W4-NET  Lab Publications

Dr. Xiao's research areas include security and communications/networks. He has published more than 200 SCI-indexed journal papers (including 50 IEEE transactions papers) and over 200 refereed conference papers and book chapters related to these research areas.

Selected Recent IEEE/ACM Transactions Papers and IEEE J-SAC

  1. B. Fu, Y. Xiao, X. Liang, and C. L. P. Chen, "Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks," IEEE Transactions on Cybernetics (previously IEEE Transactions on Systems, Man, and Cybernetics, Part B), Vol. 45, No. 1, pp. 103 - 115, Jan. 2015. DOI: 10.1109/TCYB.2014.2320717.
    The video demos can be found: Group-Size Video.

  2. Z. Xiao, Y. Xiao, and D. Du, "Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids," IEEE Transactions on Smart Grid, Vol. 4, No. 1, Mar. 2013, pp. 214-226. DOI: 10.1109/TSG.2012.2229397.

  3. Y. Xiao, M. Peng, J. Gibson, G. G. Xie, D. Du, and T. Vasilakos, "Tight Performance Bounds of Multi-hop Fair-Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 10, Oct. 2012, pp. 1538-1554, DOI: 10.1109/TMC.2011.190

  4. Y. Xiao, H. Chen, M. Guizani, and H. Chen, "Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 9, Sep. 2012, pp. 1532-1544. DOI: 10.1109/TMC.2011.166

  5. Y. Xiao, Y. Zhang, and X. Liang, "Primate-inspired Communication Methods for Mobile and Static Sensors and RFID Tags," ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4, Article 26, pp. 26:1-26:37, Dec. 2011, DOI 10.1145/2019591.2019595.

  6. J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun, "Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks," IEEE Transactions on Industrial Electronics, Vol. 57, No. 12, Dec. 2010, pp. 4219-4230, DOI: 10.1109/TIE.2010.2043038

  7. X. Cao, J. Chen, Y. Xiao, Y. Sun, "Building Environment Control with Wireless Sensor and Actuator Networks: Centralized vs. Distributed,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 11, Nov. 2010,  pp. 3596-3605, DOI: 10.1109/TIE.2009.2029585

  8. X. Liang and Y Xiao, "Studying Bio-inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory," IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory, Vol. 40, No. 3, June 2010, pp. 683-693. DOI: 10.1109/TSMCB.2009.2034976 (acceptance rate =10%)

  9. A. Olteanu, Y. Xiao, K. Wu, and X. Du, “Weaving a Proper Net to Catch Large Objects in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 9, No. 4, Apr. 2010, pp. 1360-1369. DOI: 10.1109/TWC.2010.081098.

  10. Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, and C. Liu, "Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks," IEEE Transactions on Computers, Vol. 59, No. 4, Apr. 2010, pp. 507-521, DOI: 10.1109/TC.2009.170.

  11. I. Tinnirello, G. Bianchi, and Y. Xiao, “Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches,IEEE Transactions on Vehicular Technology, Vol. 59, No. 3, Mar. 2010, pp. 1055-1067, DOI: 10.1109/TVT.2009.2029118

  12. A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Transactions on Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226. DOI: 10.1109/TWC.2010.01.081291

  13. A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Transactions on Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037, DOI 10.1109/TWC.2009.12.090023

  14. M. Peng, Y. Xiao, and P. Wang, "Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.5105-5114, DOI: 10.1109/TVT.2009.2027908

  15. M. Chen, V. Leung, S. Mao, Y. Xiao, and I. Chlamtac, “Hybrid Geographical Routing for Flexible Energy-Delay Trade-offs," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.4976-4987, DOI: 10.1109/TVT.2009.2025767

  16. K. Ghaboosi, M. Latva-aho, Y. Xiao, and Q. Zhang, “eMAC—A Medium-Access Control Protocol for the Next-Generation Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 8, Oct. 2009, pp. 4476-4490. DOI: 10.1109/TVT.2009.2018620

  17. K. Ghaboosi, M. Latva-aho, Y. Xiao, and B. Khalaj, “Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3518-3532. DOI: 10.1109/TVT.2008.2012158

  18. Y. Xiao, H. Chen, X. Du, Y. Zhang, H. Chen, and M. Guizani, "On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks," IEEE Transactions on Wireless Communications, Vol. 8, No. 9, Sept. 2009, pp. 4406-4410, DOI: 10.1109/TWC.2009.080717.

  19. Y. Zhang, Y. Xiao and V. C.M. Leung, "Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN," IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3738-3752. DOI: 10.1109/TVT.2009.2014383

  20. F. Hu, Y. Xiao, and Q. Hao “Congestion-aware, Loss-Resilient Bio-monitoring Sensor Networking for Mobile Health Applications,” IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare, Vol. 27, No. 4, May 2009, pp. 450-465, DOI: 10.1109/JSAC.2009.090509

  21. T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, "Aggregation with Fragment Retransmission for Very High-Speed WLANs," IEEE/ACM Transactions on Networking, Vol. 17, No. 2, Apr. 2009, pp.591-604. DOI: 10.1109/TNET.2009.2014654

  22. X. Du, M. Guizani, Y. Xiao, and H. Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks," IEEE Transactions on Wireless Communications, Vol.8, No.3, Mar. 2009, pp. 1223-1229. DOI: 10.1109/TWC.2009.060598

  23. Y. Xiao, H. Chen, X. Du, and M. Guizani, ”Stream-based Cipher Feedback Mode in Wireless Error Channels,” IEEE Transactions on Wireless Communications, Vol.8, No.2, Feb. 2009, pp. 622-626. DOI: 10.1109/TWC.2009.071278

  24. Y. Zhang, Y. Xiao and H. Chen, “Queueing Analysis for OFDM Subcarrier Allocation in Broadband Wireless Multiservice Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 10, Oct. 2008, pp. 3951- 3961.

