Journal Papers:
1. H. Zhuang,
L. Dai, L. Xiao, and Y. Yao,"
Spectral efficiency of distributed antenna system with random antenna layout,
"
Electronics Letter, vol. 39, no 6, pp. 495-496,
Mar. 2003.
2. L. Xiao, L.
Greenstein, and N. Mandayam, "
Sensor-assisted localization in cellular systems,"
IEEE Trans. Wireless Comm.,
vol. 6, no. 12, pp. 4244-4248, Dec. 2007.
3. L. Xiao, L.
Greenstein, N. Mandayam, and S. Periyalwar,
"Distributed measurements for estimating and updating cellular system performance,"
IEEE Trans. Comm., vol. 56, no. 6, pp. 991-998, Jun. 2008.
4. L. Xiao, L.
Greenstein, N. B. Mandayam, and W. Trappe,
"Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579,
Jul. 2008.
5. L. Xiao, L. Greenstein, N.
B. Mandayam, and W. Trappe,
"Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.
6. L. Xiao, L. Greenstein, N.
B. Mandayam, and W. Trappe,
"Channel-based detection of Sybil attacks in wireless networks,"
IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.
7. L. Xiao, H. Dai and P. Ning,
"Jamming-resistant collaborative broadcast using uncoordinated frequency hopping,"
IEEE Trans. Information Forensics & Security, vol. 7, no. 1,
pp. 297 – 309, Feb. 2012.
8. L. Xiao, H. Dai, P. Ning,
"MAC design of uncoordinated FH-based collaborative broadcast,"
IEEE Wireless Comm. Letters, vol. 1, no. 3, pp. 261 - 264, Jun. 2012.
9. C. Li, H. Dai, L. Xiao, P.
Ning, "Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks,"
IEEE Trans. Signal Processing, vol. 60, no. 10,
pp. 5281 - 5292, Oct. 2012.
10. L. Xiao, W.S Lin, Y. Chen,
K.J.R Liu, "Indirect reciprocity security game for large-scale mobile wireless networks,"
IEEE Trans. Information Forensics & Security, vol. 7, no. 4, pp. 1368 – 1380, Aug. 2012.
11. C. Zhao, L. Xiao et al.,
"Secure relay selection based on learning with negative externality in wireless networks,"
EURASIP Journal on Advances in Signal Processing, vol. 2013, no. 1, pp.
1-7, Dec. 2013.
12. L. Xiao, Q. Yan, W. Lou, G.
Chen, Y.T. Hou,
"Proximity-based security techniques for mobile users in wireless networks,"
IEEE Trans. Information Forensics & Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.
13. L. Xiao, N. B. Mandayam, and H. V. Poor,
"Prospect theoretic analysis of energy exchange among microgrids,"
IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.
14. L. Xiao, T. Chen, J. Liu,
H. Dai,
"Anti-jamming transmission stackelberg game with observation errors,"
IEEE Comm. Letters, vol. 19, no. 6, pp.
949-952, Jun. 2015.
15. L. Xiao, Y. Li, J. Liu, Y.
Zhao,
"Power control with reinforcement learning in cooperative cognitive radio networks against jamming,"
Journal of Supercomputing, vol. 71, no. 9, pp. 3237-3257,
Apr. 2015.
16. J. Liu, L. Xiao, G. Liu, Y.
Zhao, "Active authentication with reinforcement learning based on ambient radio signals,"
Springer Multimedia Tools and Applications, vol. 76, no. 3, pp. 3979-3998, Oct. 2015.
17. L. Xiao, J. Liu, Q. Li, N.
B. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Information
Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
18. L. Xiao, Y. Li, G. Han, G.
Liu, W. Zhuang, "PHY-layer spoofing detection with reinforcement learning in wireless networks," IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.
19. 肖亮, 李强达, 刘金亮, "云存储安全技术研究进展综述," 数据采集与处理, 2016, 31(3):464-472.
20. L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud storage defense against advanced persistent threats: A prospect theoretic study," IEEE Journal on Selected Areas in Comm., vol. 35, no. 3, pp. 534-544, Jan. 2017.
Code.
21. L. Xiao, T. Chen, G. Han, W. Zhuang, and L. Sun, "Game theoretic study on channel-based authentication in MIMO systems," IEEE Trans. Vehicular Technology, vol. 66, no. 8, pp. 7474-7484, Jan. 2017.
Code.
22. N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-layer authentication based on extreme learning machine," IEEE Comm. Letters, vol. 21, no. 1, pp. 1557-1560, Jul. 2017.
23. L. Xiao, Y. Li, X. Huang, and X. Du, "Cloud-based malware detection game for mobile device with offloading," IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742-2750, Oct. 2017.
24. L. Xiao, X. Wan, and Z. Han, "PHY-layer authentication with multiple landmarks with reduced overhead," IEEE Trans. Wireless Comm., vol. 17, no. 3, pp. 1676-1687, Dec. 2017.
Code.
25. L. Xiao, Y. Li, G. Han, H. Dai, and H. V. Poor, "A secure mobile crowdsensing game with deep reinforcement learning," IEEE Trans. Information Forensics & Security, vol. 13, no. 1, pp. 35-47, Jan. 2018.
