W4-NET  Lab Publications

Dr. Xiao's research areas include security and wireless networks. He has published more than 300 SCI-indexed journal papers (including 60+ IEEE transactions papers) and over 300 refereed conference papers and book chapters related to these research areas. 

Selected recent Papers

  1. J. Li, Y. Xiao, S. Li, and T Li, "Designing Accountable IoT Systems to Overcome IoT Storage Limitation," Computers & Security,  Vol. 148, January,2025, Paper ID: 104118, DOI: 10.1016/j.cose.2024.104118

  2. Y. Gao, S. Li, W. Dong, Y. Xiao, and B. Lu, "Intelligent Building Energy Management Considering Uncertainties and Variation of Day-Ahead and Real-Time Electricity Prices," IEEE Internet of Things Journal, vol. 11, no. 23, pp. 37785-37798, 1 Dec.1, 2024, DOI: 10.1109/JIOT.2024.3444823.

  3. Y. Yang, Y. Xiao, T. Li, and K. Liu, "Defense for Displacement Attacks on Distributed Formation Control Systems," IEEE Transactions on Network Science and Engineering, Vol. 11, No. 6, pp. 6560-6573, Nov.-Dec. 2024, DOI: 10.1109/TNSE.2024.3457382.

  4. J. Li, Y. Xiao, and T. Li, "Accountability in Internet of Things Networks," IEEE Internet of Things Journal, Vol. 11, No. 21, pp. 35580-35595, 1 Nov.1, 2024, DOI: 10.1109/JIOT.2024.3436645.

  5. S. Asiri, Y. Xiao, S. Alzahrani, and T. Li, "PhishingRTDS: A Real-time Detection System for Phishing Attacks Using a Deep Learning Model," Computers & Security, Vol. 141, June, 2024, Paper ID: 103843, DOI: 10.1016/j.cose.2024.103843.

  6. H. H. Addeen, Y. Xiao and T. Li, "A CVAE-Based Anomaly Detection Algorithm for Cyber Physical Attacks for Water Distribution Systems," IEEE Access, Vol. 12, pp. 48321-48334, 2024, doi: 10.1109/ACCESS.2024.3384295.

  7. P. Chaudhari, Y. Xiao, M. M.-C. Cheng, T. Li, "Fundamentals, Algorithms, and Technologies of Occupancy Detection for Smart Buildings Using IoT Sensors," Sensors (Journal), Vol. 24, No. 7, Article number:2123, 2024. DOI: 10.3390/s24072123

  8. C. Pei, Y. Xiao, W. Liang, X. Han, and W. Wang, "Canonical Variate Analysis for Detecting False Data Injection Attacks in Alternating Current State Estimation," IEEE Transactions on Network Science and Engineering, Accepted, Feb. 22, 2024.

  9. Y. Zhang, Y. Xiao, F. Teng, and T. Li, "Distributed Energy Management Method With EEOI Limitation for the Ship-Integrated Energy System," IEEE Systems Journal, Vol. 18, No. 2, pp. 1332-1343, June 2024, DOI: 10.1109/JSYST.2024.3361709.

  10. Y. Li, J. Jin, H. Tao, Y. Xiao, J. Liang, and C. L. P. Chen, "Complemented Subspace-Based Weighted Collaborative Representation Model for Imbalanced Learning," Applied Soft Computing, Vol. 153, 2024, 111319, DOI: 10.1016/j.asoc.2024.111319.

  11. X. Wang, Y. Zan, J. Zheng, Wenjuan E, Y. Tao, Y. Xiao, and T. Li, "Variable Weight Combination Model for Lane-changing Prediction of Human-Driven Vehicle," IEEE Transactions on Intelligent Vehicles, accepted, Jan. 2024.

  12. S. Liu, T. Li, Y. Xiao, H. Wang, X. Gao, and C. L. P. Chen, "Fixed-Time Dynamic Surface-Based Adaptive Composite Control for Nonlinear Systems and Its Application to the RLC Circuit," IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 71, No. 6, pp. 3206-3210, June 2024, DOI: 10.1109/TCSII.2024.3357815.

  13. Z. Yang, J. Zheng, W. Yu, Y. Xiao, J. Li, and T. Li, "Car-Following Behavior Based on LiDAR Trajectory Data at Urban Intersections," IEEE Systems Journal, accepted, Oct. 2023

  14. H. Yang, T. Li, Y. Long, and Y. Xiao, "Model-Predictive-Based Power Management for Pulsed Power Load Fed With Multizonal Shipboard Power System," IEEE Transactions on Transportation Electrification, Vol. 10, No. 2, pp. 4119-4128, June 2024, DOI: 10.1109/TTE.2023.3312770.

  15. J. Jin, B. Geng, Y. Li, J. Liang, Y. Xiao, and C. L. P. Chen, "Flexible Label-Induced Manifold Broad Learning System for Multiclass Recognition," IEEE Transactions on Neural Networks and Learning Systems, Vol. 35, No. 11, pp. 16076-16090, Nov. 2024, doi: 10.1109/TNNLS.2023.3291793.

  16. W. Bai, T. Li, Y. Long, C. L. P. Chen, Y. Xiao, W. Li, and R. Li, "A Novel Adaptive Control Design for a Class of Nonstrict-Feedback Discrete-Time Systems via Reinforcement Learning," IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 54, No. 2, pp.1250-1262. Feb. 2024, DOI: 10.1109/TSMC.2023.3326466

  17. F. Teng, Y. Zhang, T. Yang, T. Li, Y. Xiao, and Y. Li, "Distributed Optimal Energy Management for We-Energy Considering Operation Security," IEEE Transactions on Network Science and Engineering, Vol. 11, No. 1, pp. 225-235, Jan.-Feb. 2024, doi: 10.1109/TNSE.2023.3295079.

  18. H. Yang, T. Li, Y. Long, and Y. Xiao, "Event-Triggered Distributed Secondary Control With Model-Free Predictive Compensation in AC/DC Networked Microgrids Under DoS Attacks," IEEE Transactions on Cybernetics, vol. 54, no. 1, pp. 298-307, Jan. 2024, doi: 10.1109/TCYB.2022.3218026.

  19. S. Asiri, Y. Xiao, and T. Li, "PhishTransformer: A Novel Approach to Detect Phishing Attacks Using URL Collection and Transformer" Electronics Vol. 13, no. 1: 30, 2024. https://doi.org/10.3390/electronics13010030

  20. X. Gao, T. Li, Q. Shan, Y. Xiao,ꞏ L. Yuan, and Y. Liu, "Online optimal control for dynamic positioning of vessels via time-based adaptive dynamic programming," Journal of Ambient Intelligence and Humanized Computing, Vol. 14, pp. 15629–15641, Dec. 2023, DOI: 10.1007/s12652-019-01522-9

  21. J. Wang, Y. Xiao, T. Li, and C. L. P. Chen, "A Jamming Aware Artificial Potential Field Method to Counter GPS jamming for Unmanned Surface Ship Path Planning," IEEE Systems Journal, Sept. 2023, Vol. 17, No. 3, pp. 4555-4566. DOI: 10.1109/JSYST.2023.3237613

  22. X. Wang, J, Zheng, Y. Wang, J. Tong, Y. Xiao, and T. Li, "Vehicle Micro-Trajectory Automatic Acquisition Method Based on Multisensor Fusion," IEEE Sensors Journal, vol. 23, no. 18, pp. 21506-21523, Sept. 15, 2023, doi: 10.1109/JSEN.2023.3300995.

  23. Y. Liu, Y. Xiao, T. Li, and Y. Jia, "A three-way acceleration approach for interval-valued multi-attribute decision-making problems," Applied Sciences, 2023, Vol. 13, No. 13, pp. 1-24. DOI:10.3390/app13137879

  24. Y. Zhang, Y. Xiao, Q. Shan, and T. Li, "Towards Lower Carbon Emissions: A Distributed Energy Management Strategy-Based Multi-Objective Optimization for the Seaport Integrated Energy System ," Journal of Marine Science and Engineering (JMSE), 2023, 11(3), 681, DOI: 10.3390/jmse11030681

