W4-NET  Lab Publications

Dr. Xiao's research areas include security and wireless networks. He has published more than 300 SCI-indexed journal papers (including 60+ IEEE transactions papers) and over 300 refereed conference papers and book chapters related to these research areas. 

Selected recent Papers

  1. T. Mahjabin, Yang Xiao, T. Li, and M. Guizani, "Hotlist and Stale Content Update Mitigation in Local Databases for DNS Flooding Attacks," Telecommunication Systems, accepted, Aug. 2022. DOI: 10.1007/s11235-022-00950-x
  2. A. Olteanu, L. Luo, Y. Xiao, and W. Liang, "Optimal Design for Modulated Binary Sensors," IEEE Sensors Journal, Vol. 22, No. 17, pp. 17224-17233, Sep. 1, 2022, DOI: 10.1109/JSEN.2022.3193628
  3. X. Xia, Y. Xiao, W. Liang, and J. Cui, "Detection Methods in Smart Meters for Electricity Thefts: A Survey," Proceedings of the IEEE, Vol. 110, No. 2, pp. 273-319, Feb. 2022, DOI: 10.1109/JPROC.2021.3139754.
  4. X. Xia, Y. Liu, Y. Xiao, J. Cui, B. Yang, and Y. Peng, "AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening against COVID-19," IEEE Transactions on Automation Science and Engineering, Vol. 19, No. 2, pp. 646-662, April 2022, doi: 10.1109/TASE.2021.3131585.
  5. X. Xia, J. Lin, Y. Xiao, J. Cui, Y. Peng, and Y. Ma, "A Control Chart based Detector for Small-amount Electricity Theft (SET) Attack in Smart Grids," IEEE Internet of Things Journal, accepted. Sept. 2021. DOI: 10.1109/JIOT.2021.3113348
  6. Y. Yang, Y. Xiao, and T. Li, "Attacks on Formation Control for Multi-agent Systems," IEEE Transactions on Cybernetics, accepted, June 2021. DOI: 10.1109/TCYB.2021.3089375
  7.  H. Addeen, Y. Xiao, J. Li, and M. Guizani, "A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems" IEEE Access, Vol.9, 2021, pp: 99905-99921. DOI: 10.1109/ACCESS.2021.3095713
  8. C. Pei, Y. Xiao, W. Liang, and X. Han, "Detecting False Data Injection Attacks using Canonical Variate Analysis in Power Grid," IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 971-983, APRIL-JUNE 2021. DOI: 10.1109/TNSE.2020.3009299
  9. Y. Yang, Y. Xiao, and T. Li, "A Survey of Autonomous Underwater Vehicle Formation: Performance, Formation Control, and Communication Capability," IEEE Communications Surveys & Tutorials, Vol. 23, No. 2, pp. 815-841, Second Quarter 2021. DOI: 10.1109/COMST.2021.3059998
  10.  L. Luo, Y. Xiao, and W. Liang, "The Maximum Number of Cells with Modulated Binary Sensors," IEEE Sensors Journal, Vol. 21, No. 9, pp. 11061-11074, May 1, 2021, DOI: 10.1109/JSEN.2021.3060059
  11. C. Pei, Y. Xiao, W. Liang, and X. Han, "A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid," in IEEE Access, Vol. 9, pp. 15499-15509, 2021, DOI: 10.1109/ACCESS.2021.3051155.
  12. J. Wang, Y. Xiao, T. Li, and C. L. P. Chen, "A Survey of Technologies for Unmanned Merchant Ships," IEEE Access, Vol. 8, 2020, pp. 224461-224486. DOI: 10.1109/ACCESS.2020.3044040
  13.  C. Pei, Y. Xiao, W. Liang, and X. Han, "PMU Placement Protection against Coordinated False Data Injection Attacks in Smart Grid," IEEE Transactions on Industry Applications, Vol. 56, No. 4, JULY/AUGUST 2020, pp. 4381-4393, DOI: 10.1109/TIA.2020.2979793. Special Issue of Security, Reliability, Privacy, and Quality in Industrial Automation and Control.
  14. X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Group Testing based Heuristic Inspection Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, Vol. 7, No. 2, pp.805-816, APRIL-JUNE 2020, DOI: 10.1109/TNSE.2018.2855139
  15. F. Okay, S. Ozdemir and Y. Xiao, "Fog Computing Based Privacy Preserving Data Aggregation Protocols," Transactions on Emerging Telecommunications Technologies, Vol. 31, no. 4, April 2020, e3900, DOI: 10.1002/ett.3900
  16. W. Han and Y. Xiao, "Edge Computing Enabled Non-Technical Loss Fraud Detection for Big Data Security Analytic in Smart Grid," Journal of Ambient Intelligence and Humanized Computing, Vol. 11, No. 4, Apr. 2020, pp. 1697-1708, DOI: 10.1007/s12652-019-01381-4.
  17. L. Luo, Y. Xiao, W. Liang, and M. Zheng, “A Cell Reconstruction Tool to Deploy Binary Pyroelectric Sensor Arrays", IEEE Sensors Journal, Vol. 20, No. 4, Feb. 15, 2020, pp.2117-2131, DOI: 10.1109/JSEN.2019.2950018
  18. X. Xia, Y. Xiao, and W. Liang, "SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 361-374, 2020. DOI: 10.1109/TIFS.2019.2921232
  19. X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 14, No. 2, Feb. 2019, pp. 445-458. DOI: 10.1109/TIFS.2018.2854703