Code.
26. L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor, "Mobile crowdsensing games in vehicular networks," IEEE Trans. Vehicular Technology, vol. 67, no. 2, pp. 1535-1545, Feb. 2018.
Code.
27. L. Xiao, D. Jiang, X. Wan, W. Su, and Y. Tang, "Anti-jamming underwater transmission with mobility and learning," IEEE Comm. Letters, vol. 22, no. 3, pp. 542-545, Mar. 2018.
Code.
28. L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, "Reinforcement learning-based NOMA power allocation in the presence of smart jamming," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3377-3389, Apr. 2018.
29. L. Xiao, C. Xie, M. Min, and W. Zhuang, "User-centric view of unmanned aerial vehicle transmission against smart attacks," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3420-3430, Apr. 2018.
30. L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, "UAV relay in VANETs against smart jamming with reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 5, pp. 4087-4097, May 2018.
31. L. Xiao, D. Xu, N. B. Mandayam, and H. V. Poor, "Attacker-centric view of a detection game against advanced persistent threats," IEEE Trans. Mobile Computing, vol. 17, no. 11, pp. 2512-2523, Nov. 2018.
Code.
32. L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, and M. Guizani, "Security in mobile edge caching with reinforcement learning," IEEE Wireless Comm. Magazine, vol. 25, no. 3, pp. 116-122, Jun. 2018.
33. L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, "IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?," IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018.
34. 陈烨, 许冬瑾, 肖亮, "基于区块链的网络安全技术综述," 电信科学, 2018, 34(03):10-16.
35. M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, "Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4250-4261, Dec. 2018.
36. L. Xiao, D. Jiang, D. Xu, H. Zhu, Y. Zhang, and H. V. Poor, "Two-dimensional antijamming mobile communication based on reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 10, pp. 9499-9512, Oct. 2018.
37. G. Sheng, M. Min, L. Xiao, and S. Liu, "Reinforcement learning based control for unmanned aerial vehicles," Journal of Communications and Information Networks, vol. 3, no. 3, pp. 39-48, Oct. 2018.
38. L. Xiao, D. Jiang, D. Xu, W. Su, N. An and D. Wang, "Secure mobile crowdsensing based on deep learning," China Communications, vol. 15, no. 10, pp. 1-11, Oct. 2018.
39. M. Min, X. Wan, L. Xiao, Y. Chen, M. Xia, D. Wu, H. Dai, "Learning-based privacy-aware offloading for healthcare IoT with energy harvesting," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4307-4316, Oct. 2018.
40. Z. Deng, Y. Zhou, D. Wu, G. Ye, M. Chen, and L. Xiao, "Utility maximization of cloud-based in-car video recording over vehicular access networks," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5213-5226, Dec. 2018.
41. L. Xiao, G. Sheng, X. Wan, W. Su, and P. Cheng, "Learning-based PHY-layer authentication for underwater sensor networks," IEEE Comm. Letters, vol. 23, no. 1, pp. 60-63, Jan. 2019.
42. S. Liu, L. Xiao, L. Huang, X. Wang, "Impulsive noise recovery and elimination: A sparse machine learning based approach," IEEE Trans. Vehicular Technology, vol. 68, no. 3, pp. 2306-2315, Mar. 2019.
43. M. Min, L. Xiao, Y. Chen, P. Cheng, D. Wu, and W. Zhuang, "Learning-based computation offloading for IoT devices with energy harvesting," IEEE Trans. Vehicular Technology, vol. 68, no. 2, pp. 1930-1941, Jan. 2019.
44. M. Hu, L. Zhuang, D. Wu, X. Chen, and L. Xiao, "Learning driven computation offloading for asymmetrically informed edge computing," IEEE Trans. Parallel and Distributed Systems, vol. 30, no. 7, pp. 1802-1815, Aug. 2019.
45. L. Xiao, D. Jiang, Y. Chen, W. Su, and Y. Tang, "Reinforcement-learning-based relay mobility and power allocation for UWSNs against jamming," IEEE Journal of Oceanic Engineering, vol. 45, no. 3, pp. 1148-1156, May 2019.
46. S. Liu, L. Xiao, Z. Han, and Y. Tang, "Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6919-6932, Aug. 2019.
47. L. Xiao, G. Sheng, S. Liu, H. Dai, M. Peng, and J. Song, "Deep reinforcement learning-enabled secure visible light communication against eavesdropping," IEEE Trans. Comm., vol. 67, no. 10, pp. 6994-7005, Oct. 2019.
48. 黄锦灏, 江东华, 丁钰真, 肖亮, 范业仙, 陈建成, "基于强化学习的能量采集物联网视频编码技术," 厦门大学学报(自然科学版), 2019, 58(06):889-893.
