Journal Articles

How to Achieve Non-Repudiation of Origin with Privacy Protection in Cloud Computing

Wei Wu, Jianying Zhou, Yang Xiang, and Li Xu
Journal of Computer and System Sciences, vol. 79, no. 8, pp. 1200-1213, December 2013.

Multi-Dimensional Routing Protocol in Human Associated Delay-Tolerant Networks

Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, and Shui Yu
IEEE Transactions on Mobile Computing, vol. 12, no. 11, pp. 2132-2144, November 2013.

Modeling Propagation Dynamics of Social Network Worms

Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, and Weijia Jia
IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 8, pp. 1633-1643, August 2013.

Unsupervised Traffic Classification Using Flow Statistical Properties and IP Packet Payload

Jun Zhang, Yang Xiang, Wanlei Zhou, and Yu Wang
Journal of Computer and System Sciences, vol. 79, no. 5, pp. 573-585, August 2013.

Resisting Web Proxy-based HTTP Attacks by Temporal and Spatial Locality Behavior

Yi Xie, Shensheng Tang, Yang Xiang, and Jiankun Hu
IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1401-1410, July 2013.

Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware

Silvio Cesare, Yang Xiang, and Wanlei Zhou
IEEE Transactions on Computers, vol. 62, no. 6, pp. 1193-1206, June 2013.

An Effective Network Traffic Classification Method with Unknown Flow Detection

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, and Athanasios V. Vasilakos
IEEE Transactions on Network and Service Management, vol. 10, no. 2, pp. 133-147, June 2013.

Mobile Phone Sensing Systems: A Survey

Wazir Khan, Yang Xiang, Mohammed Aalsalem, and Quratulain Arshad
IEEE Communications Surveys and Tutorials, vol. 15, no. 1, pp. 402-407, February 2013.

Network Traffic Classification Using Correlation Information

Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, and Yong Guan
IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 104-117, January 2013.

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions

Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, and Yong Xiang
IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 5-15, January 2013.

A Novel Z-Domain Precoding Method for Blind Separation of Spatially Correlated Signals

Yong Xiang, Dezhong Peng, Yang Xiang, and Song Guo
IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 1, pp. 94-105, January 2013.

Evolution of Cooperation in Reputation System by Group-Based Scheme

Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, and Kouichi Sakurai
The Journal of Supercomputing, vol. 63, no. 1, pp. 171-190, January 2013.

A Quality-of-Service based Finegrained Reputation System in the Grid Environment

Yongrui Cui, Mingchu Li, Yang Xiang, Yizhi Ren, and Silvio Cesare
Concurrency and Computation: Practice and Experience, vol. 24, no. 17, pp. 1990–2006, December 2012.

Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking

Iynkaran Natgunanathan, Yong Xiang, Yue Rong, Wanlei Zhou, and Song Guo
IEEE Transactions on Audio, Speech and Language Processing, vol. 20 , no. 8, pp. 2232-2239, October 2012.

Minimum Disclosure Approach to Authentication and Privacy in RFID Systems

R. Doss, W. Zhou, S. Sundaresan, S. Yu and L. Gao
Computer Networks (Elsevier), vol. 56, no. 15, pp. 3401-3416, October 2012.

M-Dimension: Multi Characteristics Based Routing Protocol in Human Associated Delay-Tolerant Networks with Improved Performance over One Dimensional Classic Models

Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, and Shui Yu
Journal of Networking and Computer Applications (Elsevier), vol. 35, no. 4, pp. 1285-1296, July 2012.

CAFS: A Novel Lightweight Cache-based Scheme for Large-Scale Intrusion Alert Fusion

Sheng Wen, Wei Zhou, Yang Xiang and Wanlei Zhou
Concurrency and Computation: Practice and Experience (Wiley), vol. 24, no. 10, pp. 1137-1153, July 2012.

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang
IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June 2012.

Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures

Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li
Journal of Networking and Computer Applications (Elsevier), vol. 35, no. 3, pp. 867-880, May 2012.

Generating Regular Expression Signatures for Network Traffic Classification in Trusted Network Management

Yu Wang, Yang Xiang, Wanlei Zhou, and Shunzheng Yu
Journal of Network and Computer Applications, vol. 35, no. 3, pp. 992-1000, May 2012.

