删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

厦门大学信息学院导师教师师资介绍简介-肖亮

本站小编 Free考研考试/2021-05-09


肖亮 教育部“****奖励计划”青年****、福建省新世纪优秀人才、教授、博士生导师、网络空间安全系主任
美国罗格斯大学(Rutgers Univ.) 博士(2009)
研究方向:无线通信,网络安全,大数据,机器学习
所属部门:网络空间安全系,通信工程系
电子邮件:lxiao (AT) xmu.edu.cn
个人主页:http://lxiao.xmu.edu.cn


个人简历:
主讲课程: 无线通信工程(本科生课程)
信息安全基础(本科生课程)
无线通信网络(研究生课程)
学术兼职: ● IEEE高级会员,IEEE ComSoc 大数据技术委员会委员,
● 中国电子学会高级会员,青年科学家俱乐部会员
● 中国计算机学会高级会员,网络与数据通信专委会委员,物联网专委会委员
● 中国通信学会青年工作委员会委员,通信理论与信号处理委员会委员
● IEEE Transactions on Communications (TCOM)编委
● IEEE Transactions on Dependable and Secure Computing编委
● IEEE Transactions on Information Forensics and Security编委
● 《网络与信息安全学报》编委
● 《China Communications》编委
● 《计算机科学》编委
在研项目: ● 非预知物理层密钥的无线网络抗敌意干扰技术研究,国家自然科学基金面上项目,2013-2016
● 基于前景理论的无线网络安全博弈理论与机制研究, 国家自然科学基金面上项目, 2017 -2020
● 无人机智能抗干扰通信技术研究, 国家自然科学基金面上项目, 2020-2023
代表性论文: Book Chapter: 1. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Chapter 13: Channel-Based Authentication, in Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York, 2010.
2. L. Xiao, "Anti-jamming Transmissions in Cognitive Radio Networks," Springer, 2015, ISBN: 978-3-319-24290-3.
3. L. Xiao,"Chapter 4. Reinforcement Learning Based PHY-Layer Authentication in Cognitive Radio Networks," in "Cognitive Radio Networks: Performance, Applications and Technology", Chee Wei Tan, Eds., NOVA, 2018, ISBN: 978-1-53613-068-3.
4. L. Xiao,"Reinforcement learning based wireless communications against jamming and interference," Encyclopedia of Wireless Networks, Jun. 2018.
5. L. Xiao, W. Zhuang, S. Zhou, C. Chen, "Learning-based VANET Communication and Security Techniques" Springer, 2019, ISBN: 978-3-030-01731-6.
期刊论文 1. H. Zhuang, L. Dai, L. Xiao, and Y. Yao," Spectral efficiency of distributed antenna system with random antenna layout, " Electronics Letter, vol. 39, no 6, pp. 495-496, Mar. 2003.
2. L. Xiao, L. Greenstein, and N. Mandayam, " Sensor-assisted localization in cellular systems," IEEE Trans. Wireless Comm., vol. 6, no. 12, pp. 4244-4248, Dec. 2007.
3. L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, "Distributed measurements for estimating and updating cellular system performance," IEEE Trans. Comm., vol. 56, no. 6, pp. 991-998, Jun. 2008.
4. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
5. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.
6. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks," IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.
7. L. Xiao, H. Dai and P. Ning, "Jamming-resistant collaborative broadcast using uncoordinated frequency hopping," IEEE Trans. Information Forensics & Security, vol. 7, no. 1, pp. 297 – 309, Feb. 2012.
8. L. Xiao, H. Dai, P. Ning, "MAC design of uncoordinated FH-based collaborative broadcast," IEEE Wireless Comm. Letters, vol. 1, no. 3, pp. 261 - 264, Jun. 2012.
9. C. Li, H. Dai, L. Xiao, P. Ning, "Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks," IEEE Trans. Signal Processing, vol. 60, no. 10, pp. 5281 - 5292, Oct. 2012.
10. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect reciprocity security game for large-scale mobile wireless networks," IEEE Trans. Information Forensics & Security, vol. 7, no. 4, pp. 1368 – 1380, Aug. 2012.
11. C. Zhao, L. Xiao et al., "Secure relay selection based on learning with negative externality in wireless networks," EURASIP Journal on Advances in Signal Processing, vol. 2013, no. 1, pp. 1-7, Dec. 2013.
12. L. Xiao, Q. Yan, W. Lou, G. Chen, Y.T. Hou, "Proximity-based security techniques for mobile users in wireless networks," IEEE Trans. Information Forensics & Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.
13. L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect theoretic analysis of energy exchange among microgrids," IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.
14. L. Xiao, T. Chen, J. Liu, H. Dai, "Anti-jamming transmission stackelberg game with observation errors," IEEE Comm. Letters, vol. 19, no. 6, pp. 949-952, Jun. 2015.
