Publication
(underline denotes SDSL student supervised by Yang Xiao. * denotes Yang Xiao being the corresponding author.)
2025
DEXO: A Secure and Fair Exchange Mechanism for Decentralized IoT Data Markets
[PDF]
Y. Li, I. Alom, W. Sun, Y. Xiao*
IEEE Internet of Things Journal (IoT-J), accepted for publication, January 2025.
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction
[PDF]
S. Shi, N. Wang, Y. Xiao, C. Zhang, Y. Shi, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium 2025 (NDSS'25), February 2025.
2024
Basic Proof-of-Stake Consensus Mechanisms
[PDF]
Y. Xiao*, W. Sun
Book chapter in Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches, pp. 49-66, IET, 2024.
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability
[PDF]
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y. T. Hou, E. Burger, L. DaSilva, W. Lou
The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), July 2024.
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials
[PDF]
H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium 2024 (NDSS'24), February 2024.
2023
Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials
[PDF]
A. D. Johnson, I. Alom, Y. Xiao*
10th ACM Workshop on Moving Target Defense (MTD'23) (Collocated with CCS'23), November 2023.
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
[PDF]
S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou
European Symposium on Research in Computer Security 2023 (ESORICS'23), September 2023.
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level
[PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
IEEE Internet of Things Journal (IoT-J), accepted for publication, August 2023.
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
[PDF]
C. Du, H. Yu, Y. Xiao, Y. T. Hou, A. Keromytis, W. Lou
USENIX Security Symposium 2023 (Security'23), August 2023.
ARI: Attestation of Real-time Mission Execution Integrity
[PDF]
J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang
USENIX Security Symposium 2023 (Security'23), August 2023.
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment
[PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted for publication, April 2023.
MS-PTP: Protecting Network Timing from Byzantine Attacks
[PDF]
S. Shi, Y. Xiao, C. Du, M. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2023 (WiSec'23), May 2023.
A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications 2023 (INFOCOM'23), May 2023.
2022
Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning
[PDF]
N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'22), December 2022.
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol
[PDF]
H. Xie, S. Fei, Z. Yan, Y. Xiao
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted: October 2022.
Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions
[PDF]
C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou
The 19th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'22), October 2022.
CANShield: Signal-based Intrusion Detection for Controller Area Networks
[PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
escar USA conference 2022, June 2022.
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
[PDF]
N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), May 2022.
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
[PDF]
N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, Y. T. Hou
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2022 (Early Access).
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution
[PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Wireless Communications (WCM), vol. 29, no. 1, pp. 220-228, February 2022.
2021
Challenges and New Directions in Securing Spectrum Access Systems
[PDF]
S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y. T. Hou, J. H. Reed
In IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6498-6518, April 2021.
2020
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication
[PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'20), December 2020.
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution
[PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
European Symposium on Research in Computer Security (ESORICS'20), September 2020.
Offloading Decision in Edge Computing for Continuous Applications under Uncertainty
[PDF]
W. Chang, Y. Xiao, W. Lou, G. Shou
IEEE Transactions on Wireless Communications (TWC), vol. 19, no. 9, pp. 6196-6209, September 2020.
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'20), July 2020.
A Survey of Distributed Consensus Protocols for Blockchain Networks
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 2, pp. 1432-1465, Secondquarter 2020.
2019
Distributed Consensus Protocols and Algorithms
[PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
Book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019
2016
Performance Analysis of Random Access Network with Post-backoff
C. Bu, Y. Xiao, T. Ye, P. Wu, X. Zhang, J. Wu
Telecommunications Science, 32, no. 2 (2016): 34.