Year |
Citation |
Score |
2020 |
Xiao L, Zhang H, Xiao Y, Wan X, Liu S, Wang L, Poor HV. Reinforcement Learning-Based Downlink Interference Control for Ultra-Dense Small Cells Ieee Transactions On Wireless Communications. 19: 423-434. DOI: 10.1109/Twc.2019.2945951 |
0.418 |
|
2020 |
Lu X, Xiao L, Xu T, Zhao Y, Tang Y, Zhuang W. Reinforcement Learning Based PHY Authentication for VANETs Ieee Transactions On Vehicular Technology. 69: 3068-3079. DOI: 10.1109/Tvt.2020.2967026 |
0.428 |
|
2020 |
Xiao L, Lu X, Xu T, Wan X, Ji W, Zhang Y. Reinforcement Learning Based Mobile Offloading for Edge Computing Against Jamming And Interference Ieee Transactions On Communications. 1-1. DOI: 10.1109/Tcomm.2020.3007742 |
0.327 |
|
2020 |
Xiao L, Ding Y, Jiang D, Huang J, Wang D, Li J, Poor HV. A Reinforcement Learning and Blockchain-based Trust Mechanism for Edge Networks Ieee Transactions On Communications. 1-1. DOI: 10.1109/Tcomm.2020.2995371 |
0.326 |
|
2020 |
Lu X, Xiao L, Dai C, Dai H. UAV-Aided Cellular Communications with Deep Reinforcement Learning Against Jamming Ieee Wireless Communications. 27: 48-53. DOI: 10.1109/Mwc.001.1900207 |
0.42 |
|
2020 |
Xiao L, Jiang D, Chen Y, Su W, Tang Y. Reinforcement-Learning-Based Relay Mobility and Power Allocation for Underwater Sensor Networks Against Jamming Ieee Journal of Oceanic Engineering. 45: 1148-1156. DOI: 10.1109/Joe.2019.2910938 |
0.419 |
|
2020 |
Ge S, Lu B, Xiao L, Gong J, Chen X, Liu Y. Mobile Edge Computing Against Smart Attacks with Deep Reinforcement Learning in Cognitive MIMO IoT Systems Mobile Networks and Applications. 1-12. DOI: 10.1007/S11036-020-01572-W |
0.449 |
|
2019 |
Liu S, Xiao L, Huang L, Wang X. Impulsive Noise Recovery and Elimination: A Sparse Machine Learning Based Approach Ieee Transactions On Vehicular Technology. 68: 2306-2315. DOI: 10.1109/Tvt.2019.2891617 |
0.378 |
|
2019 |
Min M, Xiao L, Chen Y, Cheng P, Wu D, Zhuang W. Learning-Based Computation Offloading for IoT Devices With Energy Harvesting Ieee Transactions On Vehicular Technology. 68: 1930-1941. DOI: 10.1109/Tvt.2018.2890685 |
0.361 |
|
2019 |
Hu M, Zhuang L, Wu D, Zhou Y, Chen X, Xiao L. Learning Driven Computation Offloading for Asymmetrically Informed Edge Computing Ieee Transactions On Parallel and Distributed Systems. 30: 1802-1815. DOI: 10.1109/Tpds.2019.2893925 |
0.311 |
|
2019 |
Xiao L, Sheng G, Liu S, Dai H, Peng M, Song J. Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping Ieee Transactions On Communications. 67: 6994-7005. DOI: 10.1109/Tcomm.2019.2930247 |
0.418 |
|
2019 |
Xiao L, Sheng G, Wan X, Su W, Cheng P. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks Ieee Communications Letters. 23: 60-63. DOI: 10.1109/Lcomm.2018.2877317 |
0.418 |
|
2019 |
Lu X, Xiao X, Xiao L, Dai C, Peng M, Poor HV. Reinforcement Learning-Based Microgrid Energy Trading With a Reduced Power Plant Schedule Ieee Internet of Things Journal. 6: 10728-10737. DOI: 10.1109/Jiot.2019.2941498 |
0.315 |
|
2019 |
Liu S, Xiao L, Han Z, Tang Y. Eliminating NB-IoT Interference to LTE System: A Sparse Machine Learning-Based Approach Ieee Internet of Things Journal. 6: 6919-6932. DOI: 10.1109/Jiot.2019.2912850 |
0.369 |
|
2019 |
Min M, Wan X, Xiao L, Chen Y, Xia M, Wu D, Dai H. Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting Ieee Internet of Things Journal. 6: 4307-4316. DOI: 10.1109/Jiot.2018.2875926 |
0.397 |
|
2019 |
Su W, Lin J, Chen K, Xiao L, En C. Reinforcement Learning-Based Adaptive Modulation and Coding for Efficient Underwater Communications Ieee Access. 7: 67539-67550. DOI: 10.1109/Access.2019.2918506 |
0.37 |
|
2019 |
Chen G, Zhan Y, Sheng G, Xiao L, Wang Y. Reinforcement Learning-Based Sensor Access Control for WBANs Ieee Access. 7: 8483-8494. DOI: 10.1109/Access.2018.2889879 |
0.383 |
|
2018 |
Xiao L, Wan X, Han Z. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead Ieee Transactions On Wireless Communications. 17: 1676-1687. DOI: 10.1109/Twc.2017.2784431 |
