Yang Xiao

Orcid: 0000-0002-0946-3197

Affiliations:
  • University of Kentucky, Department of Computer Science, Lexington, KY, USA
  • Virginia Tech, Blacksburg, VA, USA (PhD 2022)


According to our database1, Yang Xiao authored at least 25 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning.
CoRR, 2024

AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment.
IEEE Trans. Cogn. Commun. Netw., August, 2023

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

MANDA: On Adversarial Example Detection for Network Intrusion Detection System.
IEEE Trans. Dependable Secur. Comput., 2023

CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level.
IEEE Internet Things J., 2023

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
CoRR, 2023

MS-PTP: Protecting Network Timing from Byzantine Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

ARI: Attestation of Real-time Mission Execution Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
Proceedings of the IEEE INFOCOM 2023, 2023

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
Proceedings of the Computer Security - ESORICS 2023, 2023

Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

2022
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution.
IEEE Wirel. Commun., 2022

CANShield: Signal-based Intrusion Detection for Controller Area Networks.
CoRR, 2022

FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Challenges and New Directions in Securing Spectrum Access Systems.
IEEE Internet Things J., 2021

2020
Offloading Decision in Edge Computing for Continuous Applications Under Uncertainty.
IEEE Trans. Wirel. Commun., 2020

A Survey of Distributed Consensus Protocols for Blockchain Networks.
IEEE Commun. Surv. Tutorials, 2020

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019


  Loading...