111 Publications (Page 2 of 5)
2013
Game Theory for Network SecurityLiang, Xiannuan and Xiao, YangIEEE Communications Surveys & Tutorials, vol. 15, (no. 1), pp. 472-486, 2013.
| Journal Article
Internet of things' authentication and access controlLiu, Jing⋅Xiao, Yang and Chen, CLPhilipInternational Journal of Security and Networks, vol. 7, (no. 4), pp. 228-241, 2013.
| Journal Article
Non-repudiation in neighborhood area networks for smart gridXiao, Zhifeng⋅Xiao, Yang and Du, David HIEEE Communications Magazine, vol. 51, (no. 1), pp. 18-26, 2013.
| Journal Article
Stochastic event capturing with a single mobile robot in rectangular perimetersLiang, Xiannuan⋅Xiao, Yang⋅Zhang, Jingyuan⋅Deng, Hongmei and Vasilakos, Athanasios VTelecommunication Systems: Modeling, Analysis, Design and Management, vol. 52, (no. 4), pp. 2519-2532, 2013.
| Journal Article
2011
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFIDOlteanu, Alina⋅Xiao, Yang⋅Hu, Fei⋅Sun, Bo and Deng, HongmeiWireless Communications and Mobile Computing, vol. 11, (no. 2), pp. 254-266, 2011.
| Journal Article
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tagsXiao, Yang and Zhang, YanpingWireless Communications and Mobile Computing, vol. 11, (no. 7), pp. 964-979, 2011.
| Journal Article
Integrity protecting hierarchical concealed data aggregation for wireless sensor networksOzdemir, Suat and Xiao, YangComputer Networks, vol. 55, (no. 8), pp. 1735-1746, 2011.
| Journal Article
Survey and experiments of WIA-PA specification of industrial wireless networkLiang, Wei⋅Zhang, Xiaoling⋅Xiao, Yang⋅Wang, Fuqiang⋅Zeng, Peng and Yu, HaibinWireless Communications and Mobile Computing, vol. 11, (no. 8), pp. 1197-1212, 2011.
| Journal Article
Temporal Accountability and Anonymity in Medical Sensor NetworksLiu, Jing and Xiao, YangMobile Networks and Applications, vol. 16, (no. 6), pp. 695-712, Dec 2011.
| Journal Article
Wireless telemedicine and m-health: technologies, applications and research issuesXiao, Yang⋅Takahashi, Daisuke⋅Liu, Jing⋅Deng, Hongmei and Zhang, JingyuanInternational Journal of Sensor Networks, vol. 10, (no. 4), pp. 202-236, 2011.
| Journal Article
2010
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor NetworksXiao, Yang⋅Xiao, Yang⋅Chen, Hui⋅Chen, Hui⋅Wu, Kui⋅Wu, Kui⋅Sun, Bo⋅Sun, Bo⋅Zhang, Ying⋅Zhang, Ying⋅Sun, Xinyu⋅Sun, Xinyu⋅Liu, Chong and Liu, ChongIEEE Transactions on Computers, vol. 59, (no. 4), pp. 507-521, 2010.
| Journal Article
Cross Layer Optimization for Energy-Constrained Wireless Sensor Networks: Joint Rate Control and RoutingZheng, Meng⋅Liang, Wei⋅Yu, Haibin and Xiao, YangComputer Journal, vol. 53, (no. 10), pp. 1632-1642, 2010.
| Journal Article
Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator NetworksChen, Jiming⋅Cao, Xianghui⋅Cheng, Peng⋅Xiao, Yang and Sun, YouxianIEEE Transactions on Industrial Electronics, vol. 57, (no. 12), pp. 4219-4230, 2010.
| Journal Article
Dynamic bandwidth partition schemes for integrated voice, video, and data traffic in the IEEE 802.11e distributed wireless LANsXiao, Yang⋅Li, Frank Haizhon⋅Li, Ming⋅Zhang, Jingyuan and Li, BoInternational Journal of Communication Systems, vol. 23, (no. 3), pp. 391-412, 2010.
| Journal Article
Refinements on IEEE 802.11 Distributed Coordination Function Modeling ApproachesTinnirello, Ilenia⋅Bianchi, Giuseppe and Xiao, YangIEEE Transactions on Vehicular Technology, vol. 59, (no. 3), pp. 1055-1067, 2010.
| Journal Article
Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANsOlteanu, Alina and Xiao, YangIEEE Transactions on Wireless Communications, vol. 9, (no. 1), pp. 218-226, 2010.
| Journal Article
Special issue on "security for multimedia and ubiquitous applications"Park, Jong⋅Yang, Laurence⋅Hussain, Sajid and Xiao, YangTelecommunication Systems, vol. 44, (no. 3-4), pp. 179-180, Aug 2010.
| Journal Article
Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game TheoryLiang, Xiannuan and Xiao, YangIEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, vol. 40, (no. 3), pp. 683-693, 2010.
| Journal Article
Weaving a proper net to catch large objects in wireless sensor networksOlteanu, Alina⋅Xiao, Yang⋅Wu, Kui and Du, XiaojiangIEEE Transactions on Wireless Communications, vol. 9, (no. 4), pp. 1360-1369, 2010.
| Journal Article
2009
Aggregation With Fragment Retransmission for Very High-Speed WLANsLi, Tianji⋅Ni, Qiang⋅Malone, David⋅Leith, D.⋅Xiao, Yang and Turletti, T.IEEE/ACM Transactions on Networking, vol. 17, (no. 2), pp. 591-604, 2009.
| Journal Article
A survey of anonymity in wireless communication systemsChen, Hui⋅Chen, H.⋅Xiao, Y.⋅Xiao, Yang⋅Hong, Xiaoyan⋅Hong, X. Y.⋅Hu, F.⋅Hu, Fei⋅Xie, J. and Xie, JiangSecurity and Communication Networks, vol. 2, (no. 5), pp. 427-444, 2009.
| Journal Article
Attacks and countermeasures in multi-hop Cognitive Radio NetworksHu, Fei⋅Dong, De-cun and Xiao, YangInternational Journal of Security and Networks, vol. 4, (no. 4), pp. 263-271, 2009.
| Journal Article
Botnet: Classification, Attacks, Detection, Tracing, and Preventive MeasuresLiu, Jing⋅Xiao, Yang⋅Ghaboosi, Kaveh⋅Deng, Hongmei and Zhang, JingyuanEURASIP Journal of Wireless Communications and Networking, vol. 2009, 2009.
| Journal Article
Building a wireless capturing tool for WiFiMeng, Ke⋅Xiao, Yang and Vrbsky, Susan VSecurity and Communication Networks, vol. 2, (no. 6), pp. 654-668, 2009.
| Journal Article
Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applicationsHu, Fei⋅Xiao, Yang and Hao, QiIEEE Journal on Selected Areas in Communications, vol. 27, (no. 4), pp. 450-465, 2009.
| Journal Article