0.424 |
|
2018 |
Xiao L, Jiang D, Xu D, Zhu H, Zhang Y, Poor HV. Two-Dimensional Antijamming Mobile Communication Based on Reinforcement Learning Ieee Transactions On Vehicular Technology. 67: 9499-9512. DOI: 10.1109/Tvt.2018.2856854 |
0.41 |
|
2018 |
Xiao L, Lu X, Xu D, Tang Y, Wang L, Zhuang W. UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning Ieee Transactions On Vehicular Technology. 67: 4087-4097. DOI: 10.1109/Tvt.2018.2789466 |
0.442 |
|
2018 |
Xiao L, Xie C, Min M, Zhuang W. User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks Ieee Transactions On Vehicular Technology. 67: 3420-3430. DOI: 10.1109/Tvt.2017.2785414 |
0.446 |
|
2018 |
Xiao L, Li Y, Dai C, Dai H, Poor HV. Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming Ieee Transactions On Vehicular Technology. 67: 3377-3389. DOI: 10.1109/Tvt.2017.2782726 |
0.425 |
|
2018 |
Xiao L, Chen T, Xie C, Dai H, Poor HV. Mobile Crowdsensing Games in Vehicular Networks Ieee Transactions On Vehicular Technology. 67: 1535-1545. DOI: 10.1109/Tvt.2016.2647624 |
0.429 |
|
2018 |
Xiao L, Xu D, Mandayam NB, Poor HV. Attacker-Centric View of a Detection Game against Advanced Persistent Threats Ieee Transactions On Mobile Computing. 17: 2512-2523. DOI: 10.1109/Tmc.2018.2814052 |
0.627 |
|
2018 |
Xiao L, Li Y, Han G, Dai H, Poor HV. A Secure Mobile Crowdsensing Game With Deep Reinforcement Learning Ieee Transactions On Information Forensics and Security. 13: 35-47. DOI: 10.1109/Tifs.2017.2737968 |
0.412 |
|
2018 |
Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M. Security in Mobile Edge Caching with Reinforcement Learning Ieee Wireless Communications. 25: 116-122. DOI: 10.1109/Mwc.2018.1700291 |
0.364 |
|
2018 |
Xiao L, Wan X, Lu X, Zhang Y, Wu D. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? Ieee Signal Processing Magazine. 35: 41-49. DOI: 10.1109/Msp.2018.2825478 |
0.385 |
|
2018 |
Xiao L, Donghua, Jiang, Wan X, Su W, Tang Y. Anti-Jamming Underwater Transmission With Mobility and Learning Ieee Communications Letters. 22: 542-545. DOI: 10.1109/Lcomm.2018.2792015 |
0.424 |
|
2018 |
Min M, Xiao L, Xie C, Hajimirsadeghi M, Mandayam NB. Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach Ieee Internet of Things Journal. 5: 4250-4261. DOI: 10.1109/Jiot.2018.2844878 |
0.639 |
|
2018 |
Deng Z, Zhou Y, Wu D, Ye G, Chen M, Xiao L. Utility Maximization of Cloud-Based In-Car Video Recording Over Vehicular Access Networks Ieee Internet of Things Journal. 5: 5213-5226. DOI: 10.1109/Jiot.2018.2844169 |
0.353 |
|
2018 |
Xiao L, Jiang D, Xu D, Su W, An N, Wang D. Secure mobile crowdsensing based on deep learning China Communications. 15: 1-11. DOI: 10.1109/Cc.2018.8485464 |
0.395 |
|
2018 |
Chen G, Zhan Y, Chen Y, Xiao L, Wang Y, An N. Reinforcement Learning Based Power Control for In-Body Sensors in WBANs Against Jamming Ieee Access. 6: 37403-37412. DOI: 10.1109/Access.2018.2850659 |
0.39 |
|
2017 |
Xiao L, Chen T, Han G, Zhuang W, Sun L. Game Theoretic Study on Channel-Based Authentication in MIMO Systems Ieee Transactions On Vehicular Technology. 66: 7474-7484. DOI: 10.1109/Tvt.2017.2652484 |
0.409 |
|
2017 |
Xiao L, Li Y, Huang X, Du X. Cloud-Based Malware Detection Game for Mobile Devices with Offloading Ieee Transactions On Mobile Computing. 16: 2742-2750. DOI: 10.1109/Tmc.2017.2687918 |
0.411 |
|
2017 |
Wang N, Jiang T, Lv S, Xiao L. Physical-Layer Authentication Based on Extreme Learning Machine Ieee Communications Letters. 21: 1557-1560. DOI: 10.1109/Lcomm.2017.2690437 |
0.394 |
|
2017 |
Xiao L, Xu D, Xie C, Mandayam NB, Poor HV. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study Ieee Journal On Selected Areas in Communications. 35: 534-544. DOI: 10.1109/Jsac.2017.2659418 |
0.615 |
|
2017 |
Abass AAA, Xiao L, Mandayam NB, Gajic Z. Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage Ieee Access. 5: 8482-8491. DOI: 10.1109/Access.2017.2691326 |
0.582 |
|
2017 |
Liu J, Xiao L, Liu G, Zhao Y. Active authentication with reinforcement learning based on ambient radio signals Multimedia Tools and Applications. 76: 3979-3998. DOI: 10.1007/S11042-015-2958-X |
0.396 |
|
2016 |
Xiao L, Li Y, Han G, Liu G, Zhuang W. PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks Ieee Transactions On Vehicular Technology. 65: 10037-10047. DOI: 10.1109/Tvt.2016.2524258 |
0.437 |
|
2016 |
Xiao L, Xie C, Chen T, Dai H, Poor HV. A Mobile Offloading Game Against Smart Attacks Ieee Access. 4: 2281-2291. DOI: 10.1109/Access.2016.2565198 |
0.4 |
|
2015 |
Xiao L, Mandayam NB, Vincent Poor H. Prospect theoretic analysis of energy exchange among microgrids Ieee Transactions On Smart Grid. 6: 63-72. DOI: 10.1109/Tsg.2014.2352335 |
0.567 |
|
2015 |
Xiao L, Liu J, Li Q, Mandayam NB, Poor HV. User-Centric View of Jamming Games in Cognitive Radio Networks Ieee Transactions On Information Forensics and Security. 10: 2578-2590. DOI: 10.1109/Tifs.2015.2467593 |
0.604 |
|
2015 |
Xiao L, Chen T, Liu J, Dai H. Anti-jamming transmission stackelberg game with observation errors Ieee Communications Letters. 19: 949-952. DOI: 10.1109/Lcomm.2015.2418776 |
0.339 |
|
2015 |
Xiao L, Li Y, Liu J, Zhao Y. Power control with reinforcement learning in cooperative cognitive radio networks against jamming The Journal of Supercomputing. 71: 3237-3257. DOI: 10.1007/S11227-015-1420-1 |
0.389 |
|
2013 |
Zhao C, Xiao L, Kang S, Chen G, Li Y, Huang L. Secure relay selection based on learning with negative externality in wireless networks Eurasip Journal On Advances in Signal Processing. 2013: 89. DOI: 10.1186/1687-6180-2013-89 |
0.38 |
|
2013 |
Xiao L, Yan Q, Lou W, Chen G, Hou YT. Proximity-Based Security Techniques for Mobile Users in Wireless Networks Ieee Transactions On Information Forensics and Security. 8: 2089-2100. DOI: 10.1109/Tifs.2013.2286269 |
0.405 |
|
2012 |
Xiao L, Dai H, Ning P. MAC Design of Uncoordinated FH-Based Collaborative Broadcast Ieee Wireless Communications Letters. 1: 261-264. DOI: 10.1109/Wcl.2012.041012.120162 |
0.381 |
|
2012 |
Li C, Dai H, Xiao L, Ning P. Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks Ieee Transactions On Signal Processing. 60: 5281-5292. DOI: 10.1109/Tsp.2012.2206589 |
0.346 |
|
2012 |
Xiao L, Chen Y, Lin WS, Liu KJR. Indirect Reciprocity Security Game for Large-Scale Wireless Networks Ieee Transactions On Information Forensics and Security. 7: 1368-1380. DOI: 10.1109/Tifs.2012.2202228 |
0.374 |
|
2012 |
Xiao L, Dai H, Ning P. Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping Ieee Transactions On Information Forensics and Security. 7: 297-309. DOI: 10.1109/Tifs.2011.2165948 |
0.353 |
|
2009 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based spoofing detection in frequency-selective Rayleigh channels Ieee Transactions On Wireless Communications. 8: 5948-5956. DOI: 10.1109/Twc.2009.12.081544 |
0.6 |
|
2009 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Channel-based detection of sybil attacks in wireless networks Ieee Transactions On Information Forensics and Security. 4: 492-503. DOI: 10.1109/Tifs.2009.2026454 |
0.632 |
|
2008 |
Xiao L, Greenstein LJ, Mandayam NB, Trappe W. Using the physical layer for wireless authentication in time-variant channels Ieee Transactions On Wireless Communications. 7: 2571-2579. DOI: 10.1109/Twc.2008.070194 |
0.597 |
|
2008 |
Xiao L, Greenstein LJ, Mandayam NB, Periyalwar S. Distributed measurements for estimating and updating cellular system performance Ieee Transactions On Communications. 56: 991-998. DOI: 10.1109/Tcomm.2008.060330 |
0.572 |
|
2007 |
Xiao L, Greenstein LJ, Mandayam NB. Sensor-assisted localization in cellular systems Ieee Transactions On Wireless Communications. 6: 4244-4248. DOI: 10.1109/Twc.2007.060316 |
0.592 |
|
Show low-probability matches. |