49. X. Lu, X. Xiao, L. Xiao, C. Dai, M. Peng, and H. V. Poor, "Reinforcement learning based microgrid energy trading with a reduced power plant schedule," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10728-10737, Dec. 2019.
50. L. Xiao, H. Zhang, Y. Xiao, X. Wan, S. Liu, L. Wang and H. V. Poor, "Reinforcement learning-based downlink interference control for ultra-dense small cells," IEEE Trans. Wireless Comm., vol. 19, no. 1, pp. 423-434, Jan. 2020.
51. X. Lu, L. Xiao, C. Dai, and H. Dai, "UAV-aided cellular communications with deep reinforcement learning against jamming," IEEE Wireless Comm. Magazine, vol. 27, no. 4, pp. 48-53, Aug. 2020.
52. X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang, "Reinforcement learning based PHY authentication for VANETs," IEEE Trans. Vehicular Technology, vol. 69, no. 3, pp. 3068 - 3079, Mar. 2020.
53. M. Hu, Z. Xie, D. Wu, Y. Zhou, X. Chen, and L. Xiao, "Heterogeneous edge offloading with incomplete information: A minority game approach," IEEE Trans. Parallel and Distributed Systems, vol. 31, no. 9, pp. 2139 - 2154, Sep. 2020.
54. L. Xiao, Y. Ding, D. Jiang, J. Huang, D. Wang, J. Li, and H. V. Poor, "A reinforcement learning and blockchain-based trust mechanism for edge networks," IEEE Trans. Comm., vol. 68, no. 9, pp. 5460-5470, Sept. 2020.
55. 黄锦灏, 丁钰真, 肖亮, 沈志荣, 朱珍民, "一种基于强化学习的嵌入式系统抗拒绝服务攻击的缓存调度方案," 计算机科学, 2020.
56. L. Xiao, X. Lu, T. Xu, X. Wan, W. Ji, and Y. Zhang, "Reinforcement learning based mobile offloading for edge computing against jamming and interference," IEEE Trans. Comm., vol. 68, no. 10, pp. 6114-6126, Oct. 2020.
Code.
57. H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, "Deep reinforcement learning based intelligent reflecting surface for secure wireless communications," IEEE Trans. Wireless Comm., vol. 20, no. 1, pp. 375-388, Jan. 2021.
58. Y. Xiao, L. Xiao, X. Lu, H. Zhang, S. Yu, and H. V. Poor, "Deep reinforcement learning based user profile perturbation for privacy aware recommendation," IEEE Internet of Things Journal, in press.
59. 徐堂炜, 张海璐, 刘楚环, 肖亮, 朱珍民, "基于强化学习的低时延车联网群密钥分配管理技术," 网络与信息安全学报, 2020, 6(5): 119-125.
60. 刘思聪, 肖亮, "面向5G的“无线通信原理”教学改革探索," 高教学刊, 2020(35): 132-135.
61. W. Su, J. Tao, Y. Pei, X. You, L. Xiao, and E. Cheng, "Reinforcement learning based efficient underwater image communicaiton," IEEE Comm. Letters, in press.
62. Y. Xiao, G. Niu, L. Xiao, Y. Ding, S. Liu, and Y. Fan, "Reinforcement learning based energy-efficient Internet-of-Things video transmission," Intelligent and Converged Networks, vol. 1, no. 3, pp. 258-270, Dec. 2020.
63. X. Lu, J. Jie, Z. Lin, L. Xiao, J. Li, and Y. Zhang, "Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming," SCIENCE CHINA Information Sciences, in press.
64. L. Xiao, X. Lu, T. Xu, W. Zhuang, and H. Dai, "Reinforcement learning based physical-layer authentication for controller area networks," IEEE Trans. Information Forensics & Security, in press.
65. M. Min, W. Wang, L. Xiao, Y. Xiao and Z. Han, "Reinforcement Learning-Based Sensitive Semantic Location Privacy Protection for VANETs," China Communications, in press.
Conference Papers:
1. L. Xiao, L. Dai, S. Zhou, and Y. Yao, "Information-theoretic capacity analysis in MIMO distributed antenna systems," in Proc. IEEE
Vehicular Technology Conference (VTC), vol. 1, pp. 779-782, Jeju,
Korea, April 2003.
2. L. Xiao, S. Zhou, and Y. Yao, "QoS-oriented scheduling algorithm for 4G mobile multimedia OFDM communications," in
Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio
(PIMRC), vol. 1, pp. 545-549, Sept. 2003, Beijing, China.
3. L. Xiao, A. Wang, S. Zhou, and Y. Yao, "A dynamic resource scheduling algorithm for OFDM system," in Proc. Asia-Pacific Conference on
Communications (APCC), vol. 2, pp. 444-447, Malaysia, Sept. 2003.
4. A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic resource management in the fourth generation wireless systems," in Proc.
International Conference on Communication Technology (ICCT), Beijing, China,
April 2003.
5. L. Xiao and M. Xiao, "A new kind of MIMO-sensor networks M-SENMA," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 4, pp.
2941-2945, Los Angeles, CA, Sept. 2004.
6. H. Dai, L. Xiao, and Q. Zhou, "Energy efficiency of MIMO transmission strategies in wireless sensor networks," in Proc. 2004
International Conference on Computing, Communications and Control Technologies
(CCCT), Austin, TX, Aug. 2004.
7. L. Xiao, L. J. Greenstein, N. B. Mandayam,
