Works (41)

Updated: March 13th, 2024 08:22

2022 journal article

Dynamic Interference Management for UAV-Assisted Wireless Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 21(4), 2637–2653.

author keywords: Interference; Trajectory; Three-dimensional displays; Wireless communication; Jamming; Resource management; Unmanned aerial vehicles; Unmanned aerial vehicle (UAV); jammer; trajectory optimization; power allocation; interference management; smart interferer; spectral graph theory; Cheeger constant
TL;DR: This work designs the 3D trajectories and power allocation for the UAVs to maximize the data flow of the network while keeping the interference on the existing communication network below a threshold, and proposes an alternating-maximization approach. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: April 14, 2022

2022 journal article

Multi-Hop Task Offloading With On-the-Fly Computation for Multi-UAV Remote Edge Computing

IEEE TRANSACTIONS ON COMMUNICATIONS, 70(2), 1332–1344.

By: X. He*, R. Jin n & H. Dai n

author keywords: Task analysis; Edge computing; Servers; Resource management; Unmanned aerial vehicles; Computational modeling; Wireless communication; Edge computing; UAV; resource allocation; deployment
TL;DR: A multi-hop task offloading with on-the-fly computation scheme is proposed in this work to enable a more powerful multi-UAV remote edge computing network and two efficient algorithms are proposed to solve the corresponding joint resource allocation and deployment problem. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 7, 2022

2021 journal article

Minimizing the Age of Information in the Presence of Location Privacy-Aware Mobile Agents

IEEE TRANSACTIONS ON COMMUNICATIONS, 69(2), 1053–1067.

By: R. Jin n, X. He* & H. Dai n

author keywords: Mobile agents; Privacy; Sensors; Task analysis; Differential privacy; Information age; Base stations; Age of information; mobile crowd sensing; location privacy; differential privacy
TL;DR: A location privacy-aware payment mechanism, which can stimulate the mobile agents to report their locations with differential privacy levels desired by the BS, is proposed, and a cost-efficient mobile agent selection algorithm is proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 29, 2021

2020 article

Joint Power and Deployment Optimization for Multi-UAV Remote Edge Computing

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He*, R. Jin n & H. Dai n

TL;DR: A more efficient algorithm that has a complexity only linear in the number of UAVs is developed by exploiting the special structure of this problem to overcome the challenge of finding the optimal UAV power allocation and deployment. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2020 journal article

Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(3), 1814–1824.

By: X. He*, R. Jin n & H. Dai n

author keywords: Mobile-edge computing; privacy; task offloading; Lyapunov optimization
TL;DR: A novel privacy-preserving and cost-efficient (PEACE) task offloading scheme that can preserve user privacy while still ensure the best possible user experience is developed in this work based on the generic Lyapunov optimization framework. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 14, 2020

2020 journal article

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 19(6), 4054–4066.

By: X. He*, R. Jin n & H. Dai n

author keywords: Servers; Jamming; Security; Mobile handsets; Wireless communication; Task analysis; Interference cancellation; Mobile-edge computing; secure offloading; physical-layer
TL;DR: A novel physical-layer assisted secure offloading scheme is proposed in this work, in which the edge server proactively broadcasts jamming signals to impede eavesdropping and leverages full-duplex communication technique to effectively suppress the self-interference. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 13, 2020

2019 journal article

Camouflaging Mobile Primary Users in Database-Driven Cognitive Radio Networks

IEEE WIRELESS COMMUNICATIONS LETTERS, 8(1), 21–24.

By: X. He*, R. Jin n & H. Dai n

author keywords: Location privacy; cognitive radio; database-driven; mobile
TL;DR: A novel scheme that can camouflage mobile PUs through generating low-cost fake trajectories in the database is developed, and its effectiveness is validated by numerical results. (via Semantic Scholar)
Source: Web Of Science
Added: March 11, 2019

2019 journal article

Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT

IEEE INTERNET OF THINGS JOURNAL, 6(3), 4547–4555.

By: X. He*, R. Jin n & H. Dai n

author keywords: Deep learning; Internet-of-Things (IoT); mobile-edge computing (MEC); post-decision state (PDS); privacy
TL;DR: In this paper, a new privacy vulnerability caused by the wireless offloading feature of MEC-enabled IoT is identified and an effective privacy-aware offloading scheme is developed based on a newly proposed deep post-decision state (PDS)-learning algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: July 15, 2019

2019 journal article

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 14(12), 3273–3286.

