**Computer Security**

**Cryptographic Protocols for the Internet of Things**

**Multimedia and 3D Information Security**

**Crypto Key Management for Cloud Computing**

**Machine-Learning based Anomaly Detection**

M. Usman, V. Muthukkumarasamy, **X.-W. Wu**, and S. Khanum, *Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks*, Springer, 2018.

R. Pellikaan, **X.-W. Wu**, S. Bulygin, and R. Jurrius, *Codes, Cryptology and Curves with Computer Algebra*, Cambridge University Press, Cambridge, UK, 2017.

G.-L. Feng, **X.-W. Wu**, *Algebraic-Geometric Codes*, Science Press, Beijing, China, 1998.

- G. Raja, S. Anbalagan, G. Vijayaraghavan, S. Theerthagiri, S. Suryanarayan,
**X.-W. Wu**, "SP-CIDS: Secure and Private Collaborative IDS for VANETs,"*IEEE Transactions on Intelligent Transportation Systems,*Vol. 22, No. 7, pp. 4385 - 4393, July 2021.

- Z. Liu,
**X.-W. Wu,**“Notes on LCD codes over Frobenius rings,”*IEEE Communications Letters*, Vol. 25, No. 2, pp. 361-364, February 2021.

**X.-W. Wu**, A. Jolfaei, “Securing the Internet of Everything Through Adaptive and Resource-Efficient Mechanisms,"*IEEE Internet of Things Magazine*, Vol. 3, No. 4, pp. 16-19, December 2020.

- S. Ezekiel, A. Ali Alshehri, L. Pearlstein,
**X.-W. Wu**, A. Lutz, “IoT Anomaly Detection using Multivariate,”*International Journal of Innovative Technology and Exploring Engineering*, Vol.9, No.4, 2020, pp. 1662-1669.

- P. Beelen, O. Geil, E. Martínez-Moro, and
**X.-W. Wu**, “Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan,”*Designs, Codes and Cryptography*, 88(8), 1477-1478, 2020.

- G. Yang,
**X.-W. Wu**, Li Ying, “Energy Efficient Protocol for Routing and Scheduling for Wireless Body Area Networks,”*Wireless Networks*(Springer), Vol. 25, No.9, pp.1-9, 2019.

- M. Greferath, Z. Liu,
**X.-W. Wu**, J. ZumbrÄage,**“**New Results on the Pseudoredundancy,”*Bulletin of the Korean Mathematical Society,*Vol. 56, No. 1, pp. 111-130, 2019.

- J. Wang, X. Ren, S. Anirban,
**X.-W. Wu**, “Correct Filtering for Subgraph Isomorphism Search in Compressed Vertex-Labelled Graphs,”*Information Sciences*, (Elsevier), Vol. 482, pp. 363-373, 2019.

- G. Yang,
**X.-W. Wu**, “A Distributed Secure Monitoring System based on Blockchain,”*International Journal of Performability Engineering*, Vol.14, No.10, pp.2393-2402, Oct. 2018.

- Jolfaei,
**X.-W. Wu**, V. Muthukkumarasamy, “On the Security of Permutation-Only Image Encryption Schemes,”*IEEE Transactions on Information Forensics and Security*, Vol.11, No.2, pp.235-246, 2016.

- Z. Liu,
**X.-W. Wu**, “The fullrank value function,”*Designs, Codes and Cryptography*, Vol.81, No.2, pp.297-315, 2016.

- W. Pullan,
**X.-W. Wu**, Z. Liu, “Construction of optimal constant-dimension subspace codes,”*Journal of Combinatorial Optimization*, Vol.31, No.4, 1709-1719, 2016.

- Z. Liu,
**X.-W. Wu**, “Trellis complexity and pseudoredundancy of relative two-weight codes,”*Applicable Algebra in Engineering, Communication and Computing*, 27(2): 139-158, 2016.

- G.Z. Khan, R. Gonzalez, E.-C. Park,
**X.-W. Wu**, “Analysis of Very High Throughput (VHT) at MAC and PHY Layers under MIMO Channel in IEEE 802.11ac WLAN,”*ICACT Transactions on Advanced Communications Technology*, Vol.5, No.4, 877-888, 2016.

- A. Jolfaei,
**X.-W. Wu**, V.Muthukkumarasamy, “A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability,”*IEEE Transactions on Information Forensics and Security*, Vol.10, No.2, pp.409-422, 2015.

