Prof. Bin Xiao's Homepage

Publications

[2024]   [2023]   [2022]   [2021]   [2020]   [2019]   [2018]   [2017]   [2016]   [2015]   [Before 2015]

  • 2019 [Top]
    1. S. Gao, Z. Li, Z. Peng, and B. Xiao, "Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System", in Proc. of  the 26th ACM Conference on Computer and Communications Security (ACM CCS), London, UK, November 11-15, 2019, pp. 833-850. (acceptance rate 16%) (PDF, PPT)
    2. Y. Huang, J. Zhang, J. Duan, B. Xiao, F. Ye, and Y. Yang, "Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments", in Proc. of 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Dallas, Texas, USA, July 7-10, 2019.
    3. L. Han, B. Xiao, X. Dong, Z. Shen, Z. Shao, "DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices", in Proc. of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy,  25-29 March 2019, pp. 1052-1057.
    4. Z. Peng, H. Wu, B. Xiao, and S. Guo, "VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems", in Proc. of the First International Workshop on Blockchain and Data Management (BlockDM 2019), In Conjunction with ICDE 2019, Macau SAR, China, Apr. 8, 2019.
    5. Z. Kuang, Y. Shi, S. Guo, J. Dan, and B. Xiao, "Multi-User Offloading Game Strategy in OFDMA Mobile Cloud Computing System", IEEE Transactions on Vehicular Technology (TVT), Vol. 68, No. 12, Dec. 2019, pp. 12190-12201.
    6. Y. Yao, B. Xiao, G. Yang, Y. Hu, L. Wang, and X. Zhou, "Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI",  IEEE Journal on Selected Areas in Communications (J-SAC), Vol. 37, No. 11, Nov. 2019, pp. 2588-2602.
    7. Z. Peng, Y. Yao, B. Xiao, S. Guo and Y. Yang, "When Urban Safety Index Inference Meets Location-based Data", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 11, Nov. 2019, pp. 2701-2713.
    8. J. Liu, B. Xiao, X. Liu, K. Bu, L. Chen, and C. Nie, "Efficient Polling-based Information Collection in RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 27, No. 3, Jun. 2019, pp. 948-961.
    9. G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, and A. Hu, "Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities", Entropy 2019, 21(5), 497.
    10. Y. Yao, B. Xiao, G. Wu, X. Liu, Z. Yu, K. Zhang, and X. Zhou, "Multi-channel based Sybil Attack Detection in Vehicular Ad Hoc Networks using RSSI", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 2, Feb. 2019, pp. 362-375.
    11. J. Liu, S. Chen, Q. Xiao, M. Chen, B. Xiao and L. Chen, "Efficient Information Sampling in Multi-category RFID Systems",  IEEE/ACM Transactions on Networking (TNET), Vol. 27, No. 1, Feb. 2019, pp. 159-172.
    12. S. Guo, J. Liu, Y. Yang and B. Xiao, and Z. Li, "Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing", IEEE Transactions on Mobile Computing (TMC), Vol. 18, No. 2, Feb. 2019, pp. 319-333.
  • 2017 [Top]
    1. G. Li, A. Hu, J. Zhang, and B. Xiao, "Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation", in  Proc. of the IEEE GLOBECOM (GLOBECOM-2017), Singapore, 4-8 Dec. 2017, pp. 1-6.
    2. Y. Yao, B. Xiao, G. Wu, X. Liu, Z. Yu, K. Zhang, X. Zhou, "Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs",  in Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2017), Denver CO, USA, 26-29 June 2017, pp. 591-602. (acceptance rate 22.3%)
    3. S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, "'SCoP: Smartphone Energy Saving by Merging Push Services in Fog Computing", in Proc. of  IEEE/ACM International Symposium on Quality of Service (IWQoS), Vilanova i la Geltru, Spain, June 14-16, 2017, pp. 1-10. (acceptance rate 19.9%)
    4. F. Zhu, B. Xiao, J. Liu, Y. Wang, and L. Chen, "Dynamic Grouping in RFID Systems", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON-2017), San Diego, CA, USA, June 12-14, 2017, pp. 1-9. (acceptance rate 26.5%)
    5. T. Zhou, Z. Cai, B. Xiao, Y. Chen, and M. Xu, "Detecting Rogue AP with the Crowd Wisdom", in Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS-2017), Atlanta GA, USA, 5-8 June 2017, pp. 2327-2332.
    6. J. Liu, S. Chen, B. Xiao, Y. Wang, and L. Chen, "Category Information Collection in RFID Systems", in Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS-2017), Atlanta GA, USA, 5-8 June 2017, pp. 2220-2225.
