Bin Xiao

According to our database1, Bin Xiao
  • authored at least 135 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems.
IEEE/ACM Trans. Netw., 2017

Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems.
IEEE/ACM Trans. Netw., 2017

RFID Estimation With Blocker Tags.
IEEE/ACM Trans. Netw., 2017

Exploring Tag Distribution in Multi-Reader RFID Systems.
IEEE Trans. Mob. Comput., 2017

Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems.
IEEE Trans. Communications, 2017

Interleaved Group Convolutions for Deep Neural Networks.
CoRR, 2017

Smartphone-assisted energy efficient data communication for wearable devices.
Computer Communications, 2017

Dynamic Grouping in RFID Systems.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

SCoP: Smartphone energy saving by merging push services in Fog computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Category Information Collection in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An efficient learning-based approach to multi-objective route planning in a smart city.
Proceedings of the IEEE International Conference on Communications, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

U-safety: Urban safety analysis in a smart city.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Efficient RFID Grouping Protocols.
IEEE/ACM Trans. Netw., 2016

Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

PLAT: A Physical-Layer Tag Searching Protocol in Large RFID Systems.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Fast Collection of Data in Sensor-Augmented RFID Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Smartphone-assisted smooth live video broadcast on wearable cameras.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Fast RFID Polling Protocols.
Proceedings of the 45th International Conference on Parallel Processing, 2016

Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Secure and energy efficient prefetching design for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distrib. Syst., 2015

The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems.
IEEE Trans. Parallel Distrib. Syst., 2015

Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks.
IEEE Trans. Communications, 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution.
Concurrency and Computation: Practice and Experience, 2015

Make smartphones last a day: Pre-processing based computer vision application offloading.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

RFID cardinality estimation with blocker tags.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fast RFID grouping protocols.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014

Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks.
TAAS, 2014

Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Fast Counting the Key Tags in Anonymous RFID Systems.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Efficient Detection of Cloned Attacks for Large-Scale RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams.
IEEE Trans. Parallel Distrib. Syst., 2013

Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distrib. Syst., 2013

Robust localization against outliers in wireless sensor networks.
TOSN, 2013

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Information Forensics and Security, 2013

Detecting Sybil attacks in VANETs.
J. Parallel Distrib. Comput., 2013

A bottom-up model for heterogeneous BitTorrent systems.
J. Parallel Distrib. Comput., 2013

Fast dimension reduction for document classification based on imprecise spectrum analysis.
Inf. Sci., 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurrency and Computation: Practice and Experience, 2013

ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Differential estimation in dynamic RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

NEST: Locality-aware approximate query service for cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2012

Locality-Sensitive Bloom Filter for Approximate Membership Query.
IEEE Trans. Computers, 2012

Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Computer Communications, 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

2011
Signature Tree Generation for Polymorphic Worms.
IEEE Trans. Computers, 2011

Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter.
Computer Communications, 2011

Anchor supervised distance estimation in anisotropic wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Optimal Design of Linear Network Coding for information theoretically secure unicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient information collection protocols for sensor-augmented RFID networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks.
Proceedings of IEEE International Conference on Communications, 2011

Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Using Parallel Bloom Filters for Multiattribute Representation on Network Services.
IEEE Trans. Parallel Distrib. Syst., 2010

Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme.
IEEE Trans. Mob. Comput., 2010

Reliable Anchor-Based Sensor Localization in Irregular Areas.
IEEE Trans. Mob. Comput., 2010

PIVOT: An adaptive information discovery framework for computational grids.
Inf. Sci., 2010

Achieving optimal data storage position in wireless sensor networks.
Computer Communications, 2010

A clone of social networks to decentralized bootstrapping P2P networks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fast dimension reduction for document classification based on imprecise spectrum analysis.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data.
IEEE Trans. Computers, 2009

A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
IJAHUC, 2009

Concept, Characteristics and Defending Mechanism of Worms.
IEICE Transactions, 2009

Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.
Computers & Security, 2009

Reliable navigation of mobile sensors in wireless sensor networks without localization service.
Proceedings of the 17th International Workshop on Quality of Service, 2009

The 5th International Workshop on Security in Systems and Networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2008

Dynamic SPT update for multiple link state decrements in network routing.
The Journal of Supercomputing, 2008

An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently.
J. Parallel Distrib. Comput., 2008

Bounded LSH for Similarity Search in Peer-to-Peer File Systems.
Proceedings of the 2008 International Conference on Parallel Processing, 2008

Time-Based Privacy Protection for Multi-attribute Data in WSNs.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Bouncing Tracks in Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2007
CHEMAS: Identify suspect nodes in selective forwarding attacks.
J. Parallel Distrib. Comput., 2007

An efficient algorithm for dynamic shortest path tree update in network routing.
Journal of Communications and Networks, 2007

Special section: Security on grids and distributed systems.
Future Generation Comp. Syst., 2007

Analysis and algorithms design for the partition of large-scale adaptive mobile wireless networks.
Computer Communications, 2007

A Walking Beacon-Assisted Localization in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Generating Simplified Regular Expression Signatures for Polymorphic Worms.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Loop scheduling with timing and switching-activity minimization for VLIW DSP.
ACM Trans. Design Autom. Electr. Syst., 2006

A novel approach to detecting DDoS Attacks at an Early Stage.
The Journal of Supercomputing, 2006

Optimizing Address Assignment and Scheduling for DSPs With Multiple Functional Units.
IEEE Trans. on Circuits and Systems, 2006

Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software.
IEEE Trans. Computers, 2006

Algorithms and analysis of scheduling for loops with minimum switching.
IJCSE, 2006

A Novel Energy-Efficient Backbone for Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Detecting selective forwarding attacks in wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

TBF: An Efficient Data Architecture for Metadata Server in the Object-based Storage Network.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
Detecting SYN Flooding Attacks Near Innocent Side.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Active Detecting Method Against SYN Flooding Attack.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Universal Routing in Distributed Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

High-level synthesis for DSP applications using heterogeneous functional units.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

On Designing a Novel PI Controller for AQM Routers Supporting TCP Flows.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
Efficient variable partitioning and scheduling for DSP processors with multiple memory modules.
IEEE Trans. Signal Processing, 2004

Efficient Algorithms for Dynamic Update of Shortest Path Tree in Networking.
I. J. Comput. Appl., 2004

Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Dynamic Update of Shortest Path Tree in OSPF.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Approximation Algorithms Design for Disk Partial Covering Problem.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

A Novel Technique for Detecting DDoS Attacks at Its Early Stage.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Dynamic shortest path tree update for multiple link state decrements.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Maintaining Comprehensive Resource Availability in P2P Networks.
Proceedings of the Grid and Cooperative Computing, 2004

Optimizing Address Assignment for Scheduling Embedded DSPs.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Switching-Activity Minimization on Instruction-Level Loop Scheduling for VLIWDSP Applications.
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004

2003
Code size reduction technique and implementation for software-pipelined DSP applications.
ACM Trans. Embedded Comput. Syst., 2003

Design space minimization with timing and code size optimization for embedded DSP.
Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2003

Design and Analysis of Improved Shortest Path Tree Update for Network Routing.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Analysis and Algorithms for Partitioning of Large-scale Adaptive Mobile Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Optimal Code Size Reduction for Software-Pipelined and Unfolded Loops.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

Performance optimization of multiple memory architectures for DSP.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

Variable Partitioning and Scheduling of Multiple Memory Architectures for DSP.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Minimum dynamic update for shortest path tree construction.
Proceedings of the Global Telecommunications Conference, 2001

Efficient Update of Shortest Path Algorithms for Network Routing.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001


  Loading...