Service Members Teaching Research Publication Home

2024

TriSAS: Toward Dependable Inter-SAS Coordination with Auditability
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y. T. Hou, E. Burger, L. DaSilva, W. Lou
The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), July 2024.

AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials
H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium (NDSS'24), February 2024.

2023

Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials [PDF]
A. D. Johnson, I. Alom, Y. Xiao
10th ACM Workshop on Moving Target Defense (MTD'23) (Collocated with CCS'23), November 2023.

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou
European Symposium on Research in Computer Security (ESORICS'23), September 2023.

CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
IEEE Internet of Things Journal (IoT-J), accepted for publication, August 2023.

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication [PDF]
C. Du, H. Yu, Y. Xiao, Y. T. Hou, A. Keromytis, W. Lou
USENIX Security Symposium (Security'23), August 2023.

ARI: Attestation of Real-time Mission Execution Integrity [PDF]
J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang
USENIX Security Symposium (Security'23), August 2023.

BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted for publication, April 2023.

MS-PTP: Protecting Network Timing from Byzantine Attacks [PDF]
S. Shi, Y. Xiao, C. Du, M. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'23), May 2023. (AR=25%)

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'23), May 2023. (AR=19.2%)

2022

Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning [PDF]
N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'22), December 2022. (AR=24.1%)

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol [PDF]
H. Xie, S. Fei, Z. Yan, Y. Xiao
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted: October 2022.

Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions [PDF]
C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou
The 19th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'22), October 2022.

CANShield: Signal-based Intrusion Detection for Controller Area Networks [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
escar USA conference 2022, June 2022.

FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations [PDF]
N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), May 2022. (AR=18.4%)

MANDA: On Adversarial Example Detection for Network Intrusion Detection System [PDF]
N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, Y. T. Hou
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2022 (Early Access).

Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Wireless Communications (WCM), vol. 29, no. 1, pp. 220-228, February 2022.

2021

Challenges and New Directions in Securing Spectrum Access Systems [PDF]
S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y. T. Hou, J. H. Reed
In IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6498-6518, April 2021.

2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication [PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'20), December 2020. (AR=23.1%)

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
European Symposium on Research in Computer Security (ESORICS'20), September 2020. (AR=19.7%)

Offloading Decision in Edge Computing for Continuous Applications under Uncertainty [PDF]
W. Chang, Y. Xiao, W. Lou, G. Shou
IEEE Transactions on Wireless Communications (TWC), vol. 19, no. 9, pp. 6196-6209, September 2020.

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'20), July 2020. (AR=19.8%)

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 2, pp. 1432-1465, Secondquarter 2020.

2019

Distributed Consensus Protocols and Algorithms [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
Book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019

2016

Performance Analysis of Random Access Network with Post-backoff
C. Bu, Y. Xiao, T. Ye, P. Wu, X. Zhang, J. Wu
Telecommunications Science, 32, no. 2 (2016): 34.