  25. T. Mahjabin, A. Olteanu, Y. Xiao, W. Han, T. Li, and W. Sun, "A Survey on DNA-Based Cryptography and Steganography," IEEE Access, Vol. 11, pp. 116423-116451, 2023, DOI: 10.1109/ACCESS.2023.3324875

  26. S. Asiri, Y. Xiao, S. Alzahrani, S. Li, and T. Li, "A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks," IEEE Access, Vol. 11, pp. 6421-6443, 2023, DOI: 10.1109/ACCESS.2023.3237798

  27. Y. Yang, Y. Xiao, and T. Li, "Attacks on Formation Control for Multiagent Systems," IEEE Transactions on Cybernetics, Dec. 2022, Vol. 52, No. 12, pp. 12805-12817, DOI: 10.1109/TCYB.2021.3089375
  28. S. Alzahrani, Y. Xiao, and W. Sun, "An Analysis of Conti Ransomware Leaked Source Codes," IEEE Access, Vol. 10, pp. 100178-100193, 2022, DOI: 10.1109/ACCESS.2022.3207757
  29. T. Mahjabin, Y. Xiao, T. Li, and M. Guizani, "Hotlist and Stale Content Update Mitigation in Local Databases for DNS Flooding Attacks," Telecommunication Systems, accepted, Aug. 2022. DOI: 10.1007/s11235-022-00950-x
  30. A. Olteanu, L. Luo, Y. Xiao, and W. Liang, "Optimal Design for Modulated Binary Sensors," IEEE Sensors Journal, Vol. 22, No. 17, pp. 17224-17233, Sep. 1, 2022, DOI: 10.1109/JSEN.2022.3193628
  31. X. Xia, Y. Xiao, W. Liang, and J. Cui, "Detection Methods in Smart Meters for Electricity Thefts: A Survey," Proceedings of the IEEE, Vol. 110, No. 2, pp. 273-319, Feb. 2022, DOI: 10.1109/JPROC.2021.3139754.
  32. X. Xia, Y. Liu, Y. Xiao, J. Cui, B. Yang, and Y. Peng, "AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening against COVID-19," IEEE Transactions on Automation Science and Engineering, Vol. 19, No. 2, pp. 646-662, April 2022, doi: 10.1109/TASE.2021.3131585.
  33. X. Xia, J. Lin, Y. Xiao, J. Cui, Y. Peng, and Y. Ma, "A Control Chart based Detector for Small-amount Electricity Theft (SET) Attack in Smart Grids," IEEE Internet of Things Journal, accepted. Sept. 2021. DOI: 10.1109/JIOT.2021.3113348
  34. H. Addeen, Y. Xiao, J. Li, and M. Guizani, "A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems" IEEE Access, Vol.9, 2021, pp: 99905-99921. DOI: 10.1109/ACCESS.2021.3095713
  35. C. Pei, Y. Xiao, W. Liang, and X. Han, "Detecting False Data Injection Attacks using Canonical Variate Analysis in Power Grid," IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 971-983, APRIL-JUNE 2021. DOI: 10.1109/TNSE.2020.3009299
  36. Y. Yang, Y. Xiao, and T. Li, "A Survey of Autonomous Underwater Vehicle Formation: Performance, Formation Control, and Communication Capability," IEEE Communications Surveys & Tutorials, Vol. 23, No. 2, pp. 815-841, Second Quarter 2021. DOI: 10.1109/COMST.2021.3059998
  37.  L. Luo, Y. Xiao, and W. Liang, "The Maximum Number of Cells with Modulated Binary Sensors," IEEE Sensors Journal, Vol. 21, No. 9, pp. 11061-11074, May 1, 2021, DOI: 10.1109/JSEN.2021.3060059
  38. C. Pei, Y. Xiao, W. Liang, and X. Han, "A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid," in IEEE Access, Vol. 9, pp. 15499-15509, 2021, DOI: 10.1109/ACCESS.2021.3051155.
  39. J. Wang, Y. Xiao, T. Li, and C. L. P. Chen, "A Survey of Technologies for Unmanned Merchant Ships," IEEE Access, Vol. 8, 2020, pp. 224461-224486. DOI: 10.1109/ACCESS.2020.3044040
  40.  C. Pei, Y. Xiao, W. Liang, and X. Han, "PMU Placement Protection against Coordinated False Data Injection Attacks in Smart Grid," IEEE Transactions on Industry Applications, Vol. 56, No. 4, JULY/AUGUST 2020, pp. 4381-4393, DOI: 10.1109/TIA.2020.2979793. Special Issue of Security, Reliability, Privacy, and Quality in Industrial Automation and Control.
  41. X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Group Testing based Heuristic Inspection Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, Vol. 7, No. 2, pp.805-816, APRIL-JUNE 2020, DOI: 10.1109/TNSE.2018.2855139
  42. F. Okay, S. Ozdemir and Y. Xiao, "Fog Computing Based Privacy Preserving Data Aggregation Protocols," Transactions on Emerging Telecommunications Technologies, Vol. 31, no. 4, April 2020, e3900, DOI: 10.1002/ett.3900
  43. W. Han and Y. Xiao, "Edge Computing Enabled Non-Technical Loss Fraud Detection for Big Data Security Analytic in Smart Grid," Journal of Ambient Intelligence and Humanized Computing, Vol. 11, No. 4, Apr. 2020, pp. 1697-1708, DOI: 10.1007/s12652-019-01381-4.
  44. L. Luo, Y. Xiao, W. Liang, and M. Zheng, “A Cell Reconstruction Tool to Deploy Binary Pyroelectric Sensor Arrays", IEEE Sensors Journal, Vol. 20, No. 4, Feb. 15, 2020, pp.2117-2131, DOI: 10.1109/JSEN.2019.2950018
  45. X. Xia, Y. Xiao, and W. Liang, "SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 361-374, 2020. DOI: 10.1109/TIFS.2019.2921232
  46. X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 14, No. 2, Feb. 2019, pp. 445-458. DOI: 10.1109/TIFS.2018.2854703

