M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, and S. Khanum, *Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks*, Springer, 2018.

R. Pellikaan, **X.-W. Wu**, S. Bulygin, and R. Jurrius, *Codes, Cryptology and Curves with Computer Algebra*, Cambridge University Press, Cambridge, UK, 2017.

G.-L. Feng, **X.-W. Wu**, *Algebraic-Geometric Codes*, Science Press, Beijing, China, 1998.

K. Biswas, V. Muthu, M. J. M. Chowdhury, **X.-W. Wu**, K. Singh, "A multipath routing protocol for secure energy efficient communication in wireless sensor networks," *Computer Networks *(Elsevier, impact factor: 5.493), June 2023.

Z. Good, W. Farag, **X.-W. Wu**, S. Ezekiel, M. Balega, F. May, and A. Deak, "Comparative Analysis of Machine Learning Techniques for IoT Anomaly Detection Using the NSL-KDD Dataset," *International Journal of Computer Science and Network Security*, Vol.23, No.1, pp.46-52, 2023.

**X.-W. Wu**, Y. Cao, and R. Dankwa, "Accuracy vs Efficiency: Machine Learning Enabled Anomaly Detection on the Internet of Things," Proceedings of the 2022 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Nov. 2022, pp. 245-251.

M. Balega, W. Farag, S. Ezekiel, **X.-W. Wu**, A. Deak, and Z. Good, “IoT Anomaly Detection Using a Multitude of Machine Learning Algorithms,” Proceedings of the 2022 IEEE Applied Imagery Pattern Recognition Workshop, Washington, DC., Oct. 11-13, 2022, pp. 1-6.

G. Raja, S. Anbalagan, G. Vijayaraghavan, S. Theerthagiri, S. Suryanarayan, **X.-W. Wu**, "SP-CIDS: Secure and Private Collaborative IDS for VANETs," IEEE Transactions on Intelligent Transportation Systems, Vol. 22, No. 7, pp. 4385 - 4393, July 2021.

Z. Liu, **X.-W. Wu**, “Notes on LCD codes over Frobenius rings,” IEEE Communications Letters, Vol. 25, No. 2, pp. 361-364, February 2021.

A. Robbins, W. Farag, **X.-W. Wu**, and P. Chaudhary, "Zigbee as a candidate standard for use in anomaly detection in IoT LANs", Proc. SPIE 11751, Disruptive Technologies in Information Sciences V, 117510K (12 April 2021); https://doi.org/10.1117/12.2588155

**X.-W. Wu**, A. Jolfaei, “Securing the Internet of Everything Through Adaptive and Resource-Efficient Mechanisms," *IEEE Internet of Things Magazine*, Vol. 3, No. 4, pp. 16-19, December 2020.

S. Ezekiel, A. Ali Alshehri, L. Pearlstein, **X.-W. Wu**, A. Lutz, “IoT Anomaly Detection using Multivariate,” *International Journal of Innovative Technology and Exploring Engineering*, Vol.9, No.4, 2020, pp. 1662-1669.

P. Beelen, O. Geil, E. Martínez-Moro, and **X.-W. Wu**, “Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan,” *Designs, Codes and Cryptography*, 88(8), 1477-1478, 2020.

T. Valentine, K. Ravindran, P. Chaudhary, S. Ezekiel, X.-W. Wu, “Mitigating Security Risk of IoT with A Blockchain-Based Solution,” *Proceedings of the 2020 Annual IEEE Applied Imagery Pattern Recognition Workshop*, virtual online conference, Oct 13-15, 2020.

W. Farag, S. Ali, and **X.-W. Wu**, "Comparing Achievement of Learning Outcomes and Success Indicators in Online Computer Literacy Classes with Blended Offerings," *Proceedings of 12th Annual International Conference on Education and New Learning Technologies*, July 6-7, 2020.

G. Yang, **X.-W. Wu**, Li Ying, “Energy Efficient Protocol for Routing and Scheduling for Wireless Body Area Networks,” *Wireless Networks* (Springer), Vol. 25, No.9, pp.1-9, 2019.

M. Greferath, Z. Liu, **X.-W. Wu**, J. ZumbrÄage,** “**New Results on the Pseudoredundancy,” *Bulletin of the Korean Mathematical Society, *Vol. 56, No. 1, pp. 111-130, 2019.