15. L. Xiao, Y. Li, J. Liu, Y. Zhao, "Power control with reinforcement learning in cooperative cognitive radio networks against jamming," Journal of Supercomputing, vol. 71, no. 9, pp. 3237-3257, Apr. 2015.
16. J. Liu, L. Xiao, G. Liu, Y. Zhao, "Active authentication with reinforcement learning based on ambient radio signals," Springer Multimedia Tools and Applications, vol. 76, no. 3, pp. 3979-3998, Oct. 2015.
17. L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Information Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
18. L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, "PHY-layer spoofing detection with reinforcement learning in wireless networks," IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.
19. 肖亮, 李强达, 刘金亮, "云存储安全技术研究进展综述," 数据采集与处理, 2016, 31(3):464-472.
20. L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud storage defense against advanced persistent threats: A prospect theoretic study," IEEE Journal on Selected Areas in Comm., vol. 35, no. 3, pp. 534-544, Jan. 2017. Code.
21. L. Xiao, T. Chen, G. Han, W. Zhuang, and L. Sun, "Game theoretic study on channel-based authentication in MIMO systems," IEEE Trans. Vehicular Technology, vol. 66, no. 8, pp. 7474-7484, Jan. 2017. Code.
22. N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-layer authentication based on extreme learning machine," IEEE Comm. Letters, vol. 21, no. 1, pp. 1557-1560, Jul. 2017.
23. L. Xiao, Y. Li, X. Huang, and X. Du, "Cloud-based malware detection game for mobile device with offloading," IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742-2750, Oct. 2017.
24. L. Xiao, X. Wan, and Z. Han, "PHY-layer authentication with multiple landmarks with reduced overhead," IEEE Trans. Wireless Comm., vol. 17, no. 3, pp. 1676-1687, Dec. 2017. Code.
25. L. Xiao, Y. Li, G. Han, H. Dai, and H. V. Poor, "A secure mobile crowdsensing game with deep reinforcement learning," IEEE Trans. Information Forensics & Security, vol. 13, no. 1, pp. 35-47, Jan. 2018. Code.
26. L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor, "Mobile crowdsensing games in vehicular networks," IEEE Trans. Vehicular Technology, vol. 67, no. 2, pp. 1535-1545, Feb. 2018. Code.
27. L. Xiao, D. Jiang, X. Wan, W. Su, and Y. Tang, "Anti-jamming underwater transmission with mobility and learning," IEEE Comm. Letters, vol. 22, no. 3, pp. 542-545, Mar. 2018. Code.
28. L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, "Reinforcement learning-based NOMA power allocation in the presence of smart jamming," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3377-3389, Apr. 2018.
29. L. Xiao, C. Xie, M. Min, and W. Zhuang, "User-centric view of unmanned aerial vehicle transmission against smart attacks," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3420-3430, Apr. 2018.
30. L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, "UAV relay in VANETs against smart jamming with reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 5, pp. 4087-4097, May 2018.
31. L. Xiao, D. Xu, N. B. Mandayam, and H. V. Poor, "Attacker-centric view of a detection game against advanced persistent threats," IEEE Trans. Mobile Computing, vol. 17, no. 11, pp. 2512-2523, Nov. 2018. Code.
32. L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, and M. Guizani, "Security in mobile edge caching with reinforcement learning," IEEE Wireless Comm. Magazine, vol. 25, no. 3, pp. 116-122, Jun. 2018.
33. L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, "IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?," IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018.
34. 陈烨, 许冬瑾, 肖亮, "基于区块链的网络安全技术综述," 电信科学, 2018, 34(03):10-16.
35. M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, "Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4250-4261, Dec. 2018.
36. L. Xiao, D. Jiang, D. Xu, H. Zhu, Y. Zhang, and H. V. Poor, "Two-dimensional antijamming mobile communication based on reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 10, pp. 9499-9512, Oct. 2018.
37. G. Sheng, M. Min, L. Xiao, and S. Liu, "Reinforcement learning based control for unmanned aerial vehicles," Journal of Communications and Information Networks, vol. 3, no. 3, pp. 39-48, Oct. 2018.
38. L. Xiao, D. Jiang, D. Xu, W. Su, N. An and D. Wang, "Secure mobile crowdsensing based on deep learning," China Communications, vol. 15, no. 10, pp. 1-11, Oct. 2018.
39. M. Min, X. Wan, L. Xiao, Y. Chen, M. Xia, D. Wu, H. Dai, "Learning-based privacy-aware offloading for healthcare IoT with energy harvesting," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4307-4316, Oct. 2018.
40. Z. Deng, Y. Zhou, D. Wu, G. Ye, M. Chen, and L. Xiao, "Utility maximization of cloud-based in-car video recording over vehicular access networks," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5213-5226, Dec. 2018.
