肖2012.jpg

 

Liang Xiao

 

Professor

Department of Communication Engineering, Xiamen University

IEEE Senior member

 

Office: Room 613B, Xingzheng Lou, Haiyun, Xiamen University, Xiamen, Fujian, China 361005

Email: lxiao@xmu.edu.cn, adalittlel@gmail.com

 

Education:

Ph.D. Electrical and Computer Engineering, May 2009

Rutgers University, Piscataway, NJ

M.S. Electrical Engineering, July 2003

Tsinghua University, Beijing, China

B.A. Communication Engineering, July 2000

Nanjing University of Posts & Telecommunications, Nanjing, China

 

Research Interests:

Network security, wireless communications, smart grids.

 

Professional Experience:

Professor , Xiamen University. Department of Communication Engineering, China. 2013-current.

Associate Professor, Xiamen University. Department of Communication Engineering, China. 2009-2013.

Visiting Scholar, Princeton Univ., Department of Electrical Engineering, NJ. June-Sept. 2013.

Visiting Scholar, Virginia Tech, Department of Computer Science, VA. June-Sept. 2012.

Visiting Scholar, University of Maryland, Department of Electrical & Computer Engineering, College Park, MD. June-Sept. 2011.

Visiting Scholar, City University of Hong Kong, Department of Electronic Engineering, Hong Kong. May 14-19th, 2011.

Graduate Research Assistant, WINLAB, Rutgers University, Department of Electrical and Computer Engineering, and WINLAB. East Brunswick, NJ. 2005-2009.

Research Intern, InterDigital, King of Prussia, PA. 2008.

Research Intern, Bell Lab Innovations, Alcatel-Lucent, Whippany, NJ. 2007.

Graduate Teaching Assistant, Rutgers University, Department of Electrical and Computer Engineering. East Brunswick, NJ. 2004-2005.

Graduate Teaching Assistant, North Carolina State University, Department of Electrical and Computer Engineering. Raleigh, NC. 2003-2004.

Graduate Research Assistant, Tsinghua University, Department of Electrical Engineering and State Key Lab on Microwave & Digital Communication. Beijing, China. 2000-2003.

Liang Xiao is currently a Professor in the Department of Communication Enginnering, Xiamen University, Fujian, China. She is an IEEE Senior member, and member of IEEE Technical Committee on Big Data. She has served in several editorail roles, including an associate editor of IEEE Trans. Information Forensics & Security and IET Communications. Her research interests include wireless security, smart grids, and wireless communications. She won the best paper award for 2016 IEEE INFOCOM Bigsecurity WS. She received the B.S. degree in communication engineering from Nanjing University of Posts and Telecommunications, China, in 2000, the M.S. degree in electrical engineering from Tsinghua University, China, in 2003, and the Ph.D. degree in electrcal engineering from Rutgers University, NJ, in 2009. She was a visiting professor with Princeton University, Virginia Tech, and University of Maryland, College Park.

 

肖亮   教授 博士生导师

厦门大学信息科学与技术学院通信工程系

研究方向:无线通信,网络安全,大数据,机器学习

美国罗格斯大学( Rutgers Univ. )博士

IEEE 高级会员, 中国计算机学会高级会员,中国电子学会高级会员,中国计算机学会网络与数据通信专委会委员

通讯地址:中国福建省厦门市厦大海韵园行政C613B, 361005  电子邮箱:lxiao @xmu.edu.cn

 

肖亮,厦门大学信息科学与技术学院教授,博士生导师,IEEE高级会员,中国计算机学会高级会员,中国电子学会高级会员,网络与数据通信专委会委员。从事无线安全,水声通信和大数据等方向的研究。获教育部留学回国人员科研启动基金,入选福建省高等学校新世纪优秀人才支持计划。主持和参与了多项国家自然科学基金和福建省自然科学基金研究项目,并参与863项目。担任IEEE Trans. Information Forensics & Security等国际SCI期刊编委。担任INFOCOMGLOBECOMICC等国际学术会议技术议程委员。

 

美国Rutgers(新泽西州立)大学电子与计算机工程系博士,清华大学电子系硕士,南京邮电学院通信工程系学士。作为访问学者,曾在普林斯顿大学,弗吉尼亚理工和马里兰大学进行研究。曾任美国Rutgers大学无线信息网络实验室(WINLAB)助研,美国InterDigital公司和贝尔实验室实习研究员,美国北卡州立大学ECE系助教,清华大学微波与数字通信国家重点实验室助研。

 

Research Grants:

1. "Study on PHY-authentication in wireless networks," Natural Science Foundation of Fujian Province of China (No.2010J01347), 2010-2013 (PI).

