Publications
[2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [Before 2015]
- 2024
[Top]
- H. Yang, B. Xie, J. Wang, G. Li, B. Xiao, "Privacy-Preserving and Secure Decentralized Identity Management for Multiple Controllers", in Proc. of the IEEE Global Communications Conference (GLOBECOM-2024), Cape Town, South Africa, 8–12 December 2024, pp. 1-6.
- S. Feng, Y. Cheng, G. Li, B. Xiao, A. Hu, "Physical-layer Secret Key Generation with Energy Efficiency Maximization", in Proc. of the IEEE Global Communications Conference (GLOBECOM-2024), Cape Town, South Africa, 8–12 December 2024, pp. 1-6.
- X. Dai, B. Xiao, "Transferable 3D Adversarial Shape Completion using Diffusion Models", in Proc. of the European Conference on Computer Vision (ECCV-2024), Milano, Italy, Sep. 29 - Oct. 4, 2024. (PPT)
- X. Dai, K. Liang, B. Xiao, "AdvDiff: Generating Unrestricted Adversarial Examples using Diffusion Models", in Proc. of the European Conference on Computer Vision (ECCV-2024), Milano, Italy, Sep. 29 - Oct. 4, 2024. (PPT)
- H. Yang, R. Song, B. Chen, Y. Song, B. Xiao, "MoDID: Decentralized Identity Management for Multiple Owners", in Proc. of the IEEE International Conference on Communications (ICC-2024), Denver, CO, USA, 9 - 13 June 2024, pp. 1-6.
- Z. Liu, X. Zhang, G. Li, H. Cui, J. Wang, B. Xiao, "A Secure and Reliable Blockchain-based Audit Log System", in Proc. of the IEEE International Conference on Communications (ICC-2024), Denver, CO, USA, 9 - 13 June 2024, pp. 1-6.
- Y. Liu, Y. Ding, J. Jiang, B. Xiao, S. Yang, "Industrial Control Protocol Type Inference Using Transformer and Rule-based Re-Clustering", in Proc. of the IEEE International Conference on Computer Communications (INFOCOM-2024), Vancouver, Canada, May 20-23, 2024.
- X. Dai, Y. Li, M. Duan, B. Xiao, "Diffusion Models as Strong Adversaries", IEEE Transactions on Image Processing (T-IP), 2025.
- Y. Liu, J. Huang, Y. Li, D. Wang, B. Xiao, "Generative AI model privacy: a survey", Artificial Intelligence Review, Volume 58, article number 33, (2025). (PDF)
- X. Chen, S. Xu, S. Gao, Y. Guo, S. Yiu, B. Xiao, "FS-LLRS: Lattice-based Linkable Ring Signature with Forward Security for Cloud-assisted Electronic Medical Records", IEEE Transactions on Information Forensics and Security (TIFS), Vol. 19, Sept. 2024, pp. 8875-8891.
- J. Wang, S. Gao, G. Li, K. Gai, B. Xiao, "SAMCU: Secure and Anonymous Multi-Channel Updates in Payment-Channel Networks", IEEE Transactions on Information Forensics and Security (TIFS), Vol. 19, Aug. 2024, pp. 9115-9128.
- M. Duan, K. Jiao, S. Yu, Z. Yang, B. Xiao, K. Li, "MC-Net: Realistic Sample Generation for Black-box Attacks", IEEE Transactions on Information Forensics and Security (TIFS), Vol. 19, Jan. 2024, pp. 3008-3022.
- M. Duan, G. Xiao, K. Li, B. Xiao, "A Black-Box Attack Algorithm Targeting Unlabeled Industrial AI Systems With Contrastive Learning", IEEE Transactions on Industrial Informatics (TII), Vol. 10, No. 4, Apr. 2024, pp. 6325-6335.
- Y. Li, B. Xie, S. Guo, Y. Yang, B. Xiao, "A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks", ACM Computing Surveys (ACM CSUR), Vol. 56, No. 6, Jan. 2024, pp. 1-37. (html)
- M. Duan, Y. Qin, J. Deng, K. Li, B. Xiao, "Dual Attention Adversarial Attacks with Limited Perturbations", IEEE Transactions on Neural Networks and Learning Systems (TNNLS), Vol. 35, No. 10, Oct. 2024, pp. 13990-14004.
-
2023
[Top]
- Y. Zhou, S. Gao, W. Qiu, K. Lei, B. Xiao, "On the Profitability of Selfish Mining Attack under the Checkpoint Mechanism", in Proc. of the IEEE Global Communications Conference (GLOBECOM-2023), Kuala Lumpur, Malaysia, 4–8 December 2023, pp. 898-903.
- J. Wang, J. Li, Z. Li, X. Deng, B. Xiao, "n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi", in Proc. of the 28th European Symposium on Research in Computer Security (ESORICS) , Hague, The Netherlands, September 25-29, 2023, pp. 367-386. (PDF)
- T. Zheng, S. Gao, Y. Song, B. Xiao, "Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols", in Proc. of the 44th IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, CA, USA, May 22-25, 2023.
- K. Liang, B. Xiao, "StyLess: Boosting the Transferability of Adversarial Examples", in Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023 (CVPR-2023), Vancouver, Canada, June 18-22, 2023, pp. 8163-8172. (PDF, Code)
- Y. Li, Y. Li, X. Dai, S. Guo, B. Xiao, "Physical-World Optical Adversarial Attacks on 3D Face Recognition", in Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023 (CVPR-2023), Vancouver, Canada, June 18-22, 2023, pp. 24699-24708. (PDF, Code)
- Z. Liu, X. Zhang, L. Lao, G. Li, B. Xiao, "DBE-voting: A Privacy-preserving and Auditable Blockchain-based E-voting System", in Proc. of the IEEE International Conference on Communications (ICC-2023), Rome, Italy, 28 May -01 June 2023, pp. 6571-6577.
- R. Song, B. Xiao, Y. Song, S. Guo, Y. Yang, "A Survey of Blockchain-based Schemes for Data Sharing and Exchange", IEEE Transactions on Big Data (TBD), Vol. 9, No. 6, Dec. 2023, pp. 1477-1495. (PDF, PPT)
- H. Wu, Z. Li, R. Song, B. Xiao, "Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds", IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 35, No. 9, Sept. 2023, pp. 9728-9742.