  25. K. Ghaboosi, B. Khalaj, Y. Xiao, and M. Latva-aho, "Modeling IEEE 802.11 DCF using Parallel Space – Time Markov Chain," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2404-2413.

  26. X. Du, M. Guizani, Y. Xiao, and H. Chen, "Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2387-2394.

  27. R. Li, J. Li, K. Wu, Y. Xiao, and L. Xie, "An Enhanced Fast Handover with Low Latency for Mobile IPv6," IEEE Transactions on Wireless Communications, Vol. 7, No. 1, Jan. 2008, pp. 334-342.

  28. H. Chen and Y. Xiao, “On-Bound Selection Cache Replacement Policy for Wireless Data Access,” IEEE Transactions on Computers, Vol. 56, No. 12, Dec. 2007, pp. 1597-1611.

  29. B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923.

  30. Y. Xiao, H. Chen, and M. Guizani, “Non-blocking Pipeline Paging with Known Location Probabilities for Wireless Systems,” IEEE Transactions on Wireless Communications, Vol. 6, No. 10, Oct. 2007, pp.3632-3640.

  31. Y. Xiao, H. Chen, X. Du, and M. Guizani, "Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems," IEEE Transactions on Vehicular Technology, Vol. 56, No. 5, Sep. 2007, pp. 2745-2755.

  32. X. Du, M. Guizani, Y. Xiao, and H. Chen, “Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 6, No. 9, Sep. 2007, pp. 3395-3401.

  33. Y. Xiao, H. Li, and B. Li, "Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-based WLANs,” IEEE Transactions on Mobile Computing, Vol. 6, No. 7, July 2007, pp. 815-831.

  34. Y. Xiao, H. Chen, H. Chen, B. Sun, and P. Chen, “Optimal Utilization in Mobile Database Failure Restoration,” IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2086-2095.

  35. H. Chen, C. Tsai, M. Guizani, Y. Xiao, R. Fantacci, and H. Sharif, "Pulse Waveform Dependent BER Analysis of DS-CDMA UWB Radio under Multiple Access and Multipath Interferences," IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2338-2347.

  36. H. Chen, Y. Xiao, and X. Shen, “Update-based Cache Access and Replacement in Wireless Data Access,“ IEEE Transactions on Mobile Computing, Vol. 5, No. 12, Dec. 2006, pp.1734-1748.

  37. Y. Xiao and H. Chen, “Optimal Callback with Two-Level Adaptation for Wireless Data Access,” IEEE Transactions on Mobile Computing, Vol. 5, No. 8, Aug. 2006. pp. 1087-1102.

  38. Y. Xiao and M. Guizani, “Optimal Paging Load Balance with Total Delay Constraint in Macrocell-Microcell Hierarchical Cellular Networks,” IEEE Transactions on Wireless Communications, Vol.5, No. 8, Aug. 2006, pp. 2202-2209.

  39. B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.

  40. Y. Xiao, H. Li, K. Wu, K. K. Leung, and Q. Ni, "On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 7, July 2006, pp. 713-722.

  41. L. Cai, X. Shen, J. W. Mark, L. Cai, and Y. Xiao, “Voice Capacity Analysis of WLAN with Unbalanced Traffic,” IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, May 2006, pp.752-761.

  42. C. Liu, K. Wu, Y. Xiao, and B. Sun,"Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. 

  43. Y. Xiao, X. Shen, and H. Jiang, “Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems,“ IEEE Journal on Selected Areas in Communications, Vol. 24, No. 4, April 2006, pp. 836-842.

  44. Y. Xiao and H. Chen, “Optimal Periodic Location Area Update for Mobile Telecommunications Networks,” IEEE Transactions on Wireless Communications, Vol. 5, No. 4, April 2006, pp. 930-937.

  45. Y. Xiao, H. Chen, and M. Guizani, "Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems," IEEE Transactions on Mobile Computing, Vol. 5, No. 1, Jan. 2006, pp. 64-76.

  46. Y. Xiao, "IEEE 802.11 Performance Enhancement via Concatenation and Piggyback Mechanisms," IEEE Transactions on Wireless Communications, Vol. 4, No. 5, Sep. 2005, pp. 2182- 2192. 

  47. Y. Xiao, "Performance Analysis of Priority Schemes for IEEE 802.11 and IEEE 802.11e Wireless LANs," IEEE Transactions on Wireless Communications, Vol. 4, No. 4, Jul. 2005. pp.1506- 1515. 

  48. Y. Xiao and Y. Pan, “Differentiation, QoS guarantee, and Optimization for Real-time Traffic over One-hop Ad Hoc Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 65, June 2005, pp. 538-549.