By: R. Jin n, X. He* & H. Dai n

author keywords: Quantitative information flow; game theory; collaborative security; privacy
TL;DR: The interplay between the attacker and the collaborative entities is formulated as Quantitative Information Flow (QIF) games, in which the QIF theory is adapted to measure the collaboration gain and the privacy loss of the entities in the information sharing process. (via Semantic Scholar)
Source: Web Of Science
Added: September 16, 2019

2018 book

Advances in Mechanics of Microstructured Media and Structures

In ADVANCES IN MECHANICS OF MICROSTRUCTURED MEDIA AND STRUCTURES (Vol. 87, pp. 1–369).

Xiaofan He; Huaiyu Dai

Source: Web Of Science
Added: October 19, 2018

2018 book

Adversary Detection For Cognitive Radio Networks

In SpringerBriefs in Electrical and Computer Engineering.

By: X. He*, H. Dai n, X. He & H. Dai

Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Conclusion and FutureWork

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 73–74.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Adversary Detection For Cognitive Radio Networks Introduction

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 1–6.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study I: Link Signature Assisted PUE Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 45–50.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter aims to present a detailed case study of a link signature assisted PUE attack detection scheme, and an illustration of how the helper node can exploit its physical closeness to the PU to accurately authenticate the PU signal. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study II: HMM-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 51–62.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: Under this modeling, a novel HMM-based Byzantine attack detection technique can be developed to enforce the robustness of collaborative spectrum sensing and the sought-after multi-HMM inference algorithm is introduced. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Case Study III: CFC-Based Byzantine Attack Detection

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 63–72.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 journal article

Collaborative IDS Configuration: A Two-Layer Game-Theoretic Approach

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 4(4), 803–815.

By: R. Jin n, X. He* & H. Dai n

author keywords: Collaborative intrusion detection systems; game theory; Nash-Q learning
TL;DR: A centralized Vickrey–Clarke–Groves auction based collaboration scheme and a distributed game-theoretic incentive mechanism are proposed and the effectiveness of the proposed schemes is validated through both analysis and numerical experiments. (via Semantic Scholar)
Source: Web Of Science
Added: January 14, 2019

2018 book

Dynamic Games for Network Security

In SpringerBriefs in Electrical and Computer Engineering (pp. 1–74).

By: X. He* & H. Dai n

Sources: Web Of Science, Crossref
Added: October 16, 2018

2018 article

Dynamic Games for Network Security Conclusion and Future Work

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 73–74.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Deception

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 61–71.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: The objective of this chapter is to illustrate a foresighted deception framework that allows the defender to better align its deception strategy with its conventional defense strategy and the dynamics in the environment. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Extra Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 25–42.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter will focus on scenarios where the defender has extra information and present two novel algorithms, termed minimax-PDS and WoLF-P DS, to solve the corresponding dynamic security games with extra information. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Dynamic Security Games with Incomplete Information

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 43–60.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: A new algorithm, termed Bayesian Nash-Q, that allows the defender to infer the missing information based on repeated interactions with the attacker and the dynamic environment will be presented. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Overview of Adversary Detection in CR Networks

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 19–44.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter intends to provide a systematic review of the existing PUE attack detection methods, and in the second part of this chapter, it will switch gear towards the Byzantine attack detection schemes. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Overview of Dynamic Network Security Games

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 17–23.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: The applications of the SG in addressing security issues in cyber networks, wireless communication networks, and cyber-physical networks are presented, respectively and a brief survey of the recent efforts in this direction is provided. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries

DYNAMIC GAMES FOR NETWORK SECURITY, pp. 1–16.

By: X. He*, H. Dai n, X. He & H. Dai

Source: Web Of Science
Added: October 16, 2018

2018 article

Preliminaries of Analytical Tools

ADVERSARY DETECTION FOR COGNITIVE RADIO NETWORKS, pp. 7–17.

