default search action
Liang Xiao 0003
Person information
- affiliation: Xiamen University, China
Other persons with the same name
- Liang Xiao — disambiguation page
- Liang Xiao 0001 — Nanjing University of Science and Technology, School of Computer Science, Nanjing, China
- Liang Xiao 0002 — University of Southampton, UK
- Liang Xiao 0004 — Hubei University of Technology, China
- Liang Xiao 0005 — Zhejiang Gongshang University, China
- Liang Xiao 0006 — Wuhan University of Technology, School of Resources and Environmental Engineering, China
- Liang Xiao 0007 — National Innovation Institute of Defense Technology, Beijing, China (and 1 more)
- Liang Xiao 0008 — Huazhong University of Science and Technology, Wuhan, China
- Liang Xiao 0009 — Beijing University of Chemical Technology, Beijing, China
- Liang Xiao 0010 — Beijing Institute of Technology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j100]Xiaozhen Lu, Zihan Liu, Liang Xiao, Huaiyu Dai:
Reinforcement Learning-Based Personalized Differentially Private Federated Learning. IEEE Trans. Inf. Forensics Secur. 20: 465-477 (2025) - [j99]Zhiping Lin, Liang Xiao, Hongyi Chen, Zefang Lv, Yunjun Zhu, Yanyong Zhang, Yong-Jin Liu:
Edge-Assisted Collaborative Perception Against Jamming and Interference in Vehicular Networks. IEEE Trans. Wirel. Commun. 24(1): 860-874 (2025) - 2024
- [j98]Zhiqiang Li, Shuai Han, Liang Xiao, Mugen Peng:
Cooperative Non-Orthogonal Broadcast and Unicast Transmission for Integrated Satellite-Terrestrial Network. IEEE Trans. Broadcast. 70(3): 1052-1064 (2024) - [j97]Shuai Liu, Helin Yang, Liang Xiao, Mengting Zheng, Huabing Lu, Zehui Xiong:
Learning-Based Resource Management Optimization for UAV-Assisted MEC Against Jamming. IEEE Trans. Commun. 72(8): 4873-4886 (2024) - [j96]Jieling Li, Liang Xiao, Xuchen Qi, Zefang Lv, Qiaoxin Chen, Yong-Jin Liu:
Reinforcement Learning Based Energy-Efficient Fast Routing for FANETs. IEEE Trans. Commun. 72(11): 7063-7076 (2024) - [j95]Minghui Min, Haopeng Zhu, Jiahao Ding, Shiyin Li, Liang Xiao, Miao Pan, Zhu Han:
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation. IEEE Trans. Dependable Secur. Comput. 21(4): 3629-3643 (2024) - [j94]Zefang Lv, Liang Xiao, Yifan Chen, Haoyu Chen, Xiangyang Ji:
Safe Multi-Agent Reinforcement Learning for Wireless Applications Against Adversarial Communications. IEEE Trans. Inf. Forensics Secur. 19: 6824-6839 (2024) - [j93]Ziling Shao, Helin Yang, Liang Xiao, Wei Su, Yifan Chen, Zehui Xiong:
Deep Reinforcement Learning-Based Resource Management for UAV-Assisted Mobile Edge Computing Against Jamming. IEEE Trans. Mob. Comput. 23(12): 13358-13374 (2024) - [j92]Xiaozhen Lu, Liang Xiao, Yilin Xiao, Wei Wang, Nan Qi, Qian Wang:
Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications. IEEE Trans. Mob. Comput. 23(12): 14656-14671 (2024) - [j91]Xiaozhen Lu, Zhibo Liu, Yuhan Chen, Liang Xiao, Wei Wang, Qihui Wu:
Risk-Aware Reinforcement Learning-Based Federated Learning for IoV Systems. IEEE Trans. Mob. Comput. 23(12): 14672-14688 (2024) - [j90]Changyuan Xu, Cheng Zhan, Helin Yang, Liang Xiao:
Pareto-Optimal Aerial-Ground Energy Minimization for Aerial 3D Mobile Edge Computing Networks. IEEE Trans. Veh. Technol. 73(5): 7218-7233 (2024) - [j89]Chuhuan Liu, Zefang Lv, Liang Xiao, Wei Su, Liqing Ye, Helin Yang, Xudong You, Shuai Han:
Efficient Beacon-Aided AUV Localization: A Reinforcement Learning Based Approach. IEEE Trans. Veh. Technol. 73(6): 7799-7811 (2024) - [j88]Xinwu Chen, Shuai Han, Cheng Li, Liang Xiao:
Security Performance Analysis of Single-User Downlink Communication Based on Double-RIS. IEEE Trans. Veh. Technol. 73(6): 9115-9119 (2024) - [j87]Minghui Min, Haopeng Zhu, Shiyin Li, Hongliang Zhang, Liang Xiao, Miao Pan, Zhu Han:
Semantic Adaptive Geo-Indistinguishability for Location Privacy Protection in Mobile Networks. IEEE Trans. Veh. Technol. 73(6): 9193-9198 (2024) - [j86]Kailong Lin, Helin Yang, Mengting Zheng, Liang Xiao, Chongwen Huang, Dusit Niyato:
Penalized Reinforcement Learning-Based Energy-Efficient UAV-RIS Assisted Maritime Uplink Communications Against Jamming. IEEE Trans. Veh. Technol. 73(10): 15768-15773 (2024) - [j85]Helin Yang, Shuai Liu, Liang Xiao, Yi Zhang, Zehui Xiong, Weihua Zhuang:
Learning-Based Reliable and Secure Transmission for UAV-RIS-Assisted Communication Systems. IEEE Trans. Wirel. Commun. 23(7): 6954-6967 (2024) - [j84]Helin Yang, Kailong Lin, Liang Xiao, Yifeng Zhao, Zehui Xiong, Zhu Han:
Energy Harvesting UAV-RIS-Assisted Maritime Communications Based on Deep Reinforcement Learning Against Jamming. IEEE Trans. Wirel. Commun. 23(8): 9854-9868 (2024) - [j83]Zefang Lv, Liang Xiao, Yousong Du, Yunjun Zhu, Shuai Han, Yong-Jin Liu:
Efficient Communications in Multi-Agent Reinforcement Learning for Mobile Applications. IEEE Trans. Wirel. Commun. 23(9): 12440-12454 (2024) - [j82]Shuai Liu, Helin Yang, Mengting Zheng, Liang Xiao, Zehui Xiong, Dusit Niyato:
UAV-Enabled Semantic Communication in Mobile Edge Computing Under Jamming Attacks: An Intelligent Resource Management Approach. IEEE Trans. Wirel. Commun. 23(11): 17493-17507 (2024) - [c95]Qiwen Wang, Chen Lin, Wei Su, Liang Xiao, Xiangxiang Zeng:
Compound-Protein Interaction Prediction with Sparse Perturbation-Aware Attention. ICIC (LNBI 2) 2024: 72-83 - [c94]Shihao Chen, Helin Yang, Liang Xiao, Changyuan Xu, Xianzhong Xie, Wanting Yang, Zehui Xiong:
Intelligent Energy-Efficient and Fair Resource Scheduling for UAV-Assisted Space-Air-Ground Integrated Networks Under Jamming Attacks. VTC Spring 2024: 1-5 - [c93]Siyao Li, Chuhuan Liu, Yifan Chen, Liang Xiao, Helin Yang:
Reinforcement Learning Based Interference Coordination for Port Communications. VTC Spring 2024: 1-5 - [c92]Xiangda Lin, Helin Yang, Kailong Lin, Liang Xiao, Zhaoyuan Shi, Wanting Yang, Zehui Xiong:
Energy-Efficient Resource Management for Multi-UAV NOMA Networks Based on Deep Reinforcement Learning. VTC Spring 2024: 1-5 - [c91]Chen Wang, Yifan Chen, Zhiping Lin, Qiaoxin Chen, Liang Xiao:
Reinforcement Learning Based Jamming Detection for Reliable Wireless Communications. VTC Spring 2024: 1-2 - [c90]Weiwei Zeng, Helin Yang, Kailong Lin, Liang Xiao:
Efficient Normalizing Flow-Based Radio Frequency Fingerprinting Identification for Network Security. VTC Fall 2024: 1-5 - [c89]Yuhan Chen, Zhibo Liu, Xiaozhen Lu, Liang Xiao:
Risk-Aware Reinforcement Learning Based Federated Learning Framework for Io V. WCNC 2024: 1-6 - [c88]Shiyu Sun, Shun Chen, Shaoxuan Li, Zefang Lv, Liang Xiao, Wei Su:
Reinforcement Learning Based QoS-Aware Anti-Jamming Underwater Video Transmission. WCNC 2024: 1-6 - 2023
- [b2]Liang Xiao, Helin Yang, Weihua Zhuang, Minghui Min:
Reinforcement Learning for Maritime Communications. Wireless Networks, Springer 2023, ISBN 978-3-031-32137-5, pp. 1-146 - [j81]Xiaozhen Lu, Liang Xiao, Pengmin Li, Xiangyang Ji, Chenren Xu, Shui Yu, Weihua Zhuang:
Reinforcement Learning-Based Physical Cross-Layer Security and Privacy in 6G. IEEE Commun. Surv. Tutorials 25(1): 425-466 (2023) - [j80]Chuhuan Liu, Yi Zhang, Guohang Niu, Luliang Jia, Liang Xiao, Jiangxia Luan:
Towards reinforcement learning in UAV relay for anti-jamming maritime communications. Digit. Commun. Networks 9(6): 1477-1485 (2023) - [j79]Xu Chen, Yunfei Chen, Wei Feng, Liang Xiao, Xiangling Li, Jie Zhang, Ning Ge:
Real-Time DDoS Defense in 5G-Enabled IoT: A Multidomain Collaboration Perspective. IEEE Internet Things J. 10(5): 4490-4505 (2023) - [j78]Yilin Xiao, Liang Xiao, Kunpeng Wan, Helin Yang, Yi Zhang, Yi Wu, Yanyong Zhang:
Reinforcement Learning Based Energy-Efficient Collaborative Inference for Mobile Edge Computing. IEEE Trans. Commun. 71(2): 864-876 (2023) - [j77]Helin Yang, Sheng Zhang, Arokiaswami Alphones, Chen Chen, Kwok-Yan Lam, Zehui Xiong, Liang Xiao, Yi Zhang:
An Advanced Integrated Visible Light Communication and Localization System. IEEE Trans. Commun. 71(12): 7149-7162 (2023) - [j76]Jinming Wang, Sai Xu, Shuai Han, Liang Xiao:
UAV-Powered Multi-User Intelligent Reflecting Surface Backscatter Communication. IEEE Trans. Veh. Technol. 72(8): 10251-10262 (2023) - [j75]Shuai Han, Jinming Wang, Liang Xiao, Cheng Li:
Broadcast Secrecy Rate Maximization in UAV-Empowered IRS Backscatter Communications. IEEE Trans. Wirel. Commun. 22(10): 6445-6458 (2023) - [j74]Zefang Lv, Liang Xiao, Yousong Du, Guohang Niu, Chengwen Xing, Wenyuan Xu:
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming. IEEE Trans. Wirel. Commun. 22(12): 9063-9075 (2023) - [c87]Zefang Lv, Yousong Du, Yifan Chen, Liang Xiao, Shuai Han, Xiangyang Ji:
Efficient Communications for Multi-Agent Reinforcement Learning in Wireless Networks. GLOBECOM 2023: 583-588 - [c86]Jingchen Xu, Yifan Chen, Zhiping Lin, Yousong Du, Helin Yang, Liang Xiao:
Reliable Communications for Hypersonic Vehicles: A Reinforcement Learning Approach. GLOBECOM 2023: 838-843 - [c85]Ziling Shao, Helin Yang, Liang Xiao, Wei Su, Zehui Xiong:
Energy and Latency-Aware Resource Management for UAV-Assisted Mobile Edge Computing Against Jamming. GLOBECOM 2023: 1848-1853 - [c84]Xuchen Qi, Jieling Li, Zefang Lv, Liang Xiao:
Reinforcement Learning Based Energy-Efficient Routing with Latency Constraints for FANETs. GLOBECOM 2023: 2638-2643 - [c83]Zefang Lv, Yifan Chen, Liang Xiao, Helin Yang, Xiangyang Ji:
Multi-Agent Reinforcement Learning for Wireless Networks Against Adversarial Communications. GLOBECOM 2023: 3409-3414 - [c82]Can Wang, Helin Yang, Liang Xiao, Huabing Lu, Zehui Xiong:
