Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Yang Xiao
University of Alabama
518Publications
56H-index
13kCitations
Publications 518
Newest
Published on Jan 1, 2018in IEEE Transactions on Smart Grid 10.49
Shuhui Li28
Estimated H-index: 28
,
Yang Sun3
Estimated H-index: 3
+ 1 AuthorsYang Xiao
Published on Jul 14, 2019
Tasnuva Mahjabin (UA: University of Alabama), Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama)
Domain Name System (DNS) has become a target of the Distributed Denial of Service (DDoS) attacks. When a DNS is under a DDoS flood attack, all the domain information under that DNS becomes unreachable, eventually causing unavailability of those particular domain names. In this paper, we propose a method which includes periodic stale content update and maintains a list of most frequently queried domain names of different DNS servers. Our simulation results show that the our method can serve more ...
Published on Feb 1, 2019in IEEE Transactions on Information Forensics and Security 6.21
Xiaofang Xia2
Estimated H-index: 2
(CAS: Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama),
Wei Liang12
Estimated H-index: 12
(CAS: Chinese Academy of Sciences)
Electricity theft is a widespread problem that causes tremendous economic losses for all utility companies around the globe. As many countries struggle to update their antique power systems to emerging smart grids, more and more smart meters are deployed throughout the world. Compared with analog meters which can be tampered with by only physical attacks, smart meters can be manipulated by malicious users with both physical and cyber-attacks for the purpose of stealing electricity. Thus, electri...
Published on Jan 1, 2019 in CCNC (Consumer Communications and Networking Conference)
Tasnuva Mahjabin (UA: University of Alabama), Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama)
Domain Name System (DNS) is an important infrastructure of the Internet. However, DNS can be attacked by flooding DNS servers with tongs of DNS queries within a short time period. In this short paper, we analyze DNS attacks and propose a mitigation process.
Chao Pei1
Estimated H-index: 1
(CAS: Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama)
+ 1 AuthorsXiaojia Han1
Estimated H-index: 1
(CAS: Chinese Academy of Sciences)
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for the devices in the resource-constrained devices and/or wireless networks. Thus, in this paper, we study the trade-off between security and performance of several recent top performing lightweight block ciphers for the demand of resource-constrai...
Published on Aug 1, 2018in Computers & Security 3.06
Xiaofang Xia2
Estimated H-index: 2
(CAS: Chinese Academy of Sciences),
Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama)
+ 1 AuthorsMeng Zheng9
Estimated H-index: 9
(CAS: Chinese Academy of Sciences)
Abstract When modern hardware and software technologies are integrated into smart grid, numerous vulnerabilities are introduced at the same time. The vulnerabilities are now leveraged by malicious users for the purpose of electricity theft. Many approaches are proposed to identify malicious users. However, some of them have low detection rates; the others suffer from either low inspection speed or huge cost of deploying monitoring devices. In this paper, to accurately locate malicious users stea...
Published on Aug 1, 2018in Mobile Networks and Applications 2.39
Jingcheng Gao (UA: University of Alabama), Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama),
Shuhui Li (UA: University of Alabama)
We consider a real-time demand response system in smart grid distribution to solve real-time pricing’s (RTP) total cost minimization problem. This problem has not yet to be discussed especially at the level of neighborhood area networks. While the available RTP-alike schemes are too stand-alone to solve all the problems systematically, this paper proposes a mathematical energy scheduling model for RTP demand response, and based on which, a distributed scheduling algorithm of energy consumption f...
Published on Jun 1, 2018in Computers & Security 3.06
Bo Fu1
Estimated H-index: 1
(Cisco Systems, Inc.),
Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama),
Hui Chen17
Estimated H-index: 17
(CUNY: City University of New York)
Abstract Relationships among events in conventional system and network logs are not explicitly recorded and can only be determined from examining ancillary attributes of the events, such as, time stamps and event identifiers, or sometimes the semantics of the event attributes with some learning algorithms. The accuracy of the event relations is subject to the design of the algorithms, the experience of the users of the algorithms, and the completeness and accuracy of the attributes and the seman...
12345678910