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics

Shui Yu, Wanlei Zhou, Weijia Jia, and Jiankun Hu
The Computer Journal, vol. 55, no. 4, pp. 410-421, April 2012.

Locating Defense Positions for Thwarting the Propagation of Topological Worms

Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, and Yang Xiang
IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, April 2012.

Locating Defense Positions for Thwarting the Propagation of Topological Worms

Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, and Yang Xiang
IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, April 2012.

A Dual-Channel Time-Spread Echo Method for Audio Watermarking

Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, and Shui Yu
IEEE Transactions on Information Forensics and Security, vol.7, no.2, pp.383-392, April 2012.

On the Stress Function based OWA Determination Method with Optimization Criteria

Xinwang Liu and Shui Yu
IEEE Transaction on System, Man and Cybernetics, Part B: Cybernetics, vol. 42, no. 1, pp. 246-257, February 2012.

Survey of Network Coding-Aware Routing Protocols in Wireless Networks

Muhammad Iqbal, Bin Dai, Benxiong Huang, A. Hassan, and Shui Yu
Journal of Network and Computer Applications, vol. 24, no. 6, pp. 1956-1970, November 2011.

Orthogonal Feedback Scheme for Network Coding

Jun Yang, Bin Dai, Benxiong Huang, and Shui Yu
Journal of Network and Computer Applications, vol. 34, no. 5, pp.1623-1633, September 2011.

Eliminating Errors in Worm Propagation Models

Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, and Yang Xiang
IEEE Communication Letters, vol. 15, no. 9, pp. 1022-1024, September 2011.

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems

Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. Deng
IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1390-1397, August 2011.

A Secure and Efficient Data Aggregation Scheme for Wireless Sensor Networks

Wen Tao Zhu, Fei Gao, and Yang Xiang
Concurrency and Computation: Practice and Experience, vol. 23, no. 12, pp. 1414-1430, August 2011.

The Microcosmic Model of Worm Propagation

Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou and Yang Xiang
The Computer Journal, vol. 54, no. 10, pp. 1700-1720, August, 2011.

Secure Image Retrieval Based on Visual Content and Watermarking Protocol

Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, and Yi Mu
The Computer Journal, vol. 54, no. 10, pp. 1661-1674, August, 2011.

Optimistic Fair Exchange with Strong Resolution-Ambiguity

Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang
IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1491-1502, August 2011.

Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks

Ashley Chonka, Yang Xiang, Wanlei Zhou, and Alessio Bonti
Journal of Network and Computer Applications, vol. 34, issue. 4, pp. 1097-1107, July 2011.

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Yang Xiang, Ke Li, and Wanlei Zhou
IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, June 2011.

CM-based blind equalization of time-varying SIMOFIR channel with single pulsation estimation

Dezhong Peng, Yong Xiang, Zhang Yi, and Shui Yu
IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2410-2415, Jun 2011.

Traceback of DDoS Attacks using Entropy Variations

Shui Yu, Wanlei Zhou, Robin Doss, and Weijia Jia
IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412-425, March 2011.

Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo Based Audio Watermarking

Yong Xiang, Dezhong Peng, Iynkaran Natgunanathan, and Wanlei Zhou
IEEE Transactions on Multimedia, vol. 13, no. 1, pp. 2-13, February 2011.

Novel pseudonoise sequence and decoding function for time-spread echo based audio watermarking

Yong Xiang, Dezhong Peng, I. Natgunanathan, and Wanlei Zhou
IEEE Transactions on Multimedia, vol.13, no.1, pp. 2-13, Feb 2011.

Selecting the Individual Numerical Scale and Prioritization Method in the Analytic Hierarchy Process: A 2-Tuple Fuzzy Linguistic Approach

Yucheng Dong, Wei-Chiang Hong, Yinfeng Xu, and Shui Yu
IEEE Transactions on Fuzzy Systems, vol. 19, issue 1, pp. 13-25, February 2011.

Semantic and Layered Protein Function Prediction from PPI Networks

Wei Zhu, Jingyu Hou, and Yi-Ping Phoebe Chen
Journal of Theoretical Biology, vol. 267, issue 2, pp. 129-136, November 2010.

A new blind method for separating M+1 sources from M mixtures

Dezhong Peng, Yong Xiang, and Hieu Trinh
Computers & Mathematics with Applications, vol. 7, no. 7, pp. 1829-1839. October 2010.