Joint Trajectory Optimization and Power Control for Cognitive UAV-Assisted Secure Communications. GLOBECOM 2023: 7279-7284 - [c81]Zefang Lv, Guohang Niu, Liang Xiao, Chengwen Xing, Wenyuan Xu:
Reinforcement Learning Based UAV Swarm Communications Against Jamming. ICC 2023: 5204-5209 - [c80]Chuhuan Liu, Yifan Chen, Liang Xiao, Helin Yang, Wei Su, Xudong You:
Reinforcement Learning Based AUV Localization in Underwater Acoustic Sensor Networks. ICCC 2023: 1-6 - [c79]Zhibo Liu, Xiaozhen Lu, Yuhan Chen, Yilin Xiao, Liang Xiao, Yanling Bu:
Deep Reinforcement Learning for Network Security Applications With A Safety Guide. ICCC 2023: 1-6 - [c78]Yu Liu, Chuxuan Wang, Yilin Xiao, Zefang Lv, Liang Xiao, Xiangyang Ji:
Collaborative Inference for MEC Services Based on Multimodal Deep Neural Network. ICCC 2023: 1-6 - [c77]Kunze Li, Yuxiao Ren, Zhiping Lin, Liang Xiao:
Reinforcement Learning Based Friendly Jamming for Digital Twins Against Active Eavesdropping. MSN 2023: 277-284 - [c76]Xiaolin Fan, Caidan Zhao, Liang Xiao, Yang Lei:
Redistillation of Radio Frequency Knowledge for RFF Imbalanced Sample Recognition. SMC 2023: 2391-2396 - [c75]Xiaolin Fan, Caidan Zhao, Liang Xiao, Xiangyu Huang:
Random Railings Enhancement For RFF Imbalanced Data Augmentation. WCNC 2023: 1-6 - 2022
- [j73]Xiaozhen Lu, Jingfang Jie, Zihan Lin, Liang Xiao, Jin Li, Yanyong Zhang:
Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming. Sci. China Inf. Sci. 65(1) (2022) - [j72]Xu Chen, Liang Xiao, Wei Feng, Ning Ge, Xianbin Wang:
DDoS Defense for IoT: A Stackelberg Game Model-Enabled Collaborative Framework. IEEE Internet Things J. 9(12): 9659-9674 (2022) - [j71]Liang Xiao, Siyuan Hong, Shiyu Xu, Helin Yang, Xiangyang Ji:
IRS-Aided Energy-Efficient Secure WBAN Transmission Based on Deep Reinforcement Learning. IEEE Trans. Commun. 70(6): 4162-4174 (2022) - [j70]Liang Xiao, Hongyan Li, Shi Yu, Yi Zhang, Li-Chun Wang, Shaodan Ma:
Reinforcement Learning Based Network Coding for Drone-Aided Secure Wireless Communications. IEEE Trans. Commun. 70(9): 5975-5988 (2022) - [j69]Xiaozhen Lu, Liang Xiao, Guohang Niu, Xiangyang Ji, Qian Wang:
Safe Exploration in Wireless Security: A Safe Reinforcement Learning Algorithm With Hierarchical Structure. IEEE Trans. Inf. Forensics Secur. 17: 732-743 (2022) - [j68]Minghui Min, Liang Xiao, Jiahao Ding, Hongliang Zhang, Shiyin Li, Miao Pan, Zhu Han:
3D Geo-Indistinguishability for Indoor Location-Based Services. IEEE Trans. Wirel. Commun. 21(7): 4682-4694 (2022) - [j67]Helin Yang, Jun Zhao, Kwok-Yan Lam, Zehui Xiong, Qingqing Wu, Liang Xiao:
Distributed Deep Reinforcement Learning-Based Spectrum and Power Allocation for Heterogeneous Networks. IEEE Trans. Wirel. Commun. 21(9): 6935-6948 (2022) - [c74]Yilin Xiao, Kunpeng Wan, Liang Xiao, Helin Yang:
Energy-Efficient Collaborative Inference in MEC: A Multi-Agent Reinforcement Learning Based Approach. BigCom 2022: 407-412 - [c73]Zhiping Lin, Xiaohao Yan, Liang Xiao, Yan Shi, Yuliang Tang, Jun Liu:
Environment-Aware Reinforcement Learning Based VANET Communications Against Jamming and Interference. GLOBECOM 2022: 5717-5722 - [c72]Minghui Min, Shuang Yang, Shiyin Li, Hongliang Zhang, Liang Xiao, Miao Pan, Zhu Han:
Safe Reinforcement Learning-based Indoor 3D Location Privacy Protection. ICCC 2022: 53-58 - [c71]Pengmin Li, Shi Yu, Liang Xiao:
Smart Grid Worm Detection Based on Deep Reinforcement Learning. ICCC 2022: 684-689 - [c70]Shiyu Xu, Shi Yu, Liang Xiao, Zefang Lv:
Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks. WASA (1) 2022: 441-452 - 2021
- [j66]Wei Su, Jincheng Tao, Yuehua Pei, Xudong You, Liang Xiao, En Cheng:
Reinforcement Learning Based Efficient Underwater Image Communication. IEEE Commun. Lett. 25(3): 883-886 (2021) - [j65]Weihang Wang, Zefang Lv, Xiaozhen Lu, Yi Zhang, Liang Xiao:
Distributed reinforcement learning based framework for energy-efficient UAV relay against jamming. Intell. Converged Networks 2(2): 150-162 (2021) - [j64]Yilin Xiao, Liang Xiao, Xiaozhen Lu, Hailu Zhang, Shui Yu, H. Vincent Poor:
Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation. IEEE Internet Things J. 8(6): 4560-4568 (2021) - [j63]Helin Yang, Jun Zhao, Zehui Xiong, Kwok-Yan Lam, Sumei Sun, Liang Xiao:
Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management. IEEE J. Sel. Areas Commun. 39(10): 3144-3159 (2021) - [j62]Liang Xiao, Yuzhen Ding, Jinhao Huang, Sicong Liu, Yuliang Tang, Huaiyu Dai:
UAV Anti-Jamming Video Transmissions With QoE Guarantee: A Reinforcement Learning-Based Approach. IEEE Trans. Commun. 69(9): 5933-5947 (2021) - [j61]Liang Xiao, Xiaozhen Lu, Tangwei Xu, Weihua Zhuang, Huaiyu Dai:
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks. IEEE Trans. Inf. Forensics Secur. 16: 2535-2547 (2021) - [j60]Helin Yang, Zehui Xiong, Jun Zhao, Dusit Niyato, Liang Xiao, Qingqing Wu:
Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications. IEEE Trans. Wirel. Commun. 20(1): 375-388 (2021) - [j59]Yilin Xiao, Liang Xiao, Zefang Lv, Guohang Niu, Yuzhen Ding, Wenyuan Xu:
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference. IEEE Wirel. Commun. 28(4): 12-18 (2021) - [c69]Hongyan Li, Shi Yu, Xiaozhen Lu, Liang Xiao, Li-Chun Wang:
Drone-Aided Network Coding for Secure Wireless Communications: A Reinforcement Learning Approach. GLOBECOM 2021: 1-6 - [c68]Helin Yang, Kwok-Yan Lam, Jiangtian Nie, Jun Zhao, Sahil Garg, Liang Xiao, Zehui Xiong, Mohsen Guizani:
3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks. GLOBECOM (Workshops) 2021: 1-6 - [c67]Xiaoyue Wan, Pengmin Li, Yuhuan Wang, Wei Wei, Liang Xiao:
Reinforcement Learning Based Accurate Detection of Malicious URLs with Multi-Feature Analysis. ICCC 2021: 17-22 - [c66]Zihan Lin, Pengmin Li, Yilin Xiao, Liang Xiao, Fucai Luo:
Learning Based Efficient Federated Learning for Object Detection in MEC Against Jamming. ICCC 2021: 115-120 - [c65]Ruiheng Liao, Xudong You, Wei Su, Keyu Chen, Liang Xiao, En Cheng:
Reinforcement Learning Based Energy Efficient Underwater Passive Localization of Hidden Mobile Node. ICSPCC 2021: 1-6 - [c64]Siyuan Hong, Xiaozhen Lu, Liang Xiao, Guohang Niu, Helin Yang:
Reinforcement Learning Based Sensor Encryption and Power Control for Low-Latency WBANs. WASA (2) 2021: 575-586 - [c63]Kexin Liu, Pengmin Li, Chuhuan Liu, Liang Xiao, Luliang Jia:
UAV-Aided Anti-Jamming Maritime Communications: A Deep Reinforcement Learning Approach. WCSP 2021: 1-6 - 2020
- [j58]Yilin Xiao, Guohang Niu, Liang Xiao, Yuzhen Ding, Sicong Liu, Yexian Fan:
Reinforcement learning based energy-efficient internet-of-things video transmission. Intell. Converged Networks 1(3): 258-270 (2020) - [j57]Songyang Ge, Beiling Lu, Liang Xiao, Jie Gong, Xiang Chen, Yun Liu:
Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT Systems. Mob. Networks Appl. 25(5): 1851-1862 (2020) - [j56]Wen Bai, Yuxiao Zhang, Weiwei Huang, Yipeng Zhou, Di Wu, Gang Liu, Liang Xiao:
DeepFusion: predicting movie popularity via cross-platform feature fusion. Multim. Tools Appl. 79(27-28): 19289-19306 (2020) - [j55]Liang Xiao, Yuzhen Ding, Donghua Jiang, Jinhao Huang, Dongming Wang, Jie Li, H. Vincent Poor:
A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks. IEEE Trans. Commun. 68(9): 5460-5470 (2020) - [j54]Liang Xiao, Xiaozhen Lu, Tangwei Xu, Xiaoyue Wan, Wen Ji, Yanyong Zhang:
Reinforcement Learning-Based Mobile Offloading for Edge Computing Against Jamming and Interference. IEEE Trans. Commun. 68(10): 6114-6126 (2020) - [j53]Miao Hu, Zixuan Xie, Di Wu, Yipeng Zhou, Xu Chen, Liang Xiao:
Heterogeneous Edge Offloading With Incomplete Information: A Minority Game Approach. IEEE Trans. Parallel Distributed Syst. 31(9): 2139-2154 (2020) - [j52]Xiaozhen Lu, Liang Xiao, Tangwei Xu, Yifeng Zhao, Yuliang Tang, Weihua Zhuang:
Reinforcement Learning Based PHY Authentication for VANETs. IEEE Trans. Veh. Technol. 69(3): 3068-3079 (2020) - [j51]Liang Xiao, Hailu Zhang, Yilin Xiao, Xiaoyue Wan, Sicong Liu, Li-Chun Wang, H. Vincent Poor:
Reinforcement Learning-Based Downlink Interference Control for Ultra-Dense Small Cells. IEEE Trans. Wirel. Commun. 19(1): 423-434 (2020) - [j50]Xiaozhen Lu, Liang Xiao, Canhuang Dai, Huaiyu Dai:
UAV-Aided Cellular Communications with Deep Reinforcement Learning Against Jamming. IEEE Wirel. Commun. 27(4): 48-53 (2020) - [c62]Kexin Liu, Xiaozhen Lu, Liang Xiao, Li Xu:
Learning Based Energy Efficient Radar Power Control Against Deceptive Jamming. GLOBECOM 2020: 1-6 - [c61]Pei-Gen Ye, Yuan-Gen Wang, Jin Li, Liang Xiao, Guopu Zhu:
(τ, ϵ)-Greedy Reinforcement Learning For Anti-Jamming Wireless Communications. GLOBECOM 2020: 1-6 - [c60]Yujun Wei, Yifang Chen, Xiangui Kang, Z. Jane Wang, Liang Xiao:
Auto-Generating Neural Networks with Reinforcement Learning for Multi-Purpose Image Forensics. ICME 2020: 1-6 - [c59]Maoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li, Liang Xiao:
Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks. IFIP Int. Conf. Digital Forensics 2020: 253-270 - [c58]Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi:
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis. IH&MMSec 2020: 23-32 - [c57]Weihang Wang, Xiaozhen Lu, Sicong Liu, Liang Xiao, Bo Yang:
Energy Efficient Relay in UAV Networks Against Jamming: A Reinforcement Learning Based Approach. VTC Spring 2020: 1-5 - [c56]Xudong You, Zefang Lv, Yuzhen Ding, Wei Su, Liang Xiao:
Reinforcement Learning Based Energy Efficient Underwater Localization. WCSP 2020: 927-932 - [i12]Sicong Liu, Liang Xiao, Zhu Han, Yuliang Tang:
Eliminating NB-IoT Interference to LTE System: a Sparse Machine Learning Based Approach. CoRR abs/2005.03092 (2020) - [i11]Helin Yang, Jun Zhao, Zehui Xiong, Kwok-Yan Lam, Sumei Sun, Liang Xiao:
Privacy-Preserving Federated Learning for UAV-Enabled Networks: Learning-Based Joint Scheduling and Resource Management. CoRR abs/2011.14197 (2020)
2010 – 2019
- 2019
- [j49]Guihong Chen, Yiju Zhan, Geyi Sheng, Liang Xiao, Yonghua Wang:
Reinforcement Learning-Based Sensor Access Control for WBANs. IEEE Access 7: 8483-8494 (2019) - [j48]Wei Su, Jiamin Lin, Keyu Chen, Liang Xiao, En Cheng:
Reinforcement Learning-Based Adaptive Modulation and Coding for Efficient Underwater Communications. IEEE Access 7: 67539-67550 (2019) - [j47]Liang Xiao, Geyi Sheng, Xiaoyue Wan, Wei Su, Peng Cheng:
Learning-Based PHY-Layer Authentication for Underwater Sensor Networks. IEEE Commun. Lett. 23(1): 60-63 (2019) - [j46]Minghui Min, Xiaoyue Wan, Liang Xiao, Ye Chen, Minghua Xia, Di Wu, Huaiyu Dai:
Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting. IEEE Internet Things J. 6(3): 4307-4316 (2019) - [j45]Sicong Liu, Liang Xiao, Zhu Han, Yuliang Tang:
Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach. IEEE Internet Things J. 6(4): 6919-6932 (2019) - [j44]Xiaozhen Lu, Xingyu Xiao, Liang Xiao, Canhuang Dai, Mugen Peng, H. Vincent Poor:
Reinforcement Learning-Based Microgrid Energy Trading With a Reduced Power Plant Schedule. IEEE Internet Things J. 6(6): 10728-10737 (2019) - [j43]Liang Xiao, Geyi Sheng, Sicong Liu, Huaiyu Dai, Mugen Peng, Jian Song:
Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping. IEEE Trans. Commun. 67(10): 6994-7005 (2019) - [j42]Miao Hu, Lei Zhuang, Di Wu, Yipeng Zhou, Xu Chen, Liang Xiao:
Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing. IEEE Trans. Parallel Distributed Syst. 30(8): 1802-1815 (2019) - [j41]Minghui Min, Liang Xiao, Ye Chen, Peng Cheng, Di Wu, Weihua Zhuang:
Learning-Based Computation Offloading for IoT Devices With Energy Harvesting. IEEE Trans. Veh. Technol. 68(2): 1930-1941 (2019) - [j40]Sicong Liu, Liang Xiao, Lianfen Huang, Xianbin Wang:
Impulsive Noise Recovery and Elimination: A Sparse Machine Learning Based Approach. IEEE Trans. Veh. Technol. 68(3): 2306-2315 (2019) - [c55]Yuzhen Ding, Donghua Jiang, Jinhao Huang, Liang Xiao, Sicong Liu, Yuliang Tang, Huaiyu Dai:
QoE-Aware Power Control for UAV-Aided Media Transmission with Reinforcement Learning. GLOBECOM 2019: 1-6 - [c54]Yilin Xiao, Liang Xiao, Hailu Zhang, Shui Yu, H. Vincent Poor:
Privacy Aware Recommendation: Reinforcement Learning Based User Profile Perturbation. GLOBECOM 2019: 1-6 - [c53]Canhuang Dai, Liang Xiao, Xiaoyue Wan, Ye Chen:
Reinforcement Learning with Safe Exploration for Network Security. ICASSP 2019: 3057-3061 - [c52]Weihang Wang, Minghui Min, Liang Xiao, Ye Chen, Huaiyu Dai:
Protecting Semantic Trajectory Privacy for VANET with Reinforcement Learning. ICC 2019: 1-5 - [c51]Tangwei Xu, Xiaozhen Lu, Liang Xiao, Yuliang Tang, Huaiyu Dai:
Voltage Based Authentication for Controller Area Networks with Reinforcement Learning. ICC 2019: 1-5 - [c50]Zihan Lin, Xiaozhen Lu, Canhuang Dai, Geyi Sheng, Liang Xiao:
Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming. ML4CS 2019: 336-347 - [c49]Zhuyue Yu, Jiayou Xie, Yuliang Tang, Liang Xiao:
SMDP Based Cross-Area Resource Management for Vehicular Cloud Networks. VTC Spring 2019: 1-5 - 2018
- [j39]Guihong Chen, Yiju Zhan, Ye Chen, Liang Xiao, Yonghua Wang, Ning An:
Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming. IEEE Access 6: 37403-37412 (2018) - [j38]Liang Xiao, Donghua Jiang, Xiaoyue Wan, Wei Su, Yuliang Tang:
Anti-Jamming Underwater Transmission With Mobility and Learning. IEEE Commun. Lett. 22(3): 542-545 (2018) - [j37]Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam:
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach. IEEE Internet Things J. 5(6): 4250-4261 (2018) - [j36]Zhaobin Deng, Yipeng Zhou, Di Wu, Guoqiao Ye, Min Chen, Liang Xiao:
Utility Maximization of Cloud-Based In-Car Video Recording Over Vehicular Access Networks. IEEE Internet Things J. 5(6): 5213-5226 (2018) - [j35]Geyi Sheng, Minghui Min, Liang Xiao, Sicong Liu:
Reinforcement Learning-Based Control for Unmanned Aerial Vehicles. J. Commun. Inf. Networks 3(3): 39-48 (2018) - [j34]Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu:
IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? IEEE Signal Process. Mag. 35(5): 41-49 (2018) - [j33]Liang Xiao, Yanda Li, Guoan Han, Huaiyu Dai, H. Vincent Poor:
A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 13(1): 35-47 (2018) - [j32]Liang Xiao, Dongjin Xu, Narayan B. Mandayam, H. Vincent Poor:
Attacker-Centric View of a Detection Game against Advanced Persistent Threats. IEEE Trans. Mob. Comput. 17(11): 2512-2523 (2018) - [j31]Liang Xiao, Tianhua Chen, Caixia Xie, Huaiyu Dai, H. Vincent Poor:
Mobile Crowdsensing Games in Vehicular Networks. IEEE Trans. Veh. Technol. 67(2): 1535-1545 (2018) - [j30]Liang Xiao, Yanda Li, Canhuang Dai, Huaiyu Dai, H. Vincent Poor:
Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming. IEEE Trans. Veh. Technol. 67(4): 3377-3389 (2018) - [j29]Liang Xiao, Caixia Xie, Minghui Min, Weihua Zhuang:
User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks. IEEE Trans. Veh. Technol. 67(4): 3420-3430 (2018) - [j28]Liang Xiao, Xiaozhen Lu, Dongjin Xu, Yuliang Tang, Lei Wang, Weihua Zhuang:
UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning. IEEE Trans. Veh. Technol. 67(5): 4087-4097 (2018) - [j27]Liang Xiao, Donghua Jiang, Dongjin Xu, Hongzi Zhu, Yanyong Zhang, H. Vincent Poor:
Two-Dimensional Antijamming Mobile Communication Based on Reinforcement Learning. IEEE Trans. Veh. Technol. 67(10): 9499-9512 (2018) - [j26]Liang Xiao, Xiaoyue Wan, Zhu Han:
PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead. IEEE Trans. Wirel. Commun. 17(3): 1676-1687 (2018) - [j25]Liang Xiao, Xiaoyue Wan, Canhuang Dai, Xiaojiang Du, Xiang Chen, Mohsen Guizani:
Security in Mobile Edge Caching with Reinforcement Learning. IEEE Wirel. Commun. 25(3): 116-122 (2018) - [c48]Canhuang Dai, Xingyu Xiao, Liang Xiao, Peng Cheng:
Reinforcement Learning Based Power Control for VANET Broadcast against Jamming. GLOBECOM 2018: 1-6 - [c47]Zhongcheng Xiao, Bin Gao, Sicong Liu, Liang Xiao:
Learning Based Power Control for mmWave Massive MIMO against Jamming. GLOBECOM 2018: 1-6 - [c46]Hailu Zhang, Minghui Min, Liang Xiao, Sicong Liu, Peng Cheng, Mugen Peng:
Reinforcement Learning-Based Interference Control for Ultra-Dense Small Cells. GLOBECOM 2018: 1-6 - [c45]Xiaozhen Lu, Xiaoyue Wan, Liang Xiao, Yuliang Tang, Weihua Zhuang:
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals. ICC 2018: 1-6 - [c44]Canhuang Dai, Xingyu Xiao, Yuzhen Ding, Liang Xiao, Yuliang Tang, Sheng Zhou:
Learning Based Security for VANET with Blockchain. ICCS 2018: 210-215 - [c43]Su Liu, Ye Chen, Hui Huang, Liang Xiao, Xiaojun Hei:
Towards Smart Educational Recommendations with Reinforcement Learning in Classroom. TALE 2018: 1079-1084 - [c42]Ye Chen, Yanda Li, Dongjin Xu, Liang Xiao:
DQN-Based Power Control for IoT Transmission against Jamming. VTC Spring 2018: 1-5 - [c41]Minghui Min, Liang Xiao, Dongjin Xu, Lianfen Huang, Mugen Peng:
Learning-Based Defense against Malicious Unmanned Aerial Vehicles. VTC Spring 2018: 1-5 - [c40]Jiamin Lin, Wei Su, Liang Xiao, Xialin Jiang:
Adaptive modulation switching strategy based on Q-learning for underwater acoustic communication channel. WUWNet 2018: 38:1-38:5 - [i10]Liang Xiao, Xiaoyue Wan, Canhuang Dai, Xiaojiang Du, Xiang Chen, Mohsen Guizani:
Security in Mobile Edge Caching with Reinforcement Learning. CoRR abs/1801.05915 (2018) - [i9]Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam:
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach. CoRR abs/1801.06270 (2018) - [i8]Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu:
IoT Security Techniques Based on Machine Learning. CoRR abs/1801.06275 (2018) - [i7]Liang Xiao, Xingyu Xiao, Canhuang Dai, Mugen Peng, Lichun Wang, H. Vincent Poor:
Reinforcement Learning-based Energy Trading for Microgrids. CoRR abs/1801.06285 (2018) - [i6]Liang Xiao, Donghua Jiang, Dongjin Xu, Ning An:
Secure Mobile Crowdsensing with Deep Learning. CoRR abs/1801.07379 (2018) - 2017
- [j24]Ahmed A. Alabdel Abass, Liang Xiao, Narayan B. Mandayam, Zoran Gajic:
Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage. IEEE Access 5: 8482-8491 (2017) - [j23]Ning Wang, Ting Jiang, Shichao Lv, Liang Xiao:
Physical-Layer Authentication Based on Extreme Learning Machine. IEEE Commun. Lett. 21(7): 1557-1560 (2017) - [j22]Liang Xiao, Dongjin Xu, Caixia Xie, Narayan B. Mandayam, H. Vincent Poor:
Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study. IEEE J. Sel. Areas Commun. 35(3): 534-544 (2017) - [j21]Jinliang Liu, Liang Xiao, Guolong Liu, Yifeng Zhao:
Active authentication with reinforcement learning based on ambient radio signals. Multim. Tools Appl. 76(3): 3979-3998 (2017) - [j20]Liang Xiao, Yanda Li, Xueli Huang, Xiaojiang Du:
Cloud-Based Malware Detection Game for Mobile Devices with Offloading. IEEE Trans. Mob. Comput. 16(10): 2742-2750 (2017) - [j19]Liang Xiao, Tianhua Chen, Guoan Han, Weihua Zhuang, Limin Sun:
Game Theoretic Study on Channel-Based Authentication in MIMO Systems. IEEE Trans. Veh. Technol. 66(8): 7474-7484 (2017) - [c39]Xingyu Xiao, Canhuang Dai, Yanda Li, Changhua Zhou, Liang Xiao:
Energy Trading Game for Microgrids Using Reinforcement Learning. GAMENETS 2017: 131-140 - [c38]Xiaozhen Lu, Dongjin Xu, Liang Xiao, Lei Wang, Weihua Zhuang:
Anti-Jamming Communication Game for UAV-Aided VANETs. GLOBECOM 2017: 1-6 - [c37]Shichao Lv, Liang Xiao, Qing Hu, Xiaoshan Wang, Changzhen Hu, Limin Sun:
Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017: 1-6 - [c36]Xiaoyue Wan, Geyi Sheng, Yanda Li, Liang Xiao, Xiaojiang Du:
Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection. GLOBECOM 2017: 1-6 - [c35]Guoan Han, Liang Xiao, H. Vincent Poor:
Two-dimensional anti-jamming communication based on deep reinforcement learning. ICASSP 2017: 2087-2091 - [c34]Yanda Li, Liang Xiao, Huaiyu Dai, H. Vincent Poor:
Game theoretic study of protecting MIMO transmissions against smart attacks. ICC 2017: 1-6 - [c33]Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam:
Defense against advanced persistent threats: A Colonel Blotto game approach. ICC 2017: 1-6 - [c32]Xiaoyue Wan, Liang Xiao, Qiangda Li, Zhu Han:
FHY-layer authentication with multiple landmarks with reduced communication overhead. ICC 2017: 1-6 - [c31]Canhuang Dai, Dongjin Xu, Liang Xiao, Mugen Peng, Limin Sun:
Collaborative UFH-based anti-jamming broadcast with learning. ICCC 2017: 1-5 - [c30]Dongjin Xu, Liang Xiao, Limin Sun, Min Lei:
Game theoretic study on blockchain based secure edge networks. ICCC 2017: 1-5 - [c29]Youyang Qu, Shui Yu, Longxiang Gao, Sancheng Peng, Yong Xiang, Liang Xiao:
FuzzyDP: Fuzzy-based big data publishing against inquiry attacks. INFOCOM Workshops 2017: 7-12 - [c28]Dongjin Xu, Liang Xiao, Narayan B. Mandayam, H. Vincent Poor:
Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats. INFOCOM Workshops 2017: 541-546 - [c27]Qing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao:
Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WASA 2017: 326-337 - [i5]Liang Xiao, Guoan Han, Donghua Jiang, Hongzi Zhu, Yanyong Zhang, H. Vincent Poor:
Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement Learning. CoRR abs/1712.06793 (2017) - [i4]Minghui Min, Dongjin Xu, Liang Xiao, Yuliang Tang, Di Wu:
Learning-Based Computation Offloading for IoT Devices with Energy Harvesting. CoRR abs/1712.08768 (2017) - 2016
- [j18]Liang Xiao, Caixia Xie, Tianhua Chen, Huaiyu Dai, H. Vincent Poor:
A Mobile Offloading Game Against Smart Attacks. IEEE Access 4: 2281-2291 (2016) - [j17]He Fang, Li Xu, Liang Xiao:
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks. Concurr. Comput. Pract. Exp. 28(10): 2958-2977 (2016) - [j16]Liang Xiao, Yan Li, Guoan Han, Guolong Liu, Weihua Zhuang:
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks. IEEE Trans. Veh. Technol. 65(12): 10037-10047 (2016) - [c26]Liang Xiao, Tianhua Chen, Guoan Han, Weihua Zhuang, Limin Sun:
Channel-Based Authentication Game in MIMO Systems. GLOBECOM 2016: 1-6 - [c25]Dongjin Xu, Yanda Li, Liang Xiao, Narayan B. Mandayam, H. Vincent Poor:
Prospect Theoretic Study of Cloud Storage Defense against Advanced Persistent Threats. GLOBECOM 2016: 1-6 - [c24]Liang Xiao, Caixia Xie, Tianhua Chen, Huaiyu Dai, H. Vincent Poor:
Mobile offloading game against smart attacks. INFOCOM Workshops 2016: 403-408 - 2015
- [b1]Liang Xiao:
Anti-Jamming Transmissions in Cognitive Radio Networks. Springer Briefs in Electrical and Computer Engineering, Springer 2015, ISBN 978-3-319-24290-3, pp. 1-76 - [j15]Liang Xiao, Tianhua Chen, Jinliang Liu, Huaiyu Dai:
Anti-Jamming Transmission Stackelberg Game With Observation Errors. IEEE Commun. Lett. 19(6): 949-952 (2015) - [j14]Liang Xiao, Jinliang Liu, Qiangda Li, Narayan B. Mandayam, H. Vincent Poor:
User-Centric View of Jamming Games in Cognitive Radio Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2578-2590 (2015) - [j13]Liang Xiao, Yan Li, Jinliang Liu, Yifeng Zhao:
Power control with reinforcement learning in cooperative cognitive radio networks against jamming. J. Supercomput. 71(9): 3237-3257 (2015) - [j12]Liang Xiao, Narayan B. Mandayam, H. Vincent Poor:
Prospect Theoretic Analysis of Energy Exchange Among Microgrids. IEEE Trans. Smart Grid 6(1): 63-72 (2015) - [c23]Liang Xiao, Qiangda Li, Tianhua Chen, En Cheng, Huaiyu Dai:
Jamming Games in Underwater Sensor Networks with Reinforcement Learning. GLOBECOM 2015: 1-6 - [c22]Liang Xiao, Yan Li, Guolong Liu, Qiangda Li, Weihua Zhuang:
Spoofing Detection with Reinforcement Learning in Wireless Networks. GLOBECOM 2015: 1-5 - [c21]Liang Xiao, Jinliang Liu, Qiangda Li, H. Vincent Poor:
Secure mobile crowdsensing game. ICC 2015: 7157-7162 - [c20]Yanda Li, Jinliang Liu, Qiangda Li, Liang Xiao:
Mobile cloud offloading for malware detections with learning. INFOCOM Workshops 2015: 197-201 - [c19]Guiquan Chen, Yan Li, Liang Xiao, Lianfen Huang:
Collaborative Anti-Jamming Broadcast with Uncoordinated Frequency Hopping over USRP. VTC Spring 2015: 1-6 - [c18]Guolong Liu, Jinliang Liu, Yan Li, Liang Xiao, Yuliang Tang:
Jamming Detection of Smartphones for WiFi Signals. VTC Spring 2015: 1-3 - [c17]Tianhua Chen, Jinliang Liu, Liang Xiao, Lianfen Huang:
Anti-jamming transmissions with learning in heterogenous cognitive radio networks. WCNC Workshops 2015: 293-298 - 2014
- [c16]Yan Li, Liang Xiao, Jinliang Liu, Yuliang Tang:
Power control Stackelberg game in cooperative anti-jamming communications. GAMENETS 2014: 1-6 - [c15]Jinliang Liu, Liang Xiao, Yan Li, Lianfen Huang:
User-centric analysis on jamming game with action detection error. GAMENETS 2014: 1-6 - [c14]Liang Xiao, Jinliang Liu, Yan Li, Narayan B. Mandayam, H. Vincent Poor:
Prospect theoretic analysis of anti-jamming communications in cognitive radio networks. GLOBECOM 2014: 746-751 - [c13]Liang Xiao, Yan Chen, K. J. Ray Liu:
Anti-cheating prosumer energy exchange based on indirect reciprocity. ICC 2014: 599-604 - 2013
- [j11]Caidan Zhao, Liang Xiao, Shan Kang, Guiquan Chen, Yunzhou Li, Lianfen Huang:
Secure relay selection based on learning with negative externality in wireless networks. EURASIP J. Adv. Signal Process. 2013: 89 (2013) - [j10]Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, Y. Thomas Hou:
Proximity-Based Security Techniques for Mobile Users in Wireless Networks. IEEE Trans. Inf. Forensics Secur. 8(12): 2089-2100 (2013) - [c12]Liang Xiao, Qiben Yan, Wenjing Lou, Y. Thomas Hou:
Proximity-based security using ambient radio signals. ICC 2013: 1609-1613 - 2012
- [j9]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. IEEE Trans. Inf. Forensics Secur. 7(1): 297-309 (2012) - [j8]Liang Xiao, Yan Chen, W. Sabrina Lin, K. J. Ray Liu:
Indirect Reciprocity Security Game for Large-Scale Wireless Networks. IEEE Trans. Inf. Forensics Secur. 7(4): 1368-1380 (2012) - [j7]Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning:
Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. IEEE Trans. Signal Process. 60(10): 5281-5292 (2012) - [j6]Liang Xiao, Huaiyu Dai, Peng Ning:
MAC Design of Uncoordinated FH-Based Collaborative Broadcast. IEEE Wirel. Commun. Lett. 1(3): 261-264 (2012) - [c11]Liang Xiao, W. Sabrina Lin, Yan Chen, Kuo J. Ray Liu:
Indirect reciprocity game modelling for secure wireless networks. ICC 2012: 928-933 - 2011
- [c10]Mi Yan, Liang Du, Lianfen Huang, Liang Xiao, Jianbin Tang:
Game-Theoretic Approach against Selfish Attacks in Cognitive Radio Networks. ACIS-ICIS 2011: 58-61 - [c9]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks. GLOBECOM 2011: 1-6 - [c8]Liang Xiao, Huaiyu Dai, Peng Ning:
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks. GLOBECOM 2011: 1-6 - 2010
- [c7]Liang Xiao, Alex Reznik, Wade Trappe, Chunxuan Ye, Yogendra Shah, Larry J. Greenstein, Narayan B. Mandayam:
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [j5]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based detection of Sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3): 492-503 (2009) - [j4]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans. Wirel. Commun. 8(12): 5948-5956 (2009) - [i3]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. CoRR abs/0907.4877 (2009) - [i2]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
MIMO-Assisted Channel-Based Authentication in Wireless Networks. CoRR abs/0907.4908 (2009) - [i1]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Using the Physical Layer for Wireless Authentication in Time-Variant Channels. CoRR abs/0907.4919 (2009) - 2008
- [j3]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Shalini S. Periyalwar:
Distributed measurements for estimating and updating cellular system performance. IEEE Trans. Commun. 56(6): 991-998 (2008) - [j2]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun. 7(7): 2571-2579 (2008) - [c6]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
MIMO-assisted channel-based authentication in wireless networks. CISS 2008: 642-646 - [c5]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. ICC 2008: 1520-1524 - 2007
- [j1]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam:
Sensor-assisted localization in cellular systems. IEEE Trans. Wirel. Commun. 6(12): 4244-4248 (2007) - [c4]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe:
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. ICC 2007: 4646-4651 - 2006
- [c3]Dragan Samardzija, Liang Xiao, Narayan B. Mandayam:
Impact of Pilot Assisted Channel State Estimation on Multiple Antenna Multiuser TDD Systems with Spatial Filtering. CISS 2006: 381-385 - [c2]Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Shalini S. Periyalwar:
Sensor Networks for Estimating and Updating the Performance of Cellular Systems. ICC 2006: 2107-2111 - 2003
- [c1]Liang Xiao, Shidong Zhou, Yan Yao:
QoS-oriented scheduling algorithm for mobile multimedia in OFDM. PIMRC 2003: 545-549
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-07 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint