Liang Xiao, Ph.D. - Publications

Affiliations: 
2009 Graduate School - New Brunswick Rutgers University, New Brunswick, New Brunswick, NJ, United States 
Area:
Electronics and Electrical Engineering

55 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Xiao L, Zhang H, Xiao Y, Wan X, Liu S, Wang L, Poor HV. Reinforcement Learning-Based Downlink Interference Control for Ultra-Dense Small Cells Ieee Transactions On Wireless Communications. 19: 423-434. DOI: 10.1109/Twc.2019.2945951  0.418
2020 Lu X, Xiao L, Xu T, Zhao Y, Tang Y, Zhuang W. Reinforcement Learning Based PHY Authentication for VANETs Ieee Transactions On Vehicular Technology. 69: 3068-3079. DOI: 10.1109/Tvt.2020.2967026  0.428
2020 Xiao L, Lu X, Xu T, Wan X, Ji W, Zhang Y. Reinforcement Learning Based Mobile Offloading for Edge Computing Against Jamming And Interference Ieee Transactions On Communications. 1-1. DOI: 10.1109/Tcomm.2020.3007742  0.327
2020 Xiao L, Ding Y, Jiang D, Huang J, Wang D, Li J, Poor HV. A Reinforcement Learning and Blockchain-based Trust Mechanism for Edge Networks Ieee Transactions On Communications. 1-1. DOI: 10.1109/Tcomm.2020.2995371  0.326
2020 Lu X, Xiao L, Dai C, Dai H. UAV-Aided Cellular Communications with Deep Reinforcement Learning Against Jamming Ieee Wireless Communications. 27: 48-53. DOI: 10.1109/Mwc.001.1900207  0.42
2020 Xiao L, Jiang D, Chen Y, Su W, Tang Y. Reinforcement-Learning-Based Relay Mobility and Power Allocation for Underwater Sensor Networks Against Jamming Ieee Journal of Oceanic Engineering. 45: 1148-1156. DOI: 10.1109/Joe.2019.2910938  0.419
2020 Ge S, Lu B, Xiao L, Gong J, Chen X, Liu Y. Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT Systems Mobile Networks and Applications. 1-12. DOI: 10.1007/S11036-020-01572-W  0.449
2019 Liu S, Xiao L, Huang L, Wang X. Impulsive Noise Recovery and Elimination: A Sparse Machine Learning Based Approach Ieee Transactions On Vehicular Technology. 68: 2306-2315. DOI: 10.1109/Tvt.2019.2891617  0.378
2019 Min M, Xiao L, Chen Y, Cheng P, Wu D, Zhuang W. Learning-Based Computation Offloading for IoT Devices With Energy Harvesting Ieee Transactions On Vehicular Technology. 68: 1930-1941. DOI: 10.1109/Tvt.2018.2890685  0.361
2019 Hu M, Zhuang L, Wu D, Zhou Y, Chen X, Xiao L. Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing Ieee Transactions On Parallel and Distributed Systems. 30: 1802-1815. DOI: 10.1109/Tpds.2019.2893925  0.311
2019 Xiao L, Sheng G, Liu S, Dai H, Peng M, Song J. Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping Ieee Transactions On Communications. 67: 6994-7005. DOI: 10.1109/Tcomm.2019.2930247  0.418
2019 Xiao L, Sheng G, Wan X, Su W, Cheng P. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks Ieee Communications Letters. 23: 60-63. DOI: 10.1109/Lcomm.2018.2877317  0.418
2019 Lu X, Xiao X, Xiao L, Dai C, Peng M, Poor HV. Reinforcement Learning-Based Microgrid Energy Trading With a Reduced Power Plant Schedule Ieee Internet of Things Journal. 6: 10728-10737. DOI: 10.1109/Jiot.2019.2941498  0.315
2019 Liu S, Xiao L, Han Z, Tang Y. Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach Ieee Internet of Things Journal. 6: 6919-6932. DOI: 10.1109/Jiot.2019.2912850  0.369
2019 Min M, Wan X, Xiao L, Chen Y, Xia M, Wu D, Dai H. Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting Ieee Internet of Things Journal. 6: 4307-4316. DOI: 10.1109/Jiot.2018.2875926  0.397
2019 Su W, Lin J, Chen K, Xiao L, En C. Reinforcement Learning-Based Adaptive Modulation and Coding for Efficient Underwater Communications Ieee Access. 7: 67539-67550. DOI: 10.1109/Access.2019.2918506  0.37
2019 Chen G, Zhan Y, Sheng G, Xiao L, Wang Y. Reinforcement Learning-Based Sensor Access Control for WBANs Ieee Access. 7: 8483-8494. DOI: 10.1109/Access.2018.2889879  0.383
