
Bin Xiao 0001
Person information
- affiliation: Hong Kong Polytechnic University, Department of Computing, Hung Hom, Kowloon, Hong Kong
- affiliation (former): University of Texas at Dallas, Richardson, TX, USA
Other persons with the same name
- Bin Xiao — disambiguation page
- Bin Xiao 0002
— Chongqing University of Posts and Telecommunications, Key Laboratory of Computational Intelligence, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j85]Tongqing Zhou
, Bin Xiao
, Zhiping Cai
, Ming Xu:
A Utility Model for Photo Selection in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(1): 48-62 (2021) - 2020
- [j84]Laphou Lao, Zecheng Li, Songlin Hou, Bin Xiao
, Songtao Guo, Yuanyuan Yang:
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling. ACM Comput. Surv. 53(1): 18:1-18:32 (2020) - [j83]Xin Xie
, Xiulong Liu
, Xibin Zhao, Weilian Xue, Bin Xiao
, Heng Qi
, Keqiu Li
, Jie Wu
:
Implementation of Differential Tag Sampling for COTS RFID Systems. IEEE Trans. Mob. Comput. 19(8): 1848-1861 (2020) - [j82]Xin Xie
, Xiulong Liu
, Heng Qi
, Bin Xiao, Keqiu Li
, Jie Wu
:
Geographical Correlation-Based Data Collection for Sensor-Augmented RFID Systems. IEEE Trans. Mob. Comput. 19(10): 2344-2357 (2020) - [j81]Shang Gao
, Zhe Peng
, Bin Xiao
, Aiqun Hu
, Yubo Song
, Kui Ren:
Detection and Mitigation of DoS Attacks in Software Defined Networks. IEEE/ACM Trans. Netw. 28(3): 1419-1433 (2020) - [j80]Xiaoyong Tang
, Bin Xiao
, Kenli Li:
Indoor Crowd Density Estimation Through Mobile Smartphone Wi-Fi Probes. IEEE Trans. Syst. Man Cybern. Syst. 50(7): 2638-2649 (2020) - [j79]Yuan Yao, Bin Xiao, Wen Wang, Gang Yang, Xingshe Zhou, Zhe Peng
:
Real-Time Cache-Aided Route Planning Based on Mobile Edge Computing. IEEE Wirel. Commun. 27(5): 155-161 (2020) - [c99]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. ICC 2020: 1-6 - [c98]Congcong Shi, Rui Song, Xinyu Qi, Yubo Song, Bin Xiao, Sanglu Lu:
ClickGuard: Exposing Hidden Click Fraud via Mobile Sensor Side-channel Analysis. ICC 2020: 1-6 - [c97]Haotian Wu
, Jun Tao, Bin Xiao:
Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing. ICC 2020: 1-6 - [c96]Laphou Lao, Xiaohai Dai, Bin Xiao, Songtao Guo:
G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications. IPDPS 2020: 664-673 - [c95]Xuan Liu, Quan Yang, Shigeng Zhang, Bin Xiao:
RLLL: Accurate Relative Localization of RFID Tags with Low Latency. IWQoS 2020: 1-10 - [i2]You Chen, Guyue Li, Chen Sun, Junqing Zhang, Eduard A. Jorswieck, Bin Xiao:
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks. CoRR abs/2005.08476 (2020)
2010 – 2019
- 2019
- [j78]Guyue Li
, Chen Sun, Junqing Zhang
, Eduard A. Jorswieck
, Bin Xiao
, Aiqun Hu:
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 21(5): 497 (2019) - [j77]Yuan Yao
, Bin Xiao
, Gang Yang, Yujiao Hu
, Liang Wang
, Xingshe Zhou:
Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI. IEEE J. Sel. Areas Commun. 37(11): 2588-2602 (2019) - [j76]Songtao Guo
, Jiadi Liu, Yuanyuan Yang
, Bin Xiao
, Zhetao Li
:
Energy-Efficient Dynamic Computation Offloading and Cooperative Task Scheduling in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 18(2): 319-333 (2019) - [j75]Yuan Yao
, Bin Xiao
, Gaofei Wu, Xue Liu, Zhiwen Yu
, Kailong Zhang
, Xingshe Zhou:
Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI. IEEE Trans. Mob. Comput. 18(2): 362-375 (2019) - [j74]Zhe Peng
, Yuan Yao
, Bin Xiao
, Songtao Guo, Yuanyuan Yang
:
When Urban Safety Index Inference Meets Location-Based Data. IEEE Trans. Mob. Comput. 18(11): 2701-2713 (2019) - [j73]Jia Liu
, Shigang Chen
, Qingjun Xiao, Min Chen
, Bin Xiao
, Lijun Chen:
Efficient Information Sampling in Multi-Category RFID Systems. IEEE/ACM Trans. Netw. 27(1): 159-172 (2019) - [j72]Jia Liu
, Bin Xiao
, Xuan Liu, Kai Bu
, Lijun Chen
, Changhai Nie:
Efficient Polling-Based Information Collection in RFID Systems. IEEE/ACM Trans. Netw. 27(3): 948-961 (2019) - [j71]Zhikai Kuang, Yawei Shi
, Songtao Guo
, Jingpei Dan, Bin Xiao
:
Multi-User Offloading Game Strategy in OFDMA Mobile Cloud Computing System. IEEE Trans. Veh. Technol. 68(12): 12190-12201 (2019) - [c94]Shang Gao
, Zecheng Li, Zhe Peng
, Bin Xiao
:
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. CCS 2019: 833-850 - [c93]Lei Han, Bin Xiao
, Xuwei Dong, Zhaoyan Shen, Zili Shao:
DS-Cache: A Refined Directory Entry Lookup Cache with Prefix-Awareness for Mobile Devices. DATE 2019: 1052-1057 - [c92]Yaodong Huang, Jiarui Zhang, Jun Duan, Bin Xiao
, Fan Ye, Yuanyuan Yang
:
Resource Allocation and Consensus on Edge Blockchain in Pervasive Edge Computing Environments. ICDCS 2019: 1476-1486 - [c91]Zhe Peng, Haotian Wu
, Bin Xiao
, Songtao Guo:
VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems. ICDE Workshops 2019: 1-6 - 2018
- [j70]Zhe Peng
, Shang Gao
, Bin Xiao
, Guiyi Wei, Songtao Guo, Yuanyuan Yang
:
Indoor Floor Plan Construction Through Sensing Data Collected From Smartphones. IEEE Internet Things J. 5(6): 4351-4364 (2018) - [j69]Zhe Peng
, Shang Gao
, Zecheng Li, Bin Xiao
, Yi Qian:
Vehicle Safety Improvement through Deep Learning and Mobile Sensing. IEEE Netw. 32(4): 28-33 (2018) - [j68]Shang Gao
, Zecheng Li, Bin Xiao
, Guiyi Wei:
Security Threats in the Data Plane of Software-Defined Networks. IEEE Netw. 32(4): 108-113 (2018) - [j67]Fei Wang, Songtao Guo, Yuanyuan Yang
, Bin Xiao
:
Relay Selection and Power Allocation for Cooperative Communication Networks With Energy Harvesting. IEEE Syst. J. 12(1): 735-746 (2018) - [j66]Hongyan Yu, Songtao Guo
, Yuanyuan Yang
, Bin Xiao
:
Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel. IEEE Syst. J. 12(4): 3291-3302 (2018) - [j65]Zhe Peng
, Shang Gao
, Bin Xiao
, Songtao Guo, Yuanyuan Yang
:
CrowdGIS: Updating Digital Maps via Mobile Crowdsensing. IEEE Trans Autom. Sci. Eng. 15(1): 369-380 (2018) - [j64]Songtao Guo, Yawei Shi, Yuanyuan Yang
, Bin Xiao
:
Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks. IEEE Trans. Mob. Comput. 17(7): 1524-1537 (2018) - [j63]Fei Wang
, Songtao Guo
, Bin Xiao
, Yuanyuan Yang
, Xi Zhang
:
Resource Allocation and Admission Control for an Energy Harvesting Cooperative OFDMA Network. IEEE Trans. Veh. Technol. 67(5): 4071-4086 (2018) - [j62]Yuan Yao
, Zhe Peng
, Bin Xiao
:
Parallel Hyper-Heuristic Algorithm for Multi-Objective Route Planning in a Smart City. IEEE Trans. Veh. Technol. 67(11): 10307-10318 (2018) - [c90]Shang Gao
, Zecheng Li, Yuan Yao, Bin Xiao
, Songtao Guo, Yuanyuan Yang
:
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. AsiaCCS 2018: 413-424 - [c89]Rui Song, Yubo Song, Shang Gao
, Bin Xiao
, Aiqun Hu:
I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks. GLOBECOM 2018: 1-6 - [c88]Jiwei Li, Zhe Peng
, Bin Xiao
:
New Mobility-Aware Application Offloading Design with Low Delay and Energy Efficiency. ICC 2018: 1-6 - [c87]Xiaokun Li, Siyang Wang, Weigang Wu, Xu Chen, Bin Xiao
:
Interest Tree Based Information Dissemination via Vehicular Named Data Networking. ICCCN 2018: 1-9 - [c86]Tongqing Zhou, Bin Xiao
, Zhiping Cai, Ming Xu, Xuan Liu:
From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing. INFOCOM 2018: 1979-1987 - 2017
- [j61]Jiwei Li, Zhe Peng
, Shang Gao
, Bin Xiao
, Henry C. B. Chan
:
Smartphone-assisted energy efficient data communication for wearable devices. Comput. Commun. 105: 33-43 (2017) - [j60]Kai Bu
, Minyu Weng, Yi Zheng, Bin Xiao
, Xuan Liu:
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID. IEEE Commun. Surv. Tutorials 19(3): 1682-1700 (2017) - [j59]Kai Bu, Bin Xiao
, Yi Qian:
High performance and security in cloud computing. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j58]Wei Chen, Xiapu Luo
, Chengyu Yin, Bin Xiao
, Man Ho Au
, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j57]Feng Zhu
, Bin Xiao
, Jia Liu, Lijun Chen:
Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems. IEEE Trans. Commun. 65(1): 283-295 (2017) - [j56]Feng Zhu, Bin Xiao
, Jia Liu, Bin Wang, Qing-feng Pan, Lijun Chen:
Exploring Tag Distribution in Multi-Reader RFID Systems. IEEE Trans. Mob. Comput. 16(5): 1300-1314 (2017) - [j55]Xin Xie
, Xiulong Liu, Keqiu Li, Bin Xiao
, Heng Qi:
Minimal Perfect Hashing-Based Information Collection Protocol for RFID Systems. IEEE Trans. Mob. Comput. 16(10): 2792-2805 (2017) - [j54]Xiulong Liu, Bin Xiao
, Keqiu Li, Alex X. Liu
, Jie Wu, Xin Xie
, Heng Qi:
RFID Estimation With Blocker Tags. IEEE/ACM Trans. Netw. 25(1): 224-237 (2017) - [j53]Xiulong Liu, Xin Xie
, Keqiu Li
, Bin Xiao
, Jie Wu, Heng Qi, Dawei Lu:
Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems. IEEE/ACM Trans. Netw. 25(1): 278-291 (2017) - [j52]Qingjun Xiao
, Bin Xiao
, Shigang Chen, Jiming Chen:
Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems. IEEE/ACM Trans. Netw. 25(1): 392-405 (2017) - [c85]Yuan Yao, Bin Xiao
, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. DSN 2017: 591-602 - [c84]Guyue Li, Aiqun Hu, Junqing Zhang
, Bin Xiao
:
Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation. GLOBECOM 2017: 1-6 - [c83]Zhe Peng
, Bin Xiao
, Yuan Yao, Jichang Guan, Fan Yang:
U-safety: Urban safety analysis in a smart city. ICC 2017: 1-6 - [c82]Yubo Song, Shang Gao
, Aiqun Hu, Bin Xiao
:
Novel attacks in OSPF networks to poison routing table. ICC 2017: 1-6 - [c81]Yuan Yao, Zhe Peng
, Bin Xiao
, Jichang Guan:
An efficient learning-based approach to multi-objective route planning in a smart city. ICC 2017: 1-6 - [c80]Ting Zhang, Guo-Jun Qi, Bin Xiao, Jingdong Wang
:
Interleaved Group Convolutions. ICCV 2017: 4383-4392 - [c79]Jia Liu, Shigang Chen, Bin Xiao
, Yanyan Wang, Lijun Chen:
Category Information Collection in RFID Systems. ICDCS 2017: 2220-2225 - [c78]Tongqing Zhou, Zhiping Cai, Bin Xiao
, Yueyue Chen, Ming Xu:
Detecting Rogue AP with the Crowd Wisdom. ICDCS 2017: 2327-2332 - [c77]Shang Gao
, Zhe Peng
, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. INFOCOM 2017: 1-9 - [c76]Shang Gao
, Zhe Peng
, Bin Xiao
, Qingjun Xiao, Yubo Song:
SCoP: Smartphone energy saving by merging push services in Fog computing. IWQoS 2017: 1-10 - [c75]Feng Zhu, Bin Xiao
, Jia Liu, Yanyan Wang, Lijun Chen:
Dynamic Grouping in RFID Systems. SECON 2017: 1-9 - [i1]Ting Zhang, Guo-Jun Qi, Bin Xiao, Jingdong Wang:
Interleaved Group Convolutions for Deep Neural Networks. CoRR abs/1707.02725 (2017) - 2016
- [j51]Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao
, Xuan Liu, Shigeng Zhang:
Who stole my cheese?: Verifying intactness of anonymous RFID systems. Ad Hoc Networks 36: 111-126 (2016) - [j50]Xuan Liu, Shigeng Zhang, Bin Xiao
, Kai Bu:
Flexible and Time-Efficient Tag Scanning with Handheld Readers. IEEE Trans. Mob. Comput. 15(4): 840-852 (2016) - [j49]Jia Liu, Min Chen, Bin Xiao
, Feng Zhu, Shigang Chen, Lijun Chen:
Efficient RFID Grouping Protocols. IEEE/ACM Trans. Netw. 24(5): 3177-3190 (2016) - [c74]Wei Chen, Xiapu Luo
, Chengyu Yin, Bin Xiao
, Man Ho Au
, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. ACISP (1) 2016: 20-39 - [c73]Xuan Liu, Bin Xiao
, Shigeng Zhang, Kai Bu:
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems. ICC 2016: 1-6 - [c72]Shang Gao
, Zhe Peng
, Bin Xiao
, Yubo Song:
Secure and energy efficient prefetching design for smartphones. ICC 2016: 1-6 - [c71]Xuan Liu, Bin Xiao
, Feng Zhu, Shigeng Zhang:
Let's work together: Fast tag identification by interference elimination for multiple RFID readers. ICNP 2016: 1-10 - [c70]Jia Liu, Bin Xiao
, Xuan Liu, Lijun Chen:
Fast RFID Polling Protocols. ICPP 2016: 304-313 - [c69]Songtao Guo, Bin Xiao
, Yuanyuan Yang
, Yang Yang:
Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing. INFOCOM 2016: 1-9 - [c68]Jiwei Li, Zhe Peng
, Bin Xiao
:
Smartphone-assisted smooth live video broadcast on wearable cameras. IWQoS 2016: 1-6 - [c67]Xin Xie
, Xiulong Liu, Weilian Xue, Keqiu Li, Bin Xiao
, Heng Qi:
Fast Collection of Data in Sensor-Augmented RFID Networks. SECON 2016: 1-9 - [c66]Feng Zhu, Bin Xiao
, Jia Liu, Xuan Liu, Lijun Chen:
PLAT: A Physical-Layer Tag Searching Protocol in Large RFID Systems. SECON 2016: 1-9 - 2015
- [j48]Jinhai Xu, Songtao Guo, Bin Xiao
, Jing He:
Energy-efficient big data storage and retrieval for wireless sensor networks with nonuniform node distribution. Concurr. Comput. Pract. Exp. 27(18): 5765-5779 (2015) - [j47]Xuan Liu, Bin Xiao
, Shigeng Zhang, Kai Bu, Alvin Chan:
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems. IEEE Trans. Computers 64(11): 3265-3277 (2015) - [j46]Songtao Guo, Fei Wang, Yuanyuan Yang
, Bin Xiao
:
Energy-Efficient Cooperative Tfor Simultaneous Wireless Information and Power Transfer in Clustered Wireless Sensor Networks. IEEE Trans. Commun. 63(11): 4405-4417 (2015) - [j45]Xuan Liu, Bin Xiao
, Shigeng Zhang, Kai Bu:
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution. IEEE Trans. Parallel Distributed Syst. 26(6): 1775-1788 (2015) - [j44]Yu Hua, Bin Xiao
, Xue Liu, Dan Feng:
The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems. IEEE Trans. Parallel Distributed Syst. 26(11): 3194-3207 (2015) - [c65]Xiulong Liu, Bin Xiao
, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie
:
RFID cardinality estimation with blocker tags. INFOCOM 2015: 1679-1687 - [c64]Jia Liu, Bin Xiao
, Shigang Chen, Feng Zhu, Lijun Chen:
Fast RFID grouping protocols. INFOCOM 2015: 1948-1956 - [c63]Jiwei Li, Zhe Peng
, Bin Xiao
, Yu Hua:
Make smartphones last a day: Pre-processing based computer vision application offloading. SECON 2015: 462-470 - 2014
- [j43]Kai Bu, Xuan Liu, Bin Xiao
:
Approaching the time lower bound on cloned-tag identification for large RFID systems. Ad Hoc Networks 13: 271-281 (2014) - [j42]Jiaqing Luo, Bin Xiao
, Qingjun Xiao, Jiannong Cao
, Minyi Guo:
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks. ACM Trans. Auton. Adapt. Syst. 9(1): 5:1-5:17 (2014) - [j41]Qingjun Xiao, Bin Xiao
, Kai Bu, Jiannong Cao
:
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach. IEEE/ACM Trans. Netw. 22(2): 608-621 (2014) - [j40]Xiulong Liu, Keqiu Li, Geyong Min
, Kai Lin, Bin Xiao
, Yanming Shen, Wenyu Qu:
Efficient Unknown Tag Identification Protocols in Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 25(12): 3145-3155 (2014) - [c62]Xiulong Liu, Heng Qi, Keqiu Li, Jie Wu, Weilian Xue, Geyong Min, Bin Xiao
:
Efficient Detection of Cloned Attacks for Large-Scale RFID Systems. ICA3PP (1) 2014: 85-99 - [c61]Xiulong Liu, Keqiu Li, Heng Qi, Bin Xiao
, Xin Xie
:
Fast Counting the Key Tags in Anonymous RFID Systems. ICNP 2014: 59-70 - [c60]Kai Bu, Jia Liu, Bin Xiao
, Xuan Liu, Shigeng Zhang:
Intactness verification in anonymous RFID systems. ICPADS 2014: 134-141 - [c59]Jia Liu, Bin Xiao
, Kai Bu, Lijun Chen:
Efficient distributed query processing in large RFID-enabled supply chains. INFOCOM 2014: 163-171 - [c58]Xuan Liu, Bin Xiao
, Kai Bu, Shigeng Zhang:
LOCK: A fast and flexible tag scanning mechanism with handheld readers. IWQoS 2014: 360-369 - 2013
- [j39]Qingjun Xiao, Kai Bu, Bin Xiao
, Limin Sun:
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems. Concurr. Comput. Pract. Exp. 25(14): 2080-2097 (2013) - [j38]Hu Guan, Jingyu Zhou, Bin Xiao
, Minyi Guo, Tao Yang:
Fast dimension reduction for document classification based on imprecise spectrum analysis. Inf. Sci. 222: 147-162 (2013) - [j37]Bo Yu, Cheng-Zhong Xu
, Bin Xiao
:
Detecting Sybil attacks in VANETs. J. Parallel Distributed Comput. 73(6): 746-756 (2013) - [j36]Jiaqing Luo, Bin Xiao
, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j35]Sang Oh Park, Bin Xiao
, Victor C. M. Leung
:
Advanced technologies and theories for highly-reliable cyber physical system. J. Syst. Archit. 59(9): 729-730 (2013) - [j34]Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao
, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 429-439 (2013) - [j33]Sang Oh Park, Bin Xiao
, Victor C. M. Leung
, Young-Sik Jeong:
Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS). J. Supercomput. 66(1): 1-3 (2013) - [j32]Qingjun Xiao, Kai Bu, Zhijun Wang, Bin Xiao
:
Robust localization against outliers in wireless sensor networks. ACM Trans. Sens. Networks 9(2): 24:1-24:26 (2013) - [j31]Jin Wang, Jianping Wang
, Kejie Lu, Bin Xiao
, Naijie Gu:
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams. IEEE Trans. Parallel Distributed Syst. 24(10): 2025-2035 (2013) - [j30]Jiaqing Luo, Bin Xiao
, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c57]Fei Wang, Bin Xiao
, Kai Bu, Jinshu Su
:
Detect and identify blocker tags in tree-based RFID systems. ICC 2013: 2133-2137 - [c56]Xiulong Liu, Keqiu Li, Yanming Shen, Geyong Min, Bin Xiao
, Wenyu Qu, Hongjuan Li
:
A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems. ICCCN 2013: 1-7 - [c55]Qingjun Xiao, Bin Xiao
, Shigang Chen:
Differential estimation in dynamic RFID systems. INFOCOM 2013: 295-299 - [c54]Yu Hua, Bin Xiao
, Xue Liu:
NEST: Locality-aware approximate query service for cloud computing. INFOCOM 2013: 1303-1311 - [c53]Kai Bu, Xuan Liu, Jiwei Li, Bin Xiao
:
Less is More: Efficient RFID-Based 3D Localization. MASS 2013: 86-94 - [c52]Jiwei Li, Kai Bu, Xuan Liu, Bin Xiao
:
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing. MCC@SIGCOMM 2013: 39-44 - 2012
- [j29]Kai Bu, Qingjun Xiao, Zhixin Sun, Bin Xiao
:
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks. Comput. Commun. 35(13): 1549-1560 (2012) - [j28]Yu Hua, Bin Xiao
, Bharadwaj Veeravalli, Dan Feng:
Locality-Sensitive Bloom Filter for Approximate Membership Query. IEEE Trans. Computers 61(6): 817-830 (2012) - [j27]Kai Bu, Bin Xiao
, Qingjun Xiao, Shigang Chen:
Efficient Misplaced-Tag Pinpointing in Large RFID Systems. IEEE Trans. Parallel Distributed Syst. 23(11): 2094-2106 (2012) - [c51]Kai Bu, Xuan Liu, Bin Xiao
:
Fast cloned-tag identification protocols for large-scale RFID systems. IWQoS 2012: 1-4 - [c50]Xuan Liu, Shigeng Zhang, Kai Bu, Bin Xiao
:
Complete and fast unknown tag identification in large RFID systems. MASS 2012: 47-55 - [c49]Fei Wang, Xiaofeng Wang, Jinshu Su
, Bin Xiao
:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. TrustCom 2012: 215-222 - 2011
- [j26]Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao
, Athanasios V. Vasilakos:
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. Comput. Commun. 34(6): 793-802 (2011) - [j25]Yong Tang, Bin Xiao
, Xicheng Lu:
Signature Tree Generation for Polymorphic Worms. IEEE Trans. Computers 60(4): 565-579 (2011) - [c48]Qingjun Xiao, Kai Bu, Bin Xiao
:
Efficient Monitoring of Dynamic Tag Populations in RFID Systems. EUC 2011: 106-113 - [c47]Guobin Liu, Jiaqing Luo, Qingjun Xiao, Bin Xiao
:
EDJam: Effective Dynamic Jamming against IEEE 802.15.4-Compliant Wireless Personal Area Networks. ICC 2011: 1-5 - [c46]Jin Wang, Jianping Wang
, Kejie Lu, Yi Qian, Bin Xiao
, Naijie Gu:
Optimal Design of Linear Network Coding for information theoretically secure unicast. INFOCOM 2011: 757-765 - [c45]