Yang Xiao
University of Alabama
517Publications
56H-index
12.6kCitations
Publications 517
Newest
Published on Jan 1, 2019 in Consumer Communications and Networking Conference
Tasnuva Mahjabin (University of Alabama), Yang Xiao56
Estimated H-index: 56
(University of Alabama)
Domain Name System (DNS) is an important infrastructure of the Internet. However, DNS can be attacked by flooding DNS servers with tongs of DNS queries within a short time period. In this short paper, we analyze DNS attacks and propose a mitigation process.
Source Cite
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Wei Liang11
Estimated H-index: 11
(Chinese Academy of Sciences)
Electricity theft is a widespread problem that causes tremendous economic losses for all utility companies around the globe. As many countries struggle to update their antique power systems to emerging smart grids, more and more smart meters are deployed throughout the world. Compared with analog meters which can be tampered with by only physical attacks, smart meters can be manipulated by malicious users with both physical and cyber-attacks for the purpose of stealing electricity. Thus, electri...
Source Cite
Published on Aug 1, 2018in Mobile Networks and Applications 2.50
Jingcheng Gao (University of Alabama), Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Shuhui Li (University of Alabama)
We consider a real-time demand response system in smart grid distribution to solve real-time pricing’s (RTP) total cost minimization problem. This problem has not yet to be discussed especially at the level of neighborhood area networks. While the available RTP-alike schemes are too stand-alone to solve all the problems systematically, this paper proposes a mathematical energy scheduling model for RTP demand response, and based on which, a distributed scheduling algorithm of energy consumption f...
Source Cite
Chao Pei1
Estimated H-index: 1
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
+ 1 AuthorsXiaojia Han1
Estimated H-index: 1
(Chinese Academy of Sciences)
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for the devices in the resource-constrained devices and/or wireless networks. Thus, in this paper, we study the trade-off between security and performance of several recent top performing lightweight block ciphers for the demand of resource-constrai...
1 Citations Source Cite
Published on Apr 1, 2018in Wireless Personal Communications 1.20
Wenlin Han (California State University, Fullerton), Yang Xiao56
Estimated H-index: 56
(University of Alabama)
Delay Tolerant Networks (DTNs) have attracted various interests these days. Since DTNs are subject to high loss rate, large delay, intermittent connection, and even no end-to-end connectivity, relay nodes, such as throwboxes, are deployed to enhance network performance. Internet-based systems have contemporaneous connectivity between location-distributed nodes, and this does not apply to DTNs. Thus, the traditional relay node deployment strategies are no longer suitable for DTNs. In this paper, ...
Source Cite
Published on Jun 1, 2018in Computers & Security 2.65
Bo Fu (Cisco Systems, Inc.), Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Hui Chen17
Estimated H-index: 17
(City University of New York)
Abstract Relationships among events in conventional system and network logs are not explicitly recorded and can only be determined from examining ancillary attributes of the events, such as, time stamps and event identifiers, or sometimes the semantics of the event attributes with some learning algorithms. The accuracy of the event relations is subject to the design of the algorithms, the experience of the users of the algorithms, and the completeness and accuracy of the attributes and the seman...
Source Cite
Published on Aug 1, 2018in Computers & Security 2.65
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
+ 1 AuthorsMeng Zheng9
Estimated H-index: 9
(Chinese Academy of Sciences)
Abstract When modern hardware and software technologies are integrated into smart grid, numerous vulnerabilities are introduced at the same time. The vulnerabilities are now leveraged by malicious users for the purpose of electricity theft. Many approaches are proposed to identify malicious users. However, some of them have low detection rates; the others suffer from either low inspection speed or huge cost of deploying monitoring devices. In this paper, to accurately locate malicious users stea...
Source Cite
Published on Jan 1, 2017in Ad Hoc & Sensor Wireless Networks 0.75
Bin Xu2
Estimated H-index: 2
,
Jianying Zheng2
Estimated H-index: 2
+ 2 AuthorsSuat Ozdemir17
Estimated H-index: 17
Tasnuva Mahjabin1
Estimated H-index: 1
,
Yang Xiao56
Estimated H-index: 56
+ 1 AuthorsWangdong Jiang1
Estimated H-index: 1
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques. We provide a systematic analysis of this type of attacks including motivations and evolution, analysis of different attacks so far, prot...
4 Citations Source Cite
12345678910