- M. Usman, V. Muthukkumarasamy, and
**X.-W. Wu**, “Mobile Agent-Based Cross-Layer Anomaly Detection in Smart Home Sensor Networks Using Fuzzy logic,”*IEEE Transactions on Consumer Electronics*, Vol.61, No.2, pp.197-205, 2015.

- M. Usman, V. Muthukkumarasamy, and
**X.-W. Wu**, “Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection in Resource Constrained Networks,”*Journal of Networks*, Vol.10, No.6, pp.353-368, 2015.

- K. Biswas, V. Muthukkumarasamy,
**X.-W. Wu**, and K. Singh, “An Analytical Model for Lifetime Estimation of Wireless Sensor Networks,”*IEEE Communications Letters*, Vol.19, No.9, pp.1584-1587, 2015.

- Z. Liu,
**X.-W. Wu**, “On Relative Constant-Weight Codes,”*Designs, Codes and Cryptography*, Vol.75, No.1, pp.127-144, 2015.

- K. Biswas, V. Muthukkumarasamy,
**X.-W. Wu**, and K. Singh, “An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks,”*Journal of Networks*, Vol.10, No.11, pp.616-624, 2015.

- A. Rahman, V. Muthukkumarasamy, and
**X.-W. Wu**, “Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB),”*Journal of Networks*, Vol.10, No.8, pp.462-469, 2015.

- A. Jolfaei,
**X.-W.Wu**, V. Muthukkumarasamy, “Comments on the security of ‘Diffusion-substitution based gray image encryption’ scheme,”*Digital Signal Processing*, Vol.32, pp.34-36, 2014.

- M. Usmana, V. Muthukkumarasamy, and
**X.-W. Wu**, “A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks,”*Journal of Networks*, Vol.9, No.12, pp.3427-3444, 2014.

- X.-B. Liu, S. N. Koh, C.-C. Chui, and
**X.-W. Wu**, “A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder,”*IEEE Transactions on Information Forensics and Security*, Vol.8, No.3, pp.542-552, 2013.

- X.-B. Liu, S. N. Koh,
**X.-W. Wu**, and C.-C. Chui, “Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers,”*IET Information Security*, Vol.6, No.3, pp.183-189, 2012.

- X. Ren,
**X.-W. Wu**, and K. Tang, “TSPass: A Dynamic User Authentication Scheme Based on Time and Space,”*International Journal of Computer Science and Network Security*, Vol.12, No.10, pp.45-53, 2012.

- X.-B. Liu, S. N. Koh,
**X.-W. Wu**, and C.-C. Chui, “Reconstructing a Linear Scrambler with Improved Detection Capability and in the Presence of Noise,”*IEEE Transactions on Information Forensics and Security*, Vol.7, No.1, pp.208-218, 2012.

**X.-W. Wu**, A. Sattar, “A New Class of Traceability Schemes for Protecting Digital Content against Illegal Re-distribution,”*International Journal of Computer Science and Network Security*, Vol.11, No.12, pp.91-98, 2011.

- Z. Liu,
**X.-W. Wu**, W. Chen, and Y. Luo, “New code equivalence based on relative generalized Hamming weights,”*Information Sciences*, Vol.181, No.19, pp.4309-4317, 2011.

- A. Kelarev, J. Yearwood, P. Watters,
**X.-W. Wu**, L. Ma, J. Abawajy, L. Pan, “A Groebner-Shirshov Algorithm for Applications in Internet Security,”*Southeast Asian Bulletin of Mathematics*, vol. 35, pp. 807-820, 2011.

- Z. Liu, J. Wang, and
**X.-W. Wu**, “On the relative generalized Hamming weights of linear codes and their subcodes,”*SIAM Journal on Discrete Mathematics*, Vol. 24, No.4, pp.1234-1241, 2010.

- A.V. Kelarev, J.L.Yearwood, P.Watters,
**X.-W. Wu**, J.H. Abawajy, L.Pan, “Internet Security Applications of the Munn Rings,”*Semigroup Forum*, 81(1), 2010, pp. 162-171, 2010.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Lower Bound on Minimum Lee Distance of Algebraic-Geometric Codes over Finite Fields,”*IEE Electronics Letters*, Vol.43, No.15, pp.820-822, 2007.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Root-Finding Algorithm for List Decoding of Reed-Muller Codes,”*IEEE Transactions on Information Theory*, Vol.51, No.3, pp.1190-1196, 2005.