J. Wang, X. Ren, S. Anirban, **X.-W. Wu**, “Correct Filtering for Subgraph Isomorphism Search in Compressed Vertex-Labelled Graphs,” *Information Sciences*, (Elsevier), Vol. 482, pp. 363-373, 2019.

**X.-W. Wu**, W. Farag, S. Ali, and S. Kulkarni, “An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices”, *Proceedings of the 10thIEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference*, Columbia University, New York, USA, October 10-12, pp. 676-682, 2019.

L. Njilla, L. Pearlstein, **X.-W. Wu**, A. Lutz, S. Ezekiel, “Internet of Things Anomaly Detection using Machine Learning,” *Proceedings of the 48th Annual IEEE Applied Imagery Pattern Recognition: Cognition, Collaboration, and Cloud*, Washington, D.C., USA, Oct 15-17, 2019., 6 pages.

S. Chavan, A. Inamdar, A. Dorle, S. Kulkarni, **X.-W. Wu**, “Phishing Detection: Malicious and Benign Websites Classification using Machine Learning Techniques,” *Proceedings of International Conference on Computational Science and Applications (ICCSA 2019)*, Pune, India, August 7-9, 2019.

E.-H. Yang, **X.-W. Wu**, “On Optimal Information-Theoretical Secure Key Management,” *Proceedings of the 16th Canadian Workshop on Information Theory*, Hamilton, Ontario, Canada, June 2-5, 2019.

G. Yang, **X.-W. Wu**, “A Distributed Secure Monitoring System based on Blockchain,” *International Journal of Performability Engineering*, Vol.14, No.10, pp.2393-2402, Oct. 2018.

R. Kulkarni, K. Khadilkar, S. Kulkarni, **X.-W. Wu**, “A Wide & Deep Neural Network and Ensemble Based Approach for Phishing Detection,” *Proceedings of the International Conference on Machine Learning and Data Science (ICMLDS 2018)*, Hyderabad, India, Dec. 21-22, 2018.

G. Yang, **X.-W. Wu**, “A Lightweight Security and Energy-efficient Clustering Protocol for Wireless Sensor Networks,” *Proceedings of the 10th* *EAI International Conference on Ad Hoc Networks, *Cairns, Australia, September 20-23, 2018, 6 pages.

K. Hasan, **X.-W. Wu**, K. Biswas and K. Ahmed, “A Novel Framework for Software Defined Wireless Body Area Network,” *Proceedings of the 8th International Conference on Intelligent Systems, Modelling and Simulation*, Kuala Lumpur, Malaysia, May 8-10, 2018, 6 pages.

**X.-W. Wu**, E.-H. Yang, and J. Wang, “Lightweight Security Protocols for the Internet of Things,” *Proceedings of* *the 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications* (*IEEE PIMRC 2017*), Montreal, Canada, October 8 - 13, 2017, 7 pages (invited paper).

E.-H. Yang, **X.-W. Wu**, “Information-Theoretically Secure Key Generation and Management,” *Proceedings of* *2017* *IEEE International Symposium on Information Theory (ISIT 2017)*, Aachen, Germany, June 25 - 30, 2017, pp.1529-1533.

Jolfaei, **X.-W. Wu**, V. Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes,” *IEEE Transactions on Information Forensics and Security*, Vol.11, No.2, pp.235-246, 2016.

Z. Liu, **X.-W. Wu**, “The fullrank value function,” *Designs, Codes and Cryptography*, Vol.81, No.2, pp.297-315, 2016.

W. Pullan, **X.-W. Wu**, Z. Liu, “Construction of optimal constant-dimension subspace codes,” *Journal of Combinatorial Optimization*, Vol.31, No.4, 1709-1719, 2016.

Z. Liu, **X.-W. Wu**, “Trellis complexity and pseudoredundancy of relative two-weight codes,” *Applicable Algebra in Engineering, Communication and Computing*, 27(2): 139-158, 2016.

G.Z. Khan, R. Gonzalez, E.-C. Park, **X.-W. Wu**, “Analysis of Very High Throughput (VHT) at MAC and PHY Layers under MIMO Channel in IEEE 802.11ac WLAN,” *ICACT Transactions on Advanced Communications Technology*, Vol.5, No.4, 877-888, 2016.

K. Biswas, V. Muthukkumarasamy, **X.-W. Wu**, and K. Singh, “Performance Evaluation of Block Ciphers for Wireless Sensor Networks,” in: Advanced Computing and Communication Technologies, (Eds: R. Choudhary, et al), Springer, Singapore, 2016, pp.443-452.