2018 Xiao L, Wan X, Han Z. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead Ieee Transactions On Wireless Communications. 17: 1676-1687. DOI: 10.1109/Twc.2017.2784431  0.424
2018 Xiao L, Jiang D, Xu D, Zhu H, Zhang Y, Poor HV. Two-Dimensional Antijamming Mobile Communication Based on Reinforcement Learning Ieee Transactions On Vehicular Technology. 67: 9499-9512. DOI: 10.1109/Tvt.2018.2856854  0.41
2018 Xiao L, Lu X, Xu D, Tang Y, Wang L, Zhuang W. UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning Ieee Transactions On Vehicular Technology. 67: 4087-4097. DOI: 10.1109/Tvt.2018.2789466  0.442
2018 Xiao L, Xie C, Min M, Zhuang W. User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks Ieee Transactions On Vehicular Technology. 67: 3420-3430. DOI: 10.1109/Tvt.2017.2785414  0.446
2018 Xiao L, Li Y, Dai C, Dai H, Poor HV. Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming Ieee Transactions On Vehicular Technology. 67: 3377-3389. DOI: 10.1109/Tvt.2017.2782726  0.425
2018 Xiao L, Chen T, Xie C, Dai H, Poor HV. Mobile Crowdsensing Games in Vehicular Networks Ieee Transactions On Vehicular Technology. 67: 1535-1545. DOI: 10.1109/Tvt.2016.2647624  0.429
2018 Xiao L, Xu D, Mandayam NB, Poor HV. Attacker-Centric View of a Detection Game against Advanced Persistent Threats Ieee Transactions On Mobile Computing. 17: 2512-2523. DOI: 10.1109/Tmc.2018.2814052  0.627
2018 Xiao L, Li Y, Han G, Dai H, Poor HV. A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning Ieee Transactions On Information Forensics and Security. 13: 35-47. DOI: 10.1109/Tifs.2017.2737968  0.412
2018 Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M. Security in Mobile Edge Caching with Reinforcement Learning Ieee Wireless Communications. 25: 116-122. DOI: 10.1109/Mwc.2018.1700291  0.364
2018 Xiao L, Wan X, Lu X, Zhang Y, Wu D. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? Ieee Signal Processing Magazine. 35: 41-49. DOI: 10.1109/Msp.2018.2825478  0.385
2018 Xiao L, Donghua, Jiang, Wan X, Su W, Tang Y. Anti-Jamming Underwater Transmission With Mobility and Learning Ieee Communications Letters. 22: 542-545. DOI: 10.1109/Lcomm.2018.2792015  0.424
2018 Min M, Xiao L, Xie C, Hajimirsadeghi M, Mandayam NB. Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach Ieee Internet of Things Journal. 5: 4250-4261. DOI: 10.1109/Jiot.2018.2844878  0.639
2018 Deng Z, Zhou Y, Wu D, Ye G, Chen M, Xiao L. Utility Maximization of Cloud-Based In-Car Video Recording Over Vehicular Access Networks Ieee Internet of Things Journal. 5: 5213-5226. DOI: 10.1109/Jiot.2018.2844169  0.353
2018 Xiao L, Jiang D, Xu D, Su W, An N, Wang D. Secure mobile crowdsensing based on deep learning China Communications. 15: 1-11. DOI: 10.1109/Cc.2018.8485464  0.395
2018 Chen G, Zhan Y, Chen Y, Xiao L, Wang Y, An N. Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming Ieee Access. 6: 37403-37412. DOI: 10.1109/Access.2018.2850659  0.39
2017 Xiao L, Chen T, Han G, Zhuang W, Sun L. Game Theoretic Study on Channel-Based Authentication in MIMO Systems Ieee Transactions On Vehicular Technology. 66: 7474-7484. DOI: 10.1109/Tvt.2017.2652484  0.409
2017 Xiao L, Li Y, Huang X, Du X. Cloud-Based Malware Detection Game for Mobile Devices with Offloading Ieee Transactions On Mobile Computing. 16: 2742-2750. DOI: 10.1109/Tmc.2017.2687918  0.411
2017 Wang N, Jiang T, Lv S, Xiao L. Physical-Layer Authentication Based on Extreme Learning Machine Ieee Communications Letters. 21: 1557-1560. DOI: 10.1109/Lcomm.2017.2690437  0.394
2017 Xiao L, Xu D, Xie C, Mandayam NB, Poor HV. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study Ieee Journal On Selected Areas in Communications. 35: 534-544. DOI: 10.1109/Jsac.2017.2659418  0.615