Selected IEEE/ACM Transactions Papers

  1. J. Jiang, Y. Zuo, Y. Xiao, W. Zhang, and T. Li, "STMGF-Net: A Spatiotemporal Multi-Graph Fusion Network for Vessel Trajectory Forecasting in Intelligent Maritime Navigation," IEEE Transactions on Intelligent Transportation Systems, Vol. 25, No. 12, pp. 21367-21379, Dec. 2024, DOI: 10.1109/TITS.2024.3465234.

  2. Y. Yang, Y. Xiao, T. Li, and K. Liu, "Defense for Displacement Attacks on Distributed Formation Control Systems," IEEE Transactions on Network Science and Engineering, Vol. 11, No. 6, pp. 6560-6573, Nov.-Dec. 2024, DOI: 10.1109/TNSE.2024.3457382.

  3. S. Liu, Y. Zuo, T. Li, H. Wang, X. Gao, and Y. Xiao, "Adaptive Composite Fixed-time RL Optimized Control for Nonlinear Systems and Its Application to Intelligent Ship Autopilot," IEEE Transactions on Artificial Intelligence, accepted, Aug. 2024.

  4. X. Yang, L. -Y. Hao, T. Li, and Y. Xiao, "Dynamic Positioning Control for Unmanned Marine Vehicles With Thruster Faults and Time Delay: A Lyapunov Matrix-Based Method," IEEE Transactions on Systems, Man, and Cybernetics: Systems,, Vol. 54, No. 7, pp. 4019-4030, July 2024, DOI: 10.1109/TSMC.2024.3373631.

  5. W. Sun, Q. Lv, Y. Xiao, Q. Li, and W. Li "Multi-Agent Reinforcement Learning for Dynamic Topology Optimization of Mesh Wireless Networks," IEEE Transactions on Wireless Communications, Vol. 23, No. 9, pp. 10501-10513, Sept. 2024, DOI: 10.1109/TWC.2024.3372694.

  6. C. Pei, Y. Xiao, W. Liang, X. Han, and W. Wang, "Canonical Variate Analysis for Detecting False Data Injection Attacks in Alternating Current State Estimation," IEEE Transactions on Network Science and Engineering, Accepted, Feb. 22, 2024.