  49. Y. Xiao and  H. Li, "Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access,”  IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 11, Nov. 2004, pp.1041-1053.

  50. Y. Xiao, H. Li, Y. Pan, K. Wu, and J. Li, "On Optimizing Energy Consumption for Mobile Handsets,” IEEE Transactions on Vehicular Technology, Vol. 53, No. 6, Nov. 2004, pp. 1927-1941.

  51. Y. Xiao and  H. Li, "Local Data Control and Admission Control for Ad Hoc Wireless Networks,”  IEEE Transactions on Vehicular Technology,  Vol. 53, No. 5, Sep. 2004, pp.1558-1572. (PDF)

  52. Y. Xiao, Y. Pan, and J. Li, "Design and Analysis of Location Management for 3G Cellular Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 4, Apr. 2004, pp. 339-349.

  53.  Y. Xiao, Y. Fang, and Y.-B. Lin, "Hierarchical Implicit Deregistration with Forced Registrations in 3G Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, Jan. 2004, pp. 271-278.

Selected Journal Papers in Security and Privacy

  1. Z. Xiao, Y. Xiao, and J. Wu, "P-Accountability: A Quantitative Study of Accountability in Networked Systems," Wireless Personal Communications, accepted.

  2. W. Han and Y. Xiao, "NFD: Non-Technical Loss Fraud Detection in Smart Grid," Computers & Security, Vol. 65, March 2017, pp. 187–201, DOI: 10.1016/j.cose.2016.11.009.

  3. J. Liu, W. Han, and Y. Xiao, "Enhancements of Temporal Accountability in Medical Sensor Networks," Ad Hoc & Sensor Wireless Networks, accepted.

  4. W. Han and Y. Xiao, "A Novel Detector to Detect Colluded Non-Technical Loss Frauds in Smart Grid," Computer Networks, DOI: 10.1016/j.comnet.2016.10.011, accepted.

  5. W. Han and Y. Xiao, "Design A Fast Non-Technical Loss Fraud Detector for Smart Grid," (Wiley Journal of) Security and Communication Networks, DOI: 10.1002/sec.1682, accepted.

  6. L. Zeng, Y. Xiao, H. Chen, B. Sun, and W. Han, "Computer Operating System Logging and Security Issues: A Survey," (Wiley Journal of) Security and Communication Networks, accepted. DOI: 10.1002/sec.1677

  7. W. Han and Y. Xiao, "IP2DM: Integrated Privacy-Preserving Data Management Architecture for Smart Grid V2G Networks," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 16, No. 17, Dec. 10, 2016, pp. 2775–3186, DOI: 10.1002/wcm.2740

  8. W. Han and Y. Xiao, “Privacy Preservation for V2G Networks in Smart Grid: A Survey,” Computer Communications, Vol. 91–92, 1 Oct. 2016, pp. 17–28, doi:10.1016/j.comcom.2016.06.006

  9. L. Zeng, H. Chen, and Y. Xiao, "Accountable Administration in Operating Systems," International Journal of Information and Computer Security, accepted.

  10. E. McCary and Y. Xiao, "Home Area Network Accountability with Varying Consumption Devices in Smart Grid," (Wiley Journal of) Security and Communication Networks, Vol. 9, No. 10, pp. 977–995, 10 July 2016. DOI: 10.1002/sec.1393

  11. F. Shalini, Y. Xiao, B. Sun, "Security Issues in ProtoGENI," EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Vol. 3, No. 6, e1, 2016, pp. 1-21. http://dx.doi.org/10.4108/eai.1-1-2016.150807

  12. B. Fu and Y. Xiao, "A Multi-Resolution Accountable Logging and Its Applications," Computer Networks, Vol. 89, No. 4, Oct. 2015, Pages 44–58. doi:10.1016/j.comnet.2015.06.011

  13. F. Shalini, Y. Xiao, and B. Sun, "ProtoGENI experiments," International Journal of Security and Networks, Vol. 10, No. 4, 2015. pp. 239-254. DOI: 10.1504/IJSN.2015.072446

  14. L. Zeng, Y. Xiao, H. Chen, "Auditing Overhead, Auditing Adaptation, and Benchmark Evaluation in Linux," (Wiley Journal of) Security and Communication Networks, Vol. 8, no. 18, pp. 3523–3534, Dec. 2015, DOI: 10.1002/sec.1277

  15. J. Gao, Y. Xiao, S. Rao, and F. Shalini, "Security Tests and Attack Experimentations of ProtoGENI," International Journal of Security and Networks, Vol. 10, No. 3, 2015, pp. 151-169. DOI: 10.1504/IJSN.2015.071834

  16. V. Ndatinya, Z. Xiao, V. Manepalli, K. Meng, and Y. Xiao, "Network Forensics Analysis Using Wireshark," International Journal of Security and Networks, Vol. 10, No. 2, 2015, pp. 91-106. DOI: 10.1504/IJSN.2015.070421

  17. E. McCary and Y. Xiao, "Smart Grid Attacks and Countermeasures," EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Vol. 2, No. 2, pp. e4, Feb. 25, 2015, doi: 10.4108/inis.2.2.e4