- H. Xu, B. Xiao, X. Liu,
S. Jiang, W. Xue, L. Wang, J. Wang, K. Li, "Empowering
Authenticated and Efficient Queries
for STK Transaction-based Blockchains", IEEE Transactions on Computers (TC), Vol. 72, No. 8, Aug. 2023, pp. 2209-2223. - Z. Li, S. Chen, H. Dai, D. Xu, C. Chu, B. Xiao, "Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation", IEEE Transactions on Reliability (TR), Vol. 72, No. 2, Jun. 2023, pp. 498-510. (PDF)
- S. Gao, Z. Peng, F. Tan, Y. Zheng, B. Xiao, "SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions", IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 20, No. 3, May-June 2023, pp. 2289-2301. (PDF)
- X. Xiao, Z. Tang, C. Li, B. Xiao, K. Li, "SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning", IEEE Transactions on Industrial Informatics (TII), Vol. 19, No. 3, Mar. 2023, pp. 2608-2618. (PDF)
- Z. Li, B. Xiao, S. Guo, Y. Yang, "Securing Deployed Smart Contracts and DeFi with Distributed TEE Cluster", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 34, No. 3, Mar. 2023, pp. 828-842. (PDF)
- B. Singh, Q. Ye, H. Hu, B. Xiao, "Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain", Future Generation Computer Systems, Vol. 139, Feb. 2023, pp. 210-223.
-
2022
[Top]
- R. Song, S. Gao, Y. Song, B. Xiao, "zkDET: A Traceable Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge", in Proc. of 42th IEEE International Conference on Distributed Computing Systems (ICDCS 2022), Bologna, Italy, July 10-13, 2022, pp. 224-234.
- H. Wu, R. Song, K. Lei, B. Xiao, "Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using Blockchain", in Proc. of 42th IEEE International Conference on Distributed Computing Systems (ICDCS 2022), Bologna, Italy, July 10-13, 2022, pp. 1201-1211.
- X. Dai, B. Xiao, J. Xiao, H. Jin, "An Efficient Block Validation Mechanism for UTXO-based Blockchains", in Proc. of the 36th IEEE International Parallel & Distributed Processing Symposium (IEEE IPDPS), Lyon, France, May 30-June 3, 2022, pp. 1250-1260. (PDF)
- L. Yang, Y. Song, S. Gao, A. Hu, B. Xiao, "Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN", IEEE Transactions on Network and Service Management, Vol. 19, No. 3, Sept. 2022, pp. 2269-2281. (PDF)
- Y. Huang, J. Zhang, J. Duan, B. Xiao, F. Ye, Y. Yang, "Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments", IEEE Transactions on Mobile Computing (TMC), Vol. 21, No. 9, Sept. 2022, pp. 3298-3311.
- P. Wang, K. Li, B. Xiao, K. Li, "Multi-objective Optimization for Joint Task Offloading, Power Assignment, and Resource Allocation in Mobile Edge Computing", IEEE Internet of Things Journal (IoT-J), Vol. 9, No. 14, July 2022, pp. 11737-11748.
- M. Duan, K. Li, J. Deng, B. Xiao, Q. Tian, "A Novel Multi-sample Generation Method for Adversarial Attacks", ACM Transactions on Multimedia Computing, Communications and Applications (TOMM), Vol. 18, No. 4, Nov. 2022, Article No. 112, pp. 1-21.
- Z. Li, H. Wu, L. Lao, S. Guo, Y. Yang, B. Xiao, "PISTIS: Issuing Trusted and Authorized Certificates with Distributed Ledger and TEE", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 33, No. 7, July 2022, pp. 1636-1649. (PDF)
- H. Wu, Z. Peng, S. Guo, Y. Yang, B. Xiao, "VQL: Efficient and Verifiable Cloud Query Services for Blockchain Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 33, No. 6, June 2022, pp. 1393-1406. (PDF)
- G. Liu, S. Guo, B. Xiao, Y. Yang, "SDN-based Traffic Matrix Estimation in Data Center Networks Through Large Size Flow Identification", IEEE Transactions on Cloud Computing (TCC), Vol. 10, No. 1, Jan. 2022, pp. 675-690.
- X. Zhang, G. Li, J. Zhang, A. Hu, Z. Hou, B. Xiao, "Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems", IEEE Internet of Things Journal (IoT-J), Vol. 9, No. 8, April 2022, pp. 6081-6094. (PDF)
- X. Liu, J. Yin, J. Liu, S. Zhang, B. Xiao, "Time Efficient Tag Searching in Large-scale RFID Systems: A Compact Exclusive Validation Method", IEEE Transactions on Mobile Computing (TMC), Vol. 21, No. 4, Apr. 2022, pp. 1476-1491.
-
2021
[Top]
- Z. Li, Y. Zhou, S. Guo, B. Xiao, "SolSaviour: A Defending Framework for Deployed Defective Smart Contracts", in Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC-2021), Austin, TX, USA, Dec. 6-10, 2021, pp. 748-760. (PDF, PPT)
- Q. Chen, Y. Song, B. Jennings, F. Zhang, B. Xiao, S. Gao, "IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation", in Proc. of the IEEE GLOBECOM (GLOBECOM-2021), Madrid, Spain, 7-11 Dec. 2021, pp. 1-6.
- Mingxing Duan, Kenli Li, Lingxi Xie, Qi Tian, Bin Xiao, "Towards Multiple Black-boxes Attack via Adversarial Example Generation Network" , in Proceedings of the 29th ACM International Conference on Multimedia (ACM Multimedia), Chengdu, China, Oct. 20-24, 2021, pp. 264-272. (PDF)
- Fan Liu, Shuyu Zhao, Xuelong Dai, Bin Xiao, "Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks", in Proc. of the ICML 2021 Workshop on Adversarial Machine Learning, Jul 18-24, 2021. (PDF, Code)
- H. Zhang, L. Lao, C. Shu, B. Xiao, "Analysis of the Communication Traffic Model for Permissioned Blockchain Based on Proof-of-Work", in Proc. of the IEEE International Conference on Communications (ICC-2021), Montreal, Canada, 14-23 June 2021, pp. 1-6.
