Bin Xiao

Orcid: 0000-0003-4223-8220

Affiliations:
  • Hong Kong Polytechnic University, Department of Computing, Hung Hom, Kowloon, Hong Kong
  • University of Texas at Dallas, Richardson, TX, USA (former)


According to our database1, Bin Xiao authored at least 253 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AoI-Aware Service Provisioning in Edge Computing for Digital Twin Network Slicing Requests.
IEEE Trans. Mob. Comput., December, 2024

Dual Attention Adversarial Attacks With Limited Perturbations.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

Attacking Click-through Rate Predictors via Generating Realistic Fake Samples.
ACM Trans. Knowl. Discov. Data, June, 2024

A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks.
ACM Comput. Surv., June, 2024

A Black-Box Attack Algorithm Targeting Unlabeled Industrial AI Systems With Contrastive Learning.
IEEE Trans. Ind. Informatics, April, 2024

SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks.
IEEE Trans. Inf. Forensics Secur., 2024

MC-Net: Realistic Sample Generation for Black-Box Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things.
IACR Cryptol. ePrint Arch., 2024

PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks.
IACR Cryptol. ePrint Arch., 2024

Σ-Check: Compressed Σ-protocol Theory from Sum-check.
IACR Cryptol. ePrint Arch., 2024

Data Availability and Decentralization: New Techniques for zk-Rollups in Layer 2 Blockchain Networks.
CoRR, 2024

vDID: Blockchain-Enabled Verifiable Decentralized Identity Management for Web 3.0.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

A Secure and Reliable Blockchain-based Audit Log System.
Proceedings of the IEEE International Conference on Communications, 2024

Transferable 3D Adversarial Shape Completion Using Diffusion Models.
Proceedings of the Computer Vision - ECCV 2024, 2024

AdvDiff: Generating Unrestricted Adversarial Examples Using Diffusion Models.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
A Survey of Blockchain-Based Schemes for Data Sharing and Exchange.
IEEE Trans. Big Data, December, 2023

Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds.
IEEE Trans. Knowl. Data Eng., September, 2023

Empowering Authenticated and Efficient Queries for STK Transaction-Based Blockchains.
IEEE Trans. Computers, August, 2023

A Novel Anomaly Detection Method for Digital Twin Data Using Deconvolution Operation With Attention Mechanism.
IEEE Trans. Ind. Informatics, May, 2023

Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster.
IEEE Trans. Parallel Distributed Syst., March, 2023

SCA: Sybil-Based Collusion Attacks of IIoT Data Poisoning in Federated Learning.
IEEE Trans. Ind. Informatics, March, 2023

Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation.
IEEE Trans. Reliab., 2023

SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions.
IEEE Trans. Dependable Secur. Comput., 2023

KiloNova: Non-Uniform PCD with Zero-Knowledge Property from Generic Folding Schemes.
IACR Cryptol. ePrint Arch., 2023

SnarkFold: Efficient SNARK Proof Aggregation from Split Incrementally Verifiable Computation.
IACR Cryptol. ePrint Arch., 2023

Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023

Adv-Inpainting: Generating Natural and Transferable Adversarial Patch via Attention-guided Feature Fusion.
CoRR, 2023

SARF: Aliasing Relation Assisted Self-Supervised Learning for Few-shot Relation Reasoning.
CoRR, 2023

Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network.
CoRR, 2023

Self-Supervised Temporal Graph learning with Temporal and Structural Intensity Alignment.
CoRR, 2023

DBE-voting: A Privacy-Preserving and Auditable Blockchain-Based E-Voting System.
Proceedings of the IEEE International Conference on Communications, 2023

On the Profitability of Selfish Mining Attack Under the Checkpoint Mechanism.
Proceedings of the IEEE Global Communications Conference, 2023

StyLess: Boosting the Transferability of Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Physical-World Optical Adversarial Attacks on 3D Face Recognition.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
VQL: Efficient and Verifiable Cloud Query Services for Blockchain Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE.
IEEE Trans. Parallel Distributed Syst., 2022

A Novel Multi-Sample Generation Method for Adversarial Attacks.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN.
IEEE Trans. Netw. Serv. Manag., 2022

Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications.
IEEE Trans. Netw. Sci. Eng., 2022

Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method.
IEEE Trans. Mob. Comput., 2022

Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments.
IEEE Trans. Mob. Comput., 2022

SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification.
IEEE Trans. Cloud Comput., 2022

Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems.
IEEE Internet Things J., 2022

Multiobjective Optimization for Joint Task Offloading, Power Assignment, and Resource Allocation in Mobile Edge Computing.
IEEE Internet Things J., 2022

Partial Selfish Mining for More Profits.
CoRR, 2022

A Physical-World Adversarial Attack Against 3D Face Recognition.
CoRR, 2022

Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum.
Proceedings of the IEEE International Conference on Trust, 2022

An Efficient Block Validation Mechanism for UTXO-based Blockchains.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022

Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using Blockchain.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

: A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2021

A Utility Model for Photo Selection in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2021

Robust Computation Offloading and Resource Scheduling in Cloudlet-Based Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2021

Blockchain-Enabled Trustworthy Group Communications in UAV Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.
IEEE Internet Things J., 2021

Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols.
IACR Cryptol. ePrint Arch., 2021

Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols.
IACR Cryptol. ePrint Arch., 2021

A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling.
ACM Comput. Surv., 2021

Generating Unrestricted 3D Adversarial Point Clouds.
CoRR, 2021

Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks.
CoRR, 2021

Towards Multiple Black-boxes Attack via Adversarial Example Generation Network.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Analysis of the Communication Traffic Model for Permissioned Blockchain Based on Proof-of-Work.
Proceedings of the ICC 2021, 2021

You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording.
Proceedings of the ICC 2021, 2021

IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation.
Proceedings of the IEEE Global Communications Conference, 2021

SolSaviour: A Defending Framework for Deployed Defective Smart Contracts.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Real-Time Cache-Aided Route Planning Based on Mobile Edge Computing.
IEEE Wirel. Commun., 2020

Indoor Crowd Density Estimation Through Mobile Smartphone Wi-Fi Probes.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Detection and Mitigation of DoS Attacks in Software Defined Networks.
IEEE/ACM Trans. Netw., 2020

Implementation of Differential Tag Sampling for COTS RFID Systems.
IEEE Trans. Mob. Comput., 2020

Geographical Correlation-Based Data Collection for Sensor-Augmented RFID Systems.
IEEE Trans. Mob. Comput., 2020

RLLL: Accurate Relative Localization of RFID Tags with Low Latency.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020

Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Multi-User Offloading Game Strategy in OFDMA Mobile Cloud Computing System.
IEEE Trans. Veh. Technol., 2019

Efficient Polling-Based Information Collection in RFID Systems.
IEEE/ACM Trans. Netw., 2019

Efficient Information Sampling in Multi-Category RFID Systems.
IEEE/ACM Trans. Netw., 2019

Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI.
IEEE Trans. Mob. Comput., 2019

When Urban Safety Index Inference Meets Location-Based Data.
IEEE Trans. Mob. Comput., 2019

Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2019

Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI.
IEEE J. Sel. Areas Commun., 2019

Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
Entropy, 2019

Optimizing Cauchy Reed-Solomon Coding via ReRAM Crossbars in SSD-based RAID Systems.
Proceedings of the 2019 IEEE Non-Volatile Memory Systems and Applications Symposium, 2019

VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Parallel Hyper-Heuristic Algorithm for Multi-Objective Route Planning in a Smart City.
IEEE Trans. Veh. Technol., 2018

Resource Allocation and Admission Control for an Energy Harvesting Cooperative OFDMA Network.
IEEE Trans. Veh. Technol., 2018

Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks.
IEEE Trans. Mob. Comput., 2018

CrowdGIS: Updating Digital Maps via Mobile Crowdsensing.
IEEE Trans Autom. Sci. Eng., 2018

Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel.
IEEE Syst. J., 2018

Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting.
IEEE Syst. J., 2018

Vehicle Safety Improvement through Deep Learning and Mobile Sensing.
IEEE Netw., 2018

Security Threats in the Data Plane of Software-Defined Networks.
IEEE Netw., 2018

Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones.
IEEE Internet Things J., 2018

