Selected Impactful Papers

Below are selected highly impactful papers from our publications. For more papers, please visit members' individual sites.


Network Security

Detecting and Preventing Cyber Insider Threats: A Survey

L Liu, O De Vel, Q-L Han, J Zhang and Y Xiang
IEEE Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1397-1417, 2018.

Network traffic classification using correlation information

J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, and Y Guan
IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 104-117, Jan. 2013.

Robust network traffic classification

J Zhang, X Chen, Y Xiang, W Zhou, and J Wu
IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1257-1270, 2015.

Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks

J Chen, K He, R Du, M Zheng, Y Xiang, Q Yuan
IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 423-433, 2015.


System Security

A Survey on Security Control and Attack Detection for Industrial Cyber-Physical Systems

D Ding, Q-L Han, Y Xiang, X Ge, and X-M Zhang
Neurocomputing, vol. 275, pp. 1674-1683, 2018.

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies

J Jiang, S Wen, S Yu, Y Xiang, and W Zhou
IEEE Communications Surveys and Tutorials, 19(1). pp. 465-481, 2017.

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks

S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, and W Jia
IEEE Transactions on Computers, vol. 64, no. 3, pp. 640-653, Mar, 2015.

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid

J Baek, Q Vu, J Liu, X Huang, and Y Xiang
IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 233-244, 2015.

Modeling the Propagation of Worms in Networks: A Survey

Y Wang, S Wen, Y Xiang, and W Zhou
IEEE Communications Surveys and Tutorials, vol. 16, no. 2, pp. 942-960, 2014.

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou
IEEE Transactions on Computers, vol. 64, no. 4, pp. 971-983, Apr, 2015.

Information Security

Secure Distributed Deduplication Systems with Improved Reliability

J Li, X Chen, X Huang, S Tang, Y Xiang, M Hassan, and A Alelaiwi
IEEE Transactions on Computers, vol. 64, no. 12, pp. 3569-3579, Dec, 2015.

Secure Attribute-Based Data Sharing for Resource-Limited Users in Cloud Computing

J Li, Y Zhang, X Chen, and Y Xiang
Computers & Security, vol. 72, pp. 1-12, 2018.

Certificate-based encryption resilient to key leakage

Q Yu, J Li, Y Zhang, W Wu, X Huang, and Y Xiang
Journal of Systems and Software, vol. 116, pp. 101-112, Jun, 2016.

Robust Multi-Factor Authentication for Fragile Communications

X Huang, Y Xiang, E Bertino, J Zhou, and L Xu
IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 568-581, Nov-Dec, 2014.

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

X Huang, J Liu, S Tang, Y Xiang, K Liang, L Xu, and J Zhou
IEEE Transactions on Computers, vol. 64, no. 4, pp. 971-983, Apr, 2015.


© NSCLab 2018