Selected IEEE/ACM Transactions Papers

  1. H. Yang, T. Li, Y. Long, C. L. P. Chen, and Y. Xiao, "Distributed Virtual Inertia Implementation of Multiple Electric Springs Based on Model Predictive Control in DC Microgrids", IEEE Transactions on Industrial Electronics, Vol. 69, No. 12, pp. 13439-13450, Dec. 2022. DOI: 10.1109/TIE.2021.3130332

  2. X. Xia, Y. Liu, Y. Xiao, J. Cui, B. Yang, and Y. Peng, "AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening against COVID-19," IEEE Transactions on Automation Science and Engineering, Vol. 19, No. 2, pp. 646-662, April 2022, doi: 10.1109/TASE.2021.3131585.

  3. L. Yuan, T. Li, S. Tong, Y. Xiao, and Q. Shan, "Broad Learning System Approximation-Based Adaptive Optimal Control for Unknown Discrete-Time Nonlinear Systems", IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 52, No. 8, Aug. 2022, pp. 5028-5038, DOI: 10.1109/TSMC.2021.3113357

  4. Y. Yang, Y. Xiao, and T. Li, "Attacks on Formation Control for Multi-agent Systems," IEEE Transactions on Cybernetics, accepted, June 2021. DOI: 10.1109/TCYB.2021.3089375

  5. C. Pei, Y. Xiao, W. Liang, and X. Han, "Detecting False Data Injection Attacks using Canonical Variate Analysis in Power Grid," IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 971-983, APRIL-JUNE 2021. DOI: 10.1109/TNSE.2020.3009299

  6. C. Pei, Y. Xiao, W. Liang, and X. Han, "PMU Placement Protection against Coordinated False Data Injection Attacks in Smart Grid," IEEE Transactions on Industry Applications, Vol. 56, No. 4, JULY/AUGUST 2020, pp. 4381-4393, DOI: 10.1109/TIA.2020.2979793

  7. X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Group Testing based Heuristic Inspection Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, Vol. 7, No. 2, pp.805-816,APRIL-JUNE 2020, DOI: 10.1109/TNSE.2018.2855139

  8. X. Xia, Y. Xiao, and W. Liang, "SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 361-374, 2020. doi: 10.1109/TIFS.2019.2921232

  9. S. Li, Y. Sun, M. Ramezani, and Y. Xiao, "Artificial Neural Networks for Volt/VAR Control of DER Inverters at the Grid Edge," IEEE Transactions on Smart Grid, Vol. 10, No. 5, Sept. 2019. pp. 5564-5573. DOI: 10.1109/TSG.2018.2887080