  18. Z. Xiao, Y. Xiao, and H. Chen, "An Accountable Framework for Sensing-Oriented Mobile Cloud Computing," Journal of Internet Technology, Vol. 15, No.5, pp. 813-822, 2014. DOI: 10.6138/JIT.2014.15.5.11

  19. B. Fu and Y. Xiao, "Accountability and Q-Accountable Logging in Wireless Networks", Wireless Personal Communications, Vol. 75, No. 3, Apr. 2014, pp. 1715-1746. DOI: 10.1007/s11277-014-1604-7

  20. Z. Xiao and Y. Xiao, "Achieving Accountable MapReduce in Cloud Computing," (Elsevier) Future Generation Computer Systems, Vol. 30, No.1, Jan. 2014, pp. 1–13, DOI: 10.1016/j.future.2013.07.001

  21. Z. Xiao, B. Fu, Y. Xiao, C. L. P. Chen, and W. Liang, "A Review of GENI Authentication and Access Control Mechanisms," International Journal of Security and Networks (IJSN), Vol. 8, No. 1, 2013, pp. 40-60.

  22. S. Ozdemir, M. Peng, and Y. Xiao, " PRDA: Polynomial Regression Based Privacy Preserving Data Aggregation for Wireless Sensor Networks," Wireless Communications and Mobile Computing (WCMC) Journal , John Wiley & Sons,  Vol. 15, No. 4, pp. 615–628, Mar. 2015. DOI: 10.1002/wcm.2369

  23. J. Liu, Y. Xiao, and J. Gao, “Achieving Accountability in Smart Grids,” IEEE Systems Journal, Vol. 8, No. 2, Jun. 2014, pp. 493-508. DOI: 10.1109/JSYST.2013.2260697.

  24. J. Gao, J. Liu, B. Rajan, R. Nori, B. Fu, Y. Xiao, W. Liang, and C. L. P. Chen, "SCADA Communication and Security Issues," (Wiley Journal of) Security and Communication Networks, Vol. 7, No. 1, pp. 175–194, Jan. 2014. DOI: 10.1002/sec.698

  25. Z. Xiao, Y. Xiao, and D. Du, "Non-repudiation in Neighborhood Area Networks for Smart Grid," IEEE Communications Magazine,  Vol. 51, No. 1, pp. 18-26, Jan. 2013.

  26. Z. Xiao, Y. Xiao, and D. Du, "Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids," IEEE Transactions on Smart Grid, Vol. 4, No. 1, Mar. 2013, pp. 214-226. DOI: 10.1109/TSG.2012.2229397.

  27. J. Gao and Y. Xiao, "Design for Accountability in Multi-core Networks," Journal of Convergence, Vol. 3, No. 3, Sep. 2012, pp. 9-16.

  28. X. Liang, Y. Xiao, S. Ozdemir, A. V. Vasilakos, and H. Deng, "Cipher Feedback Mode under Go-back-N and Selective-reject Protocols in Error Channels," (Wiley Journal of) Security and Communication Networks,  Vol. 6, No. 8, pp. 942–954, Aug. 2013, DOI: 10.1002/sec.638.

  29. A. Olteanu, Y. Xiao , J. Liu, T. M. Chen, and C. L. P. Chen, “Nonintrusive Tracing in the Internet,” (Wiley Journal of) Security and Communication Networks, Vol. 6, No. 7, pp. 833–843, July 2013, DOI: 10.1002/sec.616.

  30. S. Ozdemir and Y. Xiao, "FTDA: Outlier Detection-based Fault-Tolerant Data Aggregation for Wireless Sensor Networks," (Wiley Journal of) Security and Communication Networks, Vol. 6, No. 6, pp. 702–710, June 2013. DOI: 10.1002/sec.604.

  31. B. Sun, X. Shan, K. Wu, and Y. Xiao, “Anomaly Detection based Secure In-Network Aggregation for Wireless Sensor Networks,” IEEE Systems Journal, Vol. 7, No. 1, Mar. 2013, pp. 13-25. DOI: 10.1109/JSYST.2012.2223531

  32. J. Liu, Y. Xiao, and C. L. P. Chen, "Internet of Things’ Authentication and Access Control," International Journal of Security and Networks (IJSN), Vol. 7, No. 4, 2012, pp. 228-241. DOI: 10.1504/IJSN.2012.053461

  33. Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Computing,” IEEE Communications Surveys & Tutorials, Vol. 15, No. 2, Second Quarter 2013, pp. 843-859. DOI: 10.1109/SURV.2012.060912.00182.

  34. Z. Xiao, N. Kathiresshan, and Y. Xiao, "A Survey of Accountability in Computer Networks and Distributed Systems," (Wiley Journal of) Security and Communication Networks,  Vol. 9, No. 4, pp. 290–315, 10 March 2016, pp. 290–315. DOI: 10.1002/sec.574.

  35. X. Liang and Y. Xiao, "Game Theory for Network Security," IEEE Communications Surveys & Tutorials,  Vol. 15, No. 1, First Quarter 2013, pp. 472 - 486. DOI: 10.1109/SURV.2012.062612.00056

  36. Y. Xiao, C.-C. Li, M. Lei, and S. V. Vrbsky, "Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users from Password Theft," IEEE Systems Journal, Vol. 8, No. 2, Jun. 2014, pp. 406-416. DOI: 10.1109/JSYST.2012.2183755.