G.Z. Khan, R. Gonzalez, **X.-W. Wu**, E.-C. Park, “On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN,” *Proceedings of 15th International Conference on Frontiers of Information Technology (FIT 2016)*, Islamabad, Pakistan, Dec. 18-20, 2016, pp.164-169.

A. Jolfaei, **X.-W. Wu**, V.Muthukkumarasamy, “A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability,” *IEEE Transactions on Information Forensics and Security*, Vol.10, No.2, pp.409-422, 2015.

M. Usman, V. Muthukkumarasamy, and **X.-W. Wu**, “Mobile Agent-Based Cross-Layer Anomaly Detection in Smart Home Sensor Networks Using Fuzzy logic,” *IEEE Transactions on Consumer Electronics*, Vol.61, No.2, pp.197-205, 2015.

M. Usman, V. Muthukkumarasamy, and **X.-W. Wu**, “Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection in Resource Constrained Networks,” *Journal of Networks*, Vol.10, No.6, pp.353-368, 2015.

K. Biswas, V. Muthukkumarasamy, **X.-W. Wu**, and K. Singh, “An Analytical Model for Lifetime Estimation of Wireless Sensor Networks,” *IEEE Communications Letters*, Vol.19, No.9, pp.1584-1587, 2015.

Z. Liu, **X.-W. Wu**, “On Relative Constant-Weight Codes,” *Designs, Codes and Cryptography*, Vol.75, No.1, pp.127-144, 2015.

K. Biswas, V. Muthukkumarasamy, **X.-W. Wu**, and K. Singh, “An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks,” *Journal of Networks*, Vol.10, No.11, pp.616-624, 2015.

A. Rahman, V. Muthukkumarasamy, and **X.-W. Wu**, “Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB),” *Journal of Networks*, Vol.10, No.8, pp.462-469, 2015.

A. Jolfaei, **X.-W. Wu**, and V. Muthukkumarasamy, “A Secure Lightweight Texture Encryption Scheme,” *Proceedings of 7th Pacific Rim Symposium on Image and Video Technology (PSIVT), *Auckland, New Zealand, 23 - 27 November 2015, Lecture Notes in Computer Science Vol. 9555, pp.344-356.

G.Z. Khan, R. Gonzalez, E.-C. Park, **X.-W. Wu**, “A reliable multicast MAC protocol for Wi-Fi Direct 802.11 networks,” *Proceedings of 2015 European Conference on Networks and Communications* (*EuCNC 2015*), Paris, France, June 29 - July 2, 2015, pp.224-228.

A. Jolfaei, **X.-W.Wu**, V. Muthukkumarasamy, “Comments on the security of ‘Diffusion-substitution based gray image encryption’ scheme,” *Digital Signal Processing*, Vol.32, pp.34-36, 2014.

M. Usmana, V. Muthukkumarasamy, and **X.-W. Wu**, “A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks,” *Journal of Networks*, Vol.9, No.12, pp.3427-3444, 2014.

M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, and S. Khanum, “Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends,” in: Security for Multihop Wireless Networks, (Eds: S. Mauri and L. Mauri), CRC Press, USA, 2014, pp.273-304.

B. Zarei, V. Muthukkumarasay, and **X.-W. Wu**, “Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder,” *Proceedings of the 2014 International Conference on Advances in Computer and Electronics Technology (ACET 2014),* Hong Kong, 26-27 August 2014, pp.69-73.

**X.-W. Wu**, “Dynamic Traitor Tracing with Near Optimal Codes,” *Proceedings of the 21st International Symposium on Mathematical Theory of Networks and Systems, (MTNS),*Groningen, the Netherlands, July 7-11, 2014, pp. 920-922.

Z. Liu, J. Zumbragel, M. Greferath, **X.-W. Wu**, “Notes on the Pseudoredundancy,” *Proceedings of 2014 IEEE International Symposium on Information Theory (ISIT 2014),* Honolulu, HI, USA, 29 June - 4 July 2014, pp.2789-2793.

X.-B. Liu, S. N. Koh, C.-C. Chui, and **X.-W. Wu**, “A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder,” *IEEE Transactions on Information Forensics and Security*, Vol.8, No.3, pp.542-552, 2013.

M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, “Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks,” *Proceedings of the 8th IEEE Workshop on Network Security*, Sydney, Australia, October 24, 2013, pp. 1029-1037.