and S. Periyalwar, "Sensor networks for estimating and updating the performance of cellular system," in Proc. IEEE
International Conference on Communications(ICC), vol. 5, pp. 2107-2111, June
2006.
8. D. Samardzija, L. Xiao, and N. Mandayam, "Impact of pilot assisted channel state estimation on multiple antenna multiuser TDD systems with spatial filtering," in Proc. IEEE Conference on Information Sciences and Systems
(CISS), pp. 381-385, Princeton, NJ, March 2006.
9. L. Xiao, L. J. Greenstein, N. B. Mandayam,
and W. Trappe, "Fingerprints in the Ether: using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications(ICC), pp. 4646-4651, June 2007.
10. L. Xiao, L. J. Greenstein, N. B. Mandayam,
and W. Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Proc. Conference on Information Sciences and Systems (CISS),
pp. 642-646, Princeton, NJ, Mar. 2008.
11. L. Xiao, L. J. Greenstein, N. B. Mandayam,
and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on
Communications (ICC), pp. 1520-1524, May 2008.
12. L. Xiao, A. Reznik, W. Trappe, C. Ye, Y.
Shah, L. Greenstein, and N. Mandayam,
"PHY-authentication protocol for spoofing detection in wireless networks", in Proc. IEEE Global communications conference (GLOBECOM),
2010.
13. C. Li, H. Dai, L. Xiao, P. Ning, "Analysis and optimization on jamming-resistant collaborative broadcast in large-scale networks," in
Proc. 44th Asilomar Conference on Signals, Systems and Computers (Asilomar),
California, USA, Nov. 2010.
14. L. Xiao, H. Dai, P. Ning, "Jamming-resistant collaborative broadcast in wireless networks, Part I: Single-hop networks," in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.
15. L. Xiao, H. Dai, P. Ning, "Jamming-resistant collaborative broadcast in wireless networks, Part II: Multihop networks," in Proc. IEEE Global communications conference (GLOBECOM'11),
Houston, TX, 2011.
16. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect reciprocity game modeling for secure wireless networks," in Proc. IEEE International
conference on communications (ICC), Ottawa, Canada, June 2012.
17. L. Xiao, Q. Yan, W. Lou and Y. T. Hou,
"Proximity-based security using ambient radio signals," in Proc. IEEE
International conference on communications (ICC), Budapest, Hungary, June 2013.
18. L. Xiao, Y. Chen, K.J.R Liu, "Anti-cheating prosumer energy exchange based on indirect reciprocity," in Proc. IEEE International
conference on communications (ICC), Sydney, Australia, June 2014.
19. L. Xiao, J. Liu, Y. Li, N. B. Mandayam, and
H. V. Poor, "Prospect theoretic analysis of anti-jamming communications in cognitive radio networks," in Proc. IEEE Global Commun.
Conf. (GLOBECOM'14), Dec. 2014.
20. L. Xiao, J. Liu, Q. Li, and H. V. Poor, "Secure mobile crowdsensing game," in Proc. IEEE Int’l Conf. on Commun., (ICC), London, June 2015.
21. J. Liu, L. Xiao, Y. Li and L. Huang, "User-centric analysis on jamming game with action detection error," in Proc. Int’l Conf. on Game
Theory for Networks, Beijing, China, Dec. 2014.
22. Y. Li, L. Xiao, J. Liu and Y. Tang, "Power control stackelberg game in cooperative anti-jamming
communications," in Proc. Int’l Conf. on Game Theory for Networks,
Beijing, China, Dec. 2014.
23. T. Chen, J. Liu, L. Xiao and L. Huang, "Anti-jamming transmissions with learning in heterogenous cognitive radio networks," in Proc. IEEE Wireless Communications and Networking
Conference, So-HetNets Workshop, New Orleans, LA,
Mar. 2015.
24. G. Liu, J. Liu, Y. Li, L. Xiao and Y. Tang, "Jamming detection of smartphones for WiFi signals," in Proc. IEEE Vehicular Technology Conf, Glasgow, Scotland, May 2015.
25. G. Chen, Y. Li, L. Xiao and L. Huang, "Collaborative anti-jamming broadcast with uncoordinated frequency hopping over USRP," in
Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.
26. Y. Li, Q. Li, J. Liu, L. Xiao, "Mobile cloud offloading for malware detections with learning," in Proc. IEEE International Conference on
Computer Communications (INFOCOM), -BigSecurity, Hongkong, April 2015.
27. Y. Li, L. Xiao, Q. Li, W. Su, "
Spoofing detection games in underwater sensor network," in Proc. Oceans Conference of the MTS & IEEE, Washington, DC, Oct. 2015.
28. L. Xiao, Y. Li, G. Liu, Q. Li, W. Zhuang, "Spoofing detection with reinforcement learning in wireless networks," in Proc. IEEE Global
Communications Conference, San Diego, CA, Dec. 2015.