41. L. Xiao, G. Sheng, X. Wan, W. Su, and P. Cheng, "Learning-based PHY-layer authentication for underwater sensor networks," IEEE Comm. Letters, vol. 23, no. 1, pp. 60-63, Jan. 2019.
42. S. Liu, L. Xiao, L. Huang, X. Wang, "Impulsive noise recovery and elimination: A sparse machine learning based approach," IEEE Trans. Vehicular Technology, vol. 68, no. 3, pp. 2306-2315, Mar. 2019.
43. M. Min, L. Xiao, Y. Chen, P. Cheng, D. Wu, and W. Zhuang, "Learning-based computation offloading for IoT devices with energy harvesting," IEEE Trans. Vehicular Technology, vol. 68, no. 2, pp. 1930-1941, Jan. 2019.
44. M. Hu, L. Zhuang, D. Wu, X. Chen, and L. Xiao, "Learning driven computation offloading for asymmetrically informed edge computing," IEEE Trans. Parallel and Distributed Systems, vol. 30, no. 7, pp. 1802-1815, Aug. 2019.
45. L. Xiao, D. Jiang, Y. Chen, W. Su, and Y. Tang, "Reinforcement-learning-based relay mobility and power allocation for UWSNs against jamming," IEEE Journal of Oceanic Engineering, vol. 45, no. 3, pp. 1148-1156, May 2019.
46. S. Liu, L. Xiao, Z. Han, and Y. Tang, "Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6919-6932, Aug. 2019.
47. L. Xiao, G. Sheng, S. Liu, H. Dai, M. Peng, and J. Song, "Deep reinforcement learning-enabled secure visible light communication against eavesdropping," IEEE Trans. Comm., vol. 67, no. 10, pp. 6994-7005, Oct. 2019.
48. 黄锦灏, 江东华, 丁钰真, 肖亮, 范业仙, 陈建成, "基于强化学习的能量采集物联网视频编码技术," 厦门大学学报(自然科学版), 2019, 58(06):889-893.
49. X. Lu, X. Xiao, L. Xiao, C. Dai, M. Peng, and H. V. Poor, "Reinforcement learning based microgrid energy trading with a reduced power plant schedule," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10728-10737, Dec. 2019.
50. L. Xiao, H. Zhang, Y. Xiao, X. Wan, S. Liu, L. Wang and H. V. Poor, "Reinforcement learning-based downlink interference control for ultra-dense small cells," IEEE Trans. Wireless Comm., vol. 19, no. 1, pp. 423-434, Jan. 2020.
51. X. Lu, L. Xiao, C. Dai, and H. Dai, "UAV-aided cellular communications with deep reinforcement learning against jamming," IEEE Wireless Comm. Magazine, vol. 27, no. 4, pp. 48-53, Aug. 2020.
52. X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang, "Reinforcement learning based PHY authentication for VANETs," IEEE Trans. Vehicular Technology, vol. 69, no. 3, pp. 3068 - 3079, Mar. 2020.
53. M. Hu, Z. Xie, D. Wu, Y. Zhou, X. Chen, and L. Xiao, "Heterogeneous edge offloading with incomplete information: A minority game approach," IEEE Trans. Parallel and Distributed Systems, vol. 31, no. 9, pp. 2139 - 2154, Sep. 2020.
54. L. Xiao, Y. Ding, D. Jiang, J. Huang, D. Wang, J. Li, and H. V. Poor, "A reinforcement learning and blockchain-based trust mechanism for edge networks," IEEE Trans. Comm., vol. 68, no. 9, pp. 5460-5470, Sept. 2020.
55. 黄锦灏, 丁钰真, 肖亮, 沈志荣, 朱珍民, "一种基于强化学习的嵌入式系统抗拒绝服务攻击的缓存调度方案," 计算机科学, 2020.
56. L. Xiao, X. Lu, T. Xu, X. Wan, W. Ji, and Y. Zhang, "Reinforcement learning based mobile offloading for edge computing against jamming and interference," IEEE Trans. Comm., vol. 68, no. 10, pp. 6114-6126, Oct. 2020. Code.
57. H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, "Deep reinforcement learning based intelligent reflecting surface for secure wireless communications," IEEE Trans. Wireless Comm., in press.
58. Y. Xiao, L. Xiao, X. Lu, H. Zhang, S. Yu, and H. V. Poor, "Deep reinforcement learning based user profile perturbation for privacy aware recommendation," IEEE Internet of Things Journal, in press.
59. 徐堂炜, 张海璐, 刘楚环, 肖亮, 朱珍民, "基于强化学习的低时延车联网群密钥分配管理技术," 网络与信息安全学报, 2020, 6(5): 119-125.
60. 刘思聪, 肖亮, "面向5G的“无线通信原理”教学改革探索," 高教学刊, 2020(35): 132-135.
