Liang Xiao
Liang Xiao
Dept. Communication Engineering, Xiamen University
Verified email at xmu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Using the physical layer for wireless authentication in time-variant channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008
3102008
Fingerprints in the ether: Using the physical layer for wireless authentication
L Xiao, L Greenstein, N Mandayam, W Trappe
2007 IEEE International Conference on Communications, 4646-4651, 2007
2342007
Spectral efficiency of distributed antenna system with random antenna layout
H Zhuang, L Dai, L Xiao, Y Yao
Electronics Letters 39 (6), 495-496, 2003
1782003
IoT Security Techniques Based on Machine Learning
L Xiao, X Wan, X Lu, Y Zhang, D Wu
IEEE Signal Processing Magazine, 2018
1302018
Channel-based detection of sybil attacks in wireless networks
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
Information Forensics and Security, IEEE Transactions on 4 (3), 492-503, 2009
1292009
Information-theoretic capacity analysis in MIMO distributed antenna systems
L Xiao, L Dai, H Zhuang, S Zhou, Y Yao
The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003
1172003
Dynamic resource management in the fourth generation wireless systems
W Anchun, X Liang, Z Shidong, X Xibin, Y Yan
International Conference on Communication Technology Proceedings, 2003. ICCT …, 2003
1082003
Learning-based computation offloading for IoT devices with energy harvesting
M Min, L Xiao, Y Chen, P Cheng, D Wu, W Zhuang
IEEE Trans. on Vehicular Technology, 2019
1052019
PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks
L Xiao, Y Li, G Han, G Liu, W Zhuang
IEEE Trans. Vehicular Technology 65 (12), 10037-10047, 2016
1042016
UAV Relay in VANETs Against Smart Jamming with Reinforcement Learning
L Xiao, X Lu, D Xu, Y Tang, L Wang, W Zhuang
IEEE Trans. Vehicular Technology, 2018
972018
A physical-layer technique to enhance authentication for mobile terminals
L Xiao, L Greenstein, N Mandayam, W Trappe
2008 IEEE International Conference on Communications, 1520-1524, 2008
882008
Channel-based spoofing detection in frequency-selective Rayleigh channels
L Xiao, LJ Greenstein, NB Mandayam, W Trappe
IEEE Transactions on Wireless Communications 8 (12), 5948-5956, 2009
862009
Cloud-based Malware Detetction Game for Mobile Device with Offloading
L Xiao, Y Li, X Huang, X Du
IEEE Transactions on Mobile Computing, 2017
832017
Reinforcement Learning-based NOMA Power Allocation in the Presence of Smart Jamming
L Xiao, Y Li, C Dai, H Dai, HV Poor
IEEE Trans. Vehicular Technology, 2017
782017
Prospect Theoretic Analysis of Energy Exchange Among Microgrids
L Xiao, NB Mandayam, HV Poor
IEEE Trans. Smart Grid, 2015
772015
A Secure Mobile Crowdsensing Game with Deep Reinforcement Learning
L Xiao, Y Li, G Han, H Dai, HV Poor
IEEE Trans. Information Forensics & Security, 2017
732017
User-centric View of Jamming Games in Cognitive Radio Networks
L Xiao, J Liu, Q Li, NB Mandayam, HV Poor
IEEE Trans. Information Forensics & Security 10 (12), 2578-2590, 2015
732015
Two-Dimensional Anti-Jamming Communication Based on Deep Reinforcement Learning
G Han, L Xiao, HV Poor
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2017
722017
Security in Mobile Edge Caching with Reinforcement Learning
L Xiao, X Wan, C Dai, X Du, X Chen, G Mohsen
IEEE Wireless Communications Magazine, arXiv preprint arXiv:1801.05915, 2018
682018
Indirect Reciprocity Security Game for Large-Scale Wireless Networks
L Xiao, Y Chen, WS Lin, KJR Liu
Information Forensics and Security, IEEE Transactions on 7 (4), 1368-1380, 2012
662012
The system can't perform the operation now. Try again later.
Articles 1–20