- X. Ma, Y. Song, Z. Wang, S. Gao, B. Xiao, A. Hu, "You Can Hear but You Cannot Record: Privacy Protection by Jamming Audio Recording", in Proc. of the IEEE International Conference on Communications (ICC-2021), Montreal, Canada, 14-23 June 2021, pp. 1-6.
- Z. Li, S. Gao, Z. Peng, B. Xiao, S. Guo, Y. Yang, "B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology", IEEE Transactions on Network Science and Engineering (TNSE), Vol. 8, No. 2, April-June, 2021, pp. 1674-1686. (PDF)
- Q. Hu, M. Duan, Z. Yang, S. Yu, B. Xiao, "Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications", IEEE Internet of Things Journal (IoT-J), Vol. 8, No. 16, Aug. 2021, pp. 12782-12791.
- S. Guo, M. Chen, K. Liu, X. Liao, B. Xiao, "Robust Computation Offloading and Resource Scheduling in Cloudlet-based Mobile Cloud Computing", IEEE Transactions on Mobile Computing (TMC), Vol. 20, No. 5, May 2021, pp. 2025-2040.
- K. Gai, Y. Wu, L. Zhu, K. Choo, B. Xiao, "Blockchain-Enabled Trustworthy Group Communications in UAV Networks", IEEE Transactions on Intelligent Transportation Systems (TITS), Vol. 22, No. 7, July 2021, pp. 4118-4130.
- X. Liu, J. Yin, S. Zhang, B. Xiao, B. Ou, "Time-Efficient Target Tags Information Collection in Large-scale RFID Systems", IEEE Transactions on Mobile Computing (TMC), Vol. 20, No. 9, Sept. 2021, pp. 2891-2905.
- T. Zhou, B. Xiao, Z. Cai, M. Xu, "A Utility Model for Photo Selection in Mobile Crowdsensing", IEEE Transactions on Mobile Computing (TMC), Vol. 20, No. 1, Jan. 2021, pp. 48-62.
- 2020
[Top]
- L. Yang, Y. Song, S. Gao, B. Xiao, and A. Hu, "Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN", in Proc. of the IEEE GLOBECOM (GLOBECOM-2020), Taipei, Taiwan, 7-11 Dec. 2020, pp. 1-6.
- X. Liu, Q. Yang, S. Zhang, and B. Xiao, "RLLL: Accurate Relative Localization of RFID Tags with Low Latency", in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS), June 15-17, 2020, pp. 1-10.
- L. Lao, X. Dai, B. Xiao, and S. Guo, "G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications", in Proc. of the 34th IEEE International Parallel & Distributed Processing Symposium (IEEE IPDPS), New Orleans, Louisiana USA, May 18-22, 2020, pp. 664-673. (PDF, PPT)
- H. Wu, J. Tao, and B. Xiao, "Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing", in Proc. of the IEEE International Conference on Communications (ICC-2020), Dublin, Ireland, 7-11 June 2020, pp. 1-6.
- Y. Chen, G. Li, C. Sun, J. Zhang, E. Jorswieck, and B. Xiao, "Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks", in Proc. of the IEEE International Conference on Communications (ICC-2020), Dublin, Ireland, 7-11 June 2020, pp. 1-6.
- C. Shi, R. Song, Y. Song, X. Qi, B. Xiao, and S. Lu, "ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis", in Proc. of the IEEE International Conference on Communications (ICC-2020), Dublin, Ireland, 7-11 June 2020, pp. 1-6.
- Y. Yao, B. Xiao, W. Wang, G. Yang, X. Zhou, Z. Peng, "Real-Time Cache-Aided Route Planning based on Mobile Edge Computing", IEEE Wireless Communications, Vol. 27, No. 5, Oct. 2020, pp. 155-161.
- X. Xie, X. Liu, H. Qi, B. Xiao, K. Li, and J. Wu, "Geographical Correlation-based Data Collection for Sensor-augmented RFID Systems", IEEE Transactions on Mobile Computing (TMC), Vol. 19, No. 10, Oct. 2020, pp. 2344-2357.
- X. Xie, X. Liu, X. Zhao, W. Xue, B. Xiao, H. Qi, K. Li, and J. Wu, "Implementation of Differential Tag Sampling for COTS RFID Systems", IEEE Transactions on Mobile Computing (TMC), Vol. 19, No. 8, Aug. 2020, pp. 1848-1861.
- L. Lao, Z. Li, S. Hou, B. Xiao, G. Song, Y. Yang, "A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus and Traffic Modeling", ACM Computing Surveys (ACM CSUR), Vol. 53, No. 1, Feb. 2020, pp. 1-32. (PDF, PPT)
- X. Tang, B. Xiao, and K. Li, "Indoor Crowd Density Estimation Through Mobile Smartphone Wi-Fi Probes", IEEE Transactions on Systems, Man, and Cybernetics: Systems (TSMC), Vol. 50, No. 7, July 2020, pp. 2638-2649.
- S. Gao, Z. Peng, B. Xiao, A. Hu, Y. Song, and K. Ren, "Detection and Mitigation of DoS Attacks in Software Defined Networks", IEEE/ACM Transactions on Networking (TNET), Vol. 28, No. 3, June 2020, pp. 1419-1433.
- 2019 [Top]
- S. Gao, Z. Li, Z. Peng, and B. Xiao, "Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System", in Proc. of the 26th ACM Conference on Computer and Communications Security (ACM CCS), London, UK, November 11-15, 2019, pp. 833-850. (acceptance rate 16%) (PDF, PPT)
- Y. Huang, J. Zhang, J. Duan, B. Xiao, F. Ye, and Y. Yang, "Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments", in Proc. of 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Dallas, Texas, USA, July 7-10, 2019.
- L. Han, B. Xiao, X. Dong, Z. Shen, Z. Shao, "DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices", in Proc. of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, 25-29 March 2019, pp. 1052-1057.
