Service Members Teaching Research Publication Home

2024

Basic Proof-of-Stake Consensus Mechanisms
Y. Xiao, W. Sun
Book chapter in Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches, pp. 49-66, IET, 2024.

TriSAS: Toward Dependable Inter-SAS Coordination with Auditability [PDF]
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y. T. Hou, E. Burger, L. DaSilva, W. Lou
The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), July 2024.

AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials [PDF]
H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium (NDSS'24), February 2024.

2023

Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials [PDF]
A. D. Johnson, I. Alom, Y. Xiao
10th ACM Workshop on Moving Target Defense (MTD'23) (Collocated with CCS'23), November 2023.

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities [PDF]
S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou
European Symposium on Research in Computer Security (ESORICS'23), September 2023.

CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
IEEE Internet of Things Journal (IoT-J), accepted for publication, August 2023.

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication [PDF]
C. Du, H. Yu, Y. Xiao, Y. T. Hou, A. Keromytis, W. Lou
USENIX Security Symposium (Security'23), August 2023.

ARI: Attestation of Real-time Mission Execution Integrity [PDF]
J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang
USENIX Security Symposium (Security'23), August 2023.

BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted for publication, April 2023.

MS-PTP: Protecting Network Timing from Byzantine Attacks [PDF]
S. Shi, Y. Xiao, C. Du, M. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'23), May 2023. (AR=25%)

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'23), May 2023. (AR=19.2%)

2022

Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning [PDF]
N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'22), December 2022. (AR=24.1%)

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol [PDF]
H. Xie, S. Fei, Z. Yan, Y. Xiao
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted: October 2022.

Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions [PDF]
C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou
The 19th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'22), October 2022.

CANShield: Signal-based Intrusion Detection for Controller Area Networks [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
escar USA conference 2022, June 2022.

FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations [PDF]
N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), May 2022. (AR=18.4%)

MANDA: On Adversarial Example Detection for Network Intrusion Detection System [PDF]
N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, Y. T. Hou
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2022 (Early Access).

Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Wireless Communications (WCM), vol. 29, no. 1, pp. 220-228, February 2022.

2021

Challenges and New Directions in Securing Spectrum Access Systems [PDF]
S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y. T. Hou, J. H. Reed
In IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6498-6518, April 2021.

2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication [PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'20), December 2020. (AR=23.1%)

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
European Symposium on Research in Computer Security (ESORICS'20), September 2020. (AR=19.7%)

Offloading Decision in Edge Computing for Continuous Applications under Uncertainty [PDF]
W. Chang, Y. Xiao, W. Lou, G. Shou
IEEE Transactions on Wireless Communications (TWC), vol. 19, no. 9, pp. 6196-6209, September 2020.

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'20), July 2020. (AR=19.8%)

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 2, pp. 1432-1465, Secondquarter 2020.

2019

Distributed Consensus Protocols and Algorithms [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
Book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019

2016

Performance Analysis of Random Access Network with Post-backoff
C. Bu, Y. Xiao, T. Ye, P. Wu, X. Zhang, J. Wu
Telecommunications Science, 32, no. 2 (2016): 34.