Kaiqi Xiong

Orcid: 0000-0003-2933-8083

According to our database1, Kaiqi Xiong authored at least 95 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling.
CoRR, 2024

2023
A Decentralized Cooperative Navigation Approach for Visual Homing Networks.
IT Prof., 2023

Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach.
CoRR, 2023

Improving Machine Learning Robustness via Adversarial Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Communication-Efficient Federated Learning with Channel-Aware Sparsification over Wireless Networks.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

Psychological Information Sharing Using Ethereum Blockchain and Smart Contracts.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Secure machine learning against adversarial samples at test time.
EURASIP J. Inf. Secur., 2022

Route recommendation for evacuation networks using MMPP/M/1/N queueing models.
Comput. Commun., 2022

SDN Security Review: Threat Taxonomy, Implications, and Open Challenges.
IEEE Access, 2022

Developing Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model.
Proceedings of the IEEE International Conference on Communications, 2022

2021
CRAMStrack: Enhanced Nonlinear RSSI Tracking by Using Circular Multi-Sectors.
J. Signal Process. Syst., 2021

SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks.
IET Networks, 2021

ML Attack Models: Adversarial Attacks and Data Poisoning Attacks.
CoRR, 2021

Applying the Mahalanobis Distance to Develop Robust Approaches Against False Data Injection Attacks on Dynamic Power State Estimation.
CoRR, 2021

A survey on security attacks and defense techniques for connected and autonomous vehicles.
Comput. Secur., 2021

Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation.
Comput. Secur., 2021

Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends.
IEEE Access, 2021

QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments.
Proceedings of the IEEE International Performance, 2021

Active Learning Under Malicious Mislabeling and Poisoning Attacks.
Proceedings of the IEEE Global Communications Conference, 2021

A Priority-Based Queueing Mechanism in Software-Defined Networking Environments.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

An Adversarial Attack Defending System for Securing In-Vehicle Networks.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
Aggregation Measure Factor-Based Workflow Application Scheduling in Heterogeneous Environments.
IEEE Access, 2020

Prototyping an SDN Control Framework for QoS Guarantees.
Proceedings of the Tools for Design, Implementation and Verification of Emerging Information Technologies, 2020

Robust Machine Learning against Adversarial Samples at Test Time.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur.
EAI Endorsed Trans. Security Safety, 2019

A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems.
IEEE Access, 2019

A Machine Learning Framework for Domain Generation Algorithm-Based Malware Detection.
IEEE Access, 2019

LatencySmasher: A Software-Defined Networking-Based Framework for End-to-End Latency Optimization.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Understanding User Behaviors When Phishing Attacks Occur.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Software-defined Networking-based Detection and Mitigation Approach against KRACK.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Preemption-Based Timely Software Defined Networking Framework for Emergency Response Traffic Delivery.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A Customized Educational Booster for Online Students in Cybersecurity Education.
Proceedings of the 11th International Conference on Computer Supported Education, 2019

2018
The performance analysis of public key cryptography-based authentication.
EAI Endorsed Trans. Security Safety, 2018

Kernel-Space Intrusion Detection Using Software-Defined Networking.
EAI Endorsed Trans. Security Safety, 2018

Bitcoin Concepts, Threats, and Machine-Learning Security Solutions.
IEEE Access, 2018

Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking.
IEEE Access, 2018

KrackCover: A Wireless Security Framework for Covering KRACK Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
An agent-based simulation model for distributed vehicle sharing operations.
Proceedings of the 2017 Winter Simulation Conference, 2017

SDN-Based Kernel Modular Countermeasure for Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Assessing end-to-end performance and security in cloud computing.
Proceedings of the Symposium on Applied Computing, 2017

End-to-End Delay Minimization Approaches Using Software-Defined Networking.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

A Forensic Methodology for Software-Defined Network Switches.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

A payment scheme in crowdsourcing.
Proceedings of the IEEE International Conference on Communications, 2017

An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

SECUPerf: End-to-End Security and Performance Assessment of Cloud Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Dynamic generation containment systems (DGCS): A Moving Target Defense approach.
Proceedings of the 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems, 2016

2015
An improved IEEE 802.11 CSMA/CA medium access mechanism through the introduction of random short delays.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Secure Network Bandwidth Provisioning for Quality of Services (QoS) Guarantees.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Cost-efficient and attack-resilient approaches for state estimation in power grids.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

An SDN-supported collaborative approach for DDoS flooding detection and containment.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detecting Driver Drowsiness Using Wireless Wearables.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Ensuring Cloud Service Guarantees via Service Level Agreement (SLA)-Based Resource Allocation.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

Dynamic social feature-based diffusion in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Nonlinear target tracking for threat detection using RSSI and optical fusion.
Proceedings of the 18th International Conference on Information Fusion, 2015

2014
Resilient and performance-guaranteed composite services in cloud computing.
Int. J. Cloud Comput., 2014

Practical Routing Protocol for Impromptu Mobile Social Networks.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN).
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Power-effiicent resource allocation in MapReduce clusters.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Understanding ProtoGENI in Networking Courses for Research and Education.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Highlights of RIT's Summer Camp (GREE-SC 2012).
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Security Risk Assessment of Cloud Carrier.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012

Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks.
J. Parallel Distributed Comput., 2012

The Performance of Public Key-Based Authentication Protocols.
Proceedings of the Network and System Security - 6th International Conference, 2012

Energy-efficient Resource Management for QoS-guaranteed Computing Clusters.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Locating jamming attackers in malicious wireless sensor networks.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Assessing network path vulnerabilities for secure cloud computing.
Proceedings of IEEE International Conference on Communications, 2012

2011
Power and Performance Management in Priority-Type Cluster Computing Systems.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

A Priority-Type Resource Allocation Approach in Cluster Computing.
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011

2010
Resource Provisioning in SLA-Based Cluster Computing.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2010

Power-aware resource provisioning in cluster computing.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

2009
Dynamic Localization Schemes in Malicious Sensor Networks.
J. Networks, 2009

Bandwidth provisioning in ADSL access networks.
Int. J. Netw. Manag., 2009

Service Performance and Analysis in Cloud Computing.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

The Impact of Supercomputing in the Next Generation Sequencing Data Mining.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Multiple priority customer service guarantees in cluster computing.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Next Generation Sequence Analysis Using Genetic Algorithms on Multi-core Technology.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

2008
Trustworthy Web services provisioning for differentiated customer services.
Telecommun. Syst., 2008

Efficient Localization Schemes in Sensor Networks with Malicious Nodes.
Proceedings of the SECRYPT 2008, 2008

SLA-Based Service Composition in Enterprise Computing.
Proceedings of the 16th International Workshop on Quality of Service, 2008

SLA-based resource allocation in cluster computing systems.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2006
Computer Resource Optimization for Differentiated Customer Services.
Proceedings of the 14th International Symposium on Modeling, 2006

Trust-based Resource Allocation in Web Services.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2000
Gaussian filters for nonlinear filtering problems.
IEEE Trans. Autom. Control., 2000

1999
On the analysis of neural networks with asymmetric connection weights or noninvertible transfer functions.
IEEE Trans. Syst. Man Cybern. Part B, 1999

1995
Necessary and sufficient conditions for the existence of a G-type Lyapunov function.
Autom., 1995

1993
Comments on 'on absolute stability and the aizerman conjecture'.
Autom., 1993


  Loading...