Yang Xiao

According to our database1, Yang Xiao authored at least 144 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid.
IEEE Trans. Information Forensics and Security, 2019

2018
Deploying Throwboxes to Enhance Fault-Tolerance Performance in Delay Tolerant Networks.
Wireless Personal Communications, 2018

Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid.
Computers & Security, 2018

FNF: Flow-net based fingerprinting and its applications.
Computers & Security, 2018

2017
Provably secure CL-KEM-based password-authenticated key exchange protocol.
IJSNet, 2017

A survey of intrusion detection systems in smart grid.
IJSNet, 2017

Accountable administration in operating systems.
IJICS, 2017

Utilisation and energy consumption of fair-access in sensor networks with selected grid topologies.
IJAHUC, 2017

NFD: Non-technical loss fraud detection in Smart Grid.
Computers & Security, 2017

A novel detector to detect colluded non-technical loss frauds in smart grid.
Computer Networks, 2017

Enhancements of Temporal Accountability in Medical Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2017

FNF: flow-net based fingerprinting.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks.
Wireless Communications and Mobile Computing, 2016

Computer operating system logging and security issues: a survey.
Security and Communication Networks, 2016

Design a fast Non-Technical Loss fraud detector for smart grid.
Security and Communication Networks, 2016

Security Issues in ProtoGENI.
EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 2016

Water quality monitoring using STORM 3 Data Loggers and a wireless sensor network.
IJSNet, 2016

Privacy preservation for V2G networks in smart grid: A survey.
Computer Communications, 2016

CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

CO2: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Big Data Security Analytic for Smart Grid with Fog Nodes.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux.
Security and Communication Networks, 2015

ProtoGENI experiments.
IJSN, 2015

Linux auditing: Overhead and adaptation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Accountable logging in operating systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

IP2DM for V2G networks in Smart Grid.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft.
IEEE Systems Journal, 2014

NFD: A practical scheme to detect non-technical loss fraud in smart grid.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks.
IEEE Systems Journal, 2013

Nonintrusive tracing in the Internet.
Security and Communication Networks, 2013

An update-based step-wise optimal cache replacement for wireless data access.
Computer Networks, 2013

2012
Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks.
IEEE Trans. Mob. Comput., 2012

A survey of cyber crimes.
Security and Communication Networks, 2012

A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID.
Wireless Communications and Mobile Computing, 2011

Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks.
Cluster Computing, 2011

Accountable Administration and Implementation in Operating Systems.
Proceedings of the Global Communications Conference, 2011

2010
Weaving a proper net to catch large objects in wireless sensor networks.
IEEE Trans. Wireless Communications, 2010

Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs.
IEEE Trans. Wireless Communications, 2010

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches.
IEEE Trans. Vehicular Technology, 2010

Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

A Survey of Payment Card Industry Data Security Standard.
IEEE Communications Surveys and Tutorials, 2010

Scheduling on-demand data broadcast in mixed-type request environments.
Computer Networks, 2010

Sensor Distribution on Coverage in Sensor Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Studying Non-intrusive Tracing in the Internet.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

2009
Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare.
Wireless Communications and Mobile Computing, 2009

On hierarchical pipeline paging in multi-tier overlaid hierarchical cellular networks.
IEEE Trans. Wireless Communications, 2009

Optimization between AES security and performance for IEEE 802.15.3 WPAN.
IEEE Trans. Wireless Communications, 2009

eMAC - A Medium-Access Control Protocol for the Next-Generation Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2009

Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2009

Building a wireless capturing tool for WiFi.
Security and Communication Networks, 2009

A survey of anonymity in wireless communication systems.
Security and Communication Networks, 2009

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Recent Advances in IEEE 802.11 WLANs: Protocols, Solutions and Future Directions".
MONET, 2009

Bio-inspired visual attention in agile sensing for target detection.
IJSNet, 2009

Attacks and countermeasures in multi-hop Cognitive Radio Networks.
IJSN, 2009

Wireless Network Security.
EURASIP J. Wireless Comm. and Networking, 2009

Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures.
EURASIP J. Wireless Comm. and Networking, 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Computer Networks, 2009

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.
Ad Hoc Networks, 2009

Unreachability problem in mobile ad hoc networks: A medium access control perspective.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

An Optimal Sensor Network for Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2009

Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs.
Proceedings of IEEE International Conference on Communications, 2009

Modeling IEEE 802.11 DCF Using Parallel Space-Time Markov Chain: Multi-Hop Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Low-cost wireless sensor networks for remote cardiac patients monitoring applications.
Wireless Communications and Mobile Computing, 2008

Modeling IEEE 802.11 DCF Using Parallel Space-Time Markov Chain.
IEEE Trans. Vehicular Technology, 2008

Spectrum sensing in cognitive radio sensor networks: towards ultra low overhead, distributed channel findings.
IJSNet, 2008

Wireless Telemedicine and Applications.
EURASIP J. Wireless Comm. and Networking, 2008

Temperature-Aware Routing for Telemedicine Applications in Embedded Biomedical Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2008

Security co-existence of wireless sensor networks and RFID for pervasive computing.
Computer Communications, 2008

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing.
Computer Communications, 2008

