Kaiqi Xiong
Orcid: 0000-0003-2933-8083
According to our database1,
Kaiqi Xiong
authored at least 99 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling.
CoRR, 2024
Exploring Feature Importance and Explainability Towards Enhanced ML-Based DoS Detection in AI Systems.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Enhancing Approximate Message Passing via Diffusion Models Towards On-Device Intelligence.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
2023
IT Prof., 2023
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach.
CoRR, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Communication-Efficient Federated Learning with Channel-Aware Sparsification over Wireless Networks.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
EURASIP J. Inf. Secur., 2022
Comput. Commun., 2022
IEEE Access, 2022
Developing Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud.
Proceedings of the Computer Science and Education - 17th International Conference, 2022
From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model.
Proceedings of the IEEE International Conference on Communications, 2022
2021
J. Signal Process. Syst., 2021
SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks.
IET Networks, 2021
Applying the Mahalanobis Distance to Develop Robust Approaches Against False Data Injection Attacks on Dynamic Power State Estimation.
CoRR, 2021
A survey on security attacks and defense techniques for connected and autonomous vehicles.
Comput. Secur., 2021
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation.
Comput. Secur., 2021
Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends.
IEEE Access, 2021
QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments.
Proceedings of the IEEE International Performance, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
2020
Aggregation Measure Factor-Based Workflow Application Scheduling in Heterogeneous Environments.
IEEE Access, 2020
Proceedings of the Tools for Design, Implementation and Verification of Emerging Information Technologies, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur.
EAI Endorsed Trans. Security Safety, 2019
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems.
IEEE Access, 2019
A Machine Learning Framework for Domain Generation Algorithm-Based Malware Detection.
IEEE Access, 2019
LatencySmasher: A Software-Defined Networking-Based Framework for End-to-End Latency Optimization.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
A Preemption-Based Timely Software Defined Networking Framework for Emergency Response Traffic Delivery.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 11th International Conference on Computer Supported Education, 2019
2018
EAI Endorsed Trans. Security Safety, 2018
EAI Endorsed Trans. Security Safety, 2018
IEEE Access, 2018
Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking.
IEEE Access, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018
2017
Proceedings of the 2017 Winter Simulation Conference, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the IEEE International Conference on Communications, 2017
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems, 2016
2015
An improved IEEE 802.11 CSMA/CA medium access mechanism through the introduction of random short delays.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Ensuring Cloud Service Guarantees via Service Level Agreement (SLA)-Based Resource Allocation.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 18th International Conference on Information Fusion, 2015
2014
Int. J. Cloud Comput., 2014
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014
Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN).
Proceedings of the IEEE 12th International Conference on Dependable, 2014
2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
2012
Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
ACM Trans. Sens. Networks, 2012
Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks.
J. Parallel Distributed Comput., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 20th IEEE International Symposium on Modeling, 2012
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
2010
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
2009
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009
The Impact of Supercomputing in the Next Generation Sequencing Data Mining.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Proceedings of the International Joint Conferences on Bioinformatics, 2009
2008
Telecommun. Syst., 2008
Efficient Localization Schemes in Sensor Networks with Malicious Nodes.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 16th International Workshop on Quality of Service, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
2006
Proceedings of the 14th International Symposium on Modeling, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2000
1999
On the analysis of neural networks with asymmetric connection weights or noninvertible transfer functions.
IEEE Trans. Syst. Man Cybern. Part B, 1999
1995
Autom., 1995
1993