  37. J. Liu, Y. Xiao, S. Li, W. Liang, C. L. P. Chen, "Cyber Security and Privacy Issues in Smart Grids," IEEE Communications Surveys & Tutorials, Vol. 14, NO. 4, pp. 981 - 997, Fourth Quarter 2012. DOI: 10.1109/SURV.2011.122111.00145

  38. Z. Xiao and Y. Xiao, "PeerReview re-evaluation for accountability in distributed systems or networks," International Journal of Security and Networks, Vol. 7, No. 1, 2012, pp. 40-58, DOI: 10.1504/IJSN.2012.048494

  39. D. Takahashi, Y. Xiao, and K. Meng, "Virtual Flow-net for Accountability and Forensics of Computer and Network Systems," (Wiley Journal of) Security and Communication Networks, Vol. 7, No. 12, pp. 2509–2526, Dec. 2014, DOI: 10.1002/sec.407.

  40. Y. Xiao, S. Yue, B. Fu, and S. Ozdemir, "GlobalView: Building Global View with Log Files in a Distributed / Networked System for Accountability," (Wiley Journal of) Security and Communication Networks,  Vol. 7, No. 12, pp. 2564–2586, Dec. 2014. DOI: 10.1002/sec.374.

  41. Y. Xiao, K. Meng, and D. Takahashi, “Accountability using Flow-net: Design, Implementation, and Performance Evaluation," (Wiley Journal of) Security and Communication Networks, Special Issue on Security and Privacy in Emerging Information Technologies, Vol.5, NO. 1, pp. 29–49, Jan. 2012, DOI: 10.1002/sec.348

  42. Y. Zhang, Y. Xiao, K. Ghaboosi, J. Zhang, and H. Deng, "A Survey of Cyber Crimes," (Wiley Journal of) Security and Communication Networks, Vol. 5, No. 4, pp. 422–437, Apr. 2012,  DOI: 10.1002/sec.331.

  43. Y. Zhang, Y. Xiao, M. Chen, J. Zhang, and H. Deng, "A Survey of Security Visualization for Computer Network Logs," (Wiley Journal of) Security and Communication Networks, Vol. 5, No. 4, pp. 404–421, Apr. 2012, DOI: 10.1002/sec.324.

  44. S. Ozdemir and Y. Xiao, "Integrity protecting hierarchical concealed data aggregation for wireless sensor networks," Computer Networks, Vol. 55, No. 8, June, 2011, pp.1735–1746, doi:10.1016/j.comnet.2011.01.006.

  45. Y. Xiao, D. Takahashi, J. Liu, and H. Deng, and J. Zhang, "Wireless Telemedicine and M-Health: Technologies, Applications, and Research issues," International Journal of Sensor Networks (IJSNet), Vol. 10, No. 4, 2011, pp. 202- 236.

  46. L. Liu, Y. Xiao, J. Zhang, A. Faulkner, and K. Weber, "Hidden Information in Microsoft Word," International Journal of Security and Networks (IJSN), Vol. 6, Nos. 2/3, 2011, pp. 123- 135.

  47. J. Liu, and Y. Xiao, “Temporal Accountability and Anonymity in Medical Sensor Networks,” ACM/Springer Mobile Networks and Applications (MONET), Special Issue: Wireless and Personal Communications, Vol. 16, No. 6, pp. 695-712, Dec. 2011, DOI: 10.1007/s11036-010-0254-6.

  48. A. Olteanu, Y. Xiao, F. Hu, B. Sun, and H. Deng, " A Lightweight Block Cipher Based on a Multiple Recursive Generator for Wireless Sensor Networks and RFID," Wireless Communications and Mobile Computing (WCMC) Journal, Special Issue: Network Security and Digital Forensics in Next Generation Communications, John Wiley & Sons, Vol. 11, No. 2, pp. 254–266, Feb. 2011, DOI: 10.1002/wcm.988

  49. D. Takahashi, Y. Xiao, Y. Zhang, P. Chatzimisios, and H.-H. Chen, "IEEE 802.11 User Fingerprinting and Its Applications," (Elsevier) Computers and Mathematics with Applications, Vol. 60, No. 2, July 2010, pp. 307-318. doi:10.1016/j.camwa.2010.01.002

  50. A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Transactions on Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037, DOI 10.1109/TWC.2009.12.090023

  51. A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Transactions on Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226. DOI: 10.1109/TWC.2010.01.081291

  52. J. Liu, Y. Xiao, H. Chen, S. Ozdemir, S. Dodle, and V. Singh, "A Survey of Payment Card Industry (PCI) Data Security Standard," IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, pp. 287-303, Third Quarter 2010, DOI: 10.1109/SURV.2010.031810.00083

  53. J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and, J. Zhang, "Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures," EURASIP Journal on Wireless Communications and Networking, Volume 2009, Article ID 692654, 11 pages, doi:10.1155/2009/692654

  54. Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37. DOI: 10.1109/MNET.2009.5274919

  55. K. Meng, Y. Xiao, and S. V. Vrbsky, "Building a Wireless Capturing Tool for WiFi," (Wiley Journal of) Security and Communication Networks, Vol. 2, No. 6, Nov./Dec. 2009, pp. 654 - 668, DOI 10.1002/sec.107