Modeling the Propagation of Peer-to-Peer Worms

Xiang Fan, and Yang Xiang
Future Generation Computer Systems, vol. 26, no. 8, pp. 1433-1443, October 2010.

An Automatic Application Signature Construction System for Unknown Traffic

Yu Wang, Yang Xiang, and Shun-Zheng Yu
Concurrency and Computation: Practice and Experience, vol. 22, issue 13, pp. 1927–1944, September 2010.

Toward Dynamic and Attributed-based Publication, Discovery and Selection for Cloud Computing

Andrzej Goscinski and Michael Brock
Future Generation Computer Systems, vol. 26, no. 7, pp. 947-970, July 2010.

Computing the Numerical Scale of the Linguistic Term Set for the 2-Tuple Fuzzy Linguistic Representation Model

Yucheng Dong, Yinfeng Xu, and Shui Yu
IEEE Transactions on Fuzzy Systems, vol. 17, no. 6, pp.1366-1378, December 2009.

Spam Filtering for Network Traffic Security on A Multi-core Environment

Rafiqul Islam, Wanlei Zhou, Yang Xiang, and Abdun Naser Mahmood
Concurrency and Computation: Practice and Experience, vol. 21, no. 10, pp. 1307-1320, July 2009.

Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks

Yang Xiang, Wanlei Zhou, and Minyi Guo
IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, April 2009.

Linguistic multiperson decision-making based on the use of multiple preference relations

Yucheng Dong, Yinfeng Xu, and Shui Yu
Fuzzy Sets and Systems, vol. 160, issue 5, pp.603-623, March 2009.

An Innovative Analyser for Multi-classifier E-mail Classification Based on Grey List Analysis

Rafiqul Islam, Wanlei Zhou, Minyi Guo, and Yang Xiang
Journal of Network and Computer Applications, Elsevier, vol. 32, no. 2, pp. 357-366, March 2009.

Conference Papers

Above the Trust and Security in Cloud Computing: A Notion towards Innovation

Mahbub Ahmed, Yang Xiang, and Shawkat Ali
6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom), December 2010.

A Lightweight Intrusion Alert Fusion System

Sheng Wen, Yang Xiang, and Wanlei Zhou
12th IEEE International Conference on High Performance Computing and Communications (HPCC), September 2010.

Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems

Laiping Zhao, Yizhi Ren, Yang Xiang, and Kouichi Sakurai
12th IEEE International Conference on High Performance Computing and Communications (HPCC), September 2010.

Email Classification Using Data Reduction Method Best Paper Award

Rafiqul Islam, and Yang Xiang
5th International ICST Conference on Communications and Networking in China (ChinaCom), August 2010.

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting

Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang
13th International Conference on Practice and Theory in Public Key Cryptography (PKC), May 2010.

A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost

Silvio Cesare, and Yang Xiang
24th IEEE International Conference on Advanced Information Networking and Application (AINA), April 2010.

Propagation Modeling of Peer-to-Peer Worms

Xiang Fan, and Yang Xiang
24th IEEE International Conference on Advanced Information Networking and Application (AINA), April 2010.

Automatic Application Signature Construction from Unknown Traffic

Yu Wang, Shun-Zheng Yu, and Yang Xiang
24th IEEE International Conference on Advanced Information Networking and Application (AINA), April 2010.

Modeling the Propagation of Peer-to-Peer Worms under Quarantine

Xiang Fan, and Yang Xiang
12th IEEE/IFIP Network Operations & Management Symposium (NOMS), April 2010.

Classification of Malware Using Structured Control Flow

Silvio Cesare, and Yang Xiang
8th Australasian Symposium on Parallel and Distributed Computing (AusPDC), January 2010.

Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation

Xiang Fan, and Yang Xiang
6th IFIP International Conference on Network and Parallel Computing (NPC), October 2009.

Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks

Wen Tao Zhu, and Yang Xiang
6th International Conference on Autonomic and Trusted Computing (ATC), July 2009.

Books

Software Similarity and Classification

Software Similarity and Classification

Silvio Cesare, and Yang Xiang
Springer, 2012
ISBN:978-1-4471-2908-0
Get the book from Springer.

Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches

Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches

Shawkat Ali, and Yang Xiang
IGI Global, 2010
ISBN:978-1-60566-908-3
Get the book from IGI Global.

Book Chapters

Technical Reports