Location Privacy-Preserving Data Recovery for Mobile Crowdsensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Interest Tree Based Information Dissemination via Vehicular Named Data Networking.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

New Mobility-Aware Application Offloading Design with Low Delay and Energy Efficiency.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018

Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems.
IEEE/ACM Trans. Netw., 2017

Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems.
IEEE/ACM Trans. Netw., 2017

RFID Estimation With Blocker Tags.
IEEE/ACM Trans. Netw., 2017

Exploring Tag Distribution in Multi-Reader RFID Systems.
IEEE Trans. Mob. Comput., 2017

Minimal Perfect Hashing-Based Information Collection Protocol for RFID Systems.
IEEE Trans. Mob. Comput., 2017

Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems.
IEEE Trans. Commun., 2017

CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive Mob. Comput., 2017

Interleaved Group Convolutions for Deep Neural Networks.
CoRR, 2017

High performance and security in cloud computing.
Concurr. Comput. Pract. Exp., 2017

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Commun. Surv. Tutorials, 2017

Smartphone-assisted energy efficient data communication for wearable devices.
Comput. Commun., 2017

Dynamic Grouping in RFID Systems.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

SCoP: Smartphone energy saving by merging push services in Fog computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Detecting Rogue AP with the Crowd Wisdom.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Category Information Collection in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Interleaved Group Convolutions.
Proceedings of the IEEE International Conference on Computer Vision, 2017

An efficient learning-based approach to multi-objective route planning in a smart city.
Proceedings of the IEEE International Conference on Communications, 2017

Novel attacks in OSPF networks to poison routing table.
Proceedings of the IEEE International Conference on Communications, 2017

U-safety: Urban safety analysis in a smart city.
Proceedings of the IEEE International Conference on Communications, 2017

Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Efficient RFID Grouping Protocols.
IEEE/ACM Trans. Netw., 2016

Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

PLAT: A Physical-Layer Tag Searching Protocol in Large RFID Systems.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Fast Collection of Data in Sensor-Augmented RFID Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Smartphone-assisted smooth live video broadcast on wearable cameras.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Fast RFID Polling Protocols.
Proceedings of the 45th International Conference on Parallel Processing, 2016

Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Secure and energy efficient prefetching design for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015

The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks.
IEEE Trans. Commun., 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution.
Concurr. Comput. Pract. Exp., 2015

Make smartphones last a day: Pre-processing based computer vision application offloading.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

RFID cardinality estimation with blocker tags.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fast RFID grouping protocols.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014

Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks.
ACM Trans. Auton. Adapt. Syst., 2014

Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Fast Counting the Key Tags in Anonymous RFID Systems.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Efficient Detection of Cloned Attacks for Large-Scale RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams.
IEEE Trans. Parallel Distributed Syst., 2013

Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013

Robust localization against outliers in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS).
J. Supercomput., 2013

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2013

Advanced technologies and theories for highly-reliable cyber physical system.
J. Syst. Archit., 2013

Detecting Sybil attacks in VANETs.
J. Parallel Distributed Comput., 2013

A bottom-up model for heterogeneous BitTorrent systems.
J. Parallel Distributed Comput., 2013

Fast dimension reduction for document classification based on imprecise spectrum analysis.
Inf. Sci., 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2013

ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Differential estimation in dynamic RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

NEST: Locality-aware approximate query service for cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2012

Locality-Sensitive Bloom Filter for Approximate Membership Query.
IEEE Trans. Computers, 2012

Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

2011
Signature Tree Generation for Polymorphic Worms.
IEEE Trans. Computers, 2011

Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter.
Comput. Commun., 2011

Anchor supervised distance estimation in anisotropic wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Optimal Design of Linear Network Coding for information theoretically secure unicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient information collection protocols for sensor-augmented RFID networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks.
Proceedings of IEEE International Conference on Communications, 2011

Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Using Parallel Bloom Filters for Multiattribute Representation on Network Services.
IEEE Trans. Parallel Distributed Syst., 2010

Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme.
IEEE Trans. Mob. Comput., 2010

Reliable Anchor-Based Sensor Localization in Irregular Areas.
IEEE Trans. Mob. Comput., 2010

PIVOT: An adaptive information discovery framework for computational grids.
Inf. Sci., 2010

Achieving optimal data storage position in wireless sensor networks.
Comput. Commun., 2010

A clone of social networks to decentralized bootstrapping P2P networks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data.
IEEE Trans. Computers, 2009

A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Concept, Characteristics and Defending Mechanism of Worms.
IEICE Trans. Inf. Syst., 2009

Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.
Comput. Secur., 2009

Reliable navigation of mobile sensors in wireless sensor networks without localization service.
Proceedings of the 17th International Workshop on Quality of Service, 2009

The 5th International Workshop on Security in Systems and Networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2008

Dynamic SPT update for multiple link state decrements in network routing.
J. Supercomput., 2008

An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently.
J. Parallel Distributed Comput., 2008

Bounded LSH for Similarity Search in Peer-to-Peer File Systems.
Proceedings of the 2008 International Conference on Parallel Processing, 2008

Time-Based Privacy Protection for Multi-attribute Data in WSNs.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Bouncing Tracks in Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2007
CHEMAS: Identify suspect nodes in selective forwarding attacks.
J. Parallel Distributed Comput., 2007

An efficient algorithm for dynamic shortest path tree update in network routing.
J. Commun. Networks, 2007

Special section: Security on grids and distributed systems.
Future Gener. Comput. Syst., 2007

Analysis and algorithms design for the partition of large-scale adaptive mobile wireless networks.
Comput. Commun., 2007

A Walking Beacon-Assisted Localization in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Generating Simplified Regular Expression Signatures for Polymorphic Worms.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Loop scheduling with timing and switching-activity minimization for VLIW DSP.
ACM Trans. Design Autom. Electr. Syst., 2006

A novel approach to detecting DDoS Attacks at an Early Stage.
J. Supercomput., 2006

Optimizing Address Assignment and Scheduling for DSPs With Multiple Functional Units.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software.
IEEE Trans. Computers, 2006

Algorithms and analysis of scheduling for loops with minimum switching.
Int. J. Comput. Sci. Eng., 2006

A Novel Energy-Efficient Backbone for Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Detecting selective forwarding attacks in wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

TBF: An Efficient Data Architecture for Metadata Server in the Object-based Storage Network.
Proceedings of the 14th IEEE International Conference on Networks, 2006

A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services.
Proceedings of the High Performance Computing, 2006

Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2005
Detecting SYN Flooding Attacks Near Innocent Side.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Active Detecting Method Against SYN Flooding Attack.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Universal Routing in Distributed Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

High-level synthesis for DSP applications using heterogeneous functional units.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

On Designing a Novel PI Controller for AQM Routers Supporting TCP Flows.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
Efficient variable partitioning and scheduling for DSP processors with multiple memory modules.
IEEE Trans. Signal Process., 2004

Efficient Algorithms for Dynamic Update of Shortest Path Tree in Networking.
Int. J. Comput. Their Appl., 2004

Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Dynamic Update of Shortest Path Tree in OSPF.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Approximation Algorithms Design for Disk Partial Covering Problem.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

A Novel Technique for Detecting DDoS Attacks at Its Early Stage.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Dynamic shortest path tree update for multiple link state decrements.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Maintaining Comprehensive Resource Availability in P2P Networks.
Proceedings of the Grid and Cooperative Computing, 2004

Optimizing Address Assignment for Scheduling Embedded DSPs.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Switching-Activity Minimization on Instruction-Level Loop Scheduling for VLIWDSP Applications.
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004

2003
Code size reduction technique and implementation for software-pipelined DSP applications.
ACM Trans. Embed. Comput. Syst., 2003

Design space minimization with timing and code size optimization for embedded DSP.
Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2003

Design and Analysis of Improved Shortest Path Tree Update for Network Routing.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Analysis and Algorithms for Partitioning of Large-scale Adaptive Mobile Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

Optimal Code Size Reduction for Software-Pipelined and Unfolded Loops.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

Performance optimization of multiple memory architectures for DSP.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

Variable Partitioning and Scheduling of Multiple Memory Architectures for DSP.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Minimum dynamic update for shortest path tree construction.
Proceedings of the Global Telecommunications Conference, 2001

Efficient Update of Shortest Path Algorithms for Network Routing.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001


  Loading...