29. L. Xiao, Q. Li, T. Chen, E. Cheng, H. Dai, "Jamming games in underwater sensor networks with reinforcement learning," in Proc. IEEE
Global Communications Conference, San Diego, CA, Dec. 2015.
30. L. Xiao, T. Chen, C. Xie, J. Liu,
"Mobile crowdsensing game in vehicular networks," in Proc. IEEE Region 10 Conference (TENCON), invited talk, Nov.
2015.
31. L. Xiao, C. Xie, T. Chen, H. Dai, H. V.
Poor, "Mobile offloading game against smart attacks," in Proc. IEEE International Conference on Computer Communications (INFOCOM WKSHPS), -BigSecurity, San Francisco, CA, April 2016. (Best paper award)
32. D. Xu, Y. Li, L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect theoretic study of cloud storage defense against advanced persistent threats," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, Dec. 2016.
33. L. Xiao, T. Chen, G. Han, Y. Li, W. Zhuang, and L. Sun, "Channel-based authentication game in MIMO systems," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, Dec. 2016.
34. C. Xie, and L. Xiao, "User-centric view of smart attacks in wireless networks," in Proc. IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), invited talk, Nanjing, China, Oct.2016.
35. G. Han, L. Xiao, H. V. Poor, "Two-dimensional anti-jamming communication based on deep reinforcement learning," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, Mar. 2017.
36. Y. Li, L. Xiao, H. Dai, H. V. Poor, "Game theoretic study of protecting MIMO transmission against smart attacks," in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017. (Best paper award)
37. X. Wan, L. Xiao, Q. Li, Z. Han, "PHY-layer authentication with multiple landmarks with reduced communication overhead," in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.
38. M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, "Defense against advanced persistent threats: A colonel blotto game approach," in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.
39. D. Xu, L. Xiao, N. B. Mandayam, H. V. Poor, "Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats," in Proc. IEEE International Conference on Computer Communications (INFOCOM WKSHPS), -BigSecurity, Atlanta, GA, May 2017.
40. Q. HU, S. Lv, Z. Shi, L. Sun, and L. Xiao, " Defense against advanced persistent threats with expert system for Internet of things, " in Proc. IEEE/IFIP International Conference on Wireless Algorithms, Systems, and Application, Gui Lin, China, June 2017.
41. Y. Qu, S. Yu, L. Gao, S.Peng, Y. Xiang, and L. Xiao, " FuzzyDP: Fuzzy-based big data publishing against inquiry attacks, " in Proc. IEEE Conference on Computer Communication Workshops (INFOCOM WKSHPS), - MobiSec, Atlanta, GA, May 2017.
42. X. Xiao, C. Dai, Y. li, C. Zhou, and L. Xiao, "Energy trading game for microgrids using reinforcement learning," in Proc. EAI International Conference on Game Theory for Network, invited talk, Knoxville, Tennessee, May 2017. (Best paper award)
Code.
43. X. Wan, G. Sheng, Y. Li, L. Xiao, and X. Du, "Reinforcement learning based mobile offloading for cloud-based malware detection," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Singapore, Dec. 2017.
PPT.
44. X. Lu, D. Xu, L. Xiao, L. Wang, and W. Zhuang, "Anti-jamming communication game for UAV-aided VANETs," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Singapore, Dec. 2017.
45. S. Lv, L. Xiao, Q. Hu, X. Wang, C. Hu, and L. Sun, "Anti-jamming power control game in unmanned aerial vehicle networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Singapore, Dec. 2017.
46. C. Dai, D. Xu, L. Xiao, M. Peng, and L. Sun, "Collaborative UFH-based anti-jamming broadcast with learning," in Proc. IEEE/CIC International Conference on Communications in China, Qingdao, China, Oct. 2017.
47. D. Xu, L. Xiao, L. Sun, and M. Lei, "Game theoretic study on blockchain based secure edge networks," in Proc. IEEE/CIC International Conference on Communications in China, Qingdao, China, Oct. 2017.
48. C. Zhang, X. Hei, and L. Xiao, "Dissecting campus WiFi connections in an empirical view," in Proc. International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), Taiwan, Dec. 2017. (Excellent paper)
49. X. Lu, X. Wan, L. Xiao, Y. Tang, and W. Zhuang, "Learning-based rogue edge detection in VANETs with ambient radio signals," in Proc. IEEE International Conference on Communications (ICC), Kansas City, MO, May 2018.
50. M. Min, L. Xiao, D. Xu, L. Huang, and M. Peng, "Learning-based defense against malicious unmanned aerial vehicles,"in Proc. IEEE Vehicular Technology Conference (VTC Spring), Porto, Portugal, June 2018.