- Z. Peng, H. Wu, B. Xiao, and S. Guo, "VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems", in Proc. of the First International Workshop on Blockchain and Data Management (BlockDM 2019), In Conjunction with ICDE 2019, Macau SAR, China, Apr. 8, 2019.
- Z. Kuang, Y. Shi, S. Guo, J. Dan, and B. Xiao, "Multi-User Offloading Game Strategy in OFDMA Mobile Cloud Computing System", IEEE Transactions on Vehicular Technology (TVT), Vol. 68, No. 12, Dec. 2019, pp. 12190-12201.
- Y. Yao, B. Xiao, G. Yang, Y. Hu, L. Wang, and X. Zhou, "Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI", IEEE Journal on Selected Areas in Communications (J-SAC), Vol. 37, No. 11, Nov. 2019, pp. 2588-2602.
- Z. Peng, Y. Yao, B. Xiao, S. Guo and Y. Yang, "When Urban Safety Index Inference Meets Location-based Data", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 11, Nov. 2019, pp. 2701-2713.
- J. Liu, B. Xiao, X. Liu, K. Bu, L. Chen, and C. Nie, "Efficient Polling-based Information Collection in RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 27, No. 3, Jun. 2019, pp. 948-961.
- G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, and A. Hu, "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities", Entropy 2019, 21(5), 497.
- Y. Yao, B. Xiao, G. Wu, X. Liu, Z. Yu, K. Zhang, and X. Zhou, "Multi-channel based Sybil Attack Detection in Vehicular Ad Hoc Networks using RSSI", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 2, Feb. 2019, pp. 362-375.
- J. Liu, S. Chen, Q. Xiao, M. Chen, B. Xiao and L. Chen, "Efficient Information Sampling in Multi-category RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 27, No. 1, Feb. 2019, pp. 159-172.
- S. Guo, J. Liu, Y. Yang and B. Xiao, and Z. Li, "Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 2, Feb. 2019, pp. 319-333.
- 2018 [Top]
- R. Song, Y. Song, S. Gao, B. Xiao, and A. Hu, "I Know What You Type: Leaking User Privacy Via Novel Frequency-based Side-channel Attacks", in Proc. of the IEEE GLOBECOM (GLOBECOM-2018), Abu Dhabi, UAE, 9-13 Dec. 2018, pp. 1-6.
- T. Zhou, Z. Cai, B. Xiao, L. Wang, M. Xu, and Y. Chen, "Location Privacy-Preserving Data Recovery for Mobile Crowdsensing", in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), UBICOMP 2018, Singapore, 9-11 Oct. 2018, pp. 151-173.
- S. Gao, Z. Li, Y. Yao, B. Xiao, S. Guo, Y. Yang, "Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control", in Proc. of the ACM Asia Conference on Computer and Communications Security (ACM ASIA CCS 2018 ), Songdo, Incheon, Korea, 4-8 June 2018, pp. 413-424. (acceptance rate 20%)
- J. Li, Z. Peng, and B. Xiao, "New Mobility-aware Application Offloading Design with Low Delay and Energy Efficiency", in Proc. of the IEEE International Conference on Communications (ICC-2018), Kansas City, MO USA, 20-24 May 2018, pp. 1-6.
- T. Zhou, B. Xiao, Z. Cai, M. Xu and X. Liu, "From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing", in Proc. of the IEEE International Conference on Computer Communications (INFOCOM-2018), Honolulu, HI, USA, April 15-19, 2018, pp. 1979-1987. (acceptance rate 19.2%)
- Z. Peng, S. Gao, B. Xiao, G. Wei, S. Guo, and Y. Yang, "Indoor Floor Plan Construction through Sensing Data Collected from Smartphones", IEEE Internet of Things Journal (IoT-J), Vol. 5, No. 6, Dec. 2018, pp. 4351-4364.
- H. Yu, S. Guo, Y. Yang, and B. Xiao, "Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel", IEEE Systems Journal, Vol. 12, No. 4, Dec. 2018, pp. 3291-3302.
- Z. Peng, S. Gao, Z. Li, B. Xiao, and Y. Qian, "Vehicle Safety Improvement Through Deep Learning and Mobile Sensing", IEEE Network, Vol. 32, No. 4, July/Auguest 2018, pp. 28-33.
- S. Gao, Z. Li, B. Xiao and G. Wei, "Security Threats in the Data Plane of Software-Defined Networks", IEEE Network, Vol. 32, No. 4, July/Auguest 2018, pp. 108-113.
- Y. Yao, Z. Peng, and B. Xiao, "Parallel Hyper-Heuristic Algorithm for Multi-objective Route Planning in a Smart City", IEEE Transactions on Vehicular Technology (TVT), Vol. 67, No. 11, Nov. 2018, pp. 10307-10318.
- S. Guo, Y. Shi, Y. Yang and B. Xiao, "Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks", IEEE Transactions on Mobile Computing (TMC), Vol. 17, No. 7, Jul. 2018, pp. 1524-1537.
- F. Wang, S. Guo, B. Xiao, Y. Yang, and X. Zhang, "Resource Allocation and Admission Control for an Energy Harvesting Cooperative OFDMA Network", IEEE Transactions on Vehicular Technology (TVT), Vol. 67, No. 5, May 2018, pp. 4071-4086.
- F. Wang, S. Guo, Y. Yang, B. Xiao, “Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting”, IEEE Systems Journal, Vol. 12, No. 1, Mar. 2018, Pages: 735-746.
- Z. Peng, S. Gao, B. Xiao, S. Guo and Y. Yang, "CrowdGIS: Updating Digital Maps via Mobile Crowdsensing", IEEE Transactions on Automation Science and Engineering (T-ASE), Vol. 15, No. 1, Jan. 2018, pp. 369-380.
- 2017 [Top]
- G. Li, A. Hu, J. Zhang, and B. Xiao, "Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation", in Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6.