  56. B. Sun, G. Yan, Y. Xiao, and T. A. Yang, "Self-propagate Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications," (Elsevier) Ad Hoc Networks, Special Issue on Privacy and Security Wireless Sensor Networks and Ad Hoc Networks, , Vol. 7, No. 8, Nov. 2009, pp. 1489-1500, DOI: 10.1016/j.adhoc.2009.04.003

  57. S. Ozdemir and Y. Xiao, "Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview," Computer Networks, Vol. 53, No. 12, Aug. 2009, pp. 2022–2037, doi:10.1016/j.comnet.2009.02.023

  58. H. Chen, Y. Xiao, X. Hong, F. Hu, J. Xie, "A Survey of Anonymity in Wireless Communication Systems," (Wiley Journal) Security and Communication Networks, Vol. 2 No. 5, Sept./Oct., 2009, pp. 427–444, DOI: 10.1002/sec.78

  59. Y. Xiao, H. Chen, X. Du, and M. Guizani, ”Stream-based Cipher Feedback Mode in Wireless Error Channels,” IEEE Transactions on Wireless Communications, Vol.8, No.2, Feb. 2009, pp. 622-626. DOI: 10.1109/TWC.2009.071278

  60. F. Hu, K. Wilhelm, M. Schab, M. Lukowiak, S. Radziszowski, and Y. Xiao, "NTRU-based Sensor Network Security: A Low-power Hardware Implementation Perspective," (Wiley Journal) Security and Communication Networks, Vol. 2, No. 1, pp. 71 - 81, Jan./Feb. 2009, DOI: 10.1002/sec.39

  61. B. Sun, Y. Xiao, C. –C. Li, H. Chen, and T. A. Yang, “Security Co-existence of Wireless Sensor Networks and RFID for Pervasive Computing,” Computer Communications Journal, Elsevier, Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing, Vol. 31, No. 18, Dec. 2008, pp. 4294–4303. doi:10.1016/j.comcom.2008.05.035

  62. M. Lei, Y. Xiao, S. V. Vrbsky, and C.-C. Li, “Virtual Password Using Random Linear Functions for On-line Services, ATMs, and Pervasive Computing,” Computer Communications Journal, Elsevier, Special Issue on Secure Multi-Mode Systems and their Applications for Pervasive Computing, Vol. 31, No. 18, Dec. 2008, pp. 4367–4375. doi:10.1016/j.comcom.2008.05.005.

  63. F. Hu, D. Dong, and Y. Xiao, "Attacks and Countermeasures in Multi-hop Cognitive Radios Networks," International Journal of Security and Networks, Vol. 4, No. 4, 2009, pp. 263-271.

  64. F. Hu, L. Celentano, and Y. Xiao, "Error-Resistant RFID-Assisted Wireless Sensor Networks for Cardiac Tele-healthcare," (Wiley) Wireless Communications and Mobile Computing (WCMC), John Wiley & Sons, Vol. 9, No. 1, pp. 85-101, Jan. 2009. DOI: 10.1002/wcm.607.

  65. D. Takahashi and Y Xiao, “Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability,” (Wiley Journal) Security and Communication Networks, Vol. 1, No. 2, pp. 147-160, March/April 2008, DOI: 10.1002/sec.10.

  66. Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks, Vol. 46, No. 4, Apr. 2008, pp. 116-126. 10.1109/MCOM.2008.4481350

  67. F. Hu, M. Jiang, L. Celentano, and Y. Xiao, “Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining,” (Elsevier) Ad Hoc Networks, Vol. 6, No. 7, pp. 986-1012, Sep. 2008. doi:10.1016/j.adhoc.2007.09.002.

  68. F. Hu, Y. Malkawi, S. Kumar, and Y. Xiao, “Vertical and Horizontal Synchronization Services with Outlier Detection in Underwater Sensor Networks," (Wiley) Wireless Communications and Mobile Computing (WCMC), John Wiley & Sons, Vol. 8, No. 9, Nov. 2008, pp. 1165 - 1181, DOI: 10.1002/wcm.559.

  69. Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer communications Journal, Special issue on Security on Wireless Ad Hoc and Sensor Networks, Vol. 30 No. 11-12, Sep. 2007. pp. 2314–2341.

  70. B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Communications Magazine, Special Issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Oct. 2007, pp. 56-63.

  71. X. Du, M. Guizani, Y. Xiao, and H. Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks," IEEE Transactions on Wireless Communications, Vol.8, No.3, Mar. 2009, pp. 1223-1229. DOI: 10.1109/TWC.2009.060598

  72. B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923.

  73. X. Du, M. Guizani, Y. Xiao, and H. Chen, "Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2387-2394.

  74. X. Du, M. Guizani, Y. Xiao, and H. Chen, “Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 6, No. 9, Sep. 2007, pp. 3395-3401.

  75. Y. Xiao, Y.-B. Lin, and D.-Z. Du, “Wireless Network Security,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 48374, 2 pages, 2006. doi:10.1155/WCN/2006/48374.

  76. Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, “MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 93830, 12 pages, 2006. doi:10.1155/WCN/2006/93830.