  10. X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, Vol. 14, No. 2, Feb. 2019, pp. 445-458. DOI: 10.1109/TIFS.2018.2854703

  11. B. Fu, Y. Xiao, X. Liang, and C. L. P. Chen, "Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks," IEEE Transactions on Cybernetics (previously IEEE Transactions on Systems, Man, and Cybernetics, Part B), Vol. 45, No. 1, pp. 103 - 115, Jan. 2015. DOI: 10.1109/TCYB.2014.2320717.
    The video demos can be found: Group-Size Video.

  12. Z. Xiao, Y. Xiao, and D. Du, "Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids," IEEE Transactions on Smart Grid, Vol. 4, No. 1, Mar. 2013, pp. 214-226. DOI: 10.1109/TSG.2012.2229397.

  13. Y. Xiao, M. Peng, J. Gibson, G. G. Xie, D. Du, and T. Vasilakos, "Tight Performance Bounds of Multi-hop Fair-Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 10, Oct. 2012, pp. 1538-1554, DOI: 10.1109/TMC.2011.190

  14. Y. Xiao, H. Chen, M. Guizani, and H. Chen, "Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks," IEEE Transactions on Mobile Computing, Vol. 11, No. 9, Sep. 2012, pp. 1532-1544. DOI: 10.1109/TMC.2011.166

  15. Y. Xiao, Y. Zhang, and X. Liang, "Primate-inspired Communication Methods for Mobile and Static Sensors and RFID Tags," ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4, Article 26, pp. 26:1-26:37, Dec. 2011, DOI 10.1145/2019591.2019595.

  16. J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun, "Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks," IEEE Transactions on Industrial Electronics, Vol. 57, No. 12, Dec. 2010, pp. 4219-4230, DOI: 10.1109/TIE.2010.2043038

  17. X. Cao, J. Chen, Y. Xiao, Y. Sun, "Building Environment Control with Wireless Sensor and Actuator Networks: Centralized vs. Distributed,” IEEE Transactions on Industrial Electronics, Vol. 57, No. 11, Nov. 2010,  pp. 3596-3605, DOI: 10.1109/TIE.2009.2029585

  18. X. Liang and Y Xiao, "Studying Bio-inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory," IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory, Vol. 40, No. 3, June 2010, pp. 683-693. DOI: 10.1109/TSMCB.2009.2034976 (acceptance rate =10%)

  19. A. Olteanu, Y. Xiao, K. Wu, and X. Du, “Weaving a Proper Net to Catch Large Objects in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 9, No. 4, Apr. 2010, pp. 1360-1369. DOI: 10.1109/TWC.2010.081098.

  20. Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, and C. Liu, "Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks," IEEE Transactions on Computers, Vol. 59, No. 4, Apr. 2010, pp. 507-521, DOI: 10.1109/TC.2009.170.

  21. I. Tinnirello, G. Bianchi, and Y. Xiao, “Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches,IEEE Transactions on Vehicular Technology, Vol. 59, No. 3, Mar. 2010, pp. 1055-1067, DOI: 10.1109/TVT.2009.2029118

  22. A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Transactions on Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226. DOI: 10.1109/TWC.2010.01.081291

  23. A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Transactions on Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037, DOI 10.1109/TWC.2009.12.090023

  24. M. Peng, Y. Xiao, and P. Wang, "Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.5105-5114, DOI: 10.1109/TVT.2009.2027908

  25. M. Chen, V. Leung, S. Mao, Y. Xiao, and I. Chlamtac, “Hybrid Geographical Routing for Flexible Energy-Delay Trade-offs," IEEE Transactions on Vehicular Technology, Vol. 58, No. 9, Nov. 2009, pp.4976-4987, DOI: 10.1109/TVT.2009.2025767

  26. K. Ghaboosi, M. Latva-aho, Y. Xiao, and Q. Zhang, “eMAC—A Medium-Access Control Protocol for the Next-Generation Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 8, Oct. 2009, pp. 4476-4490. DOI: 10.1109/TVT.2009.2018620

  27. K. Ghaboosi, M. Latva-aho, Y. Xiao, and B. Khalaj, “Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3518-3532. DOI: 10.1109/TVT.2008.2012158

  28. Y. Xiao, H. Chen, X. Du, Y. Zhang, H. Chen, and M. Guizani, "On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks," IEEE Transactions on Wireless Communications, Vol. 8, No. 9, Sept. 2009, pp. 4406-4410, DOI: 10.1109/TWC.2009.080717.