- Y. Yao, B. Xiao, G. Wu, X. Liu, Z. Yu, K. Zhang, X. Zhou, "Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs", in Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2017), Denver CO, USA, 26-29 June 2017, pp. 591-602. (acceptance rate 22.3%)
- S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, "'SCoP: Smartphone Energy Saving by Merging Push Services in Fog Computing", in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS), Vilanova i la Geltru, Spain, June 14-16, 2017, pp. 1-10. (acceptance rate 19.9%)
- F. Zhu, B. Xiao, J. Liu, Y. Wang, and L. Chen, "Dynamic Grouping in RFID Systems", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON-2017), San Diego, CA, USA, June 12-14, 2017, pp. 1-9. (acceptance rate 26.5%)
- T. Zhou, Z. Cai, B. Xiao, Y. Chen, and M. Xu, "Detecting Rogue AP with the Crowd Wisdom", in Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS-2017), Atlanta GA, USA, 5-8 June 2017, pp. 2327-2332.
- J. Liu, S. Chen, B. Xiao, Y. Wang, and L. Chen, "Category Information Collection in RFID Systems", in Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS-2017), Atlanta GA, USA, 5-8 June 2017, pp. 2220-2225.
- Y. Yao, Z. Peng, B. Xiao, and J. Guan, "An Efficient Learning-based Approach to Multi-objective Route Planning in a Smart City", in Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
- Y. Song, S. Gao, A. Hu, and B. Xiao, "Novel Attacks in OSPF Networks to Poison Routing Table", in Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
- Z. Peng, B. Xiao, Y. Yao, J. Guan, and F. Yang, "U-Safety: Urban Safety Analysis in A Smart City", in Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
- S. Gao, Z. Peng, B. Xiao, A. Hu, K. Ren, "FloodDefender: Protecting Data and Control Plane Resources under SDN-aimed DoS Attacks", in Proc. of the IEEE International Conference on Computer Communications (INFOCOM-2017), Atlanta GA, USA, 1-4 May 2017, pp. 1-9. (acceptance rate 20.93%)
- K. Bu, M. Weng, Y. Zheng, B. Xiao and X. Liu, "You Can Clone but You Can't Hide: A Survey of Clone Prevention and Detection for RFID", IEEE Communications Surveys and Tutorials, Vol. 19, Issue 3, 2017, pp. 1682-1700.
- X. Xie, X. Liu, K. Li, B. Xiao, and H. Qi, "Minimal Perfect Hashing-based Information Collection Protocol for RFID systems", IEEE Transactions on Mobile Computing (TMC), Vol. 16, No. 10, Oct. 2017, pp. 2792-2805.
- J. Li, Z. Peng, S. Gao, B. Xiao, and H. Chan, "Smartphone-Assisted Energy Efficient Data Communication for Wearable Devices", Computer Communications (Elsevier), Vol. 105, 1 June 2017, pp. 33-43.
- F. Zhu, B. Xiao, J. Liu, B. Wang, Q. Pan, and L. Chen, "Exploring Tag Distribution in Multi-reader RFID Systems", IEEE Transactions on Mobile Computing (TMC), Vol. 16, No. 5, May 1 2017, pp. 1300-1314.
- Q. Xiao, B. Xiao, S. Chen, and J. Chen, "Collision-aware Churn Estimation in Large-scale Dynamic RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 392-405.
- X. Liu, X. Xie, K. Li, B. Xiao, J. Wu, H. Qi, and D. Lu, "Fast Tracking the Population of Key Tags in Large-scale Anonymous RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 278-291.
- X. Liu, B. Xiao, K. Li, A. Liu, J. Wu, X. Xie, and H. Qi, "RFID Estimation with Blocker Tags" IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 224-237.
- F. Zhu, B. Xiao, J. Liu and L. Chen, "Efficient Physical-layer Unknown Tag Identification in Large-scale RFID Systems", IEEE Transactions on Communications (TCOM), Vol. 65, No. 1, Jan. 2017, pp. 283-295.
- 2016 [Top]
- X. Liu, B. Xiao, F. Zhu and S. Zhang, "Let’s Work Together: Fast Tag Identification by Interference Elimination for Multiple RFID Readers", in Proc. of the 24th IEEE International Conference on Network Protocols (IEEE ICNP 2016), Singapore, Nov. 2016, pp. 1-10. (acceptance rate 20.1%)
- J. Liu, B. Xiao, X. Liu, and L. Chen, "Fast RFID Polling Protocols", in Proc. of the International Conference on Parallel Processing (ICPP 2016), Philadelphia, USA, Aug. 2016, pp. 304-313. (acceptance rate 21.1%)
- J. Li, Z. Peng, and B. Xiao, "Smartphone-Assisted Smooth Live Video Broadcast on Wearable Cameras", in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS), Beijing, China, June 20-21, 2016, pp. 1-6.
- F. Zhu, B. Xiao, J. Liu, X. Liu, and L. Chen, "PLAT: A Physical-layer Tag Searching Protocol in Large RFID Systems", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON), London, UK, June 27-30, 2016, pp. 1-9. (acceptance rate 26.3%)
- X. Xie, X. Liu, W. Xue, K. Li, B. Xiao, and H. Qi, "Fast Collection of Data in Sensor-Augmented RFID Networks", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON), London, UK, June 27-30, 2016, pp. 1-9. (acceptance rate 26.3%)
- S. Gao, Z. Peng, B. Xiao, and Y. Song, "Secure and Energy Efficient Prefetching Design for Smartphones", in Proc. of the IEEE International Conference on Communications (ICC-2016), Kuala Lumpur, Malaysia, 23-27 May 2016, pp. 1-6.
- X. Liu, B. Xiao, S. Zhang, K. Bu, "One More Hash is Enough: Efficient Tag Stocktaking in Highly Dynamic RFID Systems", in Proc. of the IEEE International Conference on Communications (ICC-2016), Kuala Lumpur, Malaysia, 23-27 May 2016, pp. 1-6.
- S. Guo, B. Xiao, Y. Yang, Y. Yang, "Energy-Efficient Dynamic Offloading and Resource Scheduling in Mobile Cloud Computing", in Proc. of the IEEE INFOCOM 2016, San Francisco, CA USA, 10-15 April 2016, pp. 1-9. (acceptance rate 18.25%)
- J. Liu, M. Chen, Bin Xiao, F. Zhu, S. Chen, and L. Chen, "Efficient RFID Grouping Protocols", IEEE/ACM Transactions on Networking (TNET), Vol. 24, No. 5, October 2016, pp. 3177-3190.