A. Jolfaei, **X.-W. Wu**, and V. Muthukkumarasamy, “On the Feasibility and Performance of Pass-thought Authentication Systems,” *Proceedings of the 3013 Fourth International Conference on Emerging Security Technologies (EST-2013),* Cambridge, UK, September 9-11, 2013, pp.33-38.

B. Zarei, V. Muthukkumarasay, and **X.-W. Wu**, “A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks,” *Proceedings of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013),* Barcelona, Spain, March 25-28, 2013, pp.197-204.

X.-B. Liu, S. N. Koh, **X.-W. Wu**, and C.-C. Chui, “Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers,” *IET Information Security*, Vol.6, No.3, pp.183-189, 2012.

X. Ren, **X.-W. Wu**, and K. Tang, “TSPass: A Dynamic User Authentication Scheme Based on Time and Space,” *International Journal of Computer Science and Network Security*, Vol.12, No.10, pp.45-53, 2012.

X.-B. Liu, S. N. Koh, **X.-W. Wu**, and C.-C. Chui, “Reconstructing a Linear Scrambler with Improved Detection Capability and in the Presence of Noise,” *IEEE Transactions on Information Forensics and Security*, Vol.7, No.1, pp.208-218, 2012.

**X.-W. Wu**, A. W.-C. Liew, “Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution,” presented at the International Symposium on Cyberspace Safety and Security (CSS 2012) (Melbourne, Australia, December 12-13, 2012); published in: *Lecture Notes in Computer Science (LNCS),* Vol.7672, 2012, pp.352-361.

X. Ren, **X.-W. Wu**, “A Novel Dynamic User Authentication Scheme,” *Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012),* Gold Coast, Australia, 2-5 October 2012, pp.718-722.

M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, and S. Khanum, “Securing Mobile Agent based Wireless Sensor Network Applications on Middleware,” *Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012),* Gold Coast, Australia, 2-5 October 2012, pp.712-717.

M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, S. Khanum, “Wireless Smart Home Sensor Networks: Mobile Agent based Anomaly Detection,” *Proceedings of 9th IEEE International Conference on Ubiquitous Intelligence and Computing (IEEE UIC 2012),* Fukuoka, Japan, September 04-07, 2012, pp.322-329.

Z. Liu, **X.-W. Wu**, “On a Class of Three-Weight Codes with Cryptographic Applications,” *Proceedings of 2012 IEEE International Symposium on Information Theory*, MIT, Cambridge, USA, 1-6 July 2012, pp.2561-2565.

**X.-W. Wu**, A. Sattar, “A New Class of Traceability Schemes for Protecting Digital Content against Illegal Re-distribution,” *International Journal of Computer Science and Network Security*, Vol.11, No.12, pp.91-98, 2011.

Z. Liu, **X.-W. Wu**, W. Chen, and Y. Luo, “New code equivalence based on relative generalized Hamming weights,” *Information Sciences*, Vol.181, No.19, pp.4309-4317, 2011.

A. Kelarev, J. Yearwood, P. Watters, **X.-W. Wu**, L. Ma, J. Abawajy, L. Pan, “A Groebner-Shirshov Algorithm for Applications in Internet Security,” *Southeast Asian Bulletin of Mathematics*, vol. 35, pp. 807-820, 2011.

A.V. Kelarev, S. Brown, P. Watters, **X.-W. Wu** and R. Dazeley, “Establishing Reasoning Communities of Security Experts for Internet Commerce Security,” in: Technologies for Supporting Reasoning Communities and Collaborative Decision Making: Cooperative Approaches, (Eds: J. Yearwood and A. Stranieri), Information Science Publishing, January 2011, pp.380-395.

X.-B. Liu, S. N. Koh, **X.-W. Wu**, and C.-C. Chui, “Investigation on Scrambler Reconstruction With Minimum A Priori Knowledge,” *Proceedings of 2011 IEEE Global Communications Conference (IEEE GLOBECOM 2011),* Houston, Texas, 5-9 December 2011, pp.1-5.

Z. Liu, J. Wang, and **X.-W. Wu**, “On the relative generalized Hamming weights of linear codes and their subcodes,” *SIAM Journal on Discrete Mathematics*, Vol. 24, No.4, pp.1234-1241, 2010.

