Opening Members Teaching Publication Research SDSL Home

Publication

(underline denotes SDSL student supervised by Yang Xiao. * denotes Yang Xiao being the corresponding author.)

2025

DEXO: A Secure and Fair Exchange Mechanism for Decentralized IoT Data Markets [PDF]
Y. Li, I. Alom, W. Sun, Y. Xiao*
IEEE Internet of Things Journal (IoT-J), accepted for publication, January 2025.

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction [PDF]
S. Shi, N. Wang, Y. Xiao, C. Zhang, Y. Shi, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium 2025 (NDSS'25), February 2025.

2024

Basic Proof-of-Stake Consensus Mechanisms [PDF]
Y. Xiao*, W. Sun
Book chapter in Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches, pp. 49-66, IET, 2024.

TriSAS: Toward Dependable Inter-SAS Coordination with Auditability [PDF]
S. Shi, Y. Xiao, C. Du, Y. Shi, C. Wang, R. Gazda, Y. T. Hou, E. Burger, L. DaSilva, W. Lou
The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), July 2024.

AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials [PDF]
H. Yu, C. Du, Y. Xiao, A. Keromytis, C. Wang, R. Gazda, Y. T. Hou, W. Lou
Network and Distributed System Security Symposium 2024 (NDSS'24), February 2024.

2023

Rethinking Single Sign-On: A Reliable and Privacy-Preserving Alternative with Verifiable Credentials [PDF]
A. D. Johnson, I. Alom, Y. Xiao*
10th ACM Workshop on Moving Target Defense (MTD'23) (Collocated with CCS'23), November 2023.

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities [PDF]
S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, W. Lou
European Symposium on Research in Computer Security 2023 (ESORICS'23), September 2023.

CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
IEEE Internet of Things Journal (IoT-J), accepted for publication, August 2023.

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication [PDF]
C. Du, H. Yu, Y. Xiao, Y. T. Hou, A. Keromytis, W. Lou
USENIX Security Symposium 2023 (Security'23), August 2023.

ARI: Attestation of Real-time Mission Execution Integrity [PDF]
J. Wang, Y. Wang, A. Li, Y. Xiao, R. Zhang, W. Lou, Y. T. Hou, N. Zhang
USENIX Security Symposium 2023 (Security'23), August 2023.

BD-SAS: Enabling Dynamic Spectrum Sharing in Low-trust Environment [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted for publication, April 2023.

MS-PTP: Protecting Network Timing from Byzantine Attacks [PDF]
S. Shi, Y. Xiao, C. Du, M. Shahriar, A. Li, N. Zhang, Y. T. Hou, W. Lou
ACM Conference on Security and Privacy in Wireless and Mobile Networks 2023 (WiSec'23), May 2023.

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications 2023 (INFOCOM'23), May 2023.

2022

Squeezing More Utility via Adaptive Clipping on Deferentially Private Gradients in Federated Meta-Learning [PDF]
N. Wang, Y. Xiao, Y. Chen, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'22), December 2022.

SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol [PDF]
H. Xie, S. Fei, Z. Yan, Y. Xiao
IEEE Transactions on Dependable and Secure Computing (TDSC), accepted: October 2022.

Mobile Tracking in 5G and Beyond Networks: Problems, Challenges, and New Directions [PDF]
C. Du, H. Yu, Y. Xiao, W. Lou, C. Wang, R. Gazda, Y. T. Hou
The 19th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS'22), October 2022.

CANShield: Signal-based Intrusion Detection for Controller Area Networks [PDF]
M. H. Shahriar, Y. Xiao, P. Moriano, W. Lou, Y. T. Hou
escar USA conference 2022, June 2022.

FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations [PDF]
N. Wang, Y. Xiao, Y. Chen, Y. Hu, W. Lou, Y. T. Hou
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), May 2022.

MANDA: On Adversarial Example Detection for Network Intrusion Detection System [PDF]
N. Wang, Y. Chen, Y. Xiao, Y. Hu, W. Lou, Y. T. Hou
IEEE Transactions on Dependable and Secure Computing (TDSC), February 2022 (Early Access).

Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution [PDF]
Y. Xiao, S. Shi, W. Lou, C. Wang, X. Li, N. Zhang, Y. T. Hou, J. H. Reed
IEEE Wireless Communications (WCM), vol. 29, no. 1, pp. 220-228, February 2022.

2021

Challenges and New Directions in Securing Spectrum Access Systems [PDF]
S. Shi, Y. Xiao, W. Lou, C. Wang, X. Li, Y. T. Hou, J. H. Reed
In IEEE Internet of Things Journal (IoT-J), vol. 8, no. 8, pp. 6498-6518, April 2021.

2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication [PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. T. Hou
Annual Computer Security Applications Conference (ACSAC'20), December 2020.

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
European Symposium on Research in Computer Security (ESORICS'20), September 2020.

Offloading Decision in Edge Computing for Continuous Applications under Uncertainty [PDF]
W. Chang, Y. Xiao, W. Lou, G. Shou
IEEE Transactions on Wireless Communications (TWC), vol. 19, no. 9, pp. 6196-6209, September 2020.

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE International Conference on Computer Communications (INFOCOM'20), July 2020.

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]
Y. Xiao, N. Zhang, W. Lou, Y. T. Hou
IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 2, pp. 1432-1465, Secondquarter 2020.

2019

Distributed Consensus Protocols and Algorithms [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y. T. Hou
Book chapter in Blockchain for Distributed Systems Security, Wiley & Sons, 2019

2016

Performance Analysis of Random Access Network with Post-backoff
C. Bu, Y. Xiao, T. Ye, P. Wu, X. Zhang, J. Wu
Telecommunications Science, 32, no. 2 (2016): 34.