Scalability study of cache access mechanisms in multiple-cell wireless networks.
Computer Networks, 2008

Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining.
Ad Hoc Networks, 2008

A New Approach on Analysis of IEEE 802.11 DCF in Non-Saturated Wireless Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

IEEE 802.11 Distributed Coordination Function service time and queuing delay analysis using Parallel Space - Time Markov Chain.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

Active Protection in Wireless Networking.
Proceedings of the MSN 2008, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Secret Little Functions and Codebook for Protecting Users from Password Theft.
Proceedings of IEEE International Conference on Communications, 2008

A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters.
Proceedings of IEEE International Conference on Communications, 2008

Worm Propagation Dynamics in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Virtual Password Scheme to Protect Passwords.
Proceedings of IEEE International Conference on Communications, 2008

Finite Load Analysis of IEEE 802.11 Distributed Coordination Function.
Proceedings of IEEE International Conference on Communications, 2008

Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Weaving a Proper Net to Catch Large Objects.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Lightweight Block Cipher Based on a Multiple Recursive Generator.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Distributed Multi-channel Cognitive MAC Protocol for IEEE 802.11s Wireless Mesh Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Intrusion detection techniques in mobile ad hoc and wireless sensor networks.
IEEE Wireless Commun., 2007

Non-Blocking Pipeline Paging with Known Location Probabilities for Wireless Systems.
IEEE Trans. Wireless Communications, 2007

Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration.
IEEE Trans. Wireless Communications, 2007

Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems.
IEEE Trans. Vehicular Technology, 2007

Detection of Fraudulent Usage in Wireless Networks.
IEEE Trans. Vehicular Technology, 2007

On-Bound Selection Cache Replacement Policy for Wireless Data Access.
IEEE Trans. Computers, 2007

Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks.
IJWMC, 2007

A prototype underwater acoustic sensor network platform with topology-aware MAC scheme.
IJSNet, 2007

Integration of mobility and intrusion detection for wireless ad hoc networks.
Int. J. Communication Systems, 2007

A survey of key management schemes in wireless sensor networks.
Computer Communications, 2007

Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet.
IEEE Communications Magazine, 2007

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.
Ad Hoc Networks, 2007

Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

An Analytical Model of the ODPLAU Scheme for Telecommunication Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Paging Schemes Performance for Wireless Systems.
Proceedings of the Global Communications Conference, 2007

Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments.
Proceedings of the Global Communications Conference, 2007

Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet.
Proceedings of the Global Communications Conference, 2007

2006
Optimal periodic location area update for mobile telecommunications networks.
IEEE Trans. Wireless Communications, 2006

Enhancing security using mobility-based anomaly detection in cellular mobile networks.
IEEE Trans. Vehicular Technology, 2006

Voice capacity analysis of WLAN with unbalanced traffic.
IEEE Trans. Vehicular Technology, 2006

Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2006

Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems.
IEEE Trans. Mob. Comput., 2006

Optimal Callback with Two-Level Adaptation for Wireless Data Access.
IEEE Trans. Mob. Comput., 2006

Update-Based Cache Access and Replacement in Wireless Data Access.
IEEE Trans. Mob. Comput., 2006

Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems.
IEEE Journal on Selected Areas in Communications, 2006

VoIP over WLAN: voice capacity, admission control, QoS, and MAC.
Int. J. Communication Systems, 2006

MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks.
EURASIP J. Wireless Comm. and Networking, 2006

A lightweight secure protocol for wireless sensor networks.
Computer Communications, 2006

Security and privacy in RFID and applications in telemedicine.
IEEE Communications Magazine, 2006

Cache access and replacement for future wireless Internet.
IEEE Communications Magazine, 2006

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Pipeline Probability Paging for Wireless Systems.
Proceedings of IEEE International Conference on Communications, 2006

Periodic Location Area Update Schemes for UMTS 3G Mobile Networks: Optimality and Comparison.
Proceedings of IEEE International Conference on Communications, 2006

A LCG-based Secure Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Asymptotical keep-best Cache Replacement Policy for Wireless Data Access.
Proceedings of IEEE International Conference on Communications, 2006

Performance Analysis of Advanced Encryption Standard (AES).
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Hierarchical Pipeline Paging in Hierarchical Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

On Evaluating and Optimizing Pipeline Probability Paging under QoS constraints in Wireless Systems.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Configurable Acknowledgment Delay (CAD) Mechanism for Asymmetric Space-Internet Links.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Calling Activity for Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Lightweight Secure Solution for RFID.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Mobility Profile for Cellular Mobile Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Security Issues in the IEEE 802.15.3 WPANs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Step-wise Optimal Cache Replacement for Wireless Data Access In Next Generation Wireless Internet.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Which transmission mechanism is best for space Internet: window-based, rate-based, or a hybrid of the two?
IEEE Wireless Commun., 2005

Pipeline paging for wireless systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Voice Capacity Analysis of WLAN with Unbalanced Traffic.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

Security services and enhancements in the IEEE 802.15.4 wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Analytically modeling pipeline paging for wireless systems.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An adaptive callback cache access for wireless Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Performance analysis of server-based poll-each-read in wireless Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Update-based cache replacement policies in wireless data access.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005


  Loading...