A.V. Kelarev, J.L.Yearwood, P.Watters, **X.-W. Wu**, J.H. Abawajy, L.Pan, “Internet Security Applications of the Munn Rings,” *Semigroup Forum*, 81(1), 2010, pp. 162-171, 2010.

L. Zi, J. Yearwood, and **X.-W. Wu**, “Adaptive Clustering with Feature Ranking for DDoS Attacks Detection,” *Proceedings of 2010 Fourth International Conference on Network and System Security,*September 1-3, 2010, Melbourne, Australia, pp.281-286.

**X.-W. Wu**, S.N. Koh, and C.-C. Chui, “Primitive Polynomials for Robust Scramblers and Stream Ciphers Against Reverse Engineering,” *Proceedings of 2010 IEEE International Symposium on Information Theory,* Austin, USA, 13 – 18 June 2010, pp. 2473-2477.

D. Lobo, P. Watters, and **X.-W. Wu**, and L. Sun, “Windows Rootkits: Attacks and Countermeasures,” *Proceedings of the 2010 Cybercrime and Trustworthy Computing Workshop, *19-20th July 2010, Ballarat, Australia, pp. 69-78.

D. Lobo, P. Watters, and **X.-W. Wu**, “Identifying Rootkit Infections Using Data Mining,” *Proceedings of The 2010 International Conference on Information Science and Applications*, (21- 23, April 2010, Seoul, Korea), pp. 373-379.

D. Lobo, P. Watters, and **X.-W. Wu**, “Identification of Multiple Rootkit Infections,” *Proceedings of The 2010 International Conference on Communication Software and Networks*, (26 - 28, February 2010, Singapore), pp. 124-128.

D. Lobo, P. Watters, and **X.-W. Wu**, “RBACS: Rootkit Behavioral Analysis and Classification System," *Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining,*(8-11, January 2010, Phuket, Thailand), pp. 75-80.

**X.-W. Wu**, P. Watters, and J. Yearwood, “New Traceability Codes and Identification Algorithm for Tracing Pirates,” *Proceedings of 2008 IEEE International Symposium on Parallel and Distributed Processing with Application*, Sydney, Australia, 10 - 12 December 2008, pp.719-724.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Lower Bound on Minimum Lee Distance of Algebraic-Geometric Codes over Finite Fields,” *IEE Electronics Letters*, Vol.43, No.15, pp.820-822, 2007.

**X.-W. Wu**, “Efficient Traitor-Tracing Algorithms Based on List Decoding,” *Proceedings of the 2007 International Conference on Graph Theory and Information Security*, Bandung, Indonesia, 10 - 13 February 2007.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Root-Finding Algorithm for List Decoding of Reed-Muller Codes,” *IEEE Transactions on Information Theory*, Vol.51, No.3, pp.1190-1196, 2005.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “On the Decoding Radius of Lee-Metric Decoding of Algebraic-Geometric Codes,” *Proceedings of 2005 IEEE International Symposium on Information Theory*, Adelaide, Australia, 5 - 9 September 2005, pp.1191-1195.

M. Kuijper, **X.-W. Wu**, and P. Udaya, “Behavioral Models over Rings - Minimal Representations and Applications to Coding and Sequences,” *Proceedings of the 16th World Congress of International Federation of Automatic Control*, Praha, Czech Republic, July 4-8, 2005, pp.1198-1203.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Improved Decoding of Algebraic-Geometric Codes with Respect to the Lee Metric,” *Proceedings of 2005 Australian Communications Theory Workshop, Brisbane*, Australia, 2-4 February 2005, pp.111-115.

R. Pellikaan, **X.-W. Wu**, “List Decoding of q-ary Reed-Muller Codes,” *IEEE Transactions on Information Theory*, Vol.50, No.4, pp.679-682, 2004.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Class of Algebraic-Geometric Codes for Lee Metric and Their Decoding,” *Proceedings of 2004 IEEE International Symposium on Information Theory*, Chicago, USA, 27 June - 2 July 2004, p.77.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “On Lee-Metric Decoding of Algebraic-Geometric Codes,” *Proceedings of 2004 Australian Communications Theory Workshop*, Newcastle, Australia, 4-6 February 2004, pp.82-85.