51. Y. Chen, Y. Li, D. Xu, and L. Xiao, "DQN-based power control for IoT transmission against jamming," in Proc. IEEE Vehicular Technology Conference (VTC Spring), Porto, Portugal, June 2018.
52. C. Dai, X. Xiao, L. Xiao, P. Cheng, "Reinforcement learning based power control for VANET broadcast against jamming," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Abu Dhabi, UAE, Dec. 2018.
53. H. Zhang, M. Min, L. Xiao, S. Liu, P. Cheng and M. Peng, "Reinforcement learning-based interference control for ultra-dense small cells," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Abu Dhabi, UAE, Dec. 2018.
54. Z. Xiao, B. Gao, S. Liu and L. Xiao, "Learning based power control for mmWave massive MIMO against jamming," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Abu Dhabi, UAE, Dec. 2018.
55. C. Dai, X. Xiao, Y. Ding, L. Xiao and Y. Tang, "Learning based security for VANET with blockchain," in Proc. IEEE International Conf. Commun. Systems, Chengdu, China, Dec. 2018.
56. S. Liu, Y. Chen, H. Huang, L. Xiao, X. Hei, "Towards smart educational recommendations with reinforcement learning in classroom," in Proc. IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE2018), Wollongong, Australia, Dec. 2018.
57. W. Wang, M. Min, L. Xiao, Y. Chen and H. Dai, "Protecting semantic trajectory privacy for VANET with reinforcement learning," in Proc. IEEE International Conference on Communications (ICC), Shanghai, China, May 2019.
58. T. Xu, X. Lu, L. Xiao, Y. Tang and H. Dai, "Voltage based authentication for controller area networks with reinforcement learning," in Proc. IEEE International Conference on Communications (ICC), Shanghai, China, May 2019.
59. C. Dai, L. Xiao, X. Wan and Y. Chen, "Reinforcement learning with safe exploration for network security," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, May 2019.
60. Z. Lin, X. Lu, C. Dai, G. Sheng and L. Xiao, "Reinforcement learning based UAV trajectory and power control against jamming," in Proc. International Conference on Machine Learning for Cyber Security (ML4CS), Xi'an, China, Sept. 2019.
61. Y. Ding, D. Jiang, J. Huang, L. Xiao, S. Liu, Y. Tang and H. Dai, "QoE-aware power control for UAV-aided media transmission with reinforcement learning," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Waikoloa, HI, Dec. 2019.
62. Y. Xiao, L. Xiao, H. Zhang, S. Yu, and H. V. Poor, "Privacy aware recommendation: Reinforcement learning based user profile perturbation," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Waikoloa, HI, Dec. 2019.
63. W. Wang, X. Lu, S. Liu, L. Xiao, and B. Yang, "Energy efficient relay in UAV networks against jamming: A reinforcement learning based approach," in Proc. IEEE Vehicular Technology Conference (VTC WKSHPS), -High Mobility Wireless Communications (HMWC), Antwerp, Belgium, May 2020.
64. K. Liu, X. Lu, L. Xiao and L. Xu, "Learning based energy efficient radar power control against deceptive jamming," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Taipei, Taiwan, China, Dec. 2020.
65. J. Jie, X. Lu, T. Xu, L. Xiao and Y. Zhang, "Robot relay for UAV communications against jamming: A reinforcement learning approach," in Proc. China Conference on Internet of Things (Wireless Sensor Network), Dunhuang, China, Sept. 2020.
66. P. Ye, Y. Wang, J. Li, L. Xiao and G. Zhu, "(τ, ϵ)-greedy reinforcement learning for anti-jamming wireless communications," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Taipei, Taiwan, China, Dec. 2020.
67. X. You, Z. Lv, Y. Ding, W. Su and L. Xiao, "Reinforcement learning based energy efficient underwater localization," in Proc. International Conf. Wireless Comm. and Signal Process. (WCSP), Nanjing, China, Oct. 2020.
Invited Talks:
1.
"Channel-Based Spoofing Detection in Wireless Networks," UESTC’ 08
(Chengdu, China), Xiamen U.’ 08 (Xiamen, China), Bell Lab’ 09, InterDigital’ 09, BUPT’09 (Beijing, China).
2.
"Jamming-Resistant Collaborative Broadcast In Wireless Networks,"
City U. of HK‘11 (Hongkong), UMD’11, UIC’2011, and Northwestern’
11.
3. "Indirect Reciprocity
Security Game for Large-Scale Mobile Wireless Networks," National Chiao Tung Univ. (Taiwan)'12, Stevens' 12, Rutgers'12.
4. "User-centric game
theoretic study on network security," Annual Chinese conference on communication
theory and signal processing'14, XJTU'14, XIDIAN'14, ZJU'15.
