Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List no author result Created with Sketch.
Loading Scinapse...
Yang Xiao
University of Alabama
508Publications
56H-index
12.4kCitations
Publications 508
Newest
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Wei Liang12
Estimated H-index: 12
(Chinese Academy of Sciences)
Electricity theft is a widespread problem that causes tremendous economic losses for all utility companies around the globe. As many countries struggle to update their antique power systems to emerging smart grids, more and more smart meters are deployed throughout the world. Compared with analog meters which can be tampered with by only physical attacks, smart meters can be manipulated by malicious users with both physical and cyber-attacks for the purpose of stealing electricity. Thus, electri...
Source Cite
Jingcheng Gao (University of Alabama), Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Shuhui Li (University of Alabama)
We consider a real-time demand response system in smart grid distribution to solve real-time pricing’s (RTP) total cost minimization problem. This problem has not yet to be discussed especially at the level of neighborhood area networks. While the available RTP-alike schemes are too stand-alone to solve all the problems systematically, this paper proposes a mathematical energy scheduling model for RTP demand response, and based on which, a distributed scheduling algorithm of energy consumption f...
Source Cite
Wenlin Han (California State University), Yang Xiao56
Estimated H-index: 56
(University of Alabama)
Delay Tolerant Networks (DTNs) have attracted various interests these days. Since DTNs are subject to high loss rate, large delay, intermittent connection, and even no end-to-end connectivity, relay nodes, such as throwboxes, are deployed to enhance network performance. Internet-based systems have contemporaneous connectivity between location-distributed nodes, and this does not apply to DTNs. Thus, the traditional relay node deployment strategies are no longer suitable for DTNs. In this paper, ...
Source Cite
2018 in Computers & SecurityIF: 2.65
Bo Fu1
Estimated H-index: 1
(Cisco Systems, Inc.),
Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Hui Chen17
Estimated H-index: 17
(City University of New York)
Abstract Relationships among events in conventional system and network logs are not explicitly recorded and can only be determined from examining ancillary attributes of the events, such as, time stamps and event identifiers, or sometimes the semantics of the event attributes with some learning algorithms. The accuracy of the event relations is subject to the design of the algorithms, the experience of the users of the algorithms, and the completeness and accuracy of the attributes and the seman...
Source Cite
2018 in Computers & SecurityIF: 2.65
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
+ 1 AuthorsMeng Zheng9
Estimated H-index: 9
(Chinese Academy of Sciences)
Abstract When modern hardware and software technologies are integrated into smart grid, numerous vulnerabilities are introduced at the same time. The vulnerabilities are now leveraged by malicious users for the purpose of electricity theft. Many approaches are proposed to identify malicious users. However, some of them have low detection rates; the others suffer from either low inspection speed or huge cost of deploying monitoring devices. In this paper, to accurately locate malicious users stea...
Source Cite
Chao Pei1
Estimated H-index: 1
(Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
+ 1 AuthorsXiaojia Han1
Estimated H-index: 1
(Chinese Academy of Sciences)
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for the devices in the resource-constrained devices and/or wireless networks. Thus, in this paper, we study the trade-off between security and performance of several recent top performing lightweight block ciphers for the demand of resource-constrai...
1 Citations Download PDF Cite
2017 in The Computer JournalIF: 0.79
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Wei Liang12
Estimated H-index: 12
(Chinese Academy of Sciences)
+ 1 AuthorsMeng Zheng9
Estimated H-index: 9
(Chinese Academy of Sciences)
1 Citations Source Cite
Jing Liu11
Estimated H-index: 11
,
Wenlin Han7
Estimated H-index: 7
,
Yang Xiao56
Estimated H-index: 56
Source
2017 in Computer NetworksIF: 2.52
Wenlin Han7
Estimated H-index: 7
(University of Alabama),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
A Non-Technical Loss (NTL) fraud occurs when a fraudster tampers with a smart meter so that the meter registers less electricity consumption than the actual consumed amount, and therefore the utility becomes the victim who suffers the corresponding economic loss. In the literature, many detection schemes have been proposed to detect NTL frauds. However, some NTL frauds are far more complicated than what the existing schemes expect. We recently discovered a new potential type of frauds, a variant...
5 Citations Source Cite
2017 in Computers & SecurityIF: 2.65
Wenlin Han7
Estimated H-index: 7
(University of Alabama),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
Abstract Utility companies consistently suffer from the harassing of Non-Technical Loss (NTL) frauds globally. In the traditional power grid, electricity theft is the main form of NTL frauds. In Smart Grid, smart meters thwart electricity theft in some ways but cause more problems, e.g., intrusions, hacking, and malicious manipulation. Various detectors have been proposed to detect NTL frauds, but they either rely on user behavior analysis which requires a large amount of historical data or need...
4 Citations Source Cite
12345678910