P. Udaya, **X.-W. Wu**, and M. Kuijper, “List Lee-Metric Decoding Algorithm for Generalized Reed-Solomon Codes over Commutative Rings with Identity,” *Proceedings of 10th Conference on Communications of India*, Bangalore, India, 30 January - 1 February 2004, pp. 244-248.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Lee-Metric Decoding of BCH and Reed-Solomon Codes,” *IEE Electronics Letters*, Vol.39, No.21, pp.1522-1524, 2003.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Lee-Metric Decoding Algorithm for Reed-Solomon Codes over GF(p),” *Proceedings of 7th International Symposium on Digital Signal Processing and Communication Systems*, Gold Coast, Australia, 8-11 December 2003, pp.26-31.

**X.-W. Wu**, “An Algorithm for Finding the Roots of the Polynomials over Order Domains,” *Proceedings of 2002 IEEE International Symposium on Information Theory*, Lausanne, Switzerland, June 2002, p.202.

**X.-W. Wu**, P. H. Siegel, “Efficient Root-Finding Algorithm with Application to List Decoding of Algebraic-Geometric Codes,” *IEEE Transactions on Information Theory*, Vol.47, No.6, pp.2579-2587, 2001.

**X.-W. Wu**, “The Codes with Fixed Minimum Distance and Better than the Gilbert-Varshamov Bound,” *Advances in Mathematics (China),* Vol.30, No.6, pp. 495-509, 2001.

**X.-W. Wu**, “Parameters of the Codes over Affine Varieties,” *Science in China*, Vol.43, No.2, pp.141-148, 2000.

**X.-W. Wu**, P. H. Siegel, “Fast Computation of Roots of Polynomials over Function Fields and Fast List Decoding of Algebraic Geometric Codes,” *Proceedings of 2000 IEEE International Symposium on Information Theory*, Sorrento, Italy, June 2000, p.478.

G.L. Feng, **X.-W. Wu**, and T.R.N. Rao, “New DbEC-TbED Codes Better Than the Gilbert-Varshamov Existence Bound,” *Proceedings of 2000 IEEE International Symposium on Information Theory,* Sorrento, Italy, June 2000, p.32.

G.-L. Feng, **X.-W. Wu**, and T.R.N. Rao, “Correction to ‘New Double-Byte Error-Correcting Codes for Memory Systems’,” *IEEE Transactions on Information Theory*, Vol.45, No.6, p.2209, 1999.

G.-L. Feng, **X.-W. Wu**, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,” *IEEE Transactions on Information Theory*, Vol.44, No.3, pp.1152-1163, 1998.

G.L. Feng, **X.-W. Wu**, and T.R.N. Rao, “On the Missing Functions of the Hermitian-like Codes over GF(22),” *Proceedings of 1998 IEEE International Symposium on Information Theory*, MIT, USA, August 1998, p.379.

Z.-X. Wan, **X.-W. Wu**, “The Weight Hierarchies and Generalized Weight Spectra of the Projective Codes from Degenerate Quadrics,” *Discrete Mathematics*, Vol.177, pp.223-243, 1997.

**X.-W. Wu**, “A Class of Codes from Projective Algebraic Varieties,” *Chinese Science Bulletin*, Vol.42, No.11, pp.1146-1149, 1997.

G.L. Feng, **X.-W. Wu**, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,” *Proceedings of 1997 IEEE International Symposium on Information Theory*, Ulm, Germany, June 1997, p.222.

**X.-W. Wu**, “Generalized Hamming Weights of the Projective Codes from Hermitian Varieties,” *Science in China*, Vol.39, No.2, pp.148-158, 1996.

**X.-W. Wu**, G.L. Feng, and T.R.N. Rao, “The Weight Hierarchies and Chain Condition of a Class of Codes from Varieties over Finite Fields,” *Proceedings of 34th Annual Allerton Conference on Communication, Control and Computing,* (Monticello, Illinois, USA, October 1996, pp.286-293).

**X.-W. Wu**, Z.-X. Wan, “The Weight Spectra of the Projective Codes from Degenerate Quadrics,” *Proceedings of 1st International Symposium of China-Japan on Algebraic Combinatorics*, Beijing, October 1994, pp.83-85.

**X.-W. Wu**, “Generalized Hamming Weights of Projective Reed-Muller Codes of Lower Orders,” In: Advances in Cryptology - Chinacrypt'96, (Eds: D.-Y. Pei, et al), Science Press, Beijing, China, 1996, pp.236-243.

**X.-W. Wu**, “On Monodromy of Semi-Stable Fibres,” *Chinese Science Bulletin*, Vol.39, No.14, pp.1145-1149, 1994.