  77. B. Sun, K. Wu, Y. Xiao, and R. Wang, "Integration of mobility and intrusion detection for wireless Ad Hoc networks," (Wiley) International Journal of Communication Systems, Vol. 20, No. 6, pp. 695-721, Jun. 2007.

  78. K. Wu, D. Dreef, B. Sun, and Y. Xiao, "Secure Data Aggregation without Persistent Cryptographic Operations in Wireless Sensor Networks," (Elsevier) Ad Hoc Networks, special issue on Security in Ad Hoc and Sensor Networks, Vol. 5, No. 1, Jan. 2007, pp.100–111.

  79. X. Du , Y. Xiao, M. Guizani, and H. Chen, "An effective key management scheme for heterogeneous sensor networks," (Elsevier) Ad Hoc Networks, special issue on Security in Ad Hoc and Sensor Networks, Vol. 5, No. 1, Jan. 2007, pp.24–34.

  80. B. Sun, C. Li, K. Wu, and Y. Xiao, "A Lightweight Secure Protocol for Wireless Sensor Networks," Computer Communications Journal, special issue on Wireless Sensor Networks: Performance, Reliability, Security and Beyond, Vol. 29, Nos.13-14, Aug. 2006, pp. 2556-2568.

  81. Y. Xiao, S. Yu, K. Wu, Q. Ni, C. Janecek, and J. Nordstad, "Radio Frequency Identification: Technologies, Applications, and Research Issues," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 7, No. 4, May 2007, pp.457-472.

  82. W. Stewart, Y. Xiao, B. Sun, and H. Chen, "Security Mechanisms and Vulnerabilities in the IEEE 802.15.3 Wireless Personal Area Networks," International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems, Vol. 2, No. 1, 2007, pp. 14-27.

  83. Y. Xiao, C. Bandela, X. Du, Y. Pan, and K. Dass, “Security Mechanisms, Attacks, and Security Enhancements for the IEEE 802.11 WLANs,” International Journal of Wireless and Mobile Computing, Vol. 1, Nos. 3/4, 2006, pp. 276-288.

  84. B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.

  85. X. Du, Y. Xiao, H. Chen, and Q. Wu, "Secure Cell Relay Routing Protocol for Sensor Networks," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Special issue on Wireless Network Security, Vol. 6, No. 3, May 2, 2006, Pages 375 - 391.

  86. Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine," IEEE Communications Magazine, Special issue on Quality Assurance and Devices in Telemedicine, Vol. 44. No. 4, Apr. 2006, pp. 64-72. DOI: 10.1109/MCOM.2006.1632651

Selected Papers in Smart Grids and Renewable Energy Systems

Selected Papers in Telemedicine

Selected Papers in Bio-inspired Computing and Networking

Selected Papers in Accountability

Selected Recent Conference Papers

  1. W. Han and Y. Xiao, ,"Big Data Security Analytic for Smart Grid with Fog Nodes," Proc.of SpaCCS 2016.

  2. W. Han and Y. Xiao, " Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid,” Proc. of ICCCS2016.

  3. W. Han and Y. Xiao, "Combating TNTL: Non-Technical Loss Fraud Targeting Time-based Pricing in Smart Grid,” Proc. of ICCCS2016.

  4. W. Han and Y. Xiao, "CO2: Design Fault-tolerant Relay Node Deployment Strategy for Throwbox-based DTNs" Proc. of WASA 2016.

  5. W. Han and Y. Xiao, "CNFD: A Novel Scheme to Detect Colluded Non-Technical Loss Fraud in Smart Grid," Proc. of WASA 2016.

  6. W. Han and Y. Xiao, "FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart Grid, " Proc. of WTMC 2016 injunction with AsiaCCS 2016.

  7. E. McCary and Y. Xiao, "Malicious Device Inspection in the HAN Smart Grid," Proc. of SAM'14.

  8. E. McCary and Y. Xiao, "Smart Grid HAN Accountability with Varying Consumption Devices," Proc. of SAM'14.

  9. W. Han and Y. Xiao, "NFD: A Practical Scheme to Detect Non-Technical Loss Fraud in Smart Grid," Proc. of IEEE ICC 2014. 

  10. B. Fu and Y. Xiao, "A Multi-Resolution Flow-Net Methodology for Accountable Logging and Its Application in TCP/IP Networks," Proc. of IEEE ICC 2014.

  11. Y. Zhang and Y. Xiao, "Digital Pheromone Based Patrolling Algorithm in Wireless Sensor and Actuator Networks," Proc. IEEE CCNC 2013, pp. 496-501.

  12. B. Fu and Y. Xiao, "Group Size Studies for Collaborated Sensors/Robots," Proc. IEEE CCNC 2013, pp.502-507.

  13. J. Gao and Y. Xiao, "ProtoGENI DoS/DDoS Security Tests and Experiments," Proc. of GREE12, in conjunction with GENI GEC 13.

  14. J. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and Access Control in the Internet of Things," Proc. of IEEE ICDCSW 2012.

  15. H. Zeng, K. Kwak, J. Deng, B. Fu, Y. Xiao, and J. Jeski, "Proactive and adaptive reconfiguration for reliable communication in tactical networks," Proc. of SPIE DSS 2012.