- X. Liu, S. Zhang, B. Xiao and K. Bu, "Flexible and Time-Efficient Tag Scanning with Handheld Readers", IEEE Transactions on Mobile Computing (TMC), Vol. 15, No. 4, April 2016, pp. 840-852.
- Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang, "Who Stole My Cheese?: Verifying Intactness of Anonymous RFID Systems", Ad Hoc Networks, Volume 36, Part 1, January 2016, pp. 111–126.
- 2015 [Top]
- J. Li, Z. Peng, B. Xiao, and Y. Hua, "Make Smartphones Last A Day: Pre-processing Based Computer Vision Application Offloading", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON), Seattle, WA USA, June 22-25, 2015, pp. 462-470.
- X. Liu, B. Xiao, K. Li, J. Wu, A. Liu, H. Qi and X. Xie, "RFID Cardinality Estimation with Blocker Tags", in Proc. of the IEEE INFOCOM 2015, Hong Kong, China, April 2015, pp. 1679 - 1687. (acceptance rate 19%)
- J. Liu, B. Xiao, S. Chen, F. Zhu and L. Chen, "Fast RFID Grouping Protocols", in Proc. of the IEEE INFOCOM 2015, Hong Kong, China, April 2015, pp. 1948-1956. (acceptance rate 19%)
- Y. Hua, B. Xiao, X. Liu and D. Feng, "The Design and Implementations of Locality-aware Approximate Queries in Hybrid Storage Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 26, No. 11, Nov. 2015, pp. 3194-3207.
- S. Guo, F. Wang, Y. Yang and B. Xiao, "Energy-Efficient Cooperative Transmission for Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks", IEEE Transactions on Communications (TCOM), Vol. 63, No. 11, Nov. 2015, pp. 4405-4417.
- X. Liu, Bin Xiao, S. Zhang, K. Bu and A. Chan, "STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems", accepted in IEEE Transactions on Computers (TC), Vol. 64, No. 11, Nov. 2015, pp. 3265-3277.
- Jinhai Xu, Songtao Guo, Bin Xiao, Jing He, “Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution,” Concurrency and Computation: Practice and Experience, Volume 27, Issue 18, Pages 5765–5779, Dec. 2015.
- X. Liu, B. Xiao, S. Zhang and K. Bu, "Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 26, No. 06, June 2015, pp. 1775-1788.
Before 2015 [Top]
- Conference:
- K. Bu, J. Liu, B. Xiao, X. Liu and S. Zhang, "Intactness Verification in Anonymous RFID Systems", in Proc. of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, December 16-19, 2014, pp. 134-141.
- X. Liu, K. Li, H. Qi, B. Xiao and X. Xie, "Fast Counting the Key Tags in Anonymous RFID Systems", in Proc. of the 22nd IEEE International Conference on Network Protocols (IEEE ICNP 2014), Raleigh NC USA, Oct. 2014, pp. 59-70. (acceptance rate 20%)
- X. Liu, B. Xiao, K. Bu and S. Zhang, "LOCK: A Fast and Flexible Tag Scanning Mechanism with Handheld Readers", in Proc. of the IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2014), Hong Kong China, May 2014, pp. 360-369. (acceptance rate 23.8%)
- J. Liu, B. Xiao, K. Bu and L. Chen, "Efficient Distributed Query Processing in Large RFID-enabled Supply Chains", in Proc. of the IEEE INFOCOM 2014, Toronto Canada, April 2014, pp. 163-171. (acceptance rate 19.4%)
- K. Bu, X. Liu, J. Li, and B. Xiao, "Less is More: Efficient RFID-based 3D Localization", in Proc. of the Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), Hangzhou China, Oct. 14-16 2013, pp. 86-94.
- J. Li, K. Bu, X. Liu and B. Xiao, "ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing", in Proc. of the Second Mobile Cloud Computing (MCC) Workshop, in conjunction with ACM SIGCOMM 2013, Hong Kong, Aug. 2013, pp. 39-44.
- X. Liu, K. Li, Y. Shen, G. Min, B. Xiao and W. Qu, "A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems", in Proc. of the International Conference on Computer Communications and Networks (ICCCN 2013), Nassau, Bahamas, July 2013, pp. 1-7.
- F. Wang, B. Xiao, K. Bu and J. Su, "Detect and Identify Blocker Tags in Tree-based RFID Systems", in Proc. of the IEEE International Conference on Communications (ICC 2013), Budapest, Hungary, June 2013, pp. 726 - 730.
- Y. Hua, B. Xiao and X. Liu, "NEST: Locality-aware Approximate Query Service for Cloud Computing", in Proc. of the IEEE INFOCOM 2013, Turin Italy, April 2013, pp. 1327-1335. (PPT)
- Q. Xiao, B. Xiao and S. Chen, "Differential Estimation in Dynamic RFID Systems", in Proc. of the IEEE INFOCOM 2013, Turin Italy, April 2013, pp. 295-299.
- X. Liu, S. Zhang, K. Bu and B. Xiao, "Complete and Fast Unknown Tag Identification in Large RFID Systems", in Proc. of the Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Las Vegas, Nevada, USA, Oct. 2012, pp. 47-55. (PPT)
- K. Bu, X. Liu and B. Xiao, "Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems", in Proc. of the 20th IEEE International Workshop on Quality of Service (IWQoS 2012), Coimbra Portugal, June 4-5 2012, pp. 1-4.
- Q. Xiao, K. Bu and B. Xiao, "Efficient Monitoring of Dynamic Tag Populations in RFID Systems", in Proc. of the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-2011), Melbourne, Australia, Oct 24-26, 2011, pp. 106-113. (Best Paper Award)
- K. Bu, B. Xiao, Q. Xiao and S. Chen, "'Efficient Pinpointing of Misplaced Tags in Large RFID Systems", in Proc. of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Salt Lake City, Utah USA, June 27-30, 2011, pp. 287-295. (PPT)
- G. Liu, J. Luo, Q. Xiao and B. Xiao, "EDJam: Effective Dynamic Jamming Against IEEE 802.15.4-Compliant Wireless Personal Area Networks", in Proc. of the IEEE International Conference on Communications (ICC 2011), Kyoto Japan, June 2011.
- S. Chen, M. Zhang and B. Xiao, "Efficient Information Collection Protocols for Sensor-augmented RFID Networks", in Proc. of the IEEE INFOCOM 2011, Shanghai China, April 2011, pp. 3101-3109.
- J. Wang, J. Wang, K. Lu, Y. Qian, B. Xiao and N. Gu, "Optimal Design of Linear Network Coding for Information Theoretically Secure Unicast", in Proc. of the IEEE INFOCOM 2011, Shanghai China, April 2011, pp. 757-765.
- X. Liu, S. Zhang, J. Wang, J. Cao and B. Xiao, "Anchor Supervised Distance Estimation in Anisotropic Wireless Sensor Networks", in Proc. of IEEE Wireless Communications and Networking Conference (IEEE WCNC 2011), Cancun Mexico, March 2011.
- H. Guan, B. Xiao, J. Zhou, M. Guo and T. Yang, "Fast Dimension Reduction for Document Classification Based on Imprecise Spectrum Analysis", in Proc. of the ACM Nineteenth Conference on Information and Knowledge Management (CIKM 2010), Toronto Canada, Oct. 2010, pp. 1753-1756.
- J. Luo, B. Xiao, Z. Yang and S. Zhou, "A Clone of Social Networks to Decentralized Bootstrapping P2P Networks", in Proc. of the 18th IEEE International Workshop on Quality of Service (IWQoS 2010), pp. 1-2, Beijing China, June 2010.
- J. Wang, J. Wang, K. Lu, Bin Xiao, N. Gu, "Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams", in Proc. of the IEEE INFOCOM 2010, San Diego, CA, Mar. 2010, pp. 1-9.
- Qingjun Xiao, Bin Xiao, Jiaqing Luo and Guobin Liu, "Reliable Navigation of Mobile Sensors in Wireless Sensor Networks without Localization Service", in Proc. of the 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1-9, Charleston, South Carolina, July 13-15, 2009.
- Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou, "Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks," in Proc. IPDPS 2009 IEEE International Symposium on Parallel and Distributed Processing (SSN2009), pp.1-8, Rome - Italy, May 2009.
- Zhigang Li, Nong Xiao, Jizhong Zhao, and Bin Xiao, "Bouncing Tracks in Sensor Networks", in Proc. of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), pp. 591-598, Melbourne Australia, Dec. 2008.
- Baowei Wang, Xingming Sun, Xinbing Wang, and Bin Xiao, "Time-based Privacy Protection for Multi-attribute Data in WSNs", in Proc. of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), pp. 615-622, Melbourne Australia, Dec. 2008.
- Yu Hua, Bin Xiao, Dan Feng and Bo Yu, "Bounded LSH for Similarity Search in Peer-to-Peer File Systems", in Proc. International Conference on Parallel Processing (ICPP 2008), pp. 644-651, Portland, Sept. 2008.
- Bin Xiao, "Internet Worm Threat and Defending Mechanism" (invited talk), in Proc. the 3rd Joint Workshop on Information Security (JWIS 2008), pp. 27, Seoul Korea, July 10-11 2008.
- Yong Tang, Xicheng Lu, and Bin Xiao, "Generating Simplified Regular Expression Signatures for Polymorphic Worms", in Proc. 4th International Conference on Autonomic and Trusted Computing (ATC-07) (LNCS), pp. 478-488, Hong Kong, July 2007.
- Bin Xiao, Hekang Chen, and Shuigeng Zhou, "A Walking Beacon-Assisted Localization in Wireless Sensor Networks", in Proc. 2007 IEEE International Conference on Communications (ICC 2007), pp. 3070-3075, Glasgow UK, June 2007.
- Yu Hua, and Bin Xiao, "A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services", in international conference on high performance computing (HiPC 2006), pp. 277-288, Bangalore India, December 18-21, 2006.
- Bin Xiao, Bo Yu, and Chuanshan Gao, "Detection and Localization of Sybil Nodes in VANETs", in 2nd ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 2006), in conjunction with MobiCom 2006, pp. 1-8, Los Angeles - USA, September 25, 2006.
- Bo Yu, and Bin Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks", Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006), pp. 1–8, Greece, 25-29 April 2006.
- Journal:
- X. Liu, K. Li, G. Min, K. Lin, Bin Xiao, Y. Shen and W. Qu, "Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 12, Dec. 2014, pp. 3145-3155.
- Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao and Minyi Guo, "Modeling and Defending Against Adaptive BitTorrent Worms in Peer-to-Peer Networks", ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS), Volume 9 Issue 1, Article No. 5, March 2014, pp. 1-17.
- Kai Bu, Xuan Liu, and Bin Xiao, "Approaching the Time Lower Bound on Cloned-tag Identification for Large RFID Systems", Ad Hoc Networks, Vol. 13, Part B, Feb. 2014, pp. 271-281.
- Q. Xiao, B. Xiao, K. Bu and J. Cao, "Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach", IEEE/ACM Transactions on Networking (TNET), Volume 22 No. 2, Apr. 2014, pp. 608-621.
- J. Luo, B. Xiao, K. Bu and S. Zhou, "Understanding and Improving Piece-related Algorithms in the BitTorrent Protocol", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 24, No. 12, Dec. 2013, pp. 2526-2537.
- J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, "Modeling and Optimal Design of Linear Network Coding for Secure Unicast With Multiple Streams", IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24 No. 10, Oct. 2013, pp. 2025-2035.
- Q. Xiao, K. Bu, B. Xiao, and L. Sun, "Efficient Protocol Design for Dynamic Tag Population Monitoring in Large-Scale RFID Systems", Concurrency and Computation: Practice and Experience, Volume 25, Issue 14, Sept. 2013, pp. 2080-2097.
- J. Luo, B. Xiao, and S. Zhou, "A Bottom-up Model for Heterogeneous BitTorrent Systems", Journal of Parallel and Distributed Computing (JPDC - Elsevier), Volume 73 Issue 8, Aug. 2013, pp. 1116-1126.
- B. Yu, C.-Z. Xu, and B. Xiao, "Detecting Sybil attacks in VANETs", Journal of Parallel and Distributed Computing (JPDC - Elsevier), Volume 73, Issue 6, June 2013, pp. 746-756.
- K. Bu, X. Liu, J. Luo, B. Xiao and G. Wei, "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems", IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 3, March 2013, pp. 429-439.
- Q. Xiao, K. Bu, Z. Wang, and B. Xiao, "Robust Localization against Outliers in Wireless Sensor Networks", ACM Transactions on Sensor Networks (ACM TOSN), Volume 9, No. 2, March 2013, Article No. 24, pp. 1-26.
- K. Bu, B. Xiao, Q. Xiao and S. Chen, "Efficient Misplaced-Tag Pinpointing in Large RFID Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 23, No. 11, Nov. 2012, pp. 2094-2106.
- K. Bu, Q. Xiao, Z. Sun, and B. Xiao, "Toward collinearity-aware and conflict-friendly localization for wireless sensor networks", Computer Communications (Elsevier), Volume 35, Issue 13, 15 July 2012, pp. 1549-1560.
- Y. Hua, B. Xiao, B. Veeravalli and D. Feng, "Locality-Sensitive Bloom Filter for Approximate Membership Query", IEEE Transactions on Computers (TC), Vol. 61, No. 6, June 2012, pp. 817-830. (Source Code, Manual)
- Yong Tang, Bin Xiao and Xicheng Lu, "Signature Tree Generation for Polymorphic Worms", IEEE Transactions on Computers (TC), Volume 58, No. 4, April 2011, pp. 565 - 579.
- G. Wei, Y. Ling, B. Guo, B. Xiao and A. Vasilakos, "Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter", Computer Communications (Elsevier), Volume 34, Issue 6, 3 May 2011, pp. 793-802.
- Qingjun Xiao, Bin Xiao, Jiannong Cao and Jianping Wang, "Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern Driven Scheme", IEEE Transactions on Mobile Computing (TMC), Volume 9, No. 11, Nov. 2010, pp. 1592-1607.
- G. Wei, Y. Lin, A. Vasilakos, B. Xiao and Y. Zheng, "PIVOT: An adaptive information discovery framework for computational grids", Information Science (Elsevier), Volume 180, 2010, pp. 4543-4556.
- Zhaochun Yu, Bin Xiao and Shuigeng Zhou, "Achieving Optimal Data Storage Position in Wireless Sensor Networks", Computer Communications (Elsevier), Volume 33, Issue 1, 15 January 2010, pp. 92-102.
- Bin Xiao, Lin Chen, Qingjun Xiao and Minglu Li, "Reliable Anchor-Based Sensor Localization in Irregular Areas", IEEE Transactions on Mobile Computing (TMC), Volume 9, No. 1, Jan. 2010 pp. 60 - 72.
- Bin Xiao and Yu Hua, "Using Parallel Bloom Filters for Multi-attribute Representation on Network Services", IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 21, No. 1, Jan. 2010, pp. 20 - 32.
- Yu Hua, Bin Xiao and Jianping Wang, "BR-tree: A Scalable Prototype for Supporting Multiple Queries of Multi-dimensional Data", IEEE Transactions on Computers (TC), Volume 58, No. 12, Dec. 2009, pp. 1585 - 1598.
- Yong Tang, Bin Xiao and Xicheng Lu, "Using a Bioinformatics Approach to Generate Accurate Exploit-based Signatures for Polymorphic Worms ", Computers & Security (Elsevier), Vol 28, 2009, pp. 827-842.
- Jiannong Cao, Lin Liao, Guojun Wang, Hao Ma, Bin Xiao, "A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet". International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) Volume 4, Number 3/4: pp. 183-190 (2009).
- Yong Tang, Jiaqing Luo, Bin Xiao and Guiyi Wei, "Concept, Characteristics and Defending Mechanism of Worms" (invited paper), IEICE Transactions on Information and Systems, Vol. E92-D, No.5, pp. 799-809, May 2009.
- Bin Xiao, Jiannong Cao, Qin Lu, "Dynamic SPT Update for Multiple Link State Decrements in Network Routing", Journal of Supercomputing (Springer), Volume 46, Number 3, pp. 237-256, Dec. 2008.
- Bin Xiao, Hekang Chen, Shuigeng Zhou, "Distributed Localization Using a Moving Beacon in Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 19, no. 5, pp. 587-600, May 2008.
- Bin Xiao, Wei Chen, and Yangxiang He, "An Autonomous Defense against SYN Flooding Attacks: Detect and Throttle Attacks at the Victim Side", Journal of Parallel and Distributed Computing (JPDC - Elsevier), Volume 68, Issue 4, April 2008, pp. 456-470.
- Bin Xiao, Jiannong Cao, Zili Shao, Edwin H.-M. Sha, "An Efficient Algorithm for Dynamic Shortest Path Tree Update in Network Routing", Journal of Communications and Networks (JCN - KICS), Volume 9, Number 4, December 2007, pp. 499-510.
- Bin Xiao, Bo Yu, and Chuanshan Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks", Journal of Parallel and Distributed Computing (JPDC - Elsevier), Volume 67, Issue 11, November 2007, pp. 1218-1230.
- Maria S. Pereza and Bin Xiao, "Special section: Security on grids and distributed systems", Future Generation Computer Systems (Elsevier), Volume 23, Issue 6, July 2007, pp. 774-775.
- Bin Xiao, Jiannong Cao, Zili Shao, Qingfeng Zhuge and Edwin H.-M. Sha, "Analysis and Algorithms Design for the Partition of Large-Scale Adaptive Mobile Wireless Networks", Computer Communications (Elsevier), Volume 30, Issue 8, 8 June 2007, pp. 1899-1912.
[Top]