default search action
Bin Xiao 0001
Person information
- affiliation: Hong Kong Polytechnic University, Department of Computing, Hung Hom, Kowloon, Hong Kong
- affiliation (former): University of Texas at Dallas, Richardson, TX, USA
Other persons with the same name
- Bin Xiao — disambiguation page
- Bin Xiao 0002 — Chongqing University of Posts and Telecommunications, Key Laboratory of Computational Intelligence, China (and 1 more)
- Bin Xiao 0003 — China Electric Power Research Institute, Wuhan, China
- Bin Xiao 0004 — Microsoft Cloud+AI, Microsoft Research Asia, China (and 1 more)
- Bin Xiao 0005 — Lanzhou University, College of Earth and Environment Sciences, MOE, China
- Bin Xiao 0006 — University of Chinese Academy of Sciences, Beijing, China (and 2 more)
- Bin Xiao 0007 — Stockholm University, Kista, Department of Computer and Systems Sciences, Sweden
- Bin Xiao 0008 — University of Ottawa, School of Electrical Engineering and Computer Science, Canada (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j118]Yanjie Li, Bin Xie, Songtao Guo, Yuanyuan Yang, Bin Xiao:
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks. ACM Comput. Surv. 56(6): 138:1-138:37 (2024) - [j117]Mingxing Duan, Kailun Jiao, Siyang Yu, Zhibang Yang, Bin Xiao, Kenli Li:
MC-Net: Realistic Sample Generation for Black-Box Attacks. IEEE Trans. Inf. Forensics Secur. 19: 3008-3022 (2024) - [j116]Xue Chen, Shiyuan Xu, Shang Gao, Yu Guo, Siu-Ming Yiu, Bin Xiao:
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records. IEEE Trans. Inf. Forensics Secur. 19: 8875-8891 (2024) - [j115]Jianhuan Wang, Shang Gao, Guyue Li, Keke Gai, Bin Xiao:
SAMCU: Secure and Anonymous Multi-Channel Updates in Payment Channel Networks. IEEE Trans. Inf. Forensics Secur. 19: 9115-9128 (2024) - [j114]Mingxing Duan, Guoqing Xiao, Kenli Li, Bin Xiao:
A Black-Box Attack Algorithm Targeting Unlabeled Industrial AI Systems With Contrastive Learning. IEEE Trans. Ind. Informatics 20(4): 6325-6335 (2024) - [j113]Mingxing Duan, Kenli Li, Weinan Zhang, Jiarui Qin, Bin Xiao:
Attacking Click-through Rate Predictors via Generating Realistic Fake Samples. ACM Trans. Knowl. Discov. Data 18(5): 110:1-110:24 (2024) - [j112]Mingxing Duan, Yunchuan Qin, Jiayan Deng, Kenli Li, Bin Xiao:
Dual Attention Adversarial Attacks With Limited Perturbations. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13990-14004 (2024) - [c118]Xuelong Dai, Kaisheng Liang, Bin Xiao:
AdvDiff: Generating Unrestricted Adversarial Examples Using Diffusion Models. ECCV (46) 2024: 93-109 - [c117]Zhonghao Liu, Xinwei Zhang, Guyue Li, Helei Cui, Jiaheng Wang, Bin Xiao:
A Secure and Reliable Blockchain-based Audit Log System. ICC 2024: 2010-2015 - [c116]Zhe Peng, Jiamin Deng, Shang Gao, Helei Cui, Bin Xiao:
vDID: Blockchain-Enabled Verifiable Decentralized Identity Management for Web 3.0. IWQoS 2024: 1-2 - [e4]Jianping Wang, Bin Xiao, Xuanzhe Liu:
Service Science - CCF 17th International Conference, ICSS 2024, Hong Kong, China, May 11-12, 2024, Revised Selected Papers. Communications in Computer and Information Science 2175, Springer 2024, ISBN 978-981-97-5759-6 [contents] - [i22]Chengpeng Huang, Rui Song, Shang Gao, Yu Guo, Bin Xiao:
Data Availability and Decentralization: New Techniques for zk-Rollups in Layer 2 Blockchain Networks. CoRR abs/2403.10828 (2024) - [i21]Xuelong Dai, Bin Xiao:
Transferable 3D Adversarial Shape Completion using Diffusion Models. CoRR abs/2407.10077 (2024) - [i20]Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao:
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. IACR Cryptol. ePrint Arch. 2024: 965 (2024) - [i19]Shang Gao, Chen Qian, Tianyu Zheng, Yu Guo, Bin Xiao:
Σ-Check: Compressed Σ-protocol Theory from Sum-check. IACR Cryptol. ePrint Arch. 2024: 1654 (2024) - 2023
- [j111]Bikash Chandra Singh, Qingqing Ye, Haibo Hu, Bin Xiao:
Efficient and lightweight indexing approach for multi-dimensional historical data in blockchain. Future Gener. Comput. Syst. 139: 210-223 (2023) - [j110]Rui Song, Bin Xiao, Yubo Song, Songtao Guo, Yuanyuan Yang:
A Survey of Blockchain-Based Schemes for Data Sharing and Exchange. IEEE Trans. Big Data 9(6): 1477-1495 (2023) - [j109]Hao Xu, Bin Xiao, Xiulong Liu, Li Wang, Shan Jiang, Weilian Xue, Jianrong Wang, Keqiu Li:
Empowering Authenticated and Efficient Queries for STK Transaction-Based Blockchains. IEEE Trans. Computers 72(8): 2209-2223 (2023) - [j108]Shang Gao, Zhe Peng, Feng Tan, Yuanqing Zheng, Bin Xiao:
SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions. IEEE Trans. Dependable Secur. Comput. 20(3): 2289-2301 (2023) - [j107]Xiong Xiao, Zhuo Tang, Chuanying Li, Bin Xiao, Kenli Li:
SCA: Sybil-Based Collusion Attacks of IIoT Data Poisoning in Federated Learning. IEEE Trans. Ind. Informatics 19(3): 2608-2618 (2023) - [j106]Zheng Li, Mingxing Duan, Bin Xiao, Shenghong Yang:
A Novel Anomaly Detection Method for Digital Twin Data Using Deconvolution Operation With Attention Mechanism. IEEE Trans. Ind. Informatics 19(5): 7278-7286 (2023) - [j105]Haotian Wu, Zecheng Li, Rui Song, Bin Xiao:
Enabling Privacy-Preserving and Efficient Authenticated Graph Queries on Blockchain-Assisted Clouds. IEEE Trans. Knowl. Data Eng. 35(9): 9728-9742 (2023) - [j104]Zecheng Li, Bin Xiao, Songtao Guo, Yuanyuan Yang:
Securing Deployed Smart Contracts and DeFi With Distributed TEE Cluster. IEEE Trans. Parallel Distributed Syst. 34(3): 828-842 (2023) - [j103]Zecheng Li, Shengyuan Chen, Hongshu Dai, Dunyuan Xu, Cheng-Kang Chu, Bin Xiao:
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation. IEEE Trans. Reliab. 72(2): 498-510 (2023) - [c115]Kaisheng Liang, Bin Xiao:
StyLess: Boosting the Transferability of Adversarial Examples. CVPR 2023: 8163-8172 - [c114]Yanjie Li, Yiquan Li, Xuelong Dai, Songtao Guo, Bin Xiao:
Physical-World Optical Adversarial Attacks on 3D Face Recognition. CVPR 2023: 24699-24708 - [c113]Yu Zhou, Shang Gao, Weiwei Qiu, Kai Lei, Bin Xiao:
On the Profitability of Selfish Mining Attack Under the Checkpoint Mechanism. GLOBECOM 2023: 898-903 - [c112]Zhonghao Liu, Xinwei Zhang, Laphou Lao, Guyue Li, Bin Xiao:
DBE-voting: A Privacy-Preserving and Auditable Blockchain-Based E-Voting System. ICC 2023: 6571-6577 - [c111]Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao:
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols. SP 2023: 2533-2550 - [i18]Meng Liu, Ke Liang, Bin Xiao, Sihang Zhou, Wenxuan Tu, Yue Liu, Xihong Yang, Xinwang Liu:
Self-Supervised Temporal Graph learning with Temporal and Structural Intensity Alignment. CoRR abs/2302.07491 (2023) - [i17]Wenxuan Tu, Bin Xiao, Xinwang Liu, Sihang Zhou, Zhiping Cai, Jieren Cheng:
Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network. CoRR abs/2302.07524 (2023) - [i16]Lingyuan Meng, Ke Liang, Bin Xiao, Sihang Zhou, Yue Liu, Meng Liu, Xihong Yang, Xinwang Liu:
SARF: Aliasing Relation Assisted Self-Supervised Learning for Few-shot Relation Reasoning. CoRR abs/2304.10297 (2023) - [i15]Kaisheng Liang, Bin Xiao:
StyLess: Boosting the Transferability of Adversarial Examples. CoRR abs/2304.11579 (2023) - [i14]Xuelong Dai, Kaisheng Liang, Bin Xiao:
AdvDiff: Generating Unrestricted Adversarial Examples using Diffusion Models. CoRR abs/2307.12499 (2023) - [i13]Yanjie Li, Mingxing Duan, Bin Xiao:
Adv-Inpainting: Generating Natural and Transferable Adversarial Patch via Attention-guided Feature Fusion. CoRR abs/2308.05320 (2023) - [i12]Yanjie Li, Bin Xie, Songtao Guo, Yuanyuan Yang, Bin Xiao:
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models Against Adversarial Attacks. CoRR abs/2310.00633 (2023) - [i11]Tianyu Zheng, Shang Gao, Yu Guo, Bin Xiao:
KiloNova: Non-Uniform PCD with Zero-Knowledge Property from Generic Folding Schemes. IACR Cryptol. ePrint Arch. 2023: 1579 (2023) - [i10]Xun Liu, Shang Gao, Tianyu Zheng, Bin Xiao:
SnarkFold: Efficient SNARK Proof Aggregation from Split Incrementally Verifiable Computation. IACR Cryptol. ePrint Arch. 2023: 1946 (2023) - 2022
- [j102]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep-Learning-Based Physical-Layer Secret Key Generation for FDD Systems. IEEE Internet Things J. 9(8): 6081-6094 (2022) - [j101]Peng Wang, Kenli Li, Bin Xiao, Keqin Li:
Multiobjective Optimization for Joint Task Offloading, Power Assignment, and Resource Allocation in Mobile Edge Computing. IEEE Internet Things J. 9(14): 11737-11748 (2022) - [j100]Guiyan Liu, Songtao Guo, Bin Xiao, Yuanyuan Yang:
SDN-Based Traffic Matrix Estimation in Data Center Networks through Large Size Flow Identification. IEEE Trans. Cloud Comput. 10(1): 675-690 (2022) - [j99]Xuelong Dai, Hua Dai, Chunming Rong, Geng Yang, Fu Xiao, Bin Xiao:
Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 10(4): 2595-2612 (2022) - [j98]Xuan Liu, Jiangjin Yin, Jia Liu, Shigeng Zhang, Bin Xiao:
Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method. IEEE Trans. Mob. Comput. 21(4): 1476-1491 (2022) - [j97]Yaodong Huang, Jiarui Zhang, Jun Duan, Bin Xiao, Fan Ye, Yuanyuan Yang:
Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments. IEEE Trans. Mob. Comput. 21(9): 3298-3311 (2022) - [j96]Bin Xiao, Fan Wu, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. IEEE Trans. Netw. Sci. Eng. 9(1): 171-172 (2022) - [j95]Liyan Yang, Yubo Song, Shang Gao, Aiqun Hu, Bin Xiao:
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN. IEEE Trans. Netw. Serv. Manag. 19(3): 2269-2281 (2022) - [j94]Mingxing Duan, Kenli Li, Jiayan Deng, Bin Xiao, Qi Tian:
A Novel Multi-Sample Generation Method for Adversarial Attacks. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 112:1-112:21 (2022) - [j93]Haotian Wu, Zhe Peng, Songtao Guo, Yuanyuan Yang, Bin Xiao:
VQL: Efficient and Verifiable Cloud Query Services for Blockchain Systems. IEEE Trans. Parallel Distributed Syst. 33(6): 1393-1406 (2022) - [j92]Zecheng Li, Haotian Wu, Ricky Lap-Hou Lao, Songtao Guo, Yuanyuan Yang, Bin Xiao:
Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE. IEEE Trans. Parallel Distributed Syst. 33(7): 1636-1649 (2022) - [c110]Rui Song, Shang Gao, Yubo Song, Bin Xiao:
: A Traceable and Privacy-Preserving Data Exchange Scheme based on Non-Fungible Token and Zero-Knowledge. ICDCS 2022: 224-234 - [c109]Haotian Wu, Rui Song, Kai Lei, Bin Xiao:
Slicer: Verifiable, Secure and Fair Search over Encrypted Numerical Data Using Blockchain. ICDCS 2022: 1201-1211 - [c108]Xiaohai Dai, Bin Xiao, Jiang Xiao, Hai Jin:
An Efficient Block Validation Mechanism for UTXO-based Blockchains. IPDPS 2022: 1250-1260 - [c107]Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao:
Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. TrustCom 2022: 921-926 - [i9]Yanjie Li, Yiquan Li, Bin Xiao:
A Physical-World Adversarial Attack Against 3D Face Recognition. CoRR abs/2205.13412 (2022) - [i8]Jiaping Yu, Shang Gao, Rui Song, Zhiping Cai, Bin Xiao:
Partial Selfish Mining for More Profits. CoRR abs/2207.13478 (2022) - 2021
- [j91]Laphou Lao, Zecheng Li, Songlin Hou, Bin Xiao, Songtao Guo, Yuanyuan Yang:
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. ACM Comput. Surv. 53(1): 18:1-18:32 (2021) - [j90]Qilin Hu, Mingxing Duan, ZhiBang Yang, Siyang Yu, Bin Xiao:
Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications. IEEE Internet Things J. 8(16): 12782-12791 (2021) - [j89]Keke Gai, Yulu Wu, Liehuang Zhu, Kim-Kwang Raymond Choo, Bin Xiao:
Blockchain-Enabled Trustworthy Group Communications in UAV Networks. IEEE Trans. Intell. Transp. Syst. 22(7): 4118-4130 (2021) - [j88]Tongqing Zhou, Bin Xiao, Zhiping Cai, Ming Xu:
A Utility Model for Photo Selection in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(1): 48-62 (2021) - [j87]Menggang Chen, Songtao Guo, Kai Liu, Xiaofeng Liao, Bin Xiao:
Robust Computation Offloading and Resource Scheduling in Cloudlet-Based Mobile Cloud Computing. IEEE Trans. Mob. Comput. 20(5): 2025-2040 (2021) - [j86]Xuan Liu, Jiangjin Yin, Shigeng Zhang, Bin Xiao, Bo Ou:
Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems. IEEE Trans. Mob. Comput. 20(9): 2891-2905 (2021) - [j85]Zecheng Li, Shang Gao, Zhe Peng, Songtao Guo, Yuanyuan Yang, Bin Xiao:
B-DNS: A Secure and Efficient DNS Based on the Blockchain Technology. IEEE Trans. Netw. Sci. Eng. 8(2): 1674-1686 (2021) - [c106]Zecheng Li, Yu Zhou, Songtao Guo, Bin Xiao:
SolSaviour: A Defending Framework for Deployed Defective Smart Contracts. ACSAC 2021: 748-760 - [c105]Qi Chen, Yubo Song, Brendan Jennings, Fan Zhang, Bin Xiao, Shang Gao:
IoT-ID: Robust IoT Device Identification Based on Feature Drift Adaptation. GLOBECOM 2021: 1-6 - [c104]Xiaosong Ma, Yubo Song, Zhongwei Wang, Shang Gao, Bin Xiao, Aiqun Hu:
You Can Hear But You Cannot Record: Privacy Protection by Jamming Audio Recording. ICC 2021: 1-6 - [c103]Haihua Zhang, Laphou Lao, Chang Shu, Bin Xiao:
Analysis of the Communication Traffic Model for Permissioned Blockchain Based on Proof-of-Work. ICC 2021: 1-6 - [c102]Mingxing Duan, Kenli Li, Lingxi Xie, Qi Tian, Bin Xiao:
Towards Multiple Black-boxes Attack via Adversarial Example Generation Network. ACM Multimedia 2021: 264-272 - [i7]Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao:
Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems. CoRR abs/2105.08364 (2021) - [i6]Fan Liu, Shuyu Zhao, Xuelong Dai, Bin Xiao:
Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks. CoRR abs/2106.12900 (2021) - [i5]Xuelong Dai, Yanjie Li, Hua Dai, Bin Xiao:
Generating Unrestricted 3D Adversarial Point Clouds. CoRR abs/2111.08973 (2021) - [i4]Tianyu Zheng, Shang Gao, Bin Xiao, Yubo Song:
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols. IACR Cryptol. ePrint Arch. 2021: 1405 (2021) - [i3]Shang Gao, Tianyu Zheng, Yu Guo, Bin Xiao:
Efficient and Post-Quantum Zero-Knowledge Proofs for Blockchain Confidential Transaction Protocols. IACR Cryptol. ePrint Arch. 2021: 1674 (2021) - 2020
- [j84]Xin Xie, Xiulong Liu, Xibin Zhao, Weilian Xue, Bin Xiao, Heng Qi, Keqiu Li, Jie Wu:
Implementation of Differential Tag Sampling for COTS RFID Systems. IEEE Trans. Mob. Comput. 19(8): 1848-1861 (2020) - [j83]Xin Xie, Xiulong Liu, Heng Qi, Bin Xiao, Keqiu Li, Jie Wu:
Geographical Correlation-Based Data Collection for Sensor-Augmented RFID Systems. IEEE Trans. Mob. Comput. 19(10): 2344-2357 (2020) - [j82]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Yubo Song, Kui Ren:
Detection and Mitigation of DoS Attacks in Software Defined Networks. IEEE/ACM Trans. Netw. 28(3): 1419-1433 (2020) - [j81]Xiaoyong Tang, Bin Xiao, Kenli Li:
Indoor Crowd Density Estimation Through Mobile Smartphone Wi-Fi Probes. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2638-2649 (2020) - [j80]Yuan Yao, Bin Xiao, Wen Wang, Gang Yang, Xingshe Zhou, Zhe Peng:
Real-Time Cache-Aided Route Planning Based on Mobile Edge Computing. IEEE Wirel. Commun. 27(5): 155-161 (2020) - [c101]Liyan Yang, Yubo Song, Shang Gao, Bin Xiao, Aiqun Hu:
Griffin: An Ensemble of AutoEncoders for Anomaly Traffic Detection in SDN. GLOBECOM 2020: 1-6 - [c100]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. ICC 2020: 1-6 - [c99]Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, Sanglu Lu:
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis. ICC 2020: 1-6 - [c98]Haotian Wu, Jun Tao, Bin Xiao:
Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing. ICC 2020: 1-6 - [c97]Laphou Lao, Xiaohai Dai, Bin Xiao, Songtao Guo:
G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications. IPDPS 2020: 664-673 - [c96]Xuan Liu, Quan Yang, Shigeng Zhang, Bin Xiao:
RLLL: Accurate Relative Localization of RFID Tags with Low Latency. IWQoS 2020: 1-10 - [i2]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. CoRR abs/2005.08476 (2020)
2010 – 2019
- 2019
- [j79]Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao, Aiqun Hu:
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 21(5): 497 (2019) - [j78]Yuan Yao, Bin Xiao, Gang Yang, Yujiao Hu, Liang Wang, Xingshe Zhou:
Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI. IEEE J. Sel. Areas Commun. 37(11): 2588-2602 (2019) - [j77]Songtao Guo, Jiadi Liu, Yuanyuan Yang, Bin Xiao, Zhetao Li:
Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 18(2): 319-333 (2019) - [j76]Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI. IEEE Trans. Mob. Comput. 18(2): 362-375 (2019) - [j75]Zhe Peng, Yuan Yao, Bin Xiao, Songtao Guo, Yuanyuan Yang:
When Urban Safety Index Inference Meets Location-Based Data. IEEE Trans. Mob. Comput. 18(11): 2701-2713 (2019) - [j74]Jia Liu, Shigang Chen, Qingjun Xiao, Min Chen, Bin Xiao, Lijun Chen:
Efficient Information Sampling in Multi-Category RFID Systems. IEEE/ACM Trans. Netw. 27(1): 159-172 (2019) - [j73]Jia Liu, Bin Xiao, Xuan Liu, Kai Bu, Lijun Chen, Changhai Nie:
Efficient Polling-Based Information Collection in RFID Systems. IEEE/ACM Trans. Netw. 27(3): 948-961 (2019) - [j72]Zhikai Kuang, Yawei Shi, Songtao Guo, Jingpei Dan, Bin Xiao:
Multi-User Offloading Game Strategy in OFDMA Mobile Cloud Computing System. IEEE Trans. Veh. Technol. 68(12): 12190-12201 (2019) - [c95]Shang Gao, Zecheng Li, Zhe Peng, Bin Xiao:
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. CCS 2019: 833-850 - [c94]Lei Han, Bin Xiao, Xuwei Dong, Zhaoyan Shen, Zili Shao:
DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices. DATE 2019: 1052-1057 - [c93]Yaodong Huang, Jiarui Zhang, Jun Duan, Bin Xiao, Fan Ye, Yuanyuan Yang:
Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments. ICDCS 2019: 1476-1486 - [c92]Zhe Peng, Haotian Wu, Bin Xiao, Songtao Guo:
VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems. ICDE Workshops 2019: 1-6 - [c91]Lei Han, Shangzhen Tan, Bin Xiao, Chenlin Ma, Zili Shao:
Optimizing Cauchy Reed-Solomon Coding via ReRAM Crossbars in SSD-based RAID Systems. NVMSA 2019: 1-6 - 2018
- [j71]Tongqing Zhou, Zhiping Cai, Bin Xiao, Leye Wang, Ming Xu, Yueyue Chen:
Location Privacy-Preserving Data Recovery for Mobile Crowdsensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 151:1-151:23 (2018) - [j70]Zhe Peng, Shang Gao, Bin Xiao, Guiyi Wei, Songtao Guo, Yuanyuan Yang:
Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones. IEEE Internet Things J. 5(6): 4351-4364 (2018) - [j69]Zhe Peng, Shang Gao, Zecheng Li, Bin Xiao, Yi Qian:
Vehicle Safety Improvement through Deep Learning and Mobile Sensing. IEEE Netw. 32(4): 28-33 (2018) - [j68]Shang Gao, Zecheng Li, Bin Xiao, Guiyi Wei:
Security Threats in the Data Plane of Software-Defined Networks. IEEE Netw. 32(4): 108-113 (2018) - [j67]Fei Wang, Songtao Guo, Yuanyuan Yang, Bin Xiao:
Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting. IEEE Syst. J. 12(1): 735-746 (2018) - [j66]Hongyan Yu, Songtao Guo, Yuanyuan Yang, Bin Xiao:
Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel. IEEE Syst. J. 12(4): 3291-3302 (2018) - [j65]Zhe Peng, Shang Gao, Bin Xiao, Songtao Guo, Yuanyuan Yang:
CrowdGIS: Updating Digital Maps via Mobile Crowdsensing. IEEE Trans Autom. Sci. Eng. 15(1): 369-380 (2018) - [j64]Songtao Guo, Yawei Shi, Yuanyuan Yang, Bin Xiao:
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks. IEEE Trans. Mob. Comput. 17(7): 1524-1537 (2018) - [j63]Fei Wang, Songtao Guo, Bin Xiao, Yuanyuan Yang, Xi Zhang:
Resource Allocation and Admission Control for an Energy Harvesting Cooperative OFDMA Network. IEEE Trans. Veh. Technol. 67(5): 4071-4086 (2018) - [j62]Yuan Yao, Zhe Peng, Bin Xiao:
Parallel Hyper-Heuristic Algorithm for Multi-Objective Route Planning in a Smart City. IEEE Trans. Veh. Technol. 67(11): 10307-10318 (2018) - [c90]Shang Gao, Zecheng Li, Yuan Yao, Bin Xiao, Songtao Guo, Yuanyuan Yang:
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. AsiaCCS 2018: 413-424 - [c89]Rui Song, Yubo Song, Shang Gao, Bin Xiao, Aiqun Hu:
I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks. GLOBECOM 2018: 1-6 - [c88]Jiwei Li, Zhe Peng, Bin Xiao:
New Mobility-Aware Application Offloading Design with Low Delay and Energy Efficiency. ICC 2018: 1-6 - [c87]Xiaokun Li, Siyang Wang, Weigang Wu, Xu Chen, Bin Xiao:
Interest Tree Based Information Dissemination via Vehicular Named Data Networking. ICCCN 2018: 1-9 - [c86]Tongqing Zhou, Bin Xiao, Zhiping Cai, Ming Xu, Xuan Liu:
From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing. INFOCOM 2018: 1979-1987 - 2017
- [j61]Jiwei Li, Zhe Peng, Shang Gao, Bin Xiao, Henry C. B. Chan:
Smartphone-assisted energy efficient data communication for wearable devices. Comput. Commun. 105: 33-43 (2017) - [j60]Kai Bu, Minyu Weng, Yi Zheng, Bin Xiao, Xuan Liu:
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID. IEEE Commun. Surv. Tutorials 19(3): 1682-1700 (2017) - [j59]Kai Bu, Bin Xiao, Yi Qian:
High performance and security in cloud computing. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j58]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j57]Feng Zhu, Bin Xiao, Jia Liu, Lijun Chen:
Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems. IEEE Trans. Commun. 65(1): 283-295 (2017) - [j56]Feng Zhu, Bin Xiao, Jia Liu, Bin Wang, Qing-feng Pan, Lijun Chen:
Exploring Tag Distribution in Multi-Reader RFID Systems. IEEE Trans. Mob. Comput. 16(5): 1300-1314 (2017) - [j55]Xin Xie, Xiulong Liu, Keqiu Li, Bin Xiao, Heng Qi:
Minimal Perfect Hashing-Based Information Collection Protocol for RFID Systems. IEEE Trans. Mob. Comput. 16(10): 2792-2805 (2017) - [j54]Xiulong Liu, Bin Xiao, Keqiu Li, Alex X. Liu, Jie Wu, Xin Xie, Heng Qi:
RFID Estimation With Blocker Tags. IEEE/ACM Trans. Netw. 25(1): 224-237 (2017) - [j53]Xiulong Liu, Xin Xie, Keqiu Li, Bin Xiao, Jie Wu, Heng Qi, Dawei Lu:
Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems. IEEE/ACM Trans. Netw. 25(1): 278-291 (2017) - [j52]Qingjun Xiao, Bin Xiao, Shigang Chen, Jiming Chen:
Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems. IEEE/ACM Trans. Netw. 25(1): 392-405 (2017) - [c85]Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. DSN 2017: 591-602 - [c84]Guyue Li, Aiqun Hu, Junqing Zhang, Bin Xiao:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. GLOBECOM 2017: 1-6 - [c83]Zhe Peng, Bin Xiao, Yuan Yao, Jichang Guan, Fan Yang:
U-safety: Urban safety analysis in a smart city. ICC 2017: 1-6 - [c82]Yubo Song, Shang Gao, Aiqun Hu, Bin Xiao:
Novel attacks in OSPF networks to poison routing table. ICC 2017: 1-6 - [c81]Yuan Yao, Zhe Peng, Bin Xiao, Jichang Guan:
An efficient learning-based approach to multi-objective route planning in a smart city. ICC 2017: 1-6 - [c80]Ting Zhang, Guo-Jun Qi, Bin Xiao, Jingdong Wang:
Interleaved Group Convolutions. ICCV 2017: 4383-4392 - [c79]Jia Liu, Shigang Chen, Bin Xiao, Yanyan Wang, Lijun Chen:
Category Information Collection in RFID Systems. ICDCS 2017: 2220-2225 - [c78]Tongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu:
Detecting Rogue AP with the Crowd Wisdom. ICDCS 2017: 2327-2332 - [c77]Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. INFOCOM 2017: 1-9 - [c76]Shang Gao, Zhe Peng, Bin Xiao, Qingjun Xiao, Yubo Song:
SCoP: Smartphone energy saving by merging push services in Fog computing. IWQoS 2017: 1-10 - [c75]Feng Zhu, Bin Xiao, Jia Liu, Yanyan Wang, Lijun Chen:
Dynamic Grouping in RFID Systems. SECON 2017: 1-9 - [i1]Ting Zhang, Guo-Jun Qi, Bin Xiao, Jingdong Wang:
Interleaved Group Convolutions for Deep Neural Networks. CoRR abs/1707.02725 (2017) - 2016
- [j51]Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang:
Who stole my cheese?: Verifying intactness of anonymous RFID systems. Ad Hoc Networks 36: 111-126 (2016) - [j50]Xuan Liu, Shigeng Zhang, Bin Xiao, Kai Bu:
Flexible and Time-Efficient Tag Scanning with Handheld Readers. IEEE Trans. Mob. Comput. 15(4): 840-852 (2016) - [j49]Jia Liu, Min Chen, Bin Xiao, Feng Zhu, Shigang Chen, Lijun Chen:
Efficient RFID Grouping Protocols. IEEE/ACM Trans. Netw. 24(5): 3177-3190 (2016) - [c74]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. ACISP (1) 2016: 20-39 - [c73]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu:
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems. ICC 2016: 1-6 - [c72]Shang Gao, Zhe Peng, Bin Xiao, Yubo Song:
Secure and energy efficient prefetching design for smartphones. ICC 2016: 1-6 - [c71]Xuan Liu, Bin Xiao, Feng Zhu, Shigeng Zhang:
Let's work together: Fast tag identification by interference elimination for multiple RFID readers. ICNP 2016: 1-10 - [c70]Jia Liu, Bin Xiao, Xuan Liu, Lijun Chen:
Fast RFID Polling Protocols. ICPP 2016: 304-313 - [c69]Songtao Guo, Bin Xiao, Yuanyuan Yang, Yang Yang:
Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing. INFOCOM 2016: 1-9 - [c68]Jiwei Li, Zhe Peng, Bin Xiao:
Smartphone-assisted smooth live video broadcast on wearable cameras. IWQoS 2016: 1-6 - [c67]Xin Xie, Xiulong Liu, Weilian Xue, Keqiu Li, Bin Xiao, Heng Qi:
Fast Collection of Data in Sensor-Augmented RFID Networks. SECON 2016: 1-9 - [c66]Feng Zhu, Bin Xiao, Jia Liu, Xuan Liu, Lijun Chen:
PLAT: A Physical-Layer Tag Searching Protocol in Large RFID Systems. SECON 2016: 1-9 - 2015
- [j48]Jinhai Xu, Songtao Guo, Bin Xiao, Jing He:
Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution. Concurr. Comput. Pract. Exp. 27(18): 5765-5779 (2015) - [j47]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Alvin Chan:
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems. IEEE Trans. Computers 64(11): 3265-3277 (2015) - [j46]Songtao Guo, Fei Wang, Yuanyuan Yang, Bin Xiao:
Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks. IEEE Trans. Commun. 63(11): 4405-4417 (2015) - [j45]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu:
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution. IEEE Trans. Parallel Distributed Syst. 26(6): 1775-1788 (2015) - [j44]Yu Hua, Bin Xiao, Xue Liu, Dan Feng:
The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems. IEEE Trans. Parallel Distributed Syst. 26(11): 3194-3207 (2015) - [c65]Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie:
RFID cardinality estimation with blocker tags. INFOCOM 2015: 1679-1687 - [c64]Jia Liu, Bin Xiao, Shigang Chen, Feng Zhu, Lijun Chen:
Fast RFID grouping protocols. INFOCOM 2015: 1948-1956 - [c63]Jiwei Li, Zhe Peng, Bin Xiao, Yu Hua:
Make smartphones last a day: Pre-processing based computer vision application offloading. SECON 2015: 462-470 - 2014
- [j43]Kai Bu, Xuan Liu, Bin Xiao:
Approaching the time lower bound on cloned-tag identification for large RFID systems. Ad Hoc Networks 13: 271-281 (2014) - [j42]Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, Minyi Guo:
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks. ACM Trans. Auton. Adapt. Syst. 9(1): 5:1-5:17 (2014) - [j41]Qingjun Xiao, Bin Xiao, Kai Bu, Jiannong Cao:
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach. IEEE/ACM Trans. Netw. 22(2): 608-621 (2014) - [j40]Xiulong Liu, Keqiu Li, Geyong Min, Kai Lin, Bin Xiao, Yanming Shen, Wenyu Qu:
Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 25(12): 3145-3155 (2014) - [c62]Xiulong Liu, Heng Qi, Keqiu Li, Jie Wu, Weilian Xue, Geyong Min, Bin Xiao:
