecture Notes in Computer Science (LNCS), Vol.7672, 2012, pp.352-361.
X. Ren, X.-W. Wu, “A Novel Dynamic User Authentication Scheme,” Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012), Gold Coast, Australia, 2-5 October 2012, pp.718-722.
M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, “Securing Mobile Agent based Wireless Sensor Network Applications on Middleware,” Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012), Gold Coast, Australia, 2-5 October 2012, pp.712-717.
M. Usman, V. Muthukkumarasamy, X.-W. Wu, S. Khanum, “Wireless Smart Home Sensor Networks: Mobile Agent based Anomaly Detection,” Proceedings of 9th IEEE International Conference on Ubiquitous Intelligence and Computing (IEEE UIC 2012), Fukuoka, Japan, September 04-07, 2012, pp.322-329.
Z. Liu, X.-W. Wu, “On a Class of Three-Weight Codes with Cryptographic Applications,” Proceedings of 2012 IEEE International Symposium on Information Theory, MIT, Cambridge, USA, 1-6 July 2012, pp.2561-2565.
X.-W. Wu, A. Sattar, “A New Class of Traceability Schemes for Protecting Digital Content against Illegal Re-distribution,” International Journal of Computer Science and Network Security, Vol.11, No.12, pp.91-98, 2011.
Z. Liu, X.-W. Wu, W. Chen, and Y. Luo, “New code equivalence based on relative generalized Hamming weights,” Information Sciences, Vol.181, No.19, pp.4309-4317, 2011.
A. Kelarev, J. Yearwood, P. Watters, X.-W. Wu, L. Ma, J. Abawajy, L. Pan, “A Groebner-Shirshov Algorithm for Applications in Internet Security,” Southeast Asian Bulletin of Mathematics, vol. 35, pp. 807-820, 2011.
A.V. Kelarev, S. Brown, P. Watters, X.-W. Wu and R. Dazeley, “Establishing Reasoning Communities of Security Experts for Internet Commerce Security,” in: Technologies for Supporting Reasoning Communities and Collaborative Decision Making: Cooperative Approaches, (Eds: J. Yearwood and A. Stranieri), Information Science Publishing, January 2011, pp.380-395.
X.-B. Liu, S. N. Koh, X.-W. Wu, and C.-C. Chui, “Investigation on Scrambler Reconstruction With Minimum A Priori Knowledge,” Proceedings of 2011 IEEE Global Communications Conference (IEEE GLOBECOM 2011), Houston, Texas, 5-9 December 2011, pp.1-5.
Z. Liu, J. Wang, and X.-W. Wu, “On the relative generalized Hamming weights of linear codes and their subcodes,” SIAM Journal on Discrete Mathematics, Vol. 24, No.4, pp.1234-1241, 2010.
A.V. Kelarev, J.L.Yearwood, P.Watters, X.-W. Wu, J.H. Abawajy, L.Pan, “Internet Security Applications of the Munn Rings,” Semigroup Forum, 81(1), 2010, pp. 162-171, 2010.
L. Zi, J. Yearwood, and X.-W. Wu, “Adaptive Clustering with Feature Ranking for DDoS Attacks Detection,” Proceedings of 2010 Fourth International Conference on Network and System Security,September 1-3, 2010, Melbourne, Australia, pp.281-286.
X.-W. Wu, S.N. Koh, and C.-C. Chui, “Primitive Polynomials for Robust Scramblers and Stream Ciphers Against Reverse Engineering,” Proceedings of 2010 IEEE International Symposium on Information Theory, Austin, USA, 13 – 18 June 2010, pp. 2473-2477.
D. Lobo, P. Watters, and X.-W. Wu, and L. Sun, “Windows Rootkits: Attacks and Countermeasures,” Proceedings of the 2010 Cybercrime and Trustworthy Computing Workshop, 19-20th July 2010, Ballarat, Australia, pp. 69-78.
D. Lobo, P. Watters, and X.-W. Wu, “Identifying Rootkit Infections Using Data Mining,” Proceedings of The 2010 International Conference on Information Science and Applications, (21- 23, April 2010, Seoul, Korea), pp. 373-379.
D. Lobo, P. Watters, and X.-W. Wu, “Identification of Multiple Rootkit Infections,” Proceedings of The 2010 International Conference on Communication Software and Networks, (26 - 28, February 2010, Singapore), pp. 124-128.
D. Lobo, P. Watters, and X.-W. Wu, “RBACS: Rootkit Behavioral Analysis and Classification System," Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining,(8-11, January 2010, Phuket, Thailand), pp. 75-80.
X.-W. Wu, P. Watters, and J. Yearwood, “New Traceability Codes and Identification Algorithm for Tracing Pirates,” Proceedings of 2008 IEEE International Symposium on Parallel and Distributed Processing with Application, Sydney, Australia, 10 - 12 December 2008, pp.719-724.
X.-W. Wu, M. Kuijper, and P. Udaya, “Lower Bound on Minimum Lee Distance of Algebraic-Geometric Codes over Finite Fields,” IEE Electronics Letters, Vol.43, No.15, pp.820-822, 2007.
X.-W. Wu, “Efficient Traitor-Tracing Algorithms Based on List Decoding,” Proceedings of the 2007 International Conference on Graph Theory and Information Security, Bandung, Indonesia, 10 - 13 February 2007.
X.-W. Wu, M. Kuijper, and P. Udaya, “A Root-Finding Algorithm for List Decoding of Reed-Muller Codes,” IEEE Transactions on Information Theory, Vol.51, No.3, pp.1190-1196, 2005.
X.-W. Wu, M. Kuijper, and P. Udaya, “On the Decoding Radius of Lee-Metric Decoding of Algebraic-Geometric Codes,” Proceedings of 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, 5 - 9 September 2005, pp.1191-1195.
M. Kuijper, X.-W. Wu, and P. Udaya, “Behavioral Models over Rings - Minimal Representations and Applications to Coding and Sequences,” Proceedings of the 16th World Congress of International Federation of Automatic Control, Praha, Czech Republic, July 4-8, 2005, pp.1198-1203.
X.-W. Wu, M. Kuijper, and P. Udaya, “Improved Decoding of Algebraic-Geometric Codes with Respect to the Lee Metric,” Proceedings of 2005 Australian Communications Theory Workshop, Brisbane, Australia, 2-4 February 2005, pp.111-115.
R. Pellikaan, X.-W. Wu, “List Decoding of q-ary Reed-Muller Codes,” IEEE Transactions on Information Theory, Vol.50, No.4, pp.679-682, 2004.
X.-W. Wu, M. Kuijper, and P. Udaya, “A Class of Algebraic-Geometric Codes for Lee Metric and Their Decoding,” Proceedings of 2004 IEEE International Symposium on Information Theory, Chicago, USA, 27 June - 2 July 2004, p.77.
X.-W. Wu, M. Kuijper, and P. Udaya, “On Lee-Metric Decoding of Algebraic-Geometric Codes,” Proceedings of 2004 Australian Communications Theory Workshop, Newcastle, Australia, 4-6 February 2004, pp.82-85.
P. Udaya, X.-W. Wu, and M. Kuijper, “List Lee-Metric Decoding Algorithm for Generalized Reed-Solomon Codes over Commutative Rings with Identity,” Proceedings of 10th Conference on Communications of India, Bangalore, India, 30 January - 1 February 2004, pp. 244-248.
X.-W. Wu, M. Kuijper, and P. Udaya, “Lee-Metric Decoding of BCH and Reed-Solomon Codes,” IEE Electronics Letters, Vol.39, No.21, pp.1522-1524, 2003.
X.-W. Wu, M. Kuijper, and P. Udaya, “A Lee-Metric Decoding Algorithm for Reed-Solomon Codes over GF(p),” Proceedings of 7th International Symposium on Digital Signal Processing and Communication Systems, Gold Coast, Australia, 8-11 December 2003, pp.26-31.
X.-W. Wu, “An Algorithm for Finding the Roots of the Polynomials over Order Domains,” Proceedings of 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, June 2002, p.202.
X.-W. Wu, P. H. Siegel, “Efficient Root-Finding Algorithm with Application to List Decoding of Algebraic-Geometric Codes,” IEEE Transactions on Information Theory, Vol.47, No.6, pp.2579-2587, 2001.
X.-W. Wu, “The Codes with Fixed Minimum Distance and Better than the Gilbert-Varshamov Bound,” Advances in Mathematics (China), Vol.30, No.6, pp. 495-509, 2001.
X.-W. Wu, “Parameters of the Codes over Affine Varieties,” Science in China, Vol.43, No.2, pp.141-148, 2000.
X.-W. Wu, P. H. Siegel, “Fast Computation of Roots of Polynomials over Function Fields and Fast List Decoding of Algebraic Geometric Codes,” Proceedings of 2000 IEEE International Symposium on Information Theory, Sorrento, Italy, June 2000, p.478.
G.L. Feng, X.-W. Wu, and T.R.N. Rao, “New DbEC-TbED Codes Better Than the Gilbert-Varshamov Existence Bound,” Proceedings of 2000 IEEE International Symposium on Information Theory, Sorrento, Italy, June 2000, p.32.
G.-L. Feng, X.-W. Wu, and T.R.N. Rao, “Correction to ‘New Double-Byte Error-Correcting Codes for Memory Systems’,” IEEE Transactions on Information Theory, Vol.45, No.6, p.2209, 1999.
G.-L. Feng, X.-W. Wu, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,” IEEE Transactions on Information Theory, Vol.44, No.3, pp.1152-1163, 1998.
G.L. Feng, X.-W. Wu, and T.R.N. Rao, “On the Missing Functions of the Hermitian-like Codes over GF(22),” Proceedings of 1998 IEEE International Symposium on Information Theory, MIT, USA, August 1998, p.379.
Z.-X. Wan, X.-W. Wu, “The Weight Hierarchies and Generalized Weight Spectra of the Projective Codes from Degenerate Quadrics,” Discrete Mathematics, Vol.177, pp.223-243, 1997.
X.-W. Wu, “A Class of Codes from Projective Algebraic Varieties,” Chinese Science Bulletin, Vol.42, No.11, pp.1146-1149, 1997.
G.L. Feng, X.-W. Wu, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,” Proceedings of 1997 IEEE International Symposium on Information Theory, Ulm, Germany, June 1997, p.222.
X.-W. Wu, “Generalized Hamming Weights of the Projective Codes from Hermitian Varieties,” Science in China, Vol.39, No.2, pp.148-158, 1996.
X.-W. Wu, G.L. Feng, and T.R.N. Rao, “The Weight Hierarchies and Chain Condition of a Class of Codes from Varieties over Finite Fields,” Proceedings of 34th Annual Allerton Conference on Communication, Control and Computing, (Monticello, Illinois, USA, October 1996, pp.286-293).
X.-W. Wu, Z.-X. Wan, “The Weight Spectra of the Projective Codes from Degenerate Quadrics,” Proceedings of 1st International Symposium of China-Japan on Algebraic Combinatorics, Beijing, October 1994, pp.83-85.
X.-W. Wu, “Generalized Hamming Weights of Projective Reed-Muller Codes of Lower Orders,” In: Advances in Cryptology - Chinacrypt'96, (Eds: D.-Y. Pei, et al), Science Press, Beijing, China, 1996, pp.236-243.
X.-W. Wu, “On Monodromy of Semi-Stable Fibres,” Chinese Science Bulletin, Vol.39, No.14, pp.1145-1149, 1994.