- R. Pellikaan,
**X.-W. Wu**, “List Decoding of q-ary Reed-Muller Codes,”*IEEE Transactions on Information Theory*, Vol.50, No.4, pp.679-682, 2004.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Lee-Metric Decoding of BCH and Reed-Solomon Codes,”*IEE Electronics Letters*, Vol.39, No.21, pp.1522-1524, 2003.

**X.-W. Wu**, P. H. Siegel, “Efficient Root-Finding Algorithm with Application to List Decoding of Algebraic-Geometric Codes,”*IEEE Transactions on Information Theory*, Vol.47, No.6, pp.2579-2587, 2001.

- G.-L. Feng,
**X.-W. Wu**, and T.R.N. Rao, “Correction to ‘New Double-Byte Error-Correcting Codes for Memory Systems’,”*IEEE Transactions on Information Theory*, Vol.45, No.6, p.2209, 1999.

- G.-L. Feng,
**X.-W. Wu**, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,”*IEEE Transactions on Information Theory*, Vol.44, No.3, pp.1152-1163, 1998.

**X.-W. Wu**, “The Codes with Fixed Minimum Distance and Better than the Gilbert-Varshamov Bound,”*Advances in Mathematics (China),*Vol.30, No.6, pp. 495-509, 2001.

**X.-W. Wu**, “Parameters of the Codes over Affine Varieties,”*Science in China*, Vol.43, No.2, pp.141-148, 2000.

- Z.-X. Wan,
**X.-W. Wu**, “The Weight Hierarchies and Generalized Weight Spectra of the Projective Codes from Degenerate Quadrics,”*Discrete Mathematics*, Vol.177, pp.223-243, 1997.

**X.-W. Wu**, “A Class of Codes from Projective Algebraic Varieties,”*Chinese Science Bulletin*, Vol.42, No.11, pp.1146-1149, 1997.

**X.-W. Wu**, “Generalized Hamming Weights of the Projective Codes from Hermitian Varieties,”*Science in China*, Vol.39, No.2, pp.148-158, 1996.

**X.-W. Wu**, “On Monodromy of Semi-Stable Fibres,”*Chinese Science Bulletin*, Vol.39, No.14, pp.1145-1149, 1994.

- A. Robbins, W. Farag,
**X.-W. Wu**, and P. Chaudhary "Zigbee as a candidate standard for use in anomaly detection in IoT LANs", Proc. SPIE 11751, Disruptive Technologies in Information Sciences V, 117510K (12 April 2021); https://doi.org/10.1117/12.2588155

- T. Valentine, K. Ravindran, P. Chaudhary, S. Ezekiel,
**X.-W. Wu**, “Mitigating Security Risk of IoT with A Blockchain-Based Solution,”*Proceedings of the 2020 Annual IEEE Applied Imagery Pattern Recognition Workshop (AIPR 20200)*, virtual online conference, Oct 13-15, 2020.

- W. Farag, S. Ali, and
**X.-W. Wu**, "Comparing Achievement of Learning Outcomes and Success Indicators in Online Computer Literacy Classes with Blended Offerings,"*Proceedings of 12th Annual International Conference on Education and New Learning Technologies*, July 6-7, 2020.

**X.-W. Wu**, W. Farag, S. Ali, and S. Kulkarni, “An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices”,*Proceedings of the 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference*, Columbia University, New York, USA, October 10-12, pp. 676-682, 2019.**DOI:**10.1109/UEMCON47517.2019.8993102 Available at: https://ieeexplore.ieee.org/document/8993102

- L. Njilla, L. Pearlstein,
**X.-W. Wu**, A. Lutz, S. Ezekiel, “Internet of Things Anomaly Detection using Machine Learning,”*Proceedings of the 48th Annual IEEE Applied Imagery Pattern Recognition: Cognition, Collaboration, and Cloud (AIPR 2019)*, Washington, D.C., USA, Oct 15-17, 2019., 6 pages.

- S. Chavan, A. Inamdar, A. Dorle, S. Kulkarni,
**X.-W. Wu**, “Phishing Detection: Malicious and Benign Websites Classification using Machine Learning Techniques,”*Proceedings of International Conference on Computational Science and Applications (ICCSA 2019)*, Pune, India, August 7-9, 2019.

- E.-H. Yang,
**X.-W. Wu**, “On Optimal Information-Theoretical Secure Key Management,”*Proceedings of the 16th Canadian Workshop on Information Theory*, Hamilton, Ontario, Canada, June 2-5, 2019.

- R. Kulkarni, K. Khadilkar, S. Kulkarni,
**X.-W. Wu**, “A Wide & Deep Neural Network and Ensemble Based Approach for Phishing Detection,”*Proceedings of the International Conference on Machine Learning and Data Science (ICMLDS 2018)*, Hyderabad, India, Dec. 21-22, 2018.

- G. Yang,
**X.-W. Wu**, “A Lightweight Security and Energy-efficient Clustering Protocol for Wireless Sensor Networks,”*Proceedings of the 10th**EAI International Conference on Ad Hoc Networks,*Cairns, Australia, September 20-23, 2018, 6 pages.

- K. Hasan,
**X.-W. Wu**, K. Biswas and K. Ahmed, “A Novel Framework for Software Defined Wireless Body Area Network,”*Proceedings of the 8thInternational Conference on Intelligent Systems, Modelling and Simulation*, Kuala Lumpur, Malaysia, May 8-10, 2018, 6 pages.

**X.-W. Wu**, E.-H. Yang, and J. Wang, “Lightweight Security Protocols for the Internet of Things,”*Proceedings of**the 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications*(*IEEE PIMRC 2017*), Montreal, Canada, October 8 - 13, 2017, 7 pages (invited paper).

- E.-H. Yang,
**X.-W. Wu**, “Information-Theoretically Secure Key Generation and Management,”*Proceedings of**2017**IEEE International Symposium on Information Theory (ISIT 2017)*, Aachen, Germany, June 25 - 30, 2017, pp.1529-1533.

- G.Z. Khan, R. Gonzalez,
**X.-W. Wu**, E.-C. Park, “On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN,”*Proceedings of 15th International Conference on Frontiers of Information Technology (FIT 2016)*, Islamabad, Pakistan, Dec. 18-20, 2016, pp.164-169.

- A. Jolfaei,
**X.-W. Wu**, and V. Muthukkumarasamy, “A Secure Lightweight Texture Encryption Scheme,”*Proceedings of 7th Pacific Rim Symposium on Image and Video Technology (PSIVT),*Auckland, New Zealand, 23 - 27 November, 2015, Lecture Notes in Computer Science Vol. 9555, pp.344-356.

- G.Z. Khan, R. Gonzalez, E.-C. Park,
**X.-W. Wu**, “A reliable multicast MAC protocol for Wi-Fi Direct 802.11 networks,”*Proceedings of 2015 European Conference on Networks and Communications*(*EuCNC 2015*), Paris, France, June 29 - July 2, 2015, pp.224-228.

- B. Zarei, V. Muthukkumarasay, and
**X.-W. Wu**, “Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder,”*Proceedings of the 2014 International Conference on Advances in Computer and Electronics Technology (ACET 2014),*Hong Kong, 26-27 August, 2014, pp.69-73.

**X.-W. Wu**, “Dynamic Traitor Tracing with Near Optimal Codes,”*Proceedings of the 21st International Symposium on Mathematical Theory of Networks and Systems, (MTNS),*Groningen, the Netherlands, July 7-11, 2014, pp. 920-922.

- Z. Liu, J. Zumbragel, M. Greferath,
**X.-W. Wu**, “Notes on the Pseudoredundancy,”*Proceedings of 2014 IEEE International Symposium on Information Theory (ISIT 2014),*Honolulu, HI, USA, 29 June - 4 July, 2014, pp.2789-2793.

- M. Usman, V. Muthukkumarasamy,
**X.-W. Wu**, “Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks,”*Proceedings of the 8th IEEE Workshop on Network Security*, Sydney, Australia, October 24, 2013, pp. 1029-1037.

- A. Jolfaei,
**X.-W. Wu**, and V. Muthukkumarasamy, “On the Feasibility and Performance of Pass-thought Authentication Systems,”*Proceedings of the 3013 Fourth International Conference on Emerging Security Technologies (EST-2013),*Cambridge, UK, September 9-11, 2013, pp.33-38.

- B. Zarei, V. Muthukkumarasay, and
**X.-W. Wu**, “A Residual Error Control Scheme in Single-Hop Wireless Sensor Networks,”*Proceedings of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013),*Barcelona, Spain, March 25-28, 2013, pp.197-204.

**X.-W. Wu**, A. W.-C. Liew, “Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution,” presented at the International Symposium on Cyberspace Safety and Security (CSS 2012) (Melbourne, Australia, December 12-13, 2012); published in:*Lecture Notes in Computer Science (LNCS),*Vol.7672, 2012, pp.352-361.

- X. Ren,
**X.-W. Wu**, “A Novel Dynamic User Authentication Scheme,”*Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012),*Gold Coast, Australia, 2-5 October, 2012, pp.718-722.

- M. Usman, V. Muthukkumarasamy,
**X.-W. Wu**, and S. Khanum, “Securing Mobile Agent based Wireless Sensor Network Applications on Middleware,”*Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT 2012),*Gold Coast, Australia, 2-5 October, 2012, pp.712-717.

- M. Usman, V. Muthukkumarasamy,
**X.-W. Wu**, S. Khanum, “Wireless Smart Home Sensor Networks: Mobile Agent based Anomaly Detection,”*Proceedings of 9th IEEE International Conference on Ubiquitous Intelligence and Computing (IEEE UIC 2012),*Fukuoka, Japan, September 04-07, 2012, pp.322-329.

- Z. Liu,
**X.-W. Wu**, “On a Class of Three-Weight Codes with Cryptographic Applications,”*Proceedings of 2012 IEEE International Symposium on Information Theory*, MIT, Cambridge, USA, 1-6 July, 2012, pp.2561-2565.

- X.-B. Liu, S. N. Koh,
**X.-W. Wu**, and C.-C. Chui, “Investigation on Scrambler Reconstruction With Minimum A Priori Knowledge,”*Proceedings of IEEE Global Communications Conference (GLOBECOM) 2011(IEEE Globecom 2011 proceedings),*Houston, Texas, 5-9 December 2011, pp.1-5.

- L. Zi, J. Yearwood, and
**X.-W. Wu**, “Adaptive Clustering with Feature Ranking for DDoS Attacks Detection,”*Proceedings of 2010 Fourth International Conference on Network and System Security,*September 1-3, 2010, Melbourne, Australia, pp.281-286.

**X.-W. Wu**, S.N. Koh, and C.-C. Chui, “Primitive Polynomials for Robust Scramblers and Stream Ciphers Against Reverse Engineering,”*Proceedings of 2010 IEEE International Symposium on Information Theory,*Austin, USA, 13 – 18 June, 2010, pp. 2473-2477.

- D. Lobo, P. Watters, and
**X.-W. Wu**, and L. Sun, “Windows Rootkits: Attacks and Countermeasures,”*Proceedings of the 2010 Cybercrime and Trustworthy Computing Workshop,*19-20th July, 2010, Ballarat, Australia, pp. 69-78.

- D. Lobo, P. Watters, and
**X.-W. Wu**, “Identifying Rootkit Infections Using Data Mining,”*Proceedings of The 2010 International Conference on Information Science and Applications*, (21- 23, April 2010, Seoul, Korea), pp. 373-379.

- D. Lobo, P. Watters, and
**X.-W. Wu**, “Identification of Multiple Rootkit Infections,”*Proceedings of The 2010 International Conference on Communication Software and Networks*, (26 - 28, February 2010, Singapore), pp. 124-128.

- D. Lobo, P. Watters, and
**X.-W. Wu**, “RBACS: Rootkit Behavioral Analysis and Classification System,"*Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining,*(8-11, January 2010, Phuket, Thailand), pp. 75-80.

**X.-W. Wu**, P. Watters, and J. Yearwood, “New Traceability Codes and Identification Algorithm for Tracing Pirates,”*Proceedings of 2008 IEEE International Symposium on Parallel and Distributed Processing with Application*, Sydney, Australia, 10 - 12 December, 2008, pp.719-724.

**X.-W. Wu**, “Efficient Traitor-Tracing Algorithms Based on List Decoding,”*Proceedings of the 2007 International Conference on Graph Theory and Information Security*, Bandung, Indonesia, 10 - 13 February, 2007.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “On the Decoding Radius of Lee-Metric Decoding of Algebraic-Geometric Codes,”*Proceedings of 2005 IEEE International Symposium on Information Theory*, Adelaide, Australia, 5 - 9 September, 2005, pp.1191-1195.

- M. Kuijper,
**X.-W. Wu**, and P. Udaya, “Behavioral Models over Rings - Minimal Representations and Applications to Coding and Sequences,”*Proceedings of the 16th World Congress of International Federation of Automatic Control*, Praha, Czech Republic, July 4-8, 2005, pp.1198-1203.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “Improved Decoding of Algebraic-Geometric Codes with Respect to the Lee Metric,”*Proceedings of 2005 Australian Communications Theory Workshop, Brisbane*, Australia, 2-4 February, 2005, pp.111-115.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Class of Algebraic-Geometric Codes for Lee Metric and Their Decoding,”*Proceedings of 2004 IEEE International Symposium on Information Theory*, Chicago, USA, 27 June - 2 July, 2004, p.77.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “On Lee-Metric Decoding of Algebraic-Geometric Codes,”*Proceedings of 2004 Australian Communications Theory Workshop*, Newcastle, Australia, 4-6 February, 2004, pp.82-85.

- P. Udaya,
**X.-W. Wu**, and M. Kuijper, “List Lee-Metric Decoding Algorithm for Generalized Reed-Solomon Codes over Commutative Rings with Identity,”*Proceedings of 10th Conference on Communications of India*, Bangalore, India, 30 January - 1 February, 2004, pp. 244-248.

**X.-W. Wu**, M. Kuijper, and P. Udaya, “A Lee-Metric Decoding Algorithm for Reed-Solomon Codes over GF(p),”*Proceedings of 7th International Symposium on Digital Signal Processing and Communication Systems*, Gold Coast, Australia, 8-11 December, 2003, pp.26-31.

**X.-W. Wu**, “An Algorithm for Finding the Roots of the Polynomials over Order Domains,”*Proceedings of 2002 IEEE International Symposium on Information Theory*, Lausanne, Switzerland, June, 2002, p.202.

**X.-W. Wu**, P. H. Siegel, “Fast Computation of Roots of Polynomials over Function Fields and Fast List Decoding of Algebraic Geometric Codes,”*Proceedings of 2000 IEEE International Symposium on Information Theory*, Sorrento, Italy, June 2000, p.478.

- G.L. Feng,
**X.-W. Wu**, and T.R.N. Rao, “New DbEC-TbED Codes Better Than the Gilbert-Varshamov Existence Bound,”*Proceedings of 2000 IEEE International Symposium on Information Theory,*Sorrento, Italy, June 2000, p.32.

- G.L. Feng,
**X.-W. Wu**, and T.R.N. Rao, “On the Missing Functions of the Hermitian-like Codes over GF(22),”*Proceedings of 1998 IEEE International Symposium on Information Theory*, MIT, USA, August 1998, p.379.

- G.L. Feng,
**X.-W. Wu**, and T.R.N. Rao, “New Double-Byte Error-Correcting Codes for Memory Systems,”*Proceedings of 1997 IEEE International Symposium on Information Theory*, Ulm, Germany, June 1997, p.222.

**X.-W. Wu**, G.L. Feng, and T.R.N. Rao, “The Weight Hierarchies and Chain Condition of a Class of Codes from Varieties over Finite Fields,”*Proceedings of 34th Annual Allerton Conference on Communication, Control and Computing,*(Monticello, Illinois, USA, October 1996, pp.286-293).

**X.-W. Wu**, Z.-X. Wan, “The Weight Spectra of the Projective Codes from Degenerate Quadrics,”*Proceedings of 1st International Symposium of China-Japan on Algebraic Combinatorics*, Beijing, October 1994, pp.83-85.

- K. Biswas, V. Muthukkumarasamy,
**X.-W. Wu**, and K. Singh, “Performance Evaluation of Block Ciphers for Wireless Sensor Networks,” in: Advanced Computing and Communication Technologies, (Eds: R. Choudhary, et al), Springer, Singapore, 2016, pp.443-452.

- M. Usman, V. Muthukkumarasamy,
**X.-W. Wu**, and S. Khanum, “Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends,” in: Security for Multihop Wireless Networks, (Eds: S. Mauri and L. Mauri), CRC Press, USA, 2014, pp.273-304.

- A.V. Kelarev, S. Brown, P. Watters,
**X.-W. Wu**and R. Dazeley, “Establishing Reasoning Communities of Security Experts for Internet Commerce Security,” in: Technologies for Supporting Reasoning Communities and Collaborative Decision Making: Cooperative Approaches, (Eds: J. Yearwood and A. Stranieri), Information Science Publishing, January 2011, pp.380-395.

**X.-W. Wu**, “Generalized Hamming Weights of Projective Reed-Muller Codes of Lower Orders,” In: Advances in Cryptology - Chinacrypt'96, (Eds: D.-Y. Pei, et al), Science Press, Beijing, China, 1996, pp.236-243.