2. "Security analysis on cognitive radio networks," Tsinghua-Qualcomm joint research center, 2009-2012 (CoPI).

3. "Study on PHY-security in wireless networks," Research funding by Xiamen University, 2009-2012 (PI).

4. "Authentication techniques based on channel information in wireless networks," Natural Science Foundation of China (No. 61001072), 2011-2013 (PI).

5. "Security analysis for wireless network cloud techniques," Tsinghua-IBM OCR joint research center, 2011-2012 (PI).

6. "Study on channel-based authentication in wireless networks," Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry (SRF for ROCS, SEM), 2011-2013 (PI).

7. Selected by the Program for New Century Excellent Talents in Fujian Province University, 2012-2014 (PI).

8. "Study on adaptive dictionary sparse representation and applications based on non-parametric hierarchical Bayesian model," Natural Science Foundation of China (No. 61172179), 2012-2015 (CoPI).

9. "Study on anti-jamming techniques in wireless networks," Fundamental Research Funds for the Central Universities, 2012-2014 (PI).

10. "Anti-jamming techniques in wireless networks without pre-shared PHY-layer keys," Natural Science Foundation of China (No. 61271242), 2013-2016 (PI).

11. "Future wireless communication techniques with enhanced PHY-layer security," 863 high technology plan (No. 2015AA01A707), RMB 558K, 2015-2016 (CoPI).

12. "无线网络安全博弈理论与方法研究," 物联网信息安全技术北京市重点实验室开放课题, 2015.01-2016.12 (PI).

13. "基于前景理论的无线网络安全博弈理论与机制研究," 国家自然科学基金面上项目 (No. 61671396), 2017.01-2020.12 (PI).

14. "针对主观攻击者的高级持续安全威胁博弈模型研究," CCF-启明星辰"鸿雁"科研基金,CCF-Venustech Hongyan Research Initiative (2016-010), 2016.09.15-2017.10.31 (PI).

 

Selected Publications:

Book Chapter:

1. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Chapter 13: Channel-Based Authentication, in Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York, 2010.

2. L. Xiao, "Anti-jamming Transmissions in Cognitive Radio Networks," Springer, 2015, ISBN: 978-3-319-24290-3.

Journal Papers:

1. H. Zhuang, L. Dai, L. Xiao, and Y. Yao," Spectral efficiency of distributed antenna system with random antenna layout, " Electronics Letter, vol. 39, pp.495, March 2003.

2. L. Xiao, L. Greenstein, and N. Mandayam, " Sensor-assisted localization in cellular systems," IEEE Trans. Wireless Communications, vol. 6, pp. 4244-4248, Dec. 2007.

3. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Communications, vol. 7, pp. 2571-2579, Jul. 2008.

4. L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, "Distributed measurements for estimating and updating cellular system performance," IEEE Trans. Communications, vol. 56, pp. 991-998, Jun. 2008.

5. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Communications, vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.

6. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks," IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.

7. L. Xiao, H. Dai and P. Ning, "Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping," IEEE Trans. Information Forensics & Security, vol. 7, no. 1, pp. 297 – 309, Feb. 2012.

8. L. Xiao, H. Dai, P. Ning, "MAC Design of Uncoordinated FH-Based Collaborative Broadcast," IEEE Wireless Comm. Letters, vol. 1, No. 3, pp. 261 - 264, June 2012.

9. C. Li, H. Dai, L. Xiao, P. Ning, "Communication Efficiency of Anti-jamming Broadcast in Large-scale Multi-Channel Wireless Networks," IEEE Trans. Signal Processing, vol. 60, pp. 5281 - 5292, Oct. 2012.

10. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks," IEEE Trans. Information Forensics & Security, vol. 7, No. 4, pp. 1368 – 1380, Aug. 2012.

