2024
Basic Proof-of-Stake Consensus Mechanisms
Y. Xiao, W. Sun
Book chapter in Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches, pp. 49-66, IET, 2024.
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability
[PDF]
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y. T. Hou, E. Burger, L. DaSilva, W. Lou
The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), July 2024.
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials
[PDF]
H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium (NDSS'24), February 2024.
2023
Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials
[PDF]
A. D. Johnson, I. Alom, Y. Xiao
10th ACM Workshop on Moving Target Defense (MTD'23) (Collocated with CCS'23), November 2023.
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
[PDF]
S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou
European Symposium on Research in Computer Security (ESORICS'23), September 2023.
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level
[PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
IEEE Internet of Things Journal (IoT-J), accepted for publication, August 2023.
UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
[PDF]
C. Du, H. Yu, Y. Xiao, Y. T. Hou, A. Keromytis, W. Lou
USENIX Security Symposium (Security'23), August 2023.
ARI: Attestation of Real-time Mission Execution Integrity
[PDF]
J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang
USENIX Security Symposium (Security'23), August 2023.
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment
[PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted for publication, April 2023.
MS-PTP: Protecting Network Timing from Byzantine Attacks
[PDF]
S. Shi, Y. Xiao, C. Du, M. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'23), May 2023. (AR=25%)
A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'23), May 2023. (AR=19.2%)
2022
Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning
[PDF]
N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'22), December 2022. (AR=24.1%)
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol
[PDF]
H. Xie, S. Fei, Z. Yan, Y. Xiao
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted: October 2022.
Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions
[PDF]
C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou
The 19th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'22), October 2022.
CANShield: Signal-based Intrusion Detection for Controller Area Networks
[PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
escar USA conference 2022, June 2022.
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
[PDF]
N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), May 2022. (AR=18.4%)
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
[PDF]
N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, Y. T. Hou
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2022 (Early Access).
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution
[PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Wireless Communications (WCM), vol. 29, no. 1, pp. 220-228, February 2022.
2021
Challenges and New Directions in Securing Spectrum Access Systems
[PDF]
S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y. T. Hou, J. H. Reed
In IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6498-6518, April 2021.
2020
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication
[PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'20), December 2020. (AR=23.1%)
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution
[PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
European Symposium on Research in Computer Security (ESORICS'20), September 2020. (AR=19.7%)
Offloading Decision in Edge Computing for Continuous Applications under Uncertainty
[PDF]
W. Chang, Y. Xiao, W. Lou, G. Shou
IEEE Transactions on Wireless Communications (TWC), vol. 19, no. 9, pp. 6196-6209, September 2020.
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'20), July 2020. (AR=19.8%)
A Survey of Distributed Consensus Protocols for Blockchain Networks
[PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 2, pp. 1432-1465, Secondquarter 2020.
2019
Distributed Consensus Protocols and Algorithms
[PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
Book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019
2016
Performance Analysis of Random Access Network with Post-backoff
C. Bu, Y. Xiao, T. Ye, P. Wu, X. Zhang, J. Wu
Telecommunications Science, 32, no. 2 (2016): 34.