    7. Y. Yao, Z. Peng, B. Xiao, and J. Guan, "An Efficient Learning-based Approach to Multi-objective Route Planning in a Smart City", in  Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
    8. Y. Song, S. Gao, A. Hu, and B. Xiao, "Novel Attacks in OSPF Networks to Poison Routing Table", in  Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
    9. Z. Peng, B. Xiao, Y. Yao, J. Guan, and F. Yang, "U-Safety: Urban Safety Analysis in A Smart City", in  Proc. of the IEEE International Conference on Communications (ICC-2017), Paris, France, 21-25 May 2017, pp. 1-6.
    10. S. Gao, Z. Peng, B. Xiao, A. Hu, K. Ren, "FloodDefender: Protecting Data and Control Plane Resources under SDN-aimed DoS Attacks", in Proc. of the IEEE International Conference on Computer Communications (INFOCOM-2017), Atlanta GA, USA, 1-4 May 2017, pp. 1-9. (acceptance rate 20.93%)
    11. K. Bu, M. Weng, Y. Zheng, B. Xiao and X. Liu, "You Can Clone but You Can't Hide: A Survey of Clone Prevention and Detection for RFID", IEEE Communications Surveys and Tutorials, Vol. 19, Issue 3, 2017, pp. 1682-1700.
    12. X. Xie, X. Liu, K. Li, B. Xiao, and H. Qi, "Minimal Perfect Hashing-based Information Collection Protocol for RFID systems",  IEEE Transactions on Mobile Computing (TMC), Vol. 16, No. 10, Oct. 2017, pp. 2792-2805.
    13. J. Li, Z. Peng, S. Gao, B. Xiao, and H. Chan, "Smartphone-Assisted Energy Efficient Data Communication for Wearable Devices", Computer Communications (Elsevier), Vol. 105, 1 June 2017, pp. 33-43.
    14. F. Zhu, B. Xiao, J. Liu, B. Wang, Q. Pan, and L. Chen, "Exploring Tag Distribution in Multi-reader RFID Systems", IEEE Transactions on Mobile Computing (TMC), Vol. 16, No. 5, May 1 2017, pp. 1300-1314.
    15. Q. Xiao, B. Xiao, S. Chen, and J. Chen, "Collision-aware Churn Estimation in Large-scale Dynamic RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 392-405. 
    16. X. Liu, X. Xie, K. Li, B. Xiao, J. Wu, H. Qi, and D. Lu, "Fast Tracking the Population of Key Tags in Large-scale Anonymous RFID Systems", IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 278-291.
    17. X. Liu, B. Xiao, K. Li, A. Liu, J. Wu, X. Xie, and H. Qi, "RFID Estimation with Blocker Tags" IEEE/ACM Transactions on Networking (TNET), Vol. 25, No. 1, Feb. 2017, pp. 224-237.
    18. F. Zhu, B. Xiao, J. Liu and L. Chen, "Efficient Physical-layer Unknown Tag Identification in Large-scale RFID Systems", IEEE Transactions on Communications (TCOM), Vol. 65, No. 1, Jan. 2017, pp. 283-295.
  • 2016 [Top]
    1. X. Liu, B. Xiao, F. Zhu and S. Zhang, "Let’s Work Together: Fast Tag Identification by Interference Elimination for Multiple RFID Readers", in Proc. of the 24th IEEE International Conference on Network Protocols (IEEE ICNP 2016), Singapore, Nov. 2016, pp. 1-10. (acceptance rate 20.1%)
    2. J. Liu, B. Xiao, X. Liu, and L. Chen, "Fast RFID Polling Protocols", in Proc. of the International Conference on Parallel Processing (ICPP 2016), Philadelphia, USA, Aug. 2016, pp. 304-313. (acceptance rate 21.1%)
    3. J. Li, Z. Peng, and B. Xiao, "Smartphone-Assisted Smooth Live Video Broadcast on Wearable Cameras", in Proc. of  IEEE/ACM International Symposium on Quality of Service (IWQoS), Beijing, China, June 20-21, 2016, pp. 1-6.
    4. F. Zhu, B. Xiao, J. Liu, X. Liu, and L. Chen, "PLAT: A Physical-layer Tag Searching Protocol in Large RFID Systems", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON), London, UK, June 27-30, 2016, pp. 1-9. (acceptance rate 26.3%)
    5. X. Xie, X. Liu, W. Xue, K. Li, B. Xiao, and H. Qi, "Fast Collection of Data in Sensor-Augmented RFID Networks", in Proc. of the IEEE International Conference on Sensing, Communication and Networking (SECON), London, UK, June 27-30, 2016, pp. 1-9. (acceptance rate 26.3%)
    6. S. Gao, Z. Peng, B. Xiao, and Y. Song, "Secure and Energy Efficient Prefetching Design for Smartphones", in Proc. of the IEEE International Conference on Communications (ICC-2016), Kuala Lumpur, Malaysia, 23-27 May 2016, pp. 1-6.