11. C. Zhao, L. Xiao et al., "Secure relay selection based on learning with negative externality in wireless networks," EURASIP Journal on Advances in Signal Processing, pp. 1-7, April 2013.

12. L. Xiao, Q. Yan, W. Lou, G. Chen, Y.T. Hou, "Proximity-based Security Techniques for Mobile Users in Wireless Networks," IEEE Trans. Information Forensics & Security, pp. 2089-2100, vol. 8, no. 12, Dec 2013.

13. L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect Theoretic Analysis of Energy Exchange Among Microgrids," IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.

14. L. Xiao, T. Chen, J. Liu, H. Dai, "Anti-jamming Transmission Stackelberg Game with Observation Errors," IEEE Comm. Letters, vol. 19, no. 6, pp. 949-952, June 2015.

15. L. Xiao, Y. Li, J. Liu, Y. Zhao, "Power Control with Reinforcement Learning in Cooperative Cognitive Radio Networks against Jamming," Journal of Supercomputing, pp. 1-21, April 2015.

16. L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric View of Jamming Games in Cognitive Radio Networks," IEEE Trans. Information Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.

17. J. Liu, L. Xiao, G. Liu, Y. Zhao, "Active authentication with reinforcement learning based on ambient radio signals," Springer Multimedia Tools and Applications, vol. 76, no. 3, pp. 3979-3998, Oct. 2015.

18. L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, "PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks," IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.

19. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, vol. 4, pp. 2281-2291, May 2016.

20. 肖亮, 李强达, 刘金亮, "云存储安全技术研究进展综述," 数据采集与处理, 2016, 31(3):464-472.

21. L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study," IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 534-544, Mar. 2017.

22. L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor, "Mobile Crowdsensing Games in Vehicular Networks," IEEE Trans. Vehicular Technology, Jan. 2017. DOI: 10.1109/TVT.2016.2647624.

23. L. Xiao, T. Chen, G. Han, W. Zhuang, and L. Sun, "Game Theoretic Study on Channel-based Authentication in MIMO Systems," IEEE Trans. Vehicular Technology, Jan. 2017. DOI: 10.1109/TVT.2017.2652484.

24. A. Abass, L. Xiao, N. B. Mandayam, and Z. Gaijic, "Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage," IEEE Access, April 2017. DOI:10.1109/ACCESS.2017.2691326.

25. L. Xiao, Y. Li, X. Huang and X. Du, "Cloud-based Malware Detetction Game for Mobile Device with Offloading," IEEE Transactions on Mobile Computing, Mar. 2017. DOI:10.1109/TMC.2017.2687918.

26. N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-Layer Authentication Based on Extreme Learning Machine," IEEE Communication Letters, April 2017. DOI:10.1109/LCOMM.2017.2690437.

Conference Papers:

1. L. Xiao, L. Dai, S. Zhou, and Y. Yao, "Information-theoretic capacity analysis in MIMO distributed antenna systems," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 1, pp. 779-782, Jeju, Korea, April 2003.

2. L. Xiao, S. Zhou, and Y. Yao, "QoS-oriented scheduling algorithm for 4G mobile multimedia OFDM communications," in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio (PIMRC), vol. 1, pp. 545-549, Sept. 2003, Beijing, China.

3. L. Xiao, A. Wang, S. Zhou, and Y. Yao, "A dynamic resource scheduling algorithm for OFDM system," in Proc. Asia-Pacific Conference on Communications (APCC), vol. 2, pp. 444-447, Malaysia, Sept. 2003.

4. A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic Resource Management in the Fourth Generation Wireless Systems," in Proc. International Conference on Communication Technology (ICCT), Beijing, China, April 2003.

5. L. Xiao and M. Xiao, "A new kind of MIMO-sensor networks M-SENMA," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 4, pp. 2941-2945, Los Angeles, CA, Sept. 2004.

6. H. Dai, L. Xiao, and Q. Zhou, "Energy efficiency of MIMO transmission strategies in wireless sensor networks," in Proc. 2004 International Conference on Computing, Communications and Control Technologies (CCCT), Austin, TX, Aug. 2004.