  7. X. Wang, Y. Zan, J. Zheng, Wenjuan E, Y. Tao, Y. Xiao, and T. Li, "Variable Weight Combination Model for Lane-changing Prediction of Human-Driven Vehicle," IEEE Transactions on Intelligent Vehicles, accepted, Jan. 2024.

  8. S. Liu, T. Li, Y. Xiao, H. Wang, X. Gao, and C. L. P. Chen, "Fixed-Time Dynamic Surface-Based Adaptive Composite Control for Nonlinear Systems and Its Application to the RLC Circuit," IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 71, No. 6, pp. 3206-3210, June 2024, DOI: 10.1109/TCSII.2024.3357815. .

  9. W. Bai, T. Li, Y. Long, C. L. P. Chen, Y. Xiao, W. Li, and R. Li, "A Novel Adaptive Control Design for a Class of Nonstrict-Feedback Discrete-Time Systems via Reinforcement Learning," IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 54, No. 2, pp.1250-1262. Feb. 2024, DOI: 10.1109/TSMC.2023.3326466

  10. H. Yang, T. Li, Y. Long, and Y. Xiao, "Model-Predictive-Based Power Management for Pulsed Power Load Fed With Multizonal Shipboard Power System," IEEE Transactions on Transportation Electrification, Vol. 10, No. 2, pp. 4119-4128, June 2024, DOI: 10.1109/TTE.2023.3312770.

  11. J. Jin, B. Geng, Y. Li, J. Liang, Y. Xiao, and C. L. P. Chen, "Flexible Label-Induced Manifold Broad Learning System for Multiclass Recognition," IEEE Transactions on Neural Networks and Learning Systems, Vol. 35, No. 11, pp. 16076-16090, Nov. 2024, doi: 10.1109/TNNLS.2023.3291793.

  12. F. Teng, Y. Zhang, T. Yang, T. Li, Y. Xiao, and Y. Li, "Distributed Optimal Energy Management for We-Energy Considering Operation Security," IEEE Transactions on Network Science and Engineering, Vol. 11, No. 1, pp. 225-235, Jan.-Feb. 2024, doi: 10.1109/TNSE.2023.3295079.

  13. H. Yang, T. Li, Y. Long, and Y. Xiao, "Event-Triggered Distributed Secondary Control With Model-Free Predictive Compensation in AC/DC Networked Microgrids Under DoS Attacks," IEEE Transactions on Cybernetics, vol. 54, no. 1, pp. 298-307, Jan. 2024, doi: 10.1109/TCYB.2022.3218026.

  14. H. Yang, T. Li, Y. Long, C. L. P. Chen, and Y. Xiao, "Distributed Virtual Inertia Implementation of Multiple Electric Springs Based on Model Predictive Control in DC Microgrids", IEEE Transactions on Industrial Electronics, Vol. 69, No. 12, pp. 13439-13450, Dec. 2022. DOI: 10.1109/TIE.2021.3130332

  15. Y. Yang, Y. Xiao, and T. Li, "Attacks on Formation Control for Multiagent Systems," IEEE Transactions on Cybernetics, Dec. 2022, Vol. 52, No. 12, pp. 12805-12817, DOI: 10.1109/TCYB.2021.3089375
  16. X. Xia, Y. Liu, Y. Xiao, J. Cui, B. Yang, and Y. Peng, "AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening against COVID-19," IEEE Transactions on Automation Science and Engineering, Vol. 19, No. 2, pp. 646-662, April 2022, doi: 10.1109/TASE.2021.3131585.