    7. X. Liu, B. Xiao, S. Zhang, K. Bu, "One More Hash is Enough: Efficient Tag Stocktaking in Highly Dynamic RFID Systems", in Proc. of the IEEE International Conference on Communications (ICC-2016), Kuala Lumpur, Malaysia, 23-27 May 2016, pp. 1-6.
    8. S. Guo, B. Xiao, Y. Yang, Y. Yang, "Energy-Efficient Dynamic Offloading and Resource Scheduling in Mobile Cloud Computing", in Proc. of the IEEE INFOCOM 2016, San Francisco, CA USA, 10-15 April 2016, pp. 1-9. (acceptance rate 18.25%)
    9. J. Liu, M. Chen, Bin Xiao, F. Zhu, S. Chen, and L. Chen, "Efficient RFID Grouping Protocols", IEEE/ACM Transactions on Networking (TNET), Vol. 24, No. 5, October 2016, pp. 3177-3190.
    10. X. Liu, S. Zhang, B. Xiao and K. Bu, "Flexible and Time-Efficient Tag Scanning with Handheld Readers", IEEE Transactions on Mobile Computing (TMC), Vol. 15, No. 4, April 2016, pp. 840-852.
    11. Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang, "Who Stole My Cheese?: Verifying Intactness of Anonymous RFID Systems", Ad Hoc Networks, Volume 36, Part 1, January 2016, pp. 111–126.

Before 2015 [Top]

  • Conference:
    1. K. Bu, J. Liu, B. Xiao, X. Liu and S. Zhang, "Intactness Verification in Anonymous RFID Systems", in Proc. of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, December 16-19, 2014, pp. 134-141.
    2. X. Liu, K. Li, H. Qi, B. Xiao and X. Xie, "Fast Counting the Key Tags in Anonymous RFID Systems", in Proc. of the 22nd IEEE International Conference on Network Protocols (IEEE ICNP 2014), Raleigh NC USA, Oct. 2014, pp. 59-70. (acceptance rate 20%)
    3. X. Liu, B. Xiao, K. Bu and S. Zhang, "LOCK: A Fast and Flexible Tag Scanning Mechanism with Handheld Readers", in Proc. of the IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2014), Hong Kong China, May 2014, pp. 360-369. (acceptance rate 23.8%)
    4. J. Liu, B. Xiao, K. Bu and L. Chen, "Efficient Distributed Query Processing in Large RFID-enabled Supply Chains", in Proc. of the IEEE INFOCOM 2014, Toronto Canada, April 2014, pp. 163-171. (acceptance rate 19.4%)
    5. K. Bu, X. Liu, J. Li, and B. Xiao, "Less is More: Efficient RFID-based 3D Localization", in Proc. of the Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), Hangzhou China, Oct. 14-16 2013, pp. 86-94.
    6. J. Li, K. Bu, X. Liu and B. Xiao, "ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing", in Proc. of the Second Mobile Cloud Computing (MCC) Workshop, in conjunction with ACM SIGCOMM 2013, Hong Kong, Aug. 2013, pp. 39-44.
    7. X. Liu, K. Li, Y. Shen, G. Min, B. Xiao and W. Qu, "A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems", in Proc. of the International Conference on Computer Communications and Networks (ICCCN 2013), Nassau, Bahamas, July 2013, pp. 1-7.
    8. F. Wang, B. Xiao, K. Bu and J. Su, "Detect and Identify Blocker Tags in Tree-based RFID Systems", in Proc. of the IEEE International Conference on Communications (ICC 2013), Budapest, Hungary, June 2013, pp. 726 - 730.
    9. Y. Hua, B. Xiao and X. Liu, "NEST: Locality-aware Approximate Query Service for Cloud Computing", in Proc. of the IEEE INFOCOM 2013, Turin Italy, April 2013, pp. 1327-1335. (PPT)
    10. Q. Xiao, B. Xiao and S. Chen, "Differential Estimation in Dynamic RFID Systems", in Proc. of the IEEE INFOCOM 2013, Turin Italy, April 2013, pp. 295-299.
    11. X. Liu, S. Zhang, K. Bu and B. Xiao, "Complete and Fast Unknown Tag Identification in Large RFID Systems", in Proc. of the Ninth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2012), Las Vegas, Nevada, USA, Oct. 2012, pp. 47-55. (PPT)
    12. K. Bu, X. Liu and B. Xiao, "Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems", in Proc. of the 20th IEEE International Workshop on Quality of Service (IWQoS 2012), Coimbra Portugal, June 4-5 2012, pp. 1-4.
    13. Q. Xiao, K. Bu and B. Xiao, "Efficient Monitoring of Dynamic Tag Populations in RFID Systems", in Proc. of the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-2011), Melbourne, Australia, Oct 24-26, 2011, pp. 106-113. (Best Paper Award)
    14. K. Bu, B. Xiao, Q. Xiao and S. Chen, "'Efficient Pinpointing of Misplaced Tags in Large RFID Systems", in Proc. of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Salt Lake City, Utah USA, June 27-30, 2011, pp. 287-295. (PPT)
    15. G. Liu, J. Luo, Q. Xiao and B. Xiao, "EDJam: Effective Dynamic Jamming Against IEEE 802.15.4-Compliant Wireless Personal Area Networks", in Proc. of the IEEE International Conference on Communications (ICC 2011), Kyoto Japan, June 2011.
    16. S. Chen, M. Zhang and B. Xiao, "Efficient Information Collection Protocols for Sensor-augmented RFID Networks", in Proc. of the IEEE INFOCOM 2011, Shanghai China, April 2011, pp. 3101-3109.
    17. J. Wang, J. Wang, K. Lu, Y. Qian, B. Xiao and N. Gu, "Optimal Design of Linear Network Coding for Information Theoretically Secure Unicast", in Proc. of the IEEE INFOCOM 2011, Shanghai China, April 2011, pp. 757-765.
    18. X. Liu, S. Zhang, J. Wang, J. Cao and B. Xiao, "Anchor Supervised Distance Estimation in Anisotropic Wireless Sensor Networks", in Proc. of IEEE Wireless Communications and Networking Conference (IEEE WCNC 2011), Cancun Mexico, March 2011.
    19. H. Guan, B. Xiao, J. Zhou, M. Guo and T. Yang, "Fast Dimension Reduction for Document Classification Based on Imprecise Spectrum Analysis", in Proc. of the ACM Nineteenth Conference on Information and Knowledge Management (CIKM 2010), Toronto Canada, Oct. 2010, pp. 1753-1756.
    20. J. Luo, B. Xiao, Z. Yang and S. Zhou, "A Clone of Social Networks to Decentralized Bootstrapping P2P Networks", in Proc. of the 18th IEEE International Workshop on Quality of Service (IWQoS 2010), pp. 1-2, Beijing China, June 2010.
    21. J. Wang, J. Wang, K. Lu, Bin Xiao, N. Gu, "Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams", in Proc. of the IEEE INFOCOM 2010, San Diego, CA, Mar. 2010, pp. 1-9.
    22. Qingjun Xiao, Bin Xiao, Jiaqing Luo and Guobin Liu, "Reliable Navigation of Mobile Sensors in Wireless Sensor Networks without Localization Service", in Proc. of the 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1-9, Charleston, South Carolina, July 13-15, 2009.
    23. Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou, "Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks," in Proc. IPDPS 2009 IEEE International Symposium on Parallel and Distributed Processing (SSN2009), pp.1-8, Rome - Italy, May 2009.
    24. Zhigang Li, Nong Xiao, Jizhong Zhao, and Bin Xiao, "Bouncing Tracks in Sensor Networks", in Proc. of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), pp. 591-598, Melbourne Australia, Dec. 2008.
    25. Baowei Wang, Xingming Sun, Xinbing Wang, and Bin Xiao, "Time-based Privacy Protection for Multi-attribute Data in WSNs", in Proc. of the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), pp. 615-622, Melbourne Australia, Dec. 2008.
    26. Yu Hua, Bin Xiao, Dan Feng and Bo Yu, "Bounded LSH for Similarity Search in Peer-to-Peer File Systems", in Proc. International Conference on Parallel Processing (ICPP 2008), pp. 644-651, Portland, Sept. 2008.
    27. Bin Xiao, "Internet Worm Threat and Defending Mechanism" (invited talk), in Proc. the 3rd Joint Workshop on Information Security (JWIS 2008), pp. 27, Seoul Korea, July 10-11 2008.
    28. Yong Tang, Xicheng Lu, and Bin Xiao, "Generating Simplified Regular Expression Signatures for Polymorphic Worms", in Proc. 4th International Conference on Autonomic and Trusted Computing (ATC-07) (LNCS), pp. 478-488, Hong Kong, July 2007.
    29. Bin Xiao, Hekang Chen, and Shuigeng Zhou, "A Walking Beacon-Assisted Localization in Wireless Sensor Networks", in Proc. 2007 IEEE International Conference on Communications (ICC 2007), pp. 3070-3075, Glasgow UK, June 2007.
    30. Yu Hua, and Bin Xiao, "A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services", in international conference on high performance computing (HiPC 2006), pp. 277-288, Bangalore India, December 18-21, 2006.
    31. Bin Xiao, Bo Yu, and Chuanshan Gao, "Detection and Localization of Sybil Nodes in VANETs", in 2nd ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS 2006), in conjunction with MobiCom 2006, pp. 1-8, Los Angeles - USA, September 25, 2006.
    32. Bo Yu, and Bin Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks", Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006), pp. 1–8, Greece, 25-29 April 2006.

[Top