61. W. Su, J. Tao, Y. Pei, X. You, L. Xiao, and E. Cheng, "Reinforcement learning based effficient underwater image communicaiton," IEEE Comm. Letters, in press.
62. Y. Xiao, G. Niu, L. Xiao, Y. Ding, S. Liu, and Y. Fan, "Reinforcement learning based energy-efficient internet-of-things video transmission," Intelligent and Converged Networks, in press.
63. X. Lu, J. Jie, Z. Lin, L. Xiao, J. Li, and Y. Zhang, "Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming," SCIENCE CHINA Information Sciences, in press.





相关话题/厦门大学 信息学院

  • 领限时大额优惠券,享本站正版考研考试资料!
    大额优惠券
    优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
    本站小编 Free壹佰分学习网 2022-09-19
  • 厦门大学信息学院导师教师师资介绍简介-姚俊峰
    姚俊峰教授、博士生导师、副院长Ph.D.中南大学热工设备仿真与优化研究所,博士学位2001研究方向:数字化真人研究、虚拟现实系统开发与应用、智能算法研究及工业过程仿真所属部门:软件工程系电子邮件:yao0010@xmu.edu.cn个人主页:http://cdmc.xmu.edu.cn个人简历:教育 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-杨律青
    杨律青博士、教授、博士生导师、副系主任(主持工作)Ph.D.华中科技大学管理科学与信息管理系,2008.12研究方向:物联网技术与应用、企业信息化、应用软件(ERP、OA、EC等等)开发、面向对象程序设计、软件工程、IT项目管理等所属部门:软件工程系电子邮件:lqyang@xmu.edu.cn个人主 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-杨晨晖
    杨晨晖教授、博士生导师浙江大学博士研究方向:计算机视觉模式识别计算机图形学计算机体系结构所属部门:计算机科学系电子邮件:个人主页:个人简历:现任:厦门大学信息学院计算机科学系教授、博士生导师,计算机应用技术研究所所长,永泰人工智能研究院执行院长工业互联网研究院(筹)负责人教育:国防科技大学(本科、硕 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-俞容山
    俞容山厦门市“双百计划”、闽江********,博士生导师新加坡国立大学(NationalUniversityofSingapore)博士(2005)研究方向:医学人工智能生物信息所属部门:计算机科学系电子邮件:rsyu@xmu.edu.cn个人主页:https://imdl.xmu.edu.cn/ ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-曹刘娟
    曹刘娟副教授哈尔滨工程大学博士(2013)研究方向:机器学习,模式识别,遥感图像处理所属部门:计算机科学系电子邮件:caoliujuan@xmu.edu.cn个人主页:http://rssi.xmu.edu.cn/个人简历:【个人简介】曹刘娟,1983年生,副教授,硕士生导师。2013年毕业于哈尔滨 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-张仲楠
    张仲楠教授、博士生导师Ph.D.美国德克萨斯大学达拉斯分校计算机科学系,2008.08研究方向:大数据分析,人工智能,深度学习,数据挖掘,生物信息学所属部门:软件工程系电子邮件:zhongnan_zhang@xmu.edu.cn个人主页:个人简历:教育背景Ph.D.美国德克萨斯大学达拉斯分校计算机科 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-张德富
    张德富教授、博士生导师华中科技大学博士研究方向:大数据、计算智能、知识图谱、深度学习所属部门:计算机科学系电子邮件:dfzhang(AT)xmu.edu.cn个人主页:http://lab.pzcnet.com:8091个人简历:【个人简介】在湘潭大学数学系本硕连读,华中科技大学博士毕业,国防科大与 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-晁飞
    晁飞副教授英国威尔士大学Aberystwyth分校博士(2009)研究方向:智能机器人发展型机器人人工神经网络计算智能优化算法所属部门:人工智能系电子邮件:fchao(AT)xmu.edu.cn个人主页:http://cogsci.xmu.edu.cn/a/shiziduiwu/vprofessor ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-曾鸣
    曾鸣副教授、博士Ph.D.浙江大学计算机学院计算机科学与技术系2013.06研究方向:人工智能、计算机视觉、计算机图形学等,特别是面向人的分析与合成、仿真所属部门:软件工程系电子邮件:zengming@xmu.edu.cn个人主页:个人简历:教育背景Ph.D.浙江大学计算机学院计算机科学与技术系20 ...
    本站小编 Free考研考试 2021-05-09
  • 厦门大学信息学院导师教师师资介绍简介-陈锦秀
    陈锦秀副教授新加坡国立大学 博士研究方向:信息抽取&检索自然语言处理机器学习及数据挖掘技术所属部门:计算机科学系电子邮件:cjx(AT)xmu.edu.cn个人主页:http://www.cs.xmu.edu.cn/people.asp?ID=76个人简历:代表性论文:LinW,ChenJ,*Che ...
    本站小编 Free考研考试 2021-05-09