5.
"智能数据时代的网络安全研究,"
CCF广州论坛: 从"大数据"到"智能数据" , 2016.11.23, 广州.
6.
"Mobile Offloading for Cloud-based Malware Detections with Learning,"
第六届 " 山海论坛 "-大数据与高性能计算, 2016.11.23, 广州.
7.
"基于强化学习算法的网络安全技术研究," 广州大学计算机与网络安全前沿论坛, 2017.06.06, 广州.
8.
"针对主观攻击者的高级持续安全威胁博弈模型研究," 中国计算机大会, 2017.10.27, 福州.
9.
"UAV Relay in VANETs Against Smart Jamming with Reinforcement Learning," DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING, UNIVERSITY OF MACAU, 2017.11.30.
10.
"基于强化学习的水下抗干扰技术研究," 2017年度海洋信息技术研讨会, 2017.12.22, 广州.
11.
"基于深入强化学习的群智感知抗虚假感知机制," 2018年全国深度学习技术应用大会, 2018.4.21, 厦门.
12.
"基于深入强化学习的移动群智感知机制," 第二届网络空间安全喻园青年科学家论坛, 2018.5.5, 武汉.
13.
"Game-theoretic Methods for Modeling and Defending against Advanced Persistent Threats in Wireless Systems," The 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2018), Tutorial, 2018.5.7, Shanghai, China.
Professional
Activities:
1. Associate Editor, IEEE Transactions on Information Forensics and
Security, Since May 2016
2. TPC Member of IEEE INFOCOM, GLOBECOM, ICC, WCNC
3. Member of CCF Technical Committee on Networking and Data
Communications
4. Senior Member of IEEE
5. Member of ACM
6. Editor, KSII Transactions on Internet and Information Systems, 2013
7. Associate Editor, Wiley's Security and Communication Networks Journal,
2013
8. Associate Editor, IET Communications, 2015
9. Senior Member of China Computer Federation (CCF)
10. Senior Member of Chinese Institute of Electronics
11. Founding Members, IEEE ComSoc Technical Committee on Big Data (TCBD)
12. Guest editor, IEEE Journal of Selected Topics in Signal Processing, SI:CRCR
13. Associate editor, IEEE Transactions on Communications (TCOM)
14. 执行编委, 《计算机科学》
15. CISS Symposium Chair, ICC'2019
16. Workshop Chairs, SecureComm 2019 - 15th EAI International Conference on Security and Privacy in Communication Networks
17. Associate editor, IEEE Transactions on Dependable and Secure Computing
18. CCF物联网专委会委员
19.《网络与信息安全学报》编委会委员
20.《China Communications》编委
21.中国通信学会青年工作委员会委员
22.中国通信学会通信理论与信号处理委员会委员
23.中国计算机学会网络与数据通信专委会委员
24.中国人工智能学会人工智能与安全专委会委员
25.中国自动化学会自适应动态规划与强化学习专委会委员
26.Publicity Co-Chairs, IEEE/CIC International Conference on Communications in China (ICCC2021)
27.Publicity Chairs, International Conference on Big Data Computing and Communications, 2021
Teaching:
1. "Wireless Communication Techniques" - Fall
2009, Fall 2010, Fall 2011, Fall 2012, Spring 2013
2. "Digital Communication" - Spring
2010
3. "Advanced topics: Wideband Digital Communication Techniques"
- Spring 2010, Spring 2011, Spring 2012, Spring 2013,
Spring 2014
4. "Scientific English on Communications and Electronic
Information" - Spring 2010, Spring 2011, Spring
2012, Spring 2013, Spring 2014
5. "Principles of Wireless Communication"- Fall 2010, Fall 2011.
专利:
1. Liang Xiao*, Chunxuan Ye, Suhas Mathur, Yogendra C Shah,
Alexander Reznik, "Authentication for secure
wireless communication, " 美国专利:PCTUS0957477,2014.6.19,已授权.
2. 肖亮*、颜蜜、杜亮、黄联芬. "一种基于联合干扰的防御认知无线电自私攻击方法[P]. " 中国专利:ZL201210065341.8,已授权.
3. 肖亮*、康姗、颜蜜. "基于传感器的认知无线网络对多种类型攻击的检测方法[P]. " 中国专利:ZL201210064414.1,已授权.
4. 肖亮*、李强达、陈桂权、黄联芬、唐余亮. "一种检测和识别考场内开机手机的方法[P]. " 中国专利:ZL201410369094.X,已授权.
5. 肖亮*、李炎达、刘金亮、李燕. "一种基于移动群智感知的路况信息汇集方法[P]. " 中国专利:ZL201510127406.0,已授权.
6. 肖亮*、刘国隆、李燕. "一种基于强化学习的无线信道指纹方法[P]. " 中国专利:ZL201510219184.5,已授权.
7. 肖亮*、谢彩霞、陈天花、李炎达. "一种车载网络的移动群智感知方法[P]. " 中国专利:ZL201510504069.2,已授权.
8. 肖亮*、陈天花、徐亦舒、李燕、陈桂权. "一种移动终端的计算任务的云端转移方法[P]. " 中国专利:ZL201510219984.7,已授权.
9. 肖亮*、许冬瑾、范业仙、谢彩霞. "一种云存储系统的持续性攻击的检测方法[P]. " 中国专利:ZL201710018243.1,已授权.
10. 肖亮*、李强达、万晓玥、唐余亮. "一种基于多监督节点和信道信息的无线认证方法[P]. " 中国专利:ZL 201710181834.0,已授权.
11. 肖亮*、闵明慧、陈烨、许冬瑾、唐余亮. "基于强化学习的检测高级持续威胁的资源调度方法[P]. " 中国专利:ZL201710684939.8,已授权.
12. 肖亮*、周长华、陈桂权、刘金亮. "基于多用户强化学习的认知无线网络抗敌意干扰方法[P]. " 中国专利:ZL201510355173.X,已授权.
13. 肖亮*、盛葛怡、万晓玥、唐余亮. "一种基于强化学习的多途径保密信息通信方法[P]. " 中国专利:ZL201810663625.4,已授权.
14. 唐余亮*、林志平、肖亮. "车联网中多信道MAC层数据自适应传输方法、介质及系统[P]. " 中国专利:ZL201910036054.6,已授权.
软件著作权:
1. " 抗敌意干扰的无线认知网络非协调跳频广播系统. " 软件著作权: 2013SR153783, 2013.12.23.
2. " 基于RSS的无线信道指纹采集与实时识别系统. " 软件著作权: 2012SR110529, 2012.11.19.
3. " 认知无线电网络中基于间接互惠的安全系统
. "
软件著作权
: 2013SR153776, 2013.04.16.
4. " 基于跨层设计的USRP无线指纹识别系统. " 软件著作权: 2013SR081611, 2013.12.23.
5. " 安卓手机的敌意干扰检测软件. " 软件著作权: 2014SR168163, 2014.7.6.
6. " 抗敌意干扰的节点协作跳频广播系统. " 软件著作权: 2014SR077739, 2014.2.25.
7. " 基于强化学习的认知无线网络的抗敌意干扰系统. " 软件著作权: 2015SR148443, 2015.7.31.
8. " 基于环境指纹的安卓手机认证系统. " 软件著作权: 2016SR108135, 2016.5.17.
当前学生名单:
博士生
|
|

卢晓珍
|

肖奕霖
|

刘楚环
|

吕泽芳
|
|
硕士生
|
|

张海璐
|

黄锦灏
|

汪苇杭
|

徐堂炜
|

丁钰真
|
|

林紫涵
|

揭晶方
|

林海彬
|

李鸿雁
|

洪思愿
|

刘可欣
|

游旭东(协助指导)
|
|

李鹏敏
|

牛国航
|

余诗
|

颜晓豪
|

许诗雨
|

万鲲鹏
|
|
已毕业学生名单:
姓名
|
年级
|
毕业去向
|
颜蜜
|
2009级
|
中国建设银行总行信息技术类直属中心(广州开发中心)
|
林文彬
|
2009级 (协助黄联芬老师指导)
|
国家电网
|
庞文镇
|
2009级
|
南京熊猫汉达科技有限公司
|
陈乃文
|
2010级
|
福建星网锐捷网络有限公司
|
陈晓晓
|
2010级
|
华为技术有限公司
|
康姗
|
2010级
|
华为技术有限公司
|
张磊
|
2011级
|
中国电子科技集团
|
杜亮
|
2011级 (副导师:黄联芬)
|
中国建设银行总行信息技术类直属中心(广州开发中心)
|
黄伟田
|
2011级 (副导师:唐余亮)
|
福建移动莆田公司
|
陈桂权
|
2012级
|
国家电网
|
刘金亮
|
2013级
|
招商银行网络科技有限公司
|

刘金亮
|
刘囯隆
|
2013级
|
华为技术有限公司
|

刘国隆
|
李燕
|
2013级
|
华福证券有限公司
|

李燕
|
李文锋
|
2015级
|
福建星网瑞捷网络有限公司
|

李文锋
|
陈天花
|
2014级
|
华为技术有限公司
|

陈天花
|
李强达
|
2014级
|
华为技术有限公司
|

李强达
|
周长华
|
2014级
|
兴业数字金融服务(上海)股份有限公司
|

周长华
|
韩国安
|
2015级
|
腾讯
|

韩国安
|
李炎达
|
2015级
|
阿里巴巴
|

李炎达
|
谢彩霞
|
2015级
|
福建星网瑞捷网络有限公司
|

谢彩霞
|
万晓玥
|
2016级
|
厦门航空有限公司
|

万晓玥
|
肖星宇
|
2016级
|
网易游戏
|

肖星宇
|
许冬瑾
|
2016级
|
中国移动杭州研发中心
|

许冬瑾
|
江东华
|
2017级
|
龙岩市党政类人才引进
|

江东华
|
戴灿煌
|
2017级
|
网易游戏
|

戴灿煌
|
盛葛怡
|
2017级
|
浙江省选调生
|

盛葛怡
|
陈烨
|
2017级
|
厦门航空有限公司
|

陈烨
|
闵明慧
|
2016级
|
中国矿业大学
|

闵明慧
|
学生活动:
1. CNCC 2014 中国计算机大会,中国郑州, 2014.10

2. GAMENET 2014,中国北京, 2014.11

3. IEEE WCNC 2015,美国新奥尔良市, 2015.03.08-2015.03.12
4. 香港城市大学学术交流 & IEEE INFOCOM 2015,中国香港,2015.4.25-2015.5.1
5. MobiHoc
2015,中国杭州,2015.6.22-2015.6.26
6. WCNT 2015,中国马鞍山, 2015.09

7. TENCON 2015, 中国澳门, 2015.11
8. GLOBECOM 2015, 美国圣地亚哥,2015.12

9.
2016.06
10.
ICUWB 2016, 中国南京,2016.10
11. WCSP 2016, 中国扬州,2016.10

12.
2016.12 实验室游玩
13. GLOBECOM 2016, 美国华盛顿,2016.12
14. ICASSP 2017, 美国新奥尔良市,2017.3
15. ICC 2017, 法国巴黎,2017.5.20-2017.5.25
16.
2017.06
17.
国家自然科学基金委员会重大研究计划项目年度中期交流会,中国哈尔滨,2017.07.12
18. ICCC 2017, 中国青岛,2017.10.22-2017.10.24
19. 中国计算机大会 2017, 中国福州,2017.10.25-2017.10.28
20. GLOBECOM 2017, 新加坡,2017.12.4-2017.12.8
21.
空间信息网络基础理论与关键技术-重大研究计划年度交流会,中国北京,2018.1.26-2018.1.28
22. Wiopt 2018, 中国上海,2018.05.07-2018.05.11
23. ICC 2018, 美国堪萨斯,2018.5.20-2018.5.24
24.
2018.06
25. VTC 2018, 葡萄牙波尔图,2018.6.3-2018.6.6
26. 网络空间安全西湖国际论坛, 杭州,2018.11.15-2018.11.17
27. 第八届吴文俊人工智能科学技术奖颁奖典暨2018中国人工智能产业年会, 苏州,2018.12.08-2018.12.10
28. 2018中国信息通信大会, 成都,2018.12.14-2018.12.16
29. ICCS 2018, 成都,2018.12.19-2018.12.21
30. ICASSP 2019, 英国布莱顿,2019.5.12-2019.5.17
31. ICC 2019, 上海,2019.5.20-2019.5.24
32.
2019.06
33. 福建省第二届工业控制系统信息安全攻防大赛, 福州,2019.09
34. ML4CS 2019, 西安,2019.9.19-2019.9.21
35. GLOBECOM 2019, 美国夏威夷,2019.12.9-2019.12.13
36.2020,06
37.CWSN2020, 敦煌,2020.9.18-2020.9.21
38.2020.11 实验室游玩