  29. Y. Zhang, Y. Xiao and V. C.M. Leung, "Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN," IEEE Transactions on Vehicular Technology, Vol. 58, No. 7, Sept. 2009, pp. 3738-3752. DOI: 10.1109/TVT.2009.2014383

  30. T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, "Aggregation with Fragment Retransmission for Very High-Speed WLANs," IEEE/ACM Transactions on Networking, Vol. 17, No. 2, Apr. 2009, pp.591-604. DOI: 10.1109/TNET.2009.2014654

  31. X. Du, M. Guizani, Y. Xiao, and H. Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks," IEEE Transactions on Wireless Communications, Vol.8, No.3, Mar. 2009, pp. 1223-1229. DOI: 10.1109/TWC.2009.060598

  32. Y. Xiao, H. Chen, X. Du, and M. Guizani, ”Stream-based Cipher Feedback Mode in Wireless Error Channels,” IEEE Transactions on Wireless Communications, Vol.8, No.2, Feb. 2009, pp. 622-626. DOI: 10.1109/TWC.2009.071278

  33. Y. Zhang, Y. Xiao and H. Chen, “Queueing Analysis for OFDM Subcarrier Allocation in Broadband Wireless Multiservice Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 10, Oct. 2008, pp. 3951- 3961.

  34. K. Ghaboosi, B. Khalaj, Y. Xiao, and M. Latva-aho, "Modeling IEEE 802.11 DCF using Parallel Space – Time Markov Chain," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2404-2413.

  35. X. Du, M. Guizani, Y. Xiao, and H. Chen, "Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks," IEEE Transactions on Vehicular Technology, Vol. 57, No. 4, Jul. 2008, pp. 2387-2394.

  36. R. Li, J. Li, K. Wu, Y. Xiao, and L. Xie, "An Enhanced Fast Handover with Low Latency for Mobile IPv6," IEEE Transactions on Wireless Communications, Vol. 7, No. 1, Jan. 2008, pp. 334-342.

  37. H. Chen and Y. Xiao, “On-Bound Selection Cache Replacement Policy for Wireless Data Access,” IEEE Transactions on Computers, Vol. 56, No. 12, Dec. 2007, pp. 1597-1611.

  38. B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923.

  39. Y. Xiao, H. Chen, and M. Guizani, “Non-blocking Pipeline Paging with Known Location Probabilities for Wireless Systems,” IEEE Transactions on Wireless Communications, Vol. 6, No. 10, Oct. 2007, pp.3632-3640.

  40. Y. Xiao, H. Chen, X. Du, and M. Guizani, "Performance Analysis of Blanket Paging, Sequential Probability Paging, and Pipeline Probability Paging for Wireless Systems," IEEE Transactions on Vehicular Technology, Vol. 56, No. 5, Sep. 2007, pp. 2745-2755.

  41. X. Du, M. Guizani, Y. Xiao, and H. Chen, “Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 6, No. 9, Sep. 2007, pp. 3395-3401.

  42. Y. Xiao, H. Li, and B. Li, "Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-based WLANs,” IEEE Transactions on Mobile Computing, Vol. 6, No. 7, July 2007, pp. 815-831.

  43. Y. Xiao, H. Chen, H. Chen, B. Sun, and P. Chen, “Optimal Utilization in Mobile Database Failure Restoration,” IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2086-2095.

