Bin Xiao
Orcid: 0000-0003-4223-8220Affiliations:
- Hong Kong Polytechnic University, Department of Computing, Hung Hom, Kowloon, Hong Kong
- University of Texas at Dallas, Richardson, TX, USA (former)
According to our database1,
Bin Xiao
authored at least 253 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
AoI-Aware Service Provisioning in Edge Computing for Digital Twin Network Slicing Requests.
IEEE Trans. Mob. Comput., December, 2024
IEEE Trans. Neural Networks Learn. Syst., October, 2024
ACM Trans. Knowl. Discov. Data, June, 2024
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks.
ACM Comput. Surv., June, 2024
A Black-Box Attack Algorithm Targeting Unlabeled Industrial AI Systems With Contrastive Learning.
IEEE Trans. Ind. Informatics, April, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Data Availability and Decentralization: New Techniques for zk-Rollups in Layer 2 Blockchain Networks.
CoRR, 2024
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
IEEE Trans. Big Data, December, 2023
Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds.
IEEE Trans. Knowl. Data Eng., September, 2023
Empowering Authenticated and Efficient Queries for STK Transaction-Based Blockchains.
IEEE Trans. Computers, August, 2023
A Novel Anomaly Detection Method for Digital Twin Data Using Deconvolution Operation With Attention Mechanism.
IEEE Trans. Ind. Informatics, May, 2023
IEEE Trans. Parallel Distributed Syst., March, 2023
IEEE Trans. Ind. Informatics, March, 2023
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation.
IEEE Trans. Reliab., 2023
SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
SnarkFold: Efficient SNARK Proof Aggregation from Split Incrementally Verifiable Computation.
IACR Cryptol. ePrint Arch., 2023
Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain.
Future Gener. Comput. Syst., 2023
Adv-Inpainting: Generating Natural and Transferable Adversarial Patch via Attention-guided Feature Fusion.
CoRR, 2023
SARF: Aliasing Relation Assisted Self-Supervised Learning for Few-shot Relation Reasoning.
CoRR, 2023
Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network.
CoRR, 2023
Self-Supervised Temporal Graph learning with Temporal and Structural Intensity Alignment.
CoRR, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Parallel Distributed Syst., 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN.
IEEE Trans. Netw. Serv. Manag., 2022
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications.
IEEE Trans. Netw. Sci. Eng., 2022
Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method.
IEEE Trans. Mob. Comput., 2022
Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments.
IEEE Trans. Mob. Comput., 2022
SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification.
IEEE Trans. Cloud Comput., 2022
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022
IEEE Internet Things J., 2022
Multiobjective Optimization for Joint Task Offloading, Power Assignment, and Resource Allocation in Mobile Edge Computing.
IEEE Internet Things J., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022
Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using Blockchain.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
: A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Mob. Comput., 2021
Robust Computation Offloading and Resource Scheduling in Cloudlet-Based Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications.
IEEE Internet Things J., 2021
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols.
IACR Cryptol. ePrint Arch., 2021
Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols.
IACR Cryptol. ePrint Arch., 2021
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling.
ACM Comput. Surv., 2021
Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks.
CoRR, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Analysis of the Communication Traffic Model for Permissioned Blockchain Based on Proof-of-Work.
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Wirel. Commun., 2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Mob. Comput., 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020
Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE/ACM Trans. Netw., 2019
IEEE/ACM Trans. Netw., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Mob. Comput., 2019
Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2019
Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI.
IEEE J. Sel. Areas Commun., 2019
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities.
Entropy, 2019
Proceedings of the 2019 IEEE Non-Volatile Memory Systems and Applications Symposium, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019
Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Parallel Hyper-Heuristic Algorithm for Multi-Objective Route Planning in a Smart City.
IEEE Trans. Veh. Technol., 2018
Resource Allocation and Admission Control for an Energy Harvesting Cooperative OFDMA Network.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Mob. Comput., 2018
IEEE Trans Autom. Sci. Eng., 2018
Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel.
IEEE Syst. J., 2018
Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting.
IEEE Syst. J., 2018
IEEE Netw., 2018
IEEE Internet Things J., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
New Mobility-Aware Application Offloading Design with Low Delay and Energy Efficiency.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
Proceedings of the IEEE Global Communications Conference, 2018
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Mob. Comput., 2017
IEEE Trans. Commun., 2017
Pervasive Mob. Comput., 2017
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Commun. Surv. Tutorials, 2017
Comput. Commun., 2017
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
An efficient learning-based approach to multi-objective route planning in a smart city.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
IEEE Trans. Mob. Comput., 2016
Ad Hoc Networks, 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 45th International Conference on Parallel Processing, 2016
Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015
The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2015
Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks.
IEEE Trans. Commun., 2015
IEEE Trans. Computers, 2015
Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution.
Concurr. Comput. Pract. Exp., 2015
Make smartphones last a day: Pre-processing based computer vision application offloading.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE/ACM Trans. Netw., 2014
ACM Trans. Auton. Adapt. Syst., 2014
Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
2013
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Parallel Distributed Syst., 2013
ACM Trans. Sens. Networks, 2013
Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS).
J. Supercomput., 2013
IEEE Trans. Inf. Forensics Secur., 2013
J. Syst. Archit., 2013
J. Parallel Distributed Comput., 2013
Fast dimension reduction for document classification based on imprecise spectrum analysis.
Inf. Sci., 2013
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2013
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Computers, 2012
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
2011
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter.
Comput. Commun., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Optimal Design of Linear Network Coding for information theoretically secure unicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme.
IEEE Trans. Mob. Comput., 2010
IEEE Trans. Mob. Comput., 2010
Inf. Sci., 2010
Comput. Commun., 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data.
IEEE Trans. Computers, 2009
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
Int. J. Ad Hoc Ubiquitous Comput., 2009
IEICE Trans. Inf. Syst., 2009
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.
Comput. Secur., 2009
Reliable navigation of mobile sensors in wireless sensor networks without localization service.
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
J. Supercomput., 2008
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently.
J. Parallel Distributed Comput., 2008
Proceedings of the 2008 International Conference on Parallel Processing, 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
2007
J. Parallel Distributed Comput., 2007
J. Commun. Networks, 2007
Future Gener. Comput. Syst., 2007
Analysis and algorithms design for the partition of large-scale adaptive mobile wireless networks.
Comput. Commun., 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
ACM Trans. Design Autom. Electr. Syst., 2006
Optimizing Address Assignment and Scheduling for DSPs With Multiple Functional Units.
IEEE Trans. Circuits Syst. II Express Briefs, 2006
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software.
IEEE Trans. Computers, 2006
Int. J. Comput. Sci. Eng., 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
TBF: An Efficient Data Architecture for Metadata Server in the Object-based Storage Network.
Proceedings of the 14th IEEE International Conference on Networks, 2006
Proceedings of the High Performance Computing, 2006
Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006
2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
2004
Efficient variable partitioning and scheduling for DSP processors with multiple memory modules.
IEEE Trans. Signal Process., 2004
Efficient Algorithms for Dynamic Update of Shortest Path Tree in Networking.
Int. J. Comput. Their Appl., 2004
Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
Proceedings of the 7th International Symposium on Parallel Architectures, 2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Embedded and Ubiquitous Computing, 2004
Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures.
Proceedings of the Embedded and Ubiquitous Computing, 2004
Switching-Activity Minimization on Instruction-Level Loop Scheduling for VLIWDSP Applications.
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004
2003
Code size reduction technique and implementation for software-pipelined DSP applications.
ACM Trans. Embed. Comput. Syst., 2003
Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2003
Design and Analysis of Improved Shortest Path Tree Update for Network Routing.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
Analysis and Algorithms for Partitioning of Large-scale Adaptive Mobile Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
2001
Proceedings of the Global Telecommunications Conference, 2001
Efficient Update of Shortest Path Algorithms for Network Routing.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001