  17. L. Yuan, T. Li, S. Tong, Y. Xiao, and Q. Shan, "Broad Learning System Approximation-Based Adaptive Optimal Control for Unknown Discrete-Time Nonlinear Systems", IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 52, No. 8, Aug. 2022, pp. 5028-5038, DOI: 10.1109/TSMC.2021.3113357

  18. C. Pei, Y. Xiao, W. Liang, and X. Han, "Detecting False Data Injection Attacks using Canonical Variate Analysis in Power Grid," IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 971-983, APRIL-JUNE 2021. DOI: 10.1109/TNSE.2020.3009299

  19. C. Pei, Y. Xiao, W. Liang, and X. Han, "PMU Placement Protection against Coordinated False Data Injection Attacks in Smart Grid," IEEE Transactions on Industry Applications, Vol. 56, No. 4, JULY/AUGUST 2020, pp. 4381-4393, DOI: 10.1109/TIA.2020.2979793

  20. X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Group Testing based Heuristic Inspection Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, Vol. 7, No. 2, pp.805-816,APRIL-JUNE 2020, DOI: 10.1109/TNSE.2018.2855139

  21. X. Xia, Y. Xiao, and W. Liang, "SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 361-374, 2020. doi: 10.1109/TIFS.2019.2921232

  22. S. Li, Y. Sun, M. Ramezani, and Y. Xiao, "Artificial Neural Networks for Volt/VAR Control of DER Inverters at the Grid Edge," IEEE Transactions on Smart Grid, Vol. 10, No. 5, Sept. 2019. pp. 5564-5573. DOI: 10.1109/TSG.2018.2887080

  23. X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 14, No. 2, Feb. 2019, pp. 445-458. DOI: 10.1109/TIFS.2018.2854703

  24. B. Fu, Y. Xiao, X. Liang, and C. L. P. Chen, "Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks," IEEE Transactions on Cybernetics (previously IEEE Transactions on Systems, Man, and Cybernetics, Part B), Vol. 45, No. 1, pp. 103 - 115, Jan. 2015. DOI: 10.1109/TCYB.2014.2320717.
    The video demos can be found: Group-Size Video.

  25. Z. Xiao, Y. Xiao, and D. Du, "Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids," IEEE Transactions on Smart Grid, Vol. 4, No. 1, Mar. 2013, pp. 214-226. DOI: 10.1109/TSG.2012.2229397.

  26. Y. Xiao, M. Peng, J. Gibson, G. G. Xie, D. Du, and T. Vasilakos, "Tight Performance Bounds of Multi-hop Fair-Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 10, Oct. 2012, pp. 1538-1554, DOI: 10.1109/TMC.2011.190

  27. Y. Xiao, H. Chen, M. Guizani, and H. Chen, "Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 9, Sep. 2012, pp. 1532-1544. DOI: 10.1109/TMC.2011.166

  28. Y. Xiao, Y. Zhang, and X. Liang, "Primate-inspired Communication Methods for Mobile and Static Sensors and RFID Tags," ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4, Article 26, pp. 26:1-26:37, Dec. 2011, DOI 10.1145/2019591.2019595.

  29. J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun, "Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks," IEEE Transactions on Industrial Electronics, Vol. 57, No. 12, Dec. 2010, pp. 4219-4230, DOI: 10.1109/TIE.2010.2043038

  30. X. Cao, J. Chen, Y. Xiao, Y. Sun, "Building Environment Control with Wireless Sensor and Actuator Networks: Centralized vs. Distributed,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 11, Nov. 2010,  pp. 3596-3605, DOI: 10.1109/TIE.2009.2029585

  31. X. Liang and Y Xiao, "Studying Bio-inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory," IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory, Vol. 40, No. 3, June 2010, pp. 683-693. DOI: 10.1109/TSMCB.2009.2034976 (acceptance rate =10%)

  32. A. Olteanu, Y. Xiao, K. Wu, and X. Du, “Weaving a Proper Net to Catch Large Objects in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 9, No. 4, Apr. 2010, pp. 1360-1369. DOI: 10.1109/TWC.2010.081098.

  33. Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, and C. Liu, "Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks," IEEE Transactions on Computers, Vol. 59, No. 4, Apr. 2010, pp. 507-521, DOI: 10.1109/TC.2009.170.