2017 Abass AAA, Xiao L, Mandayam NB, Gajic Z. Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage Ieee Access. 5: 8482-8491. DOI: 10.1109/Access.2017.2691326  0.582
2017 Liu J, Xiao L, Liu G, Zhao Y. Active authentication with reinforcement learning based on ambient radio signals Multimedia Tools and Applications. 76: 3979-3998. DOI: 10.1007/S11042-015-2958-X  0.396
2016 Xiao L, Li Y, Han G, Liu G, Zhuang W. PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks Ieee Transactions On Vehicular Technology. 65: 10037-10047. DOI: 10.1109/Tvt.2016.2524258  0.437
2016 Xiao L, Xie C, Chen T, Dai H, Poor HV. A Mobile Offloading Game Against Smart Attacks Ieee Access. 4: 2281-2291. DOI: 10.1109/Access.2016.2565198  0.4
2015 Xiao L, Mandayam NB, Vincent Poor H. Prospect theoretic analysis of energy exchange among microgrids Ieee Transactions On Smart Grid. 6: 63-72. DOI: 10.1109/Tsg.2014.2352335  0.567
2015 Xiao L, Liu J, Li Q, Mandayam NB, Poor HV. User-Centric View of Jamming Games in Cognitive Radio Networks Ieee Transactions On Information Forensics and Security. 10: 2578-2590. DOI: 10.1109/Tifs.2015.2467593  0.604
2015 Xiao L, Chen T, Liu J, Dai H. Anti-jamming transmission stackelberg game with observation errors Ieee Communications Letters. 19: 949-952. DOI: 10.1109/Lcomm.2015.2418776  0.339
2015 Xiao L, Li Y, Liu J, Zhao Y. Power control with reinforcement learning in cooperative cognitive radio networks against jamming The Journal of Supercomputing. 71: 3237-3257. DOI: 10.1007/S11227-015-1420-1  0.389
2013 Zhao C, Xiao L, Kang S, Chen G, Li Y, Huang L. Secure relay selection based on learning with negative externality in wireless networks Eurasip Journal On Advances in Signal Processing. 2013: 89. DOI: 10.1186/1687-6180-2013-89  0.38
2013 Xiao L, Yan Q, Lou W, Chen G, Hou YT. Proximity-Based Security Techniques for Mobile Users in Wireless Networks Ieee Transactions On Information Forensics and Security. 8: 2089-2100. DOI: 10.1109/Tifs.2013.2286269  0.405
2012 Xiao L, Dai H, Ning P. MAC Design of Uncoordinated FH-Based Collaborative Broadcast Ieee Wireless Communications Letters. 1: 261-264. DOI: 10.1109/Wcl.2012.041012.120162  0.381
2012 Li C, Dai H, Xiao L, Ning P. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks Ieee Transactions On Signal Processing. 60: 5281-5292. DOI: 10.1109/Tsp.2012.2206589  0.346
2012 Xiao L, Chen Y, Lin WS, Liu KJR. Indirect Reciprocity Security Game for Large-Scale Wireless Networks Ieee Transactions On Information Forensics and Security. 7: 1368-1380. DOI: 10.1109/Tifs.2012.2202228  0.374
2012 Xiao L, Dai H, Ning P. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping Ieee Transactions On Information Forensics and Security. 7: 297-309. DOI: 10.1109/Tifs.2011.2165948  0.353
2009 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based spoofing detection in frequency-selective Rayleigh channels Ieee Transactions On Wireless Communications. 8: 5948-5956. DOI: 10.1109/Twc.2009.12.081544  0.6
2009 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based detection of sybil attacks in wireless networks Ieee Transactions On Information Forensics and Security. 4: 492-503. DOI: 10.1109/Tifs.2009.2026454  0.632
2008 Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Using the physical layer for wireless authentication in time-variant channels Ieee Transactions On Wireless Communications. 7: 2571-2579. DOI: 10.1109/Twc.2008.070194  0.597
2008 Xiao L, Greenstein LJ, Mandayam NB, Periyalwar S. Distributed measurements for estimating and updating cellular system performance Ieee Transactions On Communications. 56: 991-998. DOI: 10.1109/Tcomm.2008.060330  0.572
2007 Xiao L, Greenstein LJ, Mandayam NB. Sensor-assisted localization in cellular systems Ieee Transactions On Wireless Communications. 6: 4244-4248. DOI: 10.1109/Twc.2007.060316  0.592
Show low-probability matches.