7. L. Xiao, L. J. Greenstein, N. B. Mandayam, and S. Periyalwar, "Sensor networks for estimating and updating the performance of cellular system," in Proc. IEEE International Conference on Communications(ICC), vol. 5, pp. 2107-2111, June 2006.

8. D. Samardzija, L. Xiao, and N. Mandayam, "Impact of pilot assisted channel state estimation on multiple antenna multiuser TDD systems with spatial filtering," in Proc. IEEE Conference on Information Sciences and Systems (CISS), pp. 381-385, Princeton, NJ, March 2006.

9. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications(ICC), pp. 4646-4651, June 2007.

10. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Proc. Conference on Information Sciences and Systems (CISS), pp. 642-646, Princeton, NJ, Mar. 2008.

11. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on Communications (ICC), pp. 1520-1524, May 2008.

12. L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. Greenstein, and N. Mandayam, "PHY-Authentication Protocol for Spoofing Detection in Wireless Networks", in Proc. IEEE Global communications conference (GLOBECOM), 2010.

13. C. Li, H. Dai, L. Xiao, P. Ning, "Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks," in Proc. 44th Asilomar Conference on Signals, Systems and Computers (Asilomar), California, USA, Nov. 2010.

14. L. Xiao, H. Dai, P. Ning, "Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-hop Networks," in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.

15. L. Xiao, H. Dai, P. Ning, "Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks," in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.

16. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect reciprocity game modeling for secure wireless networks," in Proc. IEEE International conference on communications (ICC), Ottawa, Canada, June 2012.

17. L. Xiao, Q. Yan, W. Lou and Y. T. Hou, "Proximity-based security using ambient radio signals," in Proc. IEEE International conference on communications (ICC), Budapest, Hungary, June 2013.

18. L. Xiao, Y. Chen, K.J.R Liu, "Anti-Cheating Prosumer Energy Exchange based on Indirect Reciprocity," in Proc. IEEE International conference on communications (ICC), Sydney, Australia, June 2014.

19. L. Xiao, J. Liu, Y. Li, N. B. Mandayam, and H. V. Poor, "Prospect theoretic analysis of anti-jamming communications in cognitive radio networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM'14), Dec. 2014.

20. L. Xiao, J. Liu, Q. Li, and H. V. Poor, "Secure Mobile Crowdsensing Game," in Proc. IEEE Int’l Conf. on Commun., (ICC), London, June 2015.

21. J. Liu, L. Xiao, Y. Li and L. Huang, "User-Centric Analysis on Jamming Game with Action Detection Error," in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.

22. Y. Li, L. Xiao, J. Liu and Y. Tang, "Power Control Stackelberg Game in Cooperative Anti-Jamming Communications," in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.

23. T. Chen, J. Liu, L. Xiao and L. Huang, "Anti-jamming Transmissions with Learning in heterogenous Cognitive Radio Networks," in Proc. IEEE Wireless Communications and Networking Conference, So-HetNets Workshop, New Orleans, LA, Mar. 2015.

24. G. Liu, J. Liu, Y. Li, L. Xiao and Y. Tang, "Jamming Detection of Smartphones for WiFi Signals," in Proc. IEEE Vehicular Technology Conf, Glasgow, Scotland, May 2015.

25. G. Chen, Y. Li, L. Xiao and L. Huang, "Collaborative Anti-jamming Broadcast with Uncoordinated Frequency Hopping over USRP," in Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.

26. Y. Li, Q. Li, J. Liu, L. Xiao, "Mobile Cloud Offloading for Malware Detections with Learning," in Proc. IEEE International Conference on Computer Communications (INFOCOM), -BigSecurity, Hongkong, April 2015.

27. Y. Li, L. Xiao, Q. Li, W. Su, " Spoofing detection games in underwater sensor network," in Proc. Oceans Conference of the MTS & IEEE, Washington, DC, Oct. 2015.

28. L. Xiao, Y. Li, G. Liu, Q. Li, W. Zhuang, "Spoofing Detection with Reinforcement Learning in Wireless Networks," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.

29. L. Xiao, Q. Li, T. Chen, E. Cheng, H. Dai, "Jamming Games in Underwater Sensor Networks with Reinforcement Learning," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.

30. L. Xiao, T. Chen, C. Xie, J. Liu, "Mobile Crowdsensing Game in Vehicular Networks," in Proc. IEEE Region 10 Conference (TENCON), invited talk, Nov. 2015.

31. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "Mobile Offloading Game Against Smart Attacks," in Proc. IEEE International Conference on Computer Communications (INFOCOM WKSHPS), -BigSecurity, San Francisco, CA, April 2016. (Best paper award)

32. D. Xu, Y. Li, L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, Dec. 2016.

33. L. Xiao, T. Chen, G. Han, Y. Li, W. Zhuang, and L. Sun, "Channel-Based Authentication Game in MIMO systems," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, Dec. 2016.

34. C. Xie, and L. Xiao, "User-Centric View of Smart Attacks in Wireless Networks," in Proc. IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), invited talk, Nanjing, China, Oct.2016.

35. G. Han, L. Xiao, H. V. Poor, " Two-Dimensional Anti-Jamming Communication Based on Deep Reinforcement Learning," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, Mar. 2017.

36. Y. Li, L. Xiao, H. Dai, H. V. Poor, " Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.

37. X. Wan, L. Xiao, Q. Li, Z. Han, " Phy-layer Authentication with Multiple Landmarks with Reduced Communication Overhead, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.

38. M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, " Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.

39. D. Xu, L. Xiao, N. B. Mandayam, H. V. Poor, " Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game Against Advanced Persistent Threats, " in Proc. IEEE International Conference on Computer Communications (INFOCOM WKSHPS), -BigSecurity, Atlanta, GA, May 2017.

40. Q. HU, S. Lv, Z. Shi, L. Sun and L. Xiao, " Defense Against Advanced Persistent Threats with Expert Systerm for Internet of Things, " in Proc. IEEE/IFIP International Conference on Wireless Algorithms, Systems, and Application, Gui Lin, China, June 2017.

41. Y. Qu, S. Yu, L. Gao, S.Peng, Y. Xiang, and L. Xiao, " FuzzyDP: Fuzzy-based Big Data Publising Aginst Inquiry Attacks, " in Proc. IEEE Conference on Computer Communication Workshops (INFOCOM WKSHPS), - MobiSec, Atlanta, GA, May 2017.

Invited Talks:

1. "Channel-Based Spoofing Detection in Wireless Networks," UESTC’ 08 (Chengdu, China), Xiamen U.’ 08 (Xiamen, China), Bell Lab’ 09, InterDigital’ 09, BUPT’09 (Beijing, China).

2. "Jamming-Resistant Collaborative Broadcast In Wireless Networks," City U. of HK‘11 (Hongkong), UMD’11, UIC’2011, and Northwestern’ 11.

3. "Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks," National Chiao Tung Univ. (Taiwan)'12, Stevens' 12, Rutgers'12.

4. "User-centric game theoretic study on network security," Annual Chinese conference on communication theory and signal processing'14, XJTU'14, XIDIAN'14, ZJU'15.

5. "智能数据时代的网络安全研究," CCF广州论坛: 从"大数据"到"智能数据" , 2016.11.23, 广州.

6. "Mobile Offloading for Cloud-based Malware Detections with Learning," 第六届 " 山海论坛 "-大数据与高性能计算, 2016.11.23, 广州.

  

Professional Activities:

1. Associate Editor, IEEE Transactions on Information Forensics and Security, Since May 2016

2. TPC Member of IEEE INFOCOM, GLOBECOM, ICC, WCNC

3. Member of CCF Technical Committee on Networking and Data Communications

4. Senior Member of IEEE

5. Member of ACM

6. Editor, KSII Transactions on Internet and Information Systems, 2013

7. Associate Editor, Wiley's Security and Communication Networks Journal, 2013

8. Associate Editor, IET Communications, 2015

9. Senior Member of China Computer Federation (CCF)

10. Senior Member of Chinese Institute of Electronics

 

Teaching:

1. "Wireless Communication Techniques" - Fall 2009, Fall 2010, Fall 2011, Fall 2012, Spring 2013

2. "Digital Communication" - Spring 2010

3. "Advanced topics: Wideband Digital Communication Techniques" - Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014

4. "Scientific English on Communications and Electronic Information" - Spring 2010, Spring 2011, Spring 2012, Spring 2013, Spring 2014

5. "Principles of Wireless Communication"- Fall 2010, Fall 2011.

