112 Publications (Page 2 of 5)
2013
An update-based step-wise optimal cache replacement for wireless data accessChen, Hui⋅Xiao, Yang and Vrbsky, Susan VComputer Networks, vol. 57, (no. 1), Jan 16, 2013.
| Journal Article
Game Theory for Network Security
Liang, Xiannuan and Xiao, Yang
IEEE Communications Surveys & Tutorials, vol. 15, (no. 1), pp. 472-486, 2013. | Journal Article
Internet of things' authentication and access control
Liu, Jing⋅Xiao, Yang and Chen, CLPhilip
International Journal of Security and Networks, vol. 7, (no. 4), pp. 228-241, 2013. | Journal Article
Non-repudiation in neighborhood area networks for smart grid
Xiao, Zhifeng⋅Xiao, Yang and Du, David H
IEEE Communications Magazine, vol. 51, (no. 1), pp. 18-26, 2013. | Journal Article
Stochastic event capturing with a single mobile robot in rectangular perimeters
Liang, Xiannuan⋅Xiao, Yang⋅Zhang, Jingyuan⋅Deng, Hongmei and Vasilakos, Athanasios V
Telecommunication Systems: Modeling, Analysis, Design and Management, vol. 52, (no. 4), pp. 2519-2532, 2013. | Journal Article
2011
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID
Olteanu, Alina⋅Xiao, Yang⋅Hu, Fei⋅Sun, Bo and Deng, Hongmei
Wireless Communications and Mobile Computing, vol. 11, (no. 2), pp. 254-266, 2011. | Journal Article
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags
Xiao, Yang and Zhang, Yanping
Wireless Communications and Mobile Computing, vol. 11, (no. 7), pp. 964-979, 2011. | Journal Article
Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
Ozdemir, Suat and Xiao, Yang
Computer Networks, vol. 55, (no. 8), pp. 1735-1746, 2011. | Journal Article
Survey and experiments of WIA-PA specification of industrial wireless network
Liang, Wei⋅Zhang, Xiaoling⋅Xiao, Yang⋅Wang, Fuqiang⋅Zeng, Peng and Yu, Haibin
Wireless Communications and Mobile Computing, vol. 11, (no. 8), pp. 1197-1212, 2011. | Journal Article
Temporal Accountability and Anonymity in Medical Sensor Networks
Liu, Jing and Xiao, Yang
Mobile Networks and Applications, vol. 16, (no. 6), pp. 695-712, Dec 2011. | Journal Article
Wireless telemedicine and m-health: technologies, applications and research issues
Xiao, Yang⋅Takahashi, Daisuke⋅Liu, Jing⋅Deng, Hongmei and Zhang, Jingyuan
International Journal of Sensor Networks, vol. 10, (no. 4), pp. 202-236, 2011. | Journal Article
2010
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor NetworksXiao, Yang⋅Xiao, Yang⋅Chen, Hui⋅Chen, Hui⋅Wu, Kui⋅Wu, Kui⋅Sun, Bo⋅Sun, Bo⋅Zhang, Ying⋅Zhang, Ying⋅Sun, Xinyu⋅Sun, Xinyu⋅Liu, Chong and Liu, ChongIEEE Transactions on Computers, vol. 59, (no. 4), pp. 507-521, 2010.
| Journal Article
Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and Routing
Zheng, Meng⋅Liang, Wei⋅Yu, Haibin and Xiao, Yang
Computer Journal, vol. 53, (no. 10), pp. 1632-1642, 2010. | Journal Article
Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks
Chen, Jiming⋅Cao, Xianghui⋅Cheng, Peng⋅Xiao, Yang and Sun, Youxian
IEEE Transactions on Industrial Electronics, vol. 57, (no. 12), pp. 4219-4230, 2010. | Journal Article
Dynamic bandwidth partition schemes for integrated voice, video, and data traffic in the IEEE 802.11e distributed wireless LANsXiao, Yang⋅Li, Frank Haizhon⋅Li, Ming⋅Zhang, Jingyuan and Li, BoInternational Journal of Communication Systems, vol. 23, (no. 3), pp. 391-412, 2010.
| Journal Article
Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches
Tinnirello, Ilenia⋅Bianchi, Giuseppe and Xiao, Yang
IEEE Transactions on Vehicular Technology, vol. 59, (no. 3), pp. 1055-1067, 2010. | Journal Article
Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs
Olteanu, Alina and Xiao, Yang
IEEE Transactions on Wireless Communications, vol. 9, (no. 1), pp. 218-226, 2010. | Journal Article
Special issue on "security for multimedia and ubiquitous applications"
Park, Jong⋅Yang, Laurence⋅Hussain, Sajid and Xiao, Yang
Telecommunication Systems, vol. 44, (no. 3-4), pp. 179-180, Aug 2010. | Journal Article
Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory
Liang, Xiannuan and Xiao, Yang
IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, vol. 40, (no. 3), pp. 683-693, 2010. | Journal Article
Weaving a proper net to catch large objects in wireless sensor networks
Olteanu, Alina⋅Xiao, Yang⋅Wu, Kui and Du, Xiaojiang
IEEE Transactions on Wireless Communications, vol. 9, (no. 4), pp. 1360-1369, 2010. | Journal Article
2009
Aggregation With Fragment Retransmission for Very High-Speed WLANsLi, Tianji⋅Ni, Qiang⋅Malone, David⋅Leith, D.⋅Xiao, Yang and Turletti, T.IEEE/ACM Transactions on Networking, vol. 17, (no. 2), pp. 591-604, 2009.
| Journal Article
A survey of anonymity in wireless communication systemsChen, Hui⋅Chen, H.⋅Xiao, Y.⋅Xiao, Yang⋅Hong, Xiaoyan⋅Hong, X. Y.⋅Hu, F.⋅Hu, Fei⋅Xie, J. and Xie, JiangSecurity and Communication Networks, vol. 2, (no. 5), pp. 427-444, 2009.
| Journal Article
Attacks and countermeasures in multi-hop Cognitive Radio NetworksHu, Fei⋅Dong, De-cun and Xiao, YangInternational Journal of Security and Networks, vol. 4, (no. 4), pp. 263-271, 2009.
| Journal Article
Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures
Liu, Jing⋅Xiao, Yang⋅Ghaboosi, Kaveh⋅Deng, Hongmei and Zhang, Jingyuan
EURASIP Journal of Wireless Communications and Networking, vol. 2009, 2009. | Journal Article
Building a wireless capturing tool for WiFiMeng, Ke⋅Xiao, Yang and Vrbsky, Susan VSecurity and Communication Networks, vol. 2, (no. 6), pp. 654-668, 2009.
| Journal Article