Degrees
PhD, Electrical and Computer Engineering, Rutgers University, 2009
MSc, Electrical Engineering, Tsinghua University, 2003
BSc, Communication Engineering, Nanjing University of Posts & Telecommunications, 2000
Professional Activities
Associate Editor, IEEE Transactions on Information Forensics & Security, 2016 – present
IEEE Senior Member, 2013 – present
The Senior Member of China Computer Federation (CCF)
The Senior Member of Chinese Institute of Electronics
The Member of Network and Data Communications
The Technical Agenda of the global conference such as INFOCOM、GLOBECOM and ICC.
Selected Publications
Book Chapter:
[1] Xiao L, Greenstein LJ, Mandayam NB, Trappe W, 2010. "Chapter 13: Channel-Based Authentication", in "Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York.
[2] Xiao L, 2015. Anti-jamming Transmissions in Cognitive Radio Networks, Springer (ISBN: 978-3-319-24290-3).
Journal Papers:
[1] *Zhuang H, Dai L, Xiao L, Yao Y, 2003. Spectral efficiency of distributed antenna system with random antenna layout. Electronics Letter, 39(6): 495-496 (IET: SCI/EI).
[2] *Xiao L, Greenstein L, Mandayam NB, 2007. Sensor-assisted localization in cellular systems. IEEE Transactions on Wireless Communications, 6(12): 4244-4248 (IEEE: SCI/EI).
[3] *Xiao L, Greenstein L, Mandayam NB, Trappe W, 2008. Using the physical layer for wireless authentication under time-variant channels. IEEE Transactions on Wireless Communications, 7(7): 2571-2579 (IEEE: SCI/EI).
[4] *Xiao L, Greenstein L, Mandayam NB, Periyalwar S, 2008. Distributed measurements for estimating and updating cellular system performance. IEEE Transactions on Communications, 56(6): 991-998 (IEEE: SCI/EI).
[5] *Xiao L, Greenstein L, Mandayam NB, Trappe W, 2009. Channel-based spoofing detection in frequency-selective Rayleigh channels. IEEE Transactions on Wireless Communications, 8(12): 5948-5956 (IEEE: SCI/EI).
[6] *Xiao L, Greenstein L, Mandayam NB, Trappe W, 2009. Channel-based detection of Sybil attacks in wireless networks. IEEE Transactions on Information Forensics & Security, 4(3): 492-503 (IEEE: SCI/EI).
[7] *Xiao L, Dai H, Ning P, 2012. Jamming-resistant collaborative broadcast using uncoordinated frequency hopping. IEEE Transactions on Information Forensics & Security, 7(1): 297-309 (IEEE: SCI/EI).
[8] *Xiao L, Dai H, Ning P, 2012. MAC design of uncoordinated FH-based collaborative broadcast. IEEE Wireless Communications Letters, 1(3): 261-264 (IEEE: SCI/EI).
[9] *Li C, Dai H, Xiao L, Ning P, 2012. Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Transactions on Signal Processing, 60(10): 5281- 5292 (IEEE: SCI/EI).
[10] *Xiao L, Lin WS, Chen Y, Liu KJR, 2012. Indirect reciprocity security game for large-scale mobile wireless networks. IEEE Transactions on Information Forensics & Security, 7(4): 1368-1380 (IEEE: SCI/EI).
[11] Zhao C, *Xiao L, Kang S, Chen G, Zhou Y, Huang L, 2013. Secure relay selection based on learning with negative externality in wireless networks. EURASIP Journal on Advances in Signal Processing, 2013(1):1-7 (Springer: SCI/EI).
[12] *Xiao L, Yan Q, Lou W, Chen G, Hou YT, 2013. Proximity-based security techniques for mobile users in wireless networks. IEEE Transactions on Information Forensics & Security, 8(12): 2089-2100 (IEEE: SCI/EI).
[13] *Xiao L, Mandayam NB, Poor HV, 2015. Prospect theoretic analysis of energy exchange among microgrids. IEEE Transactions on Smart Grids, 6(1): 63-72 (IEEE: SCI/EI).
[14] *Xiao L, Chen T, Liu J, Dai H, 2015. Anti-jamming transmission stackelberg game with observation errors. IEEE Communications Letters, 19(6): 949-952 (IEEE: SCI/EI).
[15] *Xiao L, Li Y, Liu J, Zhao Y, 2015. Power control with reinforcement learning in cooperative cognitive radio networks against jamming. Journal of Supercomputing, 71(9): 1-21 (Springer: SCI/EI).
[16] *Xiao L, Liu J, Li Q, Mandayam NB, Poor HV, 2015. User-centric view of jamming games in cognitive radio networks. IEEE Transactions on Information Forensics & Security, 10(12): 2578-2590 (IEEE: SCI/EI).
[17] Liu J, *Xiao L, Liu G, Zhao Y, 2015. Active authentication with reinforcement learning based on ambient radio signals. Springer Multimedia Tools and Applications, doi: 10.1007/s11042-015-2958-x (Springer: EI).
[18] *Xiao L, Li Y, Han G, Liu G, Zhuang W, 2016. PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks. IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2016.2524258 (IEEE: SCI/EI).
[19] *Xiao L, Xie C, Chen T, Dai H, Poor HV, 2016. A Mobile Offloading Game Against Smart Attacks. IEEE Access, doi: 10.1109/ACCESS.2016.2565198 (IEEE: SCI/EI).