 

专利:

1. Liang Xiao*, Chunxuan Ye, Suhas Mathur, Yogendra C Shah, Alexander Reznik, "Authentication for secure wireless communication, " 美国专利:PCTUS09574772014.6.19,已授权.

2. 肖亮*、颜蜜、杜亮、黄联芬. "一种基于联合干扰的防御认知无线电自私攻击方法[P]. " 中国专利:CN102625313B2014.07.02,已授权.

3. 肖亮*、康姗、颜蜜. "基于传感器的认知无线网络对多种类型攻击的检测方法[P]. " 中国专利:CN102595411B 2014.7.2,已授权.

4. 肖亮*、李强达、陈桂权、黄联芬、唐余亮. "一种检测和识别考场内开机手机的方法[P]. " 中国专利:CN104092505B2016.02,已授权.

5. 肖亮*、李炎达、刘金亮、李燕. "一种基于移动群智感知的路况信息汇集方法[P]. " 中国专利:CN104700640A2016.09,已授权.

 

软件著作权:

1. " 抗敌意干扰的无线认知网络非协调跳频广播系统. " 软件著作权: 2013SR153783, 2013.12.23.

2. " 基于RSS的无线信道指纹采集与实时识别系统. " 软件著作权: 2012SR110529, 2012.11.19.

3. " 认知无线电网络中基于间接互惠的安全系统 . " 软件著作权 : 2013SR153776, 2013.04.16.

4. " 基于跨层设计USRP无线指纹识别系统. " 软件著作权: 2013SR081611, 2013.12.23.

5. " 安卓手机的敌意干扰检测软件. " 软件著作权: 2014SR168163, 2014.7.6.

6. " 抗敌意干扰的节点协作跳频广播系统. " 软件著作权: 2014SR077739, 2014.2.25.

7. " 基于强化学习的认知无线网络的抗敌意干扰系统. " 软件著作权: 2015SR148443, 2015.7.31.

8. " 基于环境指纹的安卓手机认证系统. " 软件著作权: 2016SR108135, 2016.5.17.

 

当前学生名单:

博士生

 


李文锋


闵明慧

 

硕士生

 


陈天花


李强达


周长华


韩国安


李炎达


谢彩霞


万晓玥


肖星宇


许冬瑾

 

已毕业学生名单:

姓名

年级

毕业去向

颜蜜

2009

中国建设银行总行信息技术类直属中心(广州开发中心)

林文彬

2009 (协助黄联芬老师指导)

国家电网

庞文镇

2009

南京熊猫汉达科技有限公司

陈乃文

2010

福建星网锐捷网络有限公司

陈晓

2010

华为技术有限公司

康姗

2010

华为技术有限公司

张磊

2011

中国电子科技集团

杜亮

2011 (副导师:黄联芬)

中国建设银行总行信息技术类直属中心(广州开发中心)

黄伟田

2011 (副导师:唐余亮)

福建移动莆田公司

陈桂权

2012

国家电网

刘金亮

2013

招商银行网络科技有限公司


刘金亮

刘囯隆

2013

华为技术有限公司


刘国隆

李燕

2013

华福证券有限公司


李燕

 

 

学生活动:

1. CNCC 2014 中国计算机大会,中国郑州, 2014.10

 

2. GAMENET 2014,中国北京, 2014.11

 

3. IEEE WCNC 2015,美国新奥尔良市, 2015.03.08-2015.03.12

   

 

4. 香港城市大学学术交流 & IEEE INFOCOM 2015,中国香港,2015.4.25-2015.5.1

       

 

5. MobiHoc 2015,中国杭州,2015.6.22-2015.6.26

   

 

6. WCNT 2015,中国马鞍山, 2015.09

 

7. TENCON 2015, 中国澳门, 2015.11

 

8. GLOBECOM 2015, 美国圣地亚哥,2015.12

9. 2016.06

   

10. ICUWB 2016, 中国南京,2016.10

       

 

 

11. WCSP 2016, 中国扬州,2016.10

12. 2016.12 实验室游玩

           

13. GLOBECOM 2016, 美国华盛顿,2016.12

       

14. ICASSP 2017, 美国新奥尔良市,2017.3