By: X. He*, H. Dai n, X. He & H. Dai

TL;DR: This chapter mainly focuses on reviewing some of the important analytic tools used in existing literature for adversary detection in CR networks, including two widely employed statistical inference tools, sequential hypothesis testing, and belief propagation. (via Semantic Scholar)
Source: Web Of Science
Added: October 16, 2018

2017 journal article

A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

author keywords: Resource sharing; delay tolerant; opportunistic resource; game theory; optimal stopping
TL;DR: The derived Stackelberg equilibrium strategy of the LF-C-MSG can be used to guide the behaviors of both the network users and the resource seller for better performance and resource utilization efficiency. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

TL;DR: A multi-player Markov stopping game (M-MSG) is developed in this work, and the derived Nash equilibrium (NE) strategy of this M- MSG can guide network users to properly handle the potential competition from other peers and thus exploit the time diversity of the opportunistic resource more effectively, which improves the resource utilization efficiency. (via Semantic Scholar)
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2016 conference paper

Collaborative IDS configuration: A two-layer game-theoretical approach

2016 ieee global communications conference (globecom).

By: R. Jin n, X. He n & H. Dai n

TL;DR: Simulation results show that the proposed algorithm can provide an effective collaborative configuration scheme, leading to significant detection performance gain, and the conditions under which there is a guaranteed improvement in expected system performance have been derived. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cloud computing; cognitive radio; energy harvesting; jamming; reinforcement learning; security; stochastic game
TL;DR: Two new MARL algorithms are proposed, termed minimax post-decision state (minimax-PDS) and Win-or-Learn Fast post- Decisive state (WoLF-P DS), which enable the LS to learn and adapt faster in dynamic environments by exploiting its information advantage. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Toward Proper Guard Zones for Link Signature

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.

By: X. He n, H. Dai n, W. Shen n, P. Ning n & R. Dutta n

author keywords: Link signature; channel correlation model; guard zone; physical-layer security
TL;DR: Various well-established channel correlation models are investigated and a set of important physical factors that have significant influence on LS security are identified, and with the obtained insights, extensive simulations are conducted to explore suitable guard zone sizes for LS in several typical indoor and outdoor environments. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 conference paper

A A stochastic multi-channel spectrum access game with incomplete information

2015 ieee international conference on communications (icc), 4799–4804.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

TL;DR: A joint reinforcement learning and type identification algorithm is developed and results show that using the proposed algorithm, a wireless user can gradually achieve the same performance as that in the corresponding complete information game. (via Semantic Scholar)
Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2015 article

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He n, H. Dai n & P. Ning n

TL;DR: Two new MARL algorithms, termed minimax-PDS and WoLF-P DS, are proposed, which enable the LS to learn and adapt faster in dynamic environments by exploiting its private local information. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

TL;DR: Fast friendly jamming is proposed, which eliminates the need for demodulation and enables the friendly jammer to verify the received signals directly on the physical layer and achieve the accurate distinction between allies' and enemies' transmissions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Dynamic Adaptive Anti-Jamming via Controlled Mobility

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.

By: X. He n, H. Dai n & P. Ning n

author keywords: Jamming/anti-jamming; mobility control; conductance; cognitive radio network; security
Source: Web Of Science
Added: August 6, 2018

2013 journal article

A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(5), 2512–2523.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cognitive radio network; collaborative spectrum sensing; malicious user detection; security
TL;DR: A new malicious user detection method using two proposed conditional frequency check (CFC) statistics is developed under the Markovian model for the spectrum state to improve the collaborative spectrum sensing performance significantly. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen n, P. Ning n, X. He n & H. Dai n

author keywords: Wireless; friendly jamming; interference cancellation
TL;DR: Both the analytical and experimental results indicate that the proposed techniques can effectively disable enemy wireless communication and at the same time maintain wireless communication between authorized devices. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He n, H. Dai n & P. Ning n

TL;DR: Two new spectral quantities, single- and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Is link signature dependable for wireless security?

2013 proceedings ieee infocom, 200–204.

By: X. He n, H. Dai n, W. Shen n & P. Ning n

TL;DR: A Correlation ATtack (CAT) is proposed to demonstrate the potential vulnerability of the link signature based security mechanisms in such circumstances as with poor scattering and/or a strong line-of-sight (LOS) component. (via Semantic Scholar)
UN Sustainable Development Goal Categories
1. No Poverty (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He n, H. Dai n & P. Ning n

TL;DR: A new malicious user detection method based on two proposed Conditional Frequency Check statistics is developed with a Markovian spectrum model that can achieve high malicious users detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.