IoT Security Techniques Based on Machine Learning L Xiao, X Wan, X Lu, Y Zhang, D Wu IEEE Signal Processing Magazine, 2018 | 578 | 2018 |
Using the physical layer for wireless authentication in time-variant channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 7 (7), 2571-2579, 2008 | 394 | 2008 |
Learning-based computation offloading for IoT devices with energy harvesting M Min, L Xiao, Y Chen, P Cheng, D Wu, W Zhuang IEEE Trans. on Vehicular Technology, 2019 | 388 | 2019 |
Fingerprints in the ether: Using the physical layer for wireless authentication L Xiao, L Greenstein, N Mandayam, W Trappe 2007 IEEE International conference on communications, 4646-4651, 2007 | 286 | 2007 |
PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks L Xiao, Y Li, G Han, G Liu, W Zhuang IEEE Trans. Vehicular Technology 65 (12), 10037-10047, 2016 | 249 | 2016 |
Deep reinforcement learning based intelligent reflecting surface for secure wireless communications H Yang, Z Xiong, J Zhao, D Niyato, L Xiao, Q Wu IEEE Trans. Wireless Comm., 2020 | 247 | 2020 |
UAV Relay in VANETs Against Smart Jamming with Reinforcement Learning L Xiao, X Lu, D Xu, Y Tang, L Wang, W Zhuang IEEE Trans. Vehicular Technology, 2018 | 247 | 2018 |
Security in Mobile Edge Caching with Reinforcement Learning L Xiao, X Wan, C Dai, X Du, X Chen, G Mohsen IEEE Wireless Communications Magazine, arXiv preprint arXiv:1801.05915, 2018 | 191 | 2018 |
Spectral efficiency of distributed antenna system with random antenna layout H Zhuang, L Dai, L Xiao, Y Yao Electronics Letters 39 (6), 1, 2003 | 185 | 2003 |
Reinforcement Learning-based NOMA Power Allocation in the Presence of Smart Jamming L Xiao, Y Li, C Dai, H Dai, HV Poor IEEE Trans. Vehicular Technology, 2017 | 180 | 2017 |
Cloud-based Malware Detetction Game for Mobile Device with Offloading L Xiao, Y Li, X Huang, X Du IEEE Transactions on Mobile Computing, 2017 | 179 | 2017 |
Two-Dimensional Anti-Jamming Communication Based on Deep Reinforcement Learning G Han, L Xiao, HV Poor IEEE International Conference on Acoustics, Speech and Signal Processing …, 2017 | 174 | 2017 |
Channel-based detection of sybil attacks in wireless networks L Xiao, LJ Greenstein, NB Mandayam, W Trappe Information Forensics and Security, IEEE Transactions on 4 (3), 492-503, 2009 | 174 | 2009 |
Learning Based Privacy-Aware Offloading for Healthcare IoT with Energy Harvesting M Min, X Wan, L Xiao, Y Chen, M Xia, D Wu, H Dai IEEE Internet of Things Journal, 2019 | 161 | 2019 |
A Secure Mobile Crowdsensing Game with Deep Reinforcement Learning L Xiao, Y Li, G Han, H Dai, HV Poor IEEE Trans. Information Forensics & Security, 2017 | 152 | 2017 |
PHY-Layer Authentication with Multiple Landmarks with Reduced Overhead L Xiao, X Wan, Z Han IEEE Trans. Wireless Communications, 2017 | 126 | 2017 |
Channel-based spoofing detection in frequency-selective Rayleigh channels L Xiao, LJ Greenstein, NB Mandayam, W Trappe IEEE Transactions on Wireless Communications 8 (12), 5948-5956, 2009 | 126 | 2009 |
Information-theoretic capacity analysis in MIMO distributed antenna systems L Xiao, L Dai, H Zhuang, S Zhou, Y Yao The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003 …, 2003 | 124 | 2003 |
User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks WZ L. Xiao, C. Xie, M. Min IEEE Trans. Vehicular Technology, 2017 | 120 | 2017 |
Mobile Offloading Game Against Smart Attacks L Xiao, C Xie, T Chen, H Dai, HV Poor IEEE International Conference on Computer Communications (INFOCOM …, 2016 | 119 | 2016 |