  16. B. Fu and Y. Xiao, "Q-Accountable: A Overhead-based Quantifiable Accountability in Wireless Networks," Proc. of IEEE IEEE CCNC 2012, pp. 138-142.

  17. S. Ozdemir and Y. Xiao, "'Polynomial Regression Based Secure Data Aggregation for Wireless Sensor Networks," Proc. of IEEE GLOBECOM 2011.

  18. Z. Xiao, Y. Xiao, and D. Du, "Building Accountable Smart Grids in Neighborhood Area Networks," Proc. of IEEE GLOBECOM 2011.

  19. L. Zeng, H. Chen, and Y. Xiao, "Accountable Administration and Implementation in Operating Systems," Proc.of IEEE GLOBECOM 2011.

  20. Y. Zhang and Y. Xiao, "A Patrolling Scheme in Wireless Sensor and Robot Networks," Proc. of INFOCOM WKSHPS, 2011.

  21. S. Ozdemir and Y. Xiao, "Outlier Detection Based Fault Tolerant Data Aggregation for Wireless Sensor Networks," Proc. of AICT2011.

  22. Z. Xiao and Y. Xiao, "Accountable MapReduce in Cloud Computing," Proc. of INFOCOM WKSHPS, 2011.

  23. N. Kathiresshan, Z. Xiao, and Y. Xiao, "EagleEye: A Logging Framework for Accountable Distributed and Networked Systems," Proc. of INFOCOM WKSHPS, 2011.

  24. J. Gao, Y. Xiao, S. Rao, and F. Shalini, "Security Tests of ProtoGENI and Attack Experimentations," Proc. of ICSST 2011, pp. 186-190.

  25. J. Liu, Y. Xiao, and J. Gao, "Accountability in Smart Grids," Prof. of IEEE CCNC 2011, Smart Grids Special Session.

  26. M. Peng, Y. Xiao, H. Chen, Q. Hao, A. V. Vasilakos, and J. Wu, "Sensor Distribution on Coverage in Sensor Networks," Proc. of Qshine 2010.

  27. A. Olteanu, Y. Xiao, J. Liu, and T. M. Chen, "Studying Non-intrusive Tracing in the Internet," Proc. of Qshine 2010.

  28. D. Takahashi, Y. Xiao, and K. Meng, "Creating User-Relationship-Graph in Use of Flow-net and Log Files for Computer and Network Accountability and Forensics," Proc. of IEEE MILCOM 2010.

  29. Y. Xiao, K. Meng, and D. Takahashi, "Implementation and Evaluation of Accountability using Flow-net in Wireless Networks," Proc. of IEEE MILCOM 2010.

  30. X. Liang, Y. Xiao, T. Vasilakos, H. Deng, and K. Meng, "CFB under Sliding-Window Protocols in Error Channels," Proc. of IEEE MILCOM 2010.

  31. B. Fu and Y. Xiao, "An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks," Proc. of IEEE GLOBECOM 2010.

  32. M. Peng and Y. Xiao, "Signature Maximization in Designing Wireless Binary Pyroelectric Sensors," Proc. of IEEE GLOBECOM 2010.

  33. Z. Xiao, Y. Xiao, and J. Wu, “A Quantitative Study of Accountability in Wireless Multi-hop Networks,” Proc. of ICPP 2010.

  34. J. Deng, K. Meng, Y. Xiao, and R. Xu, "Implementation of DoS Attack and Mitigation Strategies in IEEE 802.11b/g WLAN," Proc. of SPIE DSS 2010.

  35. Z. Xiao and Y. Xiao, "P-Accountable Networked Systems," Proceeding of INFOCOM 2010, Work in Progress (WIP) Track.

  36. Z. Xiao and Y. Xiao, "PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks," Proc. of ISA2010, CCIS 76, pp. 149–162, 2010.

  37. X. Liang and Y. Xiao, “Bio-inspired True Coalition Formation on Intrusion Detection by Mobile Robots,” Proc. of CollaborateCom09.

  38. M. Li, H. Zhu, Y. Xiao, I. Chlamtac, and B. Prabhakaran, "Adaptive Frame Concatenation Mechanisms for QoS in Multi-rate Wireless Ad Hoc Networks," Proc. of IEEE INFOCOM 2008.

  39. Y. Xiao, H. Li, and S. Choi, “Protection and Guarantee for Voice and Video Traffic in IEEE 802.11e Wireless LANs,” Proc. of IEEE INFOCOM 2004, pp. 2153-2163. (PDF) (extension of the paper was accepted by ACM/Springer Wireless Networks).

  40. Y. Xiao, “An Analysis for Differentiated Services in IEEE 802.11 and IEEE 802.11e Wireless LANs,” Proc. of IEEE ICDCS 2004, pp. 32-39. (extension of the paper was published by IEEE Transactions on Wireless Communications).

  41. J. Li, Y. Pan, and Y. Xiao, “A Dynamic HLR Scheme for Location Management in PCS Networks,” Proc. of IEEE INFOCOM 2004, pp. 266-276.

Selected Books  (Book-Promotion)

                                                                       

 

More Publications

  1. Publications by venues (Journals, books, Conferences, book chapters, etc.)
  2. Publications by categories
  3. Publications by areas
  4. Publication Statistics
  5. Security publications by areas