Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Zhifeng Xiao
Penn State Erie, The Behrend College
24Publications
10H-index
537Citations
Publications 24
Newest
Published on Aug 1, 2017in Wireless Personal Communications 1.20
Zhifeng Xiao10
Estimated H-index: 10
(Penn State Erie, The Behrend College),
Yang Xiao56
Estimated H-index: 56
(University of Alabama),
Jie Wu72
Estimated H-index: 72
(Temple University)
Accountability in computing implies that an entity should be held responsible for its behaviors with verifiable evidence. In order to study accountability, quantitative methods would be very helpful. Even though there are some researches in accountability, there are no other works which study quantitative accountability in practical settings, while quantitative accountability is defined as using quantities or metrics to measure accountability. In this paper, we propose P-Accountability, which is...
Source Cite
Published on Jul 1, 2017
Zhifeng Xiao10
Estimated H-index: 10
(Penn State Erie, The Behrend College)
This paper explores a novel named entity recognition approach to locate and classify cybersecurity concepts from unstructured texts. The proposed system follows a two-phase procedure. Phase one aims for named entity location, which can be achieved by any existing NER system that is well trained on generic and annotated English articles. The output of phase one is a processed text in which named entities are located and well marked. In phase two, we prepare two core components that define the dom...
Source Cite
Published on Mar 10, 2016in Security and Communication Networks 0.90
Zhifeng Xiao10
Estimated H-index: 10
(University of Alabama),
Nandhakumar Kathiresshan2
Estimated H-index: 2
(University of Alabama),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
Security in computer systems has been a major concern since the very beginning. Although security has been addressed in various aspects, accountability is one of the main facets of security that is lacking in today's computer systems. The ability not only to detect errors but also to find the responsible entity/entities for the failure is crucial. In this paper, we intend to provide a comprehensive investigation of the state-of-the-art accountability research issues in current information system...
11 Citations Source Cite
Published on Jun 1, 2015 in International Conference on Communications
Xiaofang Xia2
Estimated H-index: 2
(Chinese Academy of Sciences),
Wei Liang12
Estimated H-index: 12
(Chinese Academy of Sciences)
+ 2 AuthorsZhifeng Xiao10
Estimated H-index: 10
In this paper, we explore the malicious meter inspection (MMI) problem in neighborhood area smart grids. By exploiting a binary inspection tree, we propose a Difference-Comparison-based Inspection (DCI) algorithm to quickly target the malicious meters. Different from existing algorithms, the DCI algorithm is designed based on three rules that are derived according to the difference comparison results in each local subtree. An attractive feature of the DCI algorithm is that it manages to skip a l...
12 Citations Source Cite
Vivens Ndatinya1
Estimated H-index: 1
(University of Alabama),
Zhifeng Xiao10
Estimated H-index: 10
(Penn State Erie, The Behrend College)
+ 2 AuthorsYang Xiao56
Estimated H-index: 56
(University of Alabama)
The number and types of attacks against networked computer systems have raised the importance of network security. Today, network administrators need to be able to investigate and analyse the network traffic to understand what is happening and to deploy immediate response in case of an identified attack. Wireshark proves to be an effective open source tool in the study of network packets and their behaviour. In this regard, Wireshark can be used in identifying and categorising various types of a...
8 Citations Source Cite
Patrick Mosca1
Estimated H-index: 1
,
Yanping Zhang2
Estimated H-index: 2
+ 1 AuthorsYun Wang3
Estimated H-index: 3
Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidth resources has driven modern businesses into cloud services. The cloud is considered cutting edge technology and it is solely relied on by many large technology, business, and media companies such as Netflix or Salesforce.com. However, in addition to the benefit at hand, security i...
4 Citations Source Cite
Published on Jan 1, 2014in Future Generation Computer Systems 4.64
Zhifeng Xiao10
Estimated H-index: 10
(Pennsylvania State University),
Yang Xiao56
Estimated H-index: 56
(University of Alabama)
MapReduce is a programming model that is capable of processing large data sets in distributed computing environments. The original MapReduce model was designed to be fault-tolerant in case of various network abnormalities. However, fault-tolerance does not guarantee that each working machine will be completely accountable; when nodes are malicious, they may intentionally misrepresent the processing result during mapping or reducing, and they may thus make the final results inaccurate and untrust...
30 Citations Source Cite
Published on Apr 1, 2014 in Wireless Telecommunications Symposium
Yun Wang3
Estimated H-index: 3
(Bradley University),
Zhifeng Xiao10
Estimated H-index: 10
(Penn State Erie, The Behrend College)
+ 2 AuthorsJacob M Siegers1
Estimated H-index: 1
(Bradley University)
Unlike most existing works that focus on a conventional omni-directional sensor network, we investigate the sensing coverage problem in a directional sensor network through mathematically modeling, analysis, and computer-based simulation evaluation. Research results show: 1) A factor of (2π/θ) more sensors will be required to provide the same sensing coverage in a θ(θ α = ln(1-α)-ln(1-f)/ln(1-f), is solely determined by the sensing coverage requirement in an application and is independent of sen...
1 Citations Source Cite
Published on Sep 1, 2014in Journal of Internet Technology 1.30
Zhifeng Xiao10
Estimated H-index: 10
,
Yang Xiao56
Estimated H-index: 56
,
Hui Chen17
Estimated H-index: 17
Recent trends in Cloud Computing have further stimulated the popularization of mobile device industry, creating a novel computing paradigm called Mobile Cloud Computing (MCC). MCC takes advantage of the powerful computation and storage capability of cloud servers by offloading heavy computing or storing tasks from mobile devices to cloud servers to keep a thin frontend on the mobile devices. Such benefit is important to MCC leveraging various sensors equipped in modern mobile devices. We explore...
3 Citations Source Cite
Published on Jan 1, 2014
Zhifeng Xiao10
Estimated H-index: 10
(Pennsylvania State University),
Yun Wang3
Estimated H-index: 3
(Bradley University)
Recent advances have witnessed the success of Data Center Network (DCN). In this paper, we propose a novel approach for distributed log analysis in DCN. Our method leverages Mobile Agents (MAs) to perform log analysis. MAs are able to travel across the network, fulfill their tasks on the host machines, and report to the system operator. Compared to the traditional centralized method, MA-based log analysis takes advantage of the processing ability of distributed machines, offloading log analysis ...
123