  44. H. Chen, C. Tsai, M. Guizani, Y. Xiao, R. Fantacci, and H. Sharif, "Pulse Waveform Dependent BER Analysis of DS-CDMA UWB Radio under Multiple Access and Multipath Interferences," IEEE Transactions on Wireless Communications, Vol. 6, No. 6, June 2007, pp. 2338-2347.

  45. H. Chen, Y. Xiao, and X. Shen, “Update-based Cache Access and Replacement in Wireless Data Access,“ IEEE Transactions on Mobile Computing, Vol. 5, No. 12, Dec. 2006, pp.1734-1748.

  46. Y. Xiao and H. Chen, “Optimal Callback with Two-Level Adaptation for Wireless Data Access,” IEEE Transactions on Mobile Computing, Vol. 5, No. 8, Aug. 2006. pp. 1087-1102.

  47. Y. Xiao and M. Guizani, “Optimal Paging Load Balance with Total Delay Constraint in Macrocell-Microcell Hierarchical Cellular Networks,” IEEE Transactions on Wireless Communications, Vol.5, No. 8, Aug. 2006, pp. 2202-2209.

  48. B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.

  49. Y. Xiao, H. Li, K. Wu, K. K. Leung, and Q. Ni, "On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE 802.11 Distributed Wireless LANs," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 7, July 2006, pp. 713-722.

  50. L. Cai, X. Shen, J. W. Mark, L. Cai, and Y. Xiao, “Voice Capacity Analysis of WLAN with Unbalanced Traffic,” IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, May 2006, pp.752-761.

  51. C. Liu, K. Wu, Y. Xiao, and B. Sun,"Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. 

  52. Y. Xiao and H. Chen, “Optimal Periodic Location Area Update for Mobile Telecommunications Networks,” IEEE Transactions on Wireless Communications, Vol. 5, No. 4, April 2006, pp. 930-937.

  53. Y. Xiao, H. Chen, and M. Guizani, "Performance Evaluation of Pipeline Paging under Paging Delay Constraint for Wireless Systems," IEEE Transactions on Mobile Computing, Vol. 5, No. 1, Jan. 2006, pp. 64-76.

  54. Y. Xiao, "IEEE 802.11 Performance Enhancement via Concatenation and Piggyback Mechanisms," IEEE Transactions on Wireless Communications, Vol. 4, No. 5, Sep. 2005, pp. 2182- 2192. 

  55. Y. Xiao, "Performance Analysis of Priority Schemes for IEEE 802.11 and IEEE 802.11e Wireless LANs," IEEE Transactions on Wireless Communications, Vol. 4, No. 4, Jul. 2005. pp.1506- 1515. 

  56. Y. Xiao and Y. Pan, “Differentiation, QoS guarantee, and Optimization for Real-time Traffic over One-hop Ad Hoc Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 65, June 2005, pp. 538-549.

  57. Y. Xiao and  H. Li, "Voice and Video Transmissions with Global Data Parameter Control for the IEEE 802.11e Enhance Distributed Channel Access,”  IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 11, Nov. 2004, pp.1041-1053.

  58. Y. Xiao, H. Li, Y. Pan, K. Wu, and J. Li, "On Optimizing Energy Consumption for Mobile Handsets,” IEEE Transactions on Vehicular Technology, Vol. 53, No. 6, Nov. 2004, pp. 1927-1941.

  59. Y. Xiao and  H. Li, "Local Data Control and Admission Control for Ad Hoc Wireless Networks,”  IEEE Transactions on Vehicular Technology,  Vol. 53, No. 5, Sep. 2004, pp.1558-1572. (PDF)

  60. Y. Xiao, Y. Pan, and J. Li, "Design and Analysis of Location Management for 3G Cellular Networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 4, Apr. 2004, pp. 339-349.

  61.  Y. Xiao, Y. Fang, and Y.-B. Lin, "Hierarchical Implicit Deregistration with Forced Registrations in 3G Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, Jan. 2004, pp. 271-278.

 

More Publications

  1. Publications by venues (Journals, books, Conferences, book chapters, etc.)
  2. Publications by categories
  3. Publications by areas
  4. Publication Statistics
  5. Security publications by areas