IoT Security Techniques Based on Machine Learning L Xiao, X Wan, X Lu, Y Zhang, D Wu IEEE Signal Processing Magazine, 2018 | 807 | 2018 |
Learning-based computation offloading for IoT devices with energy harvesting M Min, L Xiao, Y Chen, P Cheng, D Wu, W Zhuang IEEE Trans. on Vehicular Technology, 2019 | 546 | 2019 |
Using the physical layer for wireless authentication in time-variant channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008 | 446 | 2008 |
Deep reinforcement learning based intelligent reflecting surface for secure wireless communications H Yang, Z Xiong, J Zhao, D Niyato, L Xiao, Q Wu IEEE Trans. Wireless Comm., 2020 | 417 | 2020 |
PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks L Xiao, Y Li, G Han, G Liu, W Zhuang IEEE Trans. Vehicular Technology 65 (12), 10037-10047, 2016 | 321 | 2016 |
Fingerprints in the ether: Using the physical layer for wireless authentication L Xiao, L Greenstein, N Mandayam, W Trappe 2007 IEEE International conference on communications, 4646-4651, 2007 | 318 | 2007 |
UAV Relay in VANETs Against Smart Jamming with Reinforcement Learning L Xiao, X Lu, D Xu, Y Tang, L Wang, W Zhuang IEEE Trans. Vehicular Technology, 2018 | 310 | 2018 |
Security in Mobile Edge Caching with Reinforcement Learning L Xiao, X Wan, C Dai, X Du, X Chen, G Mohsen IEEE Wireless Communications Magazine, arXiv preprint arXiv:1801.05915, 2018 | 229 | 2018 |
Two-Dimensional Anti-Jamming Communication Based on Deep Reinforcement Learning G Han, L Xiao, HV Poor IEEE International Conference on Acoustics, Speech and Signal Processing …, 2017 | 226 | 2017 |
Reinforcement Learning-based NOMA Power Allocation in the Presence of Smart Jamming L Xiao, Y Li, C Dai, H Dai, HV Poor IEEE Trans. Vehicular Technology, 2017 | 223 | 2017 |
Cloud-based Malware Detetction Game for Mobile Device with Offloading L Xiao, Y Li, X Huang, X Du IEEE Transactions on Mobile Computing, 2017 | 205 | 2017 |
Learning Based Privacy-Aware Offloading for Healthcare IoT with Energy Harvesting M Min, X Wan, L Xiao, Y Chen, M Xia, D Wu, H Dai IEEE Internet of Things Journal, 2019 | 197 | 2019 |
Spectral efficiency of distributed antenna system with random antenna layout H Zhuang, L Dai, L Xiao, Y Yao Electronics Letters 39 (6), 1, 2003 | 189 | 2003 |
Channel-based detection of sybil attacks in wireless networks L Xiao, LJ Greenstein, NB Mandayam, W Trappe Information Forensics and Security, IEEE Transactions on 4 (3), 492-503, 2009 | 185 | 2009 |
Privacy-preserving federated learning for UAV-enabled networks: Learning-based joint scheduling and resource management H Yang, J Zhao, Z Xiong, KY Lam, S Sun, L Xiao IEEE Journal on Selected Areas in Comm., 2021 | 177 | 2021 |
A Secure Mobile Crowdsensing Game with Deep Reinforcement Learning L Xiao, Y Li, G Han, H Dai, HV Poor IEEE Trans. Information Forensics & Security, 2017 | 177 | 2017 |
Anti-jamming transmission Stackelberg game with observation errors L Xiao, T Chen, J Liu, H Dai IEEE communications letters 19 (6), 949-952, 2015 | 177 | 2015 |
PHY-Layer Authentication with Multiple Landmarks with Reduced Overhead L Xiao, X Wan, Z Han IEEE Trans. Wireless Communications, 2017 | 176 | 2017 |
User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks WZ L. Xiao, C. Xie, M. Min IEEE Trans. Vehicular Technology, 2017 | 157 | 2017 |
Channel-based spoofing detection in frequency-selective Rayleigh channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 8 (12), 5948-5956, 2009 | 145 | 2009 |