  34. I. Tinnirello, G. Bianchi, and Y. Xiao, “Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches,IEEE Transactions on Vehicular Technology, Vol. 59, No. 3, Mar. 2010, pp. 1055-1067, DOI: 10.1109/TVT.2009.2029118

  35. A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Transactions on Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226. DOI: 10.1109/TWC.2010.01.081291

  36. A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Transactions on Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037, DOI 10.1109/TWC.2009.12.090023

  37. M. Peng, Y. Xiao, and P. Wang, "Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.5105-5114, DOI: 10.1109/TVT.2009.2027908

  38. M. Chen, V. Leung, S. Mao, Y. Xiao, and I. Chlamtac, “Hybrid Geographical Routing for Flexible Energy-Delay Trade-offs," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.4976-4987, DOI: 10.1109/TVT.2009.2025767

  39. K. Ghaboosi, M. Latva-aho, Y. Xiao, and Q. Zhang, “eMAC—A Medium-Access Control Protocol for the Next-Generation Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 8, Oct. 2009, pp. 4476-4490. DOI: 10.1109/TVT.2009.2018620

  40. K. Ghaboosi, M. Latva-aho, Y. Xiao, and B. Khalaj, “Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3518-3532. DOI: 10.1109/TVT.2008.2012158

  41. Y. Xiao, H. Chen, X. Du, Y. Zhang, H. Chen, and M. Guizani, "On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks," IEEE Transactions on Wireless Communications, Vol. 8, No. 9, Sept. 2009, pp. 4406-4410, DOI: 10.1109/TWC.2009.080717.

  42. Y. Zhang, Y. Xiao and V. C.M. Leung, "Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN," IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3738-3752. DOI: 10.1109/TVT.2009.2014383

  43. T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, "Aggregation with Fragment Retransmission for Very High-Speed WLANs," IEEE/ACM Transactions on Networking, Vol. 17, No. 2, Apr. 2009, pp.591-604. DOI: 10.1109/TNET.2009.2014654

  44. X. Du, M. Guizani, Y. Xiao, and H. Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks," IEEE Transactions on Wireless Communications, Vol.8, No.3, Mar. 2009, pp. 1223-1229. DOI: 10.1109/TWC.2009.060598

  45. Y. Xiao, H. Chen, X. Du, and M. Guizani, ”Stream-based Cipher Feedback Mode in Wireless Error Channels,” IEEE Transactions on Wireless Communications, Vol.8, No.2, Feb. 2009, pp. 622-626. DOI: 10.1109/TWC.2009.071278

  46. Y. Zhang, Y. Xiao and H. Chen, “Queueing Analysis for OFDM Subcarrier Allocation in Broadband Wireless Multiservice Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 10, Oct. 2008, pp. 3951- 3961.

  47. K. Ghaboosi, B. Khalaj, Y. Xiao, and M. Latva-aho, "Modeling IEEE 802.11 DCF using Parallel Space – Time Markov Chain," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2404-2413.

  48. X. Du, M. Guizani, Y. Xiao, and H. Chen, "Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2387-2394.

  49. R. Li, J. Li, K. Wu, Y. Xiao, and L. Xie, "An Enhanced Fast Handover with Low Latency for Mobile IPv6," IEEE Transactions on Wireless Communications, Vol. 7, No. 1, Jan. 2008, pp. 334-342.

  50. H. Chen and Y. Xiao, “On-Bound Selection Cache Replacement Policy for Wireless Data Access,” IEEE Transactions on Computers, Vol. 56, No. 12, Dec. 2007, pp. 1597-1611.

  51. B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923.

  52. Y. Xiao, H. Chen, and M. Guizani, “Non-blocking Pipeline Paging with Known Location Probabilities for Wireless Systems,” IEEE Transactions on Wireless Communications, Vol. 6, No. 10, Oct. 2007, pp.3632-3640.

  53. Y. Xiao, H. Chen, X. Du, and M. Guizani, "Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems," IEEE Transactions on Vehicular Technology, Vol. 56, No. 5, Sep. 2007, pp. 2745-2755.

  54. X. Du, M. Guizani, Y. Xiao, and H. Chen, “Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 6, No. 9, Sep. 2007, pp. 3395-3401.

  55. Y. Xiao, H. Li, and B. Li, "Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-based WLANs,” IEEE Transactions on Mobile Computing, Vol. 6, No. 7, July 2007, pp. 815-831.

  56. Y. Xiao, H. Chen, H. Chen, B. Sun, and P. Chen, “Optimal Utilization in Mobile Database Failure Restoration,” IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2086-2095.

  57. H. Chen, C. Tsai, M. Guizani, Y. Xiao, R. Fantacci, and H. Sharif, "Pulse Waveform Dependent BER Analysis of DS-CDMA UWB Radio under Multiple Access and Multipath Interferences," IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2338-2347.

  58. H. Chen, Y. Xiao, and X. Shen, “Update-based Cache Access and Replacement in Wireless Data Access,“ IEEE Transactions on Mobile Computing, Vol. 5, No. 12, Dec. 2006, pp.1734-1748.

  59. Y. Xiao and H. Chen, “Optimal Callback with Two-Level Adaptation for Wireless Data Access,” IEEE Transactions on Mobile Computing, Vol. 5, No. 8, Aug. 2006. pp. 1087-1102.

  60. Y. Xiao and M. Guizani, “Optimal Paging Load Balance with Total Delay Constraint in Macrocell-Microcell Hierarchical Cellular Networks,” IEEE Transactions on Wireless Communications, Vol.5, No. 8, Aug. 2006, pp. 2202-2209.

  61. B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.

  62. Y. Xiao, H. Li, K. Wu, K. K. Leung, and Q. Ni, "On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 7, July 2006, pp. 713-722.

  63. L. Cai, X. Shen, J. W. Mark, L. Cai, and Y. Xiao, “Voice Capacity Analysis of WLAN with Unbalanced Traffic,” IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, May 2006, pp.752-761.

  64. C. Liu, K. Wu, Y. Xiao, and B. Sun,"Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. 

  65. Y. Xiao and H. Chen, “Optimal Periodic Location Area Update for Mobile Telecommunications Networks,” IEEE Transactions on Wireless Communications, Vol. 5, No. 4, April 2006, pp. 930-937.

  66. Y. Xiao, H. Chen, and M. Guizani, "Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems," IEEE Transactions on Mobile Computing, Vol. 5, No. 1, Jan. 2006, pp. 64-76.

  67. Y. Xiao, "IEEE 802.11 Performance Enhancement via Concatenation and Piggyback Mechanisms," IEEE Transactions on Wireless Communications, Vol. 4, No. 5, Sep. 2005, pp. 2182- 2192. 

  68. Y. Xiao, "Performance Analysis of Priority Schemes for IEEE 802.11 and IEEE 802.11e Wireless LANs," IEEE Transactions on Wireless Communications, Vol. 4, No. 4, Jul. 2005. pp.1506- 1515.   DOI: 10.1109/TWC.2005.850328.

  69. Y. Xiao and Y. Pan, “Differentiation, QoS guarantee, and Optimization for Real-time Traffic over One-hop Ad Hoc Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 65, June 2005, pp. 538-549.

  70. Y. Xiao and  H. Li, "Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access,”  IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 11, Nov. 2004, pp.1041-1053.

  71. Y. Xiao, H. Li, Y. Pan, K. Wu, and J. Li, "On Optimizing Energy Consumption for Mobile Handsets,” IEEE Transactions on Vehicular Technology, Vol. 53, No. 6, Nov. 2004, pp. 1927-1941.

  72. Y. Xiao and  H. Li, "Local Data Control and Admission Control for Ad Hoc Wireless Networks,”  IEEE Transactions on Vehicular Technology,  Vol. 53, No. 5, Sep. 2004, pp.1558-1572. (PDF)

  73. Y. Xiao, Y. Pan, and J. Li, "Design and Analysis of Location Management for 3G Cellular Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 4, Apr. 2004, pp. 339-349.

  74.  Y. Xiao, Y. Fang, and Y.-B. Lin, "Hierarchical Implicit Deregistration with Forced Registrations in 3G Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, Jan. 2004, pp. 271-278.

Selected Patents

  1. S. Li, Y. Sun, M. Ramezani, and Y. Xiao, ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR AUTONOMOUS VOLT/VAR CONTROL OF INVERTER INTERFACED UNITS, US Patent # 11415950; Issued Aug. 16, 2022.

More Publications

  1. Publications by venues (Journals, books, Conferences, book chapters, etc.)
  2. Publications by categories
  3. Publications by areas
  4. Publication Statistics
  5. Security publications by areas