Calculated based on number of publications stored in Pure and citations from Scopus
20012024

Research activity per year

Filter
Conference article published in proceeding or book

Search results

  • 2015

    Fast RFID grouping protocols

    Liu, J., Xiao, B., Chen, S., Zhu, F. & Chen, L., 21 Aug 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. IEEE, Vol. 26. p. 1948-1956 9 p. 7218578

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    47 Citations (Scopus)
  • RFID cardinality estimation with blocker tags

    Liu, X., Xiao, B., Li, K., Wu, J., Liu, A. X., Qi, H. & Xie, X., 21 Aug 2015, 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015. IEEE, Vol. 26. p. 1679-1687 9 p. 7218548

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    34 Citations (Scopus)
  • 2014

    Efficient detection of cloned attacks for large-scale RFID systems

    Liu, X., Qi, H., Li, K., Wu, J., Xue, W., Min, G. & Xiao, B., 1 Jan 2014, Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Proceedings. PART 1 ed. Springer Verlag, p. 85-99 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8630 LNCS, no. PART 1).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    8 Citations (Scopus)
  • Efficient distributed query processing in large RFID-enabled supply chains

    Liu, J., Xiao, B., Bu, K. & Chen, L., 1 Jan 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. IEEE, p. 163-171 9 p. 6847936

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    50 Citations (Scopus)
  • Fast counting the key tags in anonymous RFID systems

    Liu, X., Li, K., Qi, H., Xiao, B. & Xie, X., 1 Jan 2014, Proceedings - IEEE 22nd International. IEEE Computer Society, p. 59-70 12 p. 6980366

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    22 Citations (Scopus)
  • Intactness verification in anonymous RFID systems

    Bu, K., Liu, J., Xiao, B., Liu, X. & Zhang, S., 1 Jan 2014, 2014 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014 - Proceedings. IEEE Computer Society, Vol. 2015-April. p. 134-141 8 p. 7097801

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • LOCK: A fast and flexible tag scanning mechanism with handheld readers

    Liu, X., Xiao, B., Bu, K. & Zhang, S., 1 Jan 2014, 2014 IEEE 22nd International Symposium of Quality of Service, IWQoS. IEEE, p. 360-369 10 p. 6914341

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • 2013

    A fast approach to unknown tag identification in large scale RFID systems

    Liu, X., Li, K., Shen, Y., Min, G., Xiao, B., Qu, W. & Li, H., 1 Dec 2013, 22nd International Conference on Computer Communications and Networks, ICCCN 2013 - Conference Proceedings. 6614086

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    7 Citations (Scopus)
  • Detect and identify blocker tags in tree-based RFID systems

    Wang, F., Xiao, B., Bu, K. & Su, J., 1 Jan 2013, 2013 IEEE International Conference on Communications, ICC 2013. IEEE, p. 2133-2137 5 p. 6654842

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Differential estimation in dynamic RFID systems

    Xiao, Q., Xiao, B. & Chen, S., 2 Sept 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 295-299 5 p. 6566782

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    44 Citations (Scopus)
  • ENDA: Embracing network inconsistency for dynamic application offloading in Mobile Cloud Computing

    Li, J., Bu, K., Liu, X. & Xiao, B., 16 Sept 2013, MCC 2013 - Proceedings of the 2nd, 2013 ACM SIGCOMM Workshop on Mobile Cloud Computing. p. 39-44 6 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    44 Citations (Scopus)
  • Less is More: Efficient RFID-based 3D localization

    Bu, K., Liu, X., Li, J. & Xiao, B., 1 Dec 2013, Proceedings - IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2013. p. 86-94 9 p. 6680227

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    13 Citations (Scopus)
  • NEST: Locality-aware approximate query service for cloud computing

    Hua, Y., Xiao, B. & Liu, X., 2 Sept 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 1303-1311 9 p. 6566923

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    23 Citations (Scopus)
  • 2012

    Complete and fast unknown tag identification in large RFID systems

    Liu, X., Zhang, S., Bu, K. & Xiao, B., 1 Dec 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 47-55 9 p. 6502501

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    34 Citations (Scopus)
  • Fast cloned-tag identification protocols for large-scale RFID systems

    Bu, K., Liu, X. & Xiao, B., 28 Sept 2012, 2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012. 6245962

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    14 Citations (Scopus)
  • VicSifter: A collaborative DDoS detection system with lightweight victim identification

    Wang, F., Wang, X., Su, J. & Xiao, B., 5 Nov 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 215-222 8 p. 6295978

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    11 Citations (Scopus)
  • 2011

    Anchor supervised distance estimation in anisotropic wireless sensor networks

    Liu, X., Zhang, S., Wang, J., Cao, J. & Xiao, B., 23 Jun 2011, 2011 IEEE Wireless Communications and Networking Conference, WCNC 2011. p. 938-943 6 p. 5779262

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    21 Citations (Scopus)
  • EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks

    Liu, G., Luo, J., Xiao, Q. & Xiao, B., 2 Sept 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5962527

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Efficient information collection protocols for sensor-augmented RFID networks

    Chen, S., Zhang, M. & Xiao, B., 2 Aug 2011, 2011 Proceedings IEEE INFOCOM. p. 3101-3109 9 p. 5935155

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    113 Citations (Scopus)
  • Efficient monitoring of dynamic tag populations in RFID systems

    Xiao, Q., Bu, K. & Xiao, B., 1 Dec 2011, Proceedings - 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011. p. 106-113 8 p. 6104514

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    13 Citations (Scopus)
  • Efficient pinpointing of misplaced tags in large RFID systems

    Bu, K., Xiao, B., Xiao, Q. & Chen, S., 20 Sept 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 287-295 9 p. 5984909

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    15 Citations (Scopus)
  • Optimal Design of Linear Network Coding for information theoretically secure unicast

    Wang, J., Wang, J., Lu, K., Qian, Y., Xiao, B. & Gu, N., 2 Aug 2011, 2011 Proceedings IEEE INFOCOM. p. 757-765 9 p. 5935296

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    15 Citations (Scopus)
  • 2010

    A clone of social networks to decentralized bootstrapping P2P networks

    Luo, J., Xiao, B., Yang, Z. & Zhou, S., 20 Sept 2010, 2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010. 5542715

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Fast dimension reduction for document classification based on Imprecise Spectrum Analysis

    Guan, H., Xiao, B., Zhou, J., Guo, M. & Yang, T., 1 Dec 2010, CIKM'10 - Proceedings of the 19th International Conference on Information and Knowledge Management and Co-located Workshops. p. 1753-1756 4 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • Optimal linear network coding design for secure unicast with multiple streams

    Wang, J., Wang, J., Lu, K., Xiao, B. & Gu, N., 15 Jun 2010, 2010 Proceedings IEEE INFOCOM. 5462049

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    26 Citations (Scopus)
  • 2009

    Modeling and analysis of self-stopping btworms using dynamic hit list in p2p networks

    Luo, J., Xiao, B., Liu, G., Xiao, Q. & Zhou, S., 25 Nov 2009, IPDPS 2009 - Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium. 5161239

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • Reliable navigation of mobile sensors in wireless sensor networks without localization service

    Xiao, Q., Xiao, B., Luo, J. & Liu, G., 20 Nov 2009, 2009 17th International Workshop on Quality of Service, IWQoS 2009. 5201398

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    8 Citations (Scopus)
  • 2008

    Bounded LSH for similarity search in peer-to-peer file systems

    Hua, Y., Xiao, B., Feng, D. & Yu, B., 17 Nov 2008, Proceedings - 37th International Conference on Parallel Processing, ICPP 2008. p. 644-651 8 p. 4625904

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    22 Citations (Scopus)
  • 2007

    A walking beacon-assisted localization in wieless sensor networks

    Xiao, B., Hekang, C. & Shuigeng, Z., 1 Dec 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 3070-3075 6 p. 4289181

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    39 Citations (Scopus)
  • Generating simplified regular expression signatures for polymorphic worms

    Tang, Y., Lu, X. & Xiao, B., 1 Dec 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 478-488 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    9 Citations (Scopus)
  • 2006

    A multi-attribute data structure with parallel Bloom filters for network services

    Hua, Y. & Xiao, B., 1 Dec 2006, High Performance Computing - HiPC 2006 - 13th International Conference Proceedings. p. 277-288 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4297 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    14 Citations (Scopus)
  • A novel energy-efficient backbone for sensor networks

    Chen, H., Zhou, S., Xiao, B., Guan, J. & Huang, B., 1 Dec 2006, Mobile Ad-Hoc and Sensor Networks - 2nd International Conference, MSN 2006, Proceedings. p. 600-611 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4325 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    2 Citations (Scopus)
  • Detecting selective forwarding attacks in wireless sensor networks

    Bo, Y. & Xiao, B., 1 Jan 2006, 20th International Parallel and Distributed Processing Symposium, IPDPS 2006. IEEE Computer Society, Vol. 2006. 1639675

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    131 Citations (Scopus)
  • Detecting selective forwarding attacks in wireless sensor networks

    Yu, B. & Xiao, B., 2006, 20th International Parallel and Distributed Processing Symposium IPDPS 2006, Greece, April 2006. IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Detection and localization of sybil nodes in VANETs

    Xiao, B., Bo, Y. & Chuanshan, G., 1 Dec 2006, DIWANS 2006 - Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (part of MobiCom 2006). Vol. 2006. p. 1-8 8 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    158 Citations (Scopus)
  • Distributed proximity-aware peer clustering in BitTorrent-like peer-to-peer networks

    Xiao, B., Yu, J. D., Shao, Z. & Li, M. L., 2006, Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer, p. 375-384 10 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Distributed proximity-aware peer clustering in bit torrent-like peer-to-peer networks

    Xiao, B., Yu, J., Shao, Z. & Li, M., 1 Jan 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 375-384 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • TBF: An efficient data architecture for metadata server in the object-based storage network

    Hua, Y., Feng, D. & Xiao, B., 1 Dec 2006, Proceedings - 2006 IEEE International Conference on Networks, ICON 2006 - Networking-Challenges and Frontiers. Vol. 1. p. 27-32 6 p. 4087652

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • 2005

    An active detecting method against SYN flooding attack

    Xiao, B., Chen, W., He, Y. & Sha, E. H. M., 1 Sept 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Vol. 1. p. 709-715 7 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    40 Citations (Scopus)
  • An efficient and practical defense method against DDoS attack at the source-end

    He, Y., Chen, W., Xiao, B. & Peng, W., 1 Sept 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Vol. 2. p. 265-269 5 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet

    Cao, J., Liao, L., Wang, G. & Xiao, B., 2005, Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer, p. 561-569 9 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Detecting SYN flooding attacks near innocent side

    He, Y., Chen, W. & Xiao, B., 1 Dec 2005, Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Proceedings. p. 443-452 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3794 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Efficient array & pointer bound checking against buffer overflow attacks via hardware/software

    Shao, Z., Xue, C., Zhuge, Q., Sha, E. H. M. & Xiao, B., 21 Sept 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Vol. 1. p. 780-785 6 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • Efficient array & pointer bound checking against buffer overflow attacks via hardware/software

    Shao, Z., Xue, C., Zhuge, Q., Sha, E. & Xiao, B., 2005, International Conference on Information Technology: Coding and Computing, 2005 : ITCC 2005, 4-6 April 2005. IEEE, p. 780-785 6 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • High-level synthesis for DSP applications using heterogeneous functional units

    Shao, Z., Zhuge, Q., Xue, C., Xiao, B. & Sha, E. H. M., 1 Dec 2005, Proceedings of the 2005 Asia and South Pacific Design Automation Conference, ASP-DAC 2005. Vol. 1. p. 302-304 3 p. 1466178

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Minimizing energy via loop scheduling and DVS for multi-core embedded systems

    Chen, Y., Shao, Z., Zhuge, Q., Xue, C., Xiao, B. & Sha, E., 2005, 11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings. IEEE Computer Society, Vol. II. p. 2-6 5 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Minimizing energy via loop scheduling and DVS for multi-core embedded systems

    Chen, Y., Shao, Z., Zhuge, Q., Xue, C., Xiao, B. & Sha, E. H. M., 1 Sept 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Vol. 2. p. 2-6 5 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    24 Citations (Scopus)
  • Universal routing in distributed networks

    Chen, K. F., Sha, E. H. M. & Xiao, B., 1 Sept 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Vol. 2. p. 555-559 5 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • 2004

    Approximation algorithms design for disk partial covering problem

    Xiao, B., Cao, J., Zhuge, Q., He, Y. & Sha, E. H. M., 16 Aug 2004, Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN. p. 104-109 6 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
    19 Citations (Scopus)
  • Dynamic shortest path tree update for multiple link state decrements

    Xiao, B., Cao, J., Zhuge, Q., Shao, Z. & Sha, E. H. M., 1 Dec 2004, GLOBECOM - IEEE Global Telecommunications Conference. p. 1163-1167 5 p. GE14-8

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
    4 Citations (Scopus)