Efficient Detection of Cloned Attacks for Large-Scale RFID Systems. ICA3PP (1) 2014: 85-99 - [c61]Xiulong Liu, Keqiu Li, Heng Qi, Bin Xiao, Xin Xie:
Fast Counting the Key Tags in Anonymous RFID Systems. ICNP 2014: 59-70 - [c60]Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang:
Intactness verification in anonymous RFID systems. ICPADS 2014: 134-141 - [c59]Jia Liu, Bin Xiao, Kai Bu, Lijun Chen:
Efficient distributed query processing in large RFID-enabled supply chains. INFOCOM 2014: 163-171 - [c58]Xuan Liu, Bin Xiao, Kai Bu, Shigeng Zhang:
LOCK: A fast and flexible tag scanning mechanism with handheld readers. IWQoS 2014: 360-369 - 2013
- [j39]Qingjun Xiao, Kai Bu, Bin Xiao, Limin Sun:
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems. Concurr. Comput. Pract. Exp. 25(14): 2080-2097 (2013) - [j38]Hu Guan, Jingyu Zhou, Bin Xiao, Minyi Guo, Tao Yang:
Fast dimension reduction for document classification based on imprecise spectrum analysis. Inf. Sci. 222: 147-162 (2013) - [j37]Bo Yu, Cheng-Zhong Xu, Bin Xiao:
Detecting Sybil attacks in VANETs. J. Parallel Distributed Comput. 73(6): 746-756 (2013) - [j36]Jiaqing Luo, Bin Xiao, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j35]Sang Oh Park, Bin Xiao, Victor C. M. Leung:
Advanced technologies and theories for highly-reliable cyber physical system. J. Syst. Archit. 59(9): 729-730 (2013) - [j34]Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 429-439 (2013) - [j33]Sang Oh Park, Bin Xiao, Victor C. M. Leung, Young-Sik Jeong:
Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS). J. Supercomput. 66(1): 1-3 (2013) - [j32]Qingjun Xiao, Kai Bu, Zhijun Wang, Bin Xiao:
Robust localization against outliers in wireless sensor networks. ACM Trans. Sens. Networks 9(2): 24:1-24:26 (2013) - [j31]Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu:
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams. IEEE Trans. Parallel Distributed Syst. 24(10): 2025-2035 (2013) - [j30]Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c57]Fei Wang, Bin Xiao, Kai Bu, Jinshu Su:
Detect and identify blocker tags in tree-based RFID systems. ICC 2013: 2133-2137 - [c56]Xiulong Liu, Keqiu Li, Yanming Shen, Geyong Min, Bin Xiao, Wenyu Qu, Hongjuan Li:
A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems. ICCCN 2013: 1-7 - [c55]Qingjun Xiao, Bin Xiao, Shigang Chen:
Differential estimation in dynamic RFID systems. INFOCOM 2013: 295-299 - [c54]Yu Hua, Bin Xiao, Xue Liu:
NEST: Locality-aware approximate query service for cloud computing. INFOCOM 2013: 1303-1311 - [c53]Kai Bu, Xuan Liu, Jiwei Li, Bin Xiao:
Less is More: Efficient RFID-Based 3D Localization. MASS 2013: 86-94 - [c52]Jiwei Li, Kai Bu, Xuan Liu, Bin Xiao:
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing. MCC@SIGCOMM 2013: 39-44 - 2012
- [j29]Kai Bu, Qingjun Xiao, Zhixin Sun, Bin Xiao:
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks. Comput. Commun. 35(13): 1549-1560 (2012) - [j28]Yu Hua, Bin Xiao, Bharadwaj Veeravalli, Dan Feng:
Locality-Sensitive Bloom Filter for Approximate Membership Query. IEEE Trans. Computers 61(6): 817-830 (2012) - [j27]Kai Bu, Bin Xiao, Qingjun Xiao, Shigang Chen:
Efficient Misplaced-Tag Pinpointing in Large RFID Systems. IEEE Trans. Parallel Distributed Syst. 23(11): 2094-2106 (2012) - [c51]Kai Bu, Xuan Liu, Bin Xiao:
Fast cloned-tag identification protocols for large-scale RFID systems. IWQoS 2012: 1-4 - [c50]Xuan Liu, Shigeng Zhang, Kai Bu, Bin Xiao:
Complete and fast unknown tag identification in large RFID systems. MASS 2012: 47-55 - [c49]Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. TrustCom 2012: 215-222 - 2011
- [j26]Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao, Athanasios V. Vasilakos:
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Comput. Commun. 34(6): 793-802 (2011) - [j25]Yong Tang, Bin Xiao, Xicheng Lu:
Signature Tree Generation for Polymorphic Worms. IEEE Trans. Computers 60(4): 565-579 (2011) - [c48]Qingjun Xiao, Kai Bu, Bin Xiao:
Efficient Monitoring of Dynamic Tag Populations in RFID Systems. EUC 2011: 106-113 - [c47]Guobin Liu, Jiaqing Luo, Qingjun Xiao, Bin Xiao:
EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks. ICC 2011: 1-5 - [c46]Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, Bin Xiao, Naijie Gu:
Optimal Design of Linear Network Coding for information theoretically secure unicast. INFOCOM 2011: 757-765 - [c45]Shigang Chen, Ming Zhang, Bin Xiao:
Efficient information collection protocols for sensor-augmented RFID networks. INFOCOM 2011: 3101-3109 - [c44]Kai Bu, Bin Xiao, Qingjun Xiao, Shigang Chen:
Efficient pinpointing of misplaced tags in large RFID systems. SECON 2011: 287-295 - [c43]Xuan Liu, Shigeng Zhang, Jianxin Wang, Jiannong Cao, Bin Xiao:
Anchor supervised distance estimation in anisotropic wireless sensor networks. WCNC 2011: 938-943 - 2010
- [j24]Zhaochun Yu, Bin Xiao, Shuigeng Zhou:
Achieving optimal data storage position in wireless sensor networks. Comput. Commun. 33(1): 92-102 (2010) - [j23]Guiyi Wei, Yun Ling, Athanasios V. Vasilakos, Bin Xiao, Yao Zheng:
PIVOT: An adaptive information discovery framework for computational grids. Inf. Sci. 180(23): 4543-4556 (2010) - [j22]Bin Xiao, Lin Chen, Qingjun Xiao, Minglu Li:
Reliable Anchor-Based Sensor Localization in Irregular Areas. IEEE Trans. Mob. Comput. 9(1): 60-72 (2010) - [j21]Qingjun Xiao, Bin Xiao, Jiannong Cao, Jianping Wang:
Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme. IEEE Trans. Mob. Comput. 9(11): 1592-1607 (2010) - [j20]Bin Xiao, Yu Hua:
Using Parallel Bloom Filters for Multiattribute Representation on Network Services. IEEE Trans. Parallel Distributed Syst. 21(1): 20-32 (2010) - [c42]Hu Guan, Bin Xiao, Jingyu Zhou, Minyi Guo, Tao Yang:
Fast dimension reduction for document classification based on imprecise spectrum analysis. CIKM 2010: 1753-1756 - [c41]Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu:
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams. INFOCOM 2010: 2240-2248 - [c40]Jiaqing Luo, Bin Xiao, Zirong Yang, Shijie Zhou:
A clone of social networks to decentralized bootstrapping P2P networks. IWQoS 2010: 1-2
2000 – 2009
- 2009
- [j19]Yong Tang, Bin Xiao, Xicheng Lu:
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. Comput. Secur. 28(8): 827-842 (2009) - [j18]Yong Tang, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Concept, Characteristics and Defending Mechanism of Worms. IEICE Trans. Inf. Syst. 92-D(5): 799-809 (2009) - [j17]Jiannong Cao, Lin Liao, Guojun Wang, Hao Ma, Bin Xiao:
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 183-190 (2009) - [j16]Yu Hua, Bin Xiao, Jianping Wang:
BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data. IEEE Trans. Computers 58(12): 1585-1598 (2009) - [c39]Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou:
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. IPDPS 2009: 1-8 - [c38]Bin Xiao:
The 5th International Workshop on Security in Systems and Networks. IPDPS 2009: 1-2 - [c37]Qingjun Xiao, Bin Xiao, Jiaqing Luo, Guobin Liu:
Reliable navigation of mobile sensors in wireless sensor networks without localization service. IWQoS 2009: 1-9 - 2008
- [j15]Bin Xiao, Wei Chen, Yanxiang He:
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently. J. Parallel Distributed Comput. 68(4): 456-470 (2008) - [j14]Bin Xiao, Jiannong Cao, Qin Lu:
Dynamic SPT update for multiple link state decrements in network routing. J. Supercomput. 46(3): 237-256 (2008) - [j13]Bin Xiao, Hekang Chen, Shuigeng Zhou:
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 19(5): 587-600 (2008) - [c36]Zhigang Li, Nong Xiao, Jizhong Zhao, Bin Xiao:
Bouncing Tracks in Sensor Networks. ICPADS 2008: 591-598 - [c35]Baowei Wang, Xingming Sun, Xinbing Wang, Bin Xiao:
Time-Based Privacy Protection for Multi-attribute Data in WSNs. ICPADS 2008: 615-622 - [c34]Yu Hua, Bin Xiao, Dan Feng, Bo Yu:
Bounded LSH for Similarity Search in Peer-to-Peer File Systems. ICPP 2008: 644-651 - 2007
- [j12]Bin Xiao, Jiannong Cao, Zili Shao, Qingfeng Zhuge, Edwin Hsing-Mean Sha:
Analysis and algorithms design for the partition of large-scale adaptive mobile wireless networks. Comput. Commun. 30(8): 1899-1912 (2007) - [j11]María S. Pérez, Bin Xiao:
Special section: Security on grids and distributed systems. Future Gener. Comput. Syst. 23(6): 774-775 (2007) - [j10]Bin Xiao, Jiannong Cao, Zili Shao, Edwin Hsing-Mean Sha:
An efficient algorithm for dynamic shortest path tree update in network routing. J. Commun. Networks 9(4): 499-510 (2007) - [j9]Bin Xiao, Bo Yu, Chuanshan Gao:
CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distributed Comput. 67(11): 1218-1230 (2007) - [c33]Yong Tang, Xicheng Lu, Bin Xiao:
Generating Simplified Regular Expression Signatures for Polymorphic Worms. ATC 2007: 478-488 - [c32]Bin Xiao, Hekang Chen, Shuigeng Zhou:
A Walking Beacon-Assisted Localization in Wireless Sensor Networks. ICC 2007: 3070-3075 - [e3]Bin Xiao, Laurence Tianruo Yang, Jianhua Ma, Christian Müller-Schloer, Yu Hua:
Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings. Lecture Notes in Computer Science 4610, Springer 2007, ISBN 978-3-540-73546-5 [contents] - 2006
- [j8]Zili Shao, Qingfeng Zhuge, Meilin Liu, Chun Xue, Edwin Hsing-Mean Sha, Bin Xiao:
Algorithms and analysis of scheduling for loops with minimum switching. Int. J. Comput. Sci. Eng. 2(1/2): 88-97 (2006) - [j7]Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao, Edwin Hsing-Mean Sha:
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. IEEE Trans. Computers 55(4): 443-453 (2006) - [j6]Chun Jason Xue, Zili Shao, Qingfeng Zhuge, Bin Xiao, Meilin Liu, Edwin Hsing-Mean Sha:
Optimizing Address Assignment and Scheduling for DSPs With Multiple Functional Units. IEEE Trans. Circuits Syst. II Express Briefs 53-II(9): 976-980 (2006) - [j5]Bin Xiao, Wei Chen, Yanxiang He:
A novel approach to detecting DDoS Attacks at an Early Stage. J. Supercomput. 36(3): 235-248 (2006) - [j4]Zili Shao, Bin Xiao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha:
Loop scheduling with timing and switching-activity minimization for VLIW DSP. ACM Trans. Design Autom. Electr. Syst. 11(1): 165-185 (2006) - [c31]Bin Xiao, Jiadi Yu, Zili Shao, Minglu Li:
Distributed Proximity-Aware Peer Clustering in BitTorrent-Like Peer-to-Peer Networks. EUC 2006: 375-384 - [c30]Yu Hua, Bin Xiao:
A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services. HiPC 2006: 277-288 - [c29]Yu Hua, Dan Feng, Bin Xiao:
TBF: An Efficient Data Architecture for Metadata Server in the Object-based Storage Network. ICON 2006: 1-6 - [c28]Bo Yu, Bin Xiao:
Detecting selective forwarding attacks in wireless sensor networks. IPDPS 2006 - [c27]Hekang Chen, Shuigeng Zhou, Bin Xiao, Jihong Guan, Bo Huang:
A Novel Energy-Efficient Backbone for Sensor Networks. MSN 2006: 600-611 - [e2]Edwin Hsing-Mean Sha, Sung-Kook Han, Cheng-Zhong Xu, Moon-hae Kim, Laurence Tianruo Yang, Bin Xiao:
Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings. Lecture Notes in Computer Science 4096, Springer 2006, ISBN 3-540-36679-2 [contents] - 2005
- [c26]Naixue Xiong, Yanxiang He, Yan Yang, Bin Xiao, Xiaohua Jia:
On Designing a Novel PI Controller for AQM Routers Supporting TCP Flows. APWeb 2005: 991-1002 - [c25]Zili Shao, Qingfeng Zhuge, Chun Xue, Bin Xiao, Edwin Hsing-Mean Sha:
High-level synthesis for DSP applications using heterogeneous functional units. ASP-DAC 2005: 302-304 - [c24]Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao:
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. ICCNMC 2005: 560-569 - [c23]Ying Chen, Zili Shao, Qingfeng Zhuge, Chun Xue, Bin Xiao, Edwin Hsing-Mean Sha:
Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems. ICPADS (2) 2005: 2-6 - [c22]Yanxiang He, Wei Chen, Wenling Peng, Bin Xiao:
An Efficient and Practical Defense Method Against DDoS Attack at the Source-End. ICPADS (2) 2005: 265-269 - [c21]Kevin F. Chen, Edwin Hsing-Mean Sha, Bin Xiao:
Universal Routing in Distributed Networks. ICPADS (2) 2005: 555-559 - [c20]Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean Sha:
An Active Detecting Method Against SYN Flooding Attack. ICPADS (1) 2005: 709-715 - [c19]Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao:
Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. ITCC (1) 2005: 780-785 - [c18]Yanxiang He, Wei Chen, Bin Xiao:
Detecting SYN Flooding Attacks Near Innocent Side. MSN 2005: 443-452 - [e1]Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuan-Shun Dai, Laurence Tianruo Yang:
Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings. Lecture Notes in Computer Science 3823, Springer 2005, ISBN 3-540-30803-2 [contents] - 2004
- [j3]Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha:
Efficient Algorithms for Dynamic Update of Shortest Path Tree in Networking. Int. J. Comput. Their Appl. 11(1): 60-75 (2004) - [j2]Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao, Chantana Chantrapornchai:
Efficient variable partitioning and scheduling for DSP processors with multiple memory modules. IEEE Trans. Signal Process. 52(4): 1090-1099 (2004) - [c17]Zili Shao, Qingfeng Zhuge, Meilin Liu, Bin Xiao, Edwin Hsing-Mean Sha:
Switching-Activity Minimization on Instruction-Level Loop Scheduling for VLIWDSP Applications. ASAP 2004: 224-234 - [c16]Zili Shao, Qingfeng Zhuge, Meilin Liu, Edwin Hsing-Mean Sha, Bin Xiao:
Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures. EUC 2004: 53-63 - [c15]Chun Xue, Zili Shao, Edwin Hsing-Mean Sha, Bin Xiao:
Optimizing Address Assignment for Scheduling Embedded DSPs. EUC 2004: 64-73 - [c14]Bin Xiao, Jiannong Cao, Edwin Hsing-Mean Sha:
Maintaining Comprehensive Resource Availability in P2P Networks. GCC 2004: 543-550 - [c13]Bin Xiao, Jiannong Cao, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha:
Dynamic shortest path tree update for multiple link state decrements. GLOBECOM 2004: 1163-1167 - [c12]Bin Xiao, Wei Chen, Yanxiang He:
A Novel Technique for Detecting DDoS Attacks at Its Early Stage. ISPA 2004: 825-834 - [c11]Bin Xiao, Jiannong Cao, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha:
Dynamic Update of Shortest Path Tree in OSPF. ISPAN 2004: 18-23 - [c10]Bin Xiao, Jiannong Cao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean Sha:
Approximation Algorithms Design for Disk Partial Covering Problem. ISPAN 2004: 104-110 - [c9]Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao:
Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. ITCC (1) 2004: 409-413 - 2003
- [j1]Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha:
Code size reduction technique and implementation for software-pipelined DSP applications. ACM Trans. Embed. Comput. Syst. 2(4): 590-613 (2003) - [c8]Bin Xiao, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha:
Design and Analysis of Improved Shortest Path Tree Update for Network Routing. PDCS 2003: 82-87 - [c7]Qingfeng Zhuge, Zili Shao, Bin Xiao, Edwin Hsing-Mean Sha:
Design space minimization with timing and code size optimization for embedded DSP. CODES+ISSS 2003: 144-149 - 2002
- [c6]Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha:
Variable Partitioning and Scheduling of Multiple Memory Architectures for DSP. IPDPS 2002 - [c5]Qingfeng Zhuge, Bin Xiao, Edwin Hsing-Mean Sha:
Performance optimization of multiple memory architectures for DSP. ISCAS (5) 2002: 469-472 - [c4]Bin Xiao, Zili Shao, Chantana Chantrapornchai, Edwin Hsing-Mean Sha, Qingfeng Zhuge:
Optimal Code Size Reduction for Software-Pipelined and Unfolded Loops. ISSS 2002: 144-149 - [c3]Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Chantana Chantrapornchai:
Analysis and Algorithms for Partitioning of Large-scale Adaptive Mobile Networks. IASTED PDCS 2002: 302-308 - 2001
- [c2]Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha:
Efficient Update of Shortest Path Algorithms for Network Routing. PDCS 2001: 315-320 - [c1]Bin Xiao, Qingfeng Zhuge, Edwin Hsing-Mean Sha:
Minimum dynamic update for shortest path tree construction. GLOBECOM 2001: 126-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint