Alex Xiangyang Liu
#131,886
Most Influential Person Now
Alex Xiangyang Liu's AcademicInfluence.com Rankings
Alex Xiangyang Liuengineering Degrees
Engineering
#4582
World Rank
#5783
Historical Rank
Applied Physics
#1145
World Rank
#1173
Historical Rank
Electrical Engineering
#1172
World Rank
#1259
Historical Rank

Download Badge
Engineering
Why Is Alex Xiangyang Liu Influential?
(Suggest an Edit or Addition)Alex Xiangyang Liu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Understanding and Modeling of WiFi Signal Based Human Activity Recognition (2015) (780)
- Keystroke Recognition Using WiFi Signals (2015) (483)
- Gait recognition using wifi signals (2016) (413)
- Device-free gesture tracking using acoustic signals (2016) (306)
- TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs (2007) (291)
- A first look at cellular machine-to-machine traffic: large scale measurement and characterization (2012) (290)
- Device-Free Human Activity Recognition Using Commercial WiFi Devices (2017) (284)
- Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it (2013) (244)
- Firewall design: consistency, completeness, and compactness (2004) (218)
- Diverse Firewall Design (2004) (196)
- Structured firewall design (2007) (179)
- A large scale exploratory analysis of software vulnerability life cycles (2012) (176)
- Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic (2013) (158)
- Safe Charging for wireless power transfer (2014) (154)
- Characterizing and modeling internet traffic dynamics of cellular devices (2011) (144)
- Understanding the impact of network dynamics on mobile video user engagement (2014) (137)
- A first look at cellular network performance during crowded events (2013) (137)
- Dynamic Resource Allocation for Load Balancing in Fog Environment (2018) (136)
- Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling (2015) (135)
- Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs (2012) (130)
- Every bit counts: fast and scalable RFID estimation (2012) (128)
- Xengine: a fast and scalable XACML policy evaluation engine (2008) (126)
- A semantics aware approach to automated reverse engineering unknown protocols (2012) (118)
- Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems (2010) (117)
- Energy-Aware Virtual Network Embedding (2014) (112)
- Fast Splitting-Based Tag Identification Algorithm For Anti-Collision in UHF RFID System (2019) (109)
- Firewall Compressor: An Algorithm for Minimizing Firewall Policies (2008) (108)
- Complete Redundancy Detection in Firewalls (2005) (108)
- All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs (2008) (108)
- STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization (2017) (107)
- A model of stateful firewalls and its properties (2005) (105)
- SafeQ: Secure and Efficient Query Processing in Sensor Networks (2010) (105)
- Characterizing geospatial dynamics of application usage in a 3G cellular data network (2012) (103)
- Automated Online Exam Proctoring (2017) (99)
- Characterizing and modeling internet traffic dynamics of cellular devices (2011) (98)
- SCAPE: Safe Charging with Adjustable Power (2014) (96)
- Friends, not Foes – Synthesizing Existing Transport Strategies for Data Center Networks (2014) (95)
- Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way (2015) (95)
- Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (2014) (93)
- Recognizing Keystrokes Using WiFi Devices (2017) (85)
- Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters (2016) (84)
- PAP: A privacy and authentication protocol for passive RFID tags (2009) (84)
- A Group-Based Binary Splitting Algorithm for UHF RFID Anti-Collision Systems (2020) (82)
- Self-adaptive parameter and strategy based particle swarm optimization for large-scale feature selection problems with multiple classifiers (2020) (80)
- Complete Redundancy Removal for Packet Classifiers in TCAMs (2010) (76)
- The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study (2017) (76)
- Designing Fast and Scalable XACML Policy Evaluation Engines (2011) (74)
- Firewall Policy Queries (2009) (74)
- Probabilistic Optimal Tree Hopping for RFID Identification (2013) (73)
- A Shifting Bloom Filter Framework for Set Queries (2015) (72)
- Radiation constrained wireless charger placement (2016) (69)
- Collaborative enforcement of firewall policies in virtual private networks (2008) (68)
- UltraGesture: Fine-Grained Gesture Sensing and Recognition (2018) (66)
- The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency (2016) (65)
- Online VNF Scaling in Datacenters (2016) (63)
- QGesture: Quantifying Gesture Distance and Direction with WiFi Signals (2018) (63)
- Multiple bulk data transfers scheduling among datacenters (2014) (62)
- Formal Verification of Firewall Policies (2008) (61)
- A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models (2019) (61)
- Finding Persistent Items in Data Streams (2016) (60)
- An advanced entropy-based DDOS detection scheme (2010) (60)
- Writing in the Air with WiFi Signals for Virtual Reality Devices (2019) (59)
- Fast and Accurate Estimation of RFID Tags (2015) (59)
- Friends, not foes (2014) (58)
- Optimizing wireless charger placement for directional charging (2017) (58)
- Guarantee IP lookup performance with FIB explosion (2014) (58)
- Split: Optimizing Space, Power, and Throughput for TCAM-Based Classification (2011) (57)
- Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures (2017) (55)
- Semantic-Aware Searching Over Encrypted Data for Cloud Computing (2018) (55)
- Bit weaving: A non-prefix approach to compressing packet classifiers in TCAMs (2009) (54)
- The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures (2018) (54)
- Radiation Constrained Scheduling of Wireless Charging Tasks (2017) (53)
- First Step toward Cloud-Based Firewalling (2012) (50)
- Quantifying and Querying Network Reachability (2010) (50)
- Multi-Category RFID Estimation (2017) (49)
- Topological Transformation Approaches to TCAM-Based Packet Classification (2011) (48)
- Label Inference Attacks Against Vertical Federated Learning (2022) (48)
- RFID Estimation With Blocker Tags (2017) (47)
- Firewall Queries (2004) (47)
- A digital watermarking approach to secure and precise range query processing in sensor networks (2013) (46)
- Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing (2016) (45)
- A secure cookie protocol (2005) (45)
- Identifying Leaders and Followers in Online Social Networks (2013) (44)
- Wireless Charger Placement for Directional Charging (2018) (44)
- Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild (2015) (43)
- GAMT: A fast and scalable IP lookup engine for GPU-based software routers (2013) (43)
- A framework of cloud service selection with criteria interactions (2019) (42)
- Noisy Bloom Filters for Multi-Set Membership Testing (2016) (42)
- A Multiple Hashing Approach to Complete Identification of Missing RFID Tags (2014) (41)
- Topological transformation approaches to optimizing TCAM-based packet classification systems (2009) (41)
- SPP: An anti-phishing single password protocol (2007) (41)
- From M-Ary Query to Bit Query: A New Strategy for Efficient Large-Scale RFID Identification (2020) (40)
- Packet classification using binary Content Addressable Memory (2014) (40)
- A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems (2020) (40)
- Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing (2017) (40)
- Revisiting caching in content delivery networks (2014) (39)
- Privacy- and Integrity-Preserving Range Queries in Sensor Networks (2012) (37)
- Large scale Hamming distance query processing (2011) (36)
- Deep Graph Matching and Searching for Semantic Code Retrieval (2020) (36)
- Depth Aware Finger Tapping on Virtual Displays (2018) (36)
- Probabilistic optimal tree hopping for RFID identification (2015) (36)
- Hardware Based Packet Classification for High Speed Internet Routers (2010) (36)
- Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks (2015) (35)
- When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control (2020) (35)
- A Shifting Framework for Set Queries (2017) (35)
- Fast Regular Expression Matching Using Small TCAM (2014) (34)
- Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds (2017) (34)
- Change-Impact Analysis of Firewall Policies (2007) (34)
- Compressing Network Access Control Lists (2011) (33)
- Omnidirectional chargability with directional antennas (2016) (33)
- A Ternary Unification Framework for optimizing TCAM-based packet classification systems (2013) (32)
- RFID cardinality estimation with blocker tags (2015) (32)
- Human object estimation via backscattered radio frequency signal (2015) (31)
- Verification of Distributed Firewalls (2008) (31)
- Noise Tolerant Localization for Sensor Networks (2018) (31)
- Radiation Constrained Scheduling of Wireless Charging Tasks (2018) (31)
- Placement of Connected Wireless Chargers (2018) (31)
- Securing Sensor Nodes Against Side Channel Attacks (2008) (31)
- Cross-Domain Privacy-Preserving Cooperative Firewall Optimization (2013) (31)
- Finding Persistent Items in Distributed Datasets (2018) (30)
- A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing (2013) (29)
- A distributed and privacy preserving algorithm for identifying information hubs in social networks (2011) (29)
- Quantifying and Verifying Reachability for Access Controlled Networks (2013) (29)
- First step towards automatic correction of firewall policy faults (2010) (29)
- Firewall policy verification and troubleshooting (2009) (29)
- Guarantee IP lookup performance with FIB explosion (2015) (29)
- Offset addressing approach to memory-efficient IP address lookup (2011) (28)
- A traffic flow approach to early detection of gathering events (2016) (28)
- An Information-Theoretical Approach to High-Speed Flow Nature Identification (2013) (28)
- Sampling Bloom Filter-Based Detection of Unknown RFID Tags (2015) (28)
- Top- $k$ Queries for Categorized RFID Systems (2017) (27)
- Characterizing and Optimizing Cellular Network Performance During Crowded Events (2016) (26)
- Privacy Preserving String Matching for Cloud Computing (2015) (26)
- Firewall policy change-impact analysis (2012) (26)
- Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals (2018) (26)
- Top-k queries for multi-category RFID systems (2016) (25)
- FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection (2012) (25)
- A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classification (2018) (25)
- A Partitioning Approach to RFID Identification (2020) (25)
- Charging Task Scheduling for Directional Wireless Charger Networks (2018) (25)
- Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild (2016) (25)
- Optimizing Taxi Driver Profit Efficiency: A Spatial Network-Based Markov Decision Process Approach (2020) (24)
- A difference resolution approach to compressing Access Control Lists (2013) (24)
- Large-Scale Feedforward Neural Network Optimization by a Self-Adaptive Strategy and Parameter Based Particle Swarm Optimization (2019) (24)
- Systematic Structural Testing of Firewall Policies (2012) (24)
- Dynamic Scaling of Virtualized, Distributed Service Chains: A Case Study of IMS (2017) (24)
- Characterizing caching workload of a large commercial Content Delivery Network (2016) (24)
- Bypassing Space Explosion in High-Speed Regular Expression Matching (2014) (23)
- Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks (2011) (23)
- Fast Identification of Blocked RFID Tags (2018) (23)
- Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation (2014) (23)
- QoS Driven Task Offloading With Statistical Guarantee in Mobile Edge Computing (2020) (22)
- FPGA Resource Pooling in Cloud Computing (2018) (22)
- SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud (2019) (22)
- Capture-Aware Identification of Mobile RFID Tags With Unreliable Channels (2020) (22)
- A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters (2013) (21)
- Privacy and Integrity Preserving Top- $k$ Query Processing for Two-Tiered Sensor Networks (2017) (21)
- A Distributed Algorithm for Identifying Information Hubs in Social Networks (2013) (21)
- Aggregation Functions Considering Criteria Interrelationships in Fuzzy Multi-Criteria Decision Making: State-of-the-Art (2018) (20)
- Fast and Accurate Detection of Unknown Tags for RFID Systems – Hash Collisions are Desirable (2020) (20)
- Network Scheduling Aware Task Placement in Datacenters (2016) (20)
- Publishing Social Network Graph Eigenspectrum With Privacy Guarantees (2020) (19)
- Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments (2019) (19)
- A sorted partitioning approach to high-speed and fast-update OpenFlow classification (2016) (19)
- Detecting and localizing end-to-end performance degradation for cellular data services (2015) (19)
- A Traffic Flow Approach to Early Detection of Gathering Events (2017) (18)
- An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning (2019) (18)
- Predictable Privacy-Preserving Mobile Crowd Sensing: A Tale of Two Roles (2019) (18)
- High-Speed Flow Nature Identification (2009) (18)
- An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud‐edge computing (2018) (18)
- Scalable TCAM-based regular expression matching with compressed finite automata (2013) (18)
- The Internet is for Porn: Measurement and Analysis of Online Adult Traffic (2016) (18)
- Multilevel Graph Matching Networks for Deep Graph Similarity Learning (2020) (17)
- Trust Assessment in Online Social Networks (2019) (17)
- Counting Human Objects Using Backscattered Radio Frequency Signals (2019) (16)
- Symmetric Key Approaches to Securing BGP—A Little Bit Trust Is Enough (2008) (16)
- An overlay automata approach to regular expression matching (2014) (16)
- A secure cookie scheme (2012) (16)
- High-Speed Application Protocol Parsing and Extraction for Deep Flow Inspection (2014) (16)
- Quarnet : A Tool for Quantifying Static Network Reachability (2009) (16)
- Multilevel Model for Video Object Segmentation Based on Supervision Optimization (2019) (15)
- MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols (2022) (15)
- Constant IP Lookup With FIB Explosion (2018) (15)
- Firewall Fingerprinting and Denial of Firewalling Attacks (2017) (15)
- Optimizing Geo-Distributed Data Analytics with Coordinated Task Scheduling and Routing (2020) (14)
- Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems (2012) (14)
- Removing Redundancy from Packet Classifiers (2004) (14)
- A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud Computing (2018) (14)
- Fast OpenFlow Table Lookup with Fast Update (2018) (14)
- Identifying and Estimating Persistent Items in Data Streams (2018) (14)
- WiTrace: Centimeter-Level Passive Gesture Tracking Using OFDM Signals (2021) (14)
- Zmail: zero-sum free market control of spam (2005) (14)
- Genome-scale NCRNA homology search using a Hamming distance-based filtration strategy (2012) (14)
- An evolutionary classification method based on fireworks algorithm (2018) (13)
- QGesture (2018) (13)
- Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough (2011) (13)
- Privacy and integrity preserving multi-dimensional range queries for cloud computing (2014) (13)
- WiTrace: Centimeter-Level Passive Gesture Tracking Using WiFi Signals (2018) (13)
- Multipath TCP traffic diversion attacks and countermeasures (2017) (13)
- Performance of Container Networking Technologies (2017) (12)
- A Prefiltering Approach to Regular Expression Matching for Network Security Systems (2012) (12)
- Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control (2017) (12)
- Optimizing Internet transit routing for content delivery networks (2018) (12)
- An Efficient Missing Tag Identification Approach in RFID Collisions (2021) (12)
- Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time (2017) (12)
- Privacy-preserving cross-domain network reachability quantification (2011) (11)
- Cross-path inference attacks on multipath TCP (2013) (11)
- Noise can help: accurate and efficient per-flow latency measurement without packet probing and time stamping (2014) (11)
- A cross-domain privacy-preserving protocol for cooperative firewall optimization (2011) (11)
- Modeling packet loss probability and busy time in multi-hop wireless networks (2016) (10)
- RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags (2010) (10)
- Firewall fingerprinting (2012) (10)
- Social Graph Publishing with Privacy Guarantees (2016) (9)
- Fault Localization for Firewall Policies (2009) (9)
- Device-free gesture tracking using acoustic signals: demo (2016) (9)
- Connectivity-Constrained Placement of Wireless Chargers (2021) (9)
- A few bits are enough - ASIC friendly Regular Expression matching for high speed network security systems (2013) (9)
- Speech Based Human Authentication on Smartphones (2019) (9)
- Secure KNN Queries over Encrypted Data: Dimensionality Is Not Always a Curse (2017) (9)
- CoMan: Managing Bandwidth Across Computing Frameworks in Multiplexed Datacenters (2018) (9)
- Who are you talking to? Breaching privacy in encrypted IM networks (2013) (9)
- Systematic Structural Testing of Firewall Policies (2008) (8)
- Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems (2020) (8)
- PCIAS: Precise and Contactless Measurement of Instantaneous Angular Speed Using a Smartphone (2018) (8)
- Large Scale Characterization of Software Vulnerability Life Cycles (2020) (8)
- Algorithmic approaches to redesigning tcam-based systems (2008) (8)
- Collaborative firewalling in wireless networks (2011) (8)
- Towards high performance security policy evaluation (2012) (7)
- Key bundles and parcels: Secure communication in many groups (2003) (7)
- CENDA: Camouflage Event Based Malicious Node Detection Architecture (2009) (7)
- Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching (2016) (7)
- Single Password , Multiple Accounts (2005) (7)
- OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes (2016) (7)
- Transforming range queries to equivalent box queries to optimize page access (2010) (7)
- Secure Hashing-Based Verifiable Pattern Matching (2018) (7)
- Modeling Morphology of Social Network Cascades (2013) (7)
- A Particle Swarm Optimization with Filter-based Population Initialization for Feature Selection (2019) (6)
- Firewall Design and Analysis (2011) (6)
- Time- and Energy-Efficient Detection of Unknown Tags in Large-Scale RFID Systems (2013) (6)
- TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems (2013) (6)
- PASE: Synthesizing Existing Transport Strategies for Near-Optimal Data Center Transport (2017) (6)
- On Goodness of WiFi based Monitoring of Vital Signs in the Wild (2020) (6)
- UltraGesture: Fine-Grained Gesture Sensing and Recognition (2022) (6)
- Assessing User Mental Workload for Smartphone Applications With Built-In Sensors (2019) (6)
- Cascade size prediction in online social networks (2017) (6)
- Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness (2015) (6)
- Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability (2019) (6)
- Cloud Computing and Security (2016) (6)
- Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping (2016) (6)
- On capturing and containing E-mail worms (2006) (5)
- A graph theoretic approach to fast and accurate malware detection (2017) (5)
- TCAM SPliT : Optimizing Space , Power , and Throughput for TCAM-based Packet Classification Systems (2009) (5)
- Insecurity and Hardness of Nearest Neighbor Queries Over Encrypted Data (2019) (5)
- Fast and Accurate Tracking of Population Dynamics in RFID Systems (2017) (5)
- Cache Assisted Randomized Sharing Counters in Network Measurement (2018) (5)
- Appearance-consistent Video Object Segmentation Based on a Multinomial Event Model (2019) (5)
- Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing (2013) (5)
- Key Bundels and Parcels: Secure Communication in Many Groups (2003) (5)
- Minimize the Make-span of Batched Requests for FPGA Pooling in Cloud Computing (2018) (5)
- Secret Sharing based Secure Regressions with Applications (2020) (4)
- Synchronize Inertial Readings From Multiple Mobile Devices in Spatial Dimension (2018) (4)
- Finding Persistent Items in Distributed Datasets (2020) (4)
- Human Activity Recognition Using Self-powered Sensors Based on Multilayer Bi-directional Long Short-Term Memory Networks (2022) (4)
- Network Scheduling and Compute Resource Aware Task Placement in Datacenters (2020) (4)
- Generative Adversarial Network-Based Transfer Reinforcement Learning for Routing With Prior Knowledge (2021) (4)
- A Random Walk Approach to Modeling the Dynamics of the Blogosphere (2011) (4)
- Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing (2016) (4)
- Topological Transformation Approaches to Database Query Processing (2015) (4)
- Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network (2019) (4)
- Bloom Filter with Noisy Coding Framework for Multi-Set Membership Testing (2022) (4)
- Dynamic Task Scheduling in Cloud-Assisted Mobile Edge Computing (2023) (4)
- An efficient urban localization method based on speed humps (2019) (4)
- On Goodness of WiFi Based Monitoring of Sleep Vital Signs in the Wild (2021) (4)
- A Speed Hump Sensing Approach to Global Positioning in Urban Cities without Gps Signals (2017) (3)
- IM session identification by outlier detection in cross-correlation functions (2015) (3)
- Quantifying and Verifying Network Reachability (2009) (3)
- RFID Authentication and Privacy (2009) (3)
- Dynamic camouflage event based malicious node detection architecture (2013) (3)
- A De-Compositional Approach to Regular Expression Matching for Network Security (2019) (3)
- Detecting national political unrest on Twitter (2016) (3)
- Fine-Grained Vibration Based Sensing Using a Smartphone (2020) (3)
- Formal Specification and Verification of a Secure Micropayment Protocol (2008) (3)
- Efficient Resource Scheduling for Interference Alleviation in Dynamic Coexisting WBANs (2023) (3)
- Algorithms for Data and Computation Privacy (2021) (3)
- RFID Protocol Design, Optimization, and Security for the Internet of Things (2017) (3)
- Publishing Social Network Data with Privacy Guarantees (2020) (3)
- Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing (2019) (3)
- Fast and Secure kNN Query Processing in Cloud Computing (2020) (3)
- Detection of Information Hiding at Physical Layer in Wireless Communications (2022) (2)
- Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters (2016) (2)
- Designing Fast and Scalable Policy Evaluation Engines (2009) (2)
- Physical-Layer Authentication in Wirelessly Powered Communication Networks (2021) (2)
- Online Resource Allocation With Machine Variability: A Bandit Perspective (2020) (2)
- A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-II (2018) (2)
- Distributed Spectrum Sharing for Enterprise Powerline Communication Networks (2018) (2)
- Breaching IM session privacy using causality (2014) (2)
- NcRNA homology search using Hamming distance seeds (2011) (2)
- An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks (2018) (2)
- A Machine Learning Approach to Phase Reference Estimation With Noise (2020) (2)
- Adaptively Secure and Fast Processing of Conjunctive Queries Over Encrypted Data (2022) (2)
- Thresholded Monitoring in Distributed Data Streams (2019) (2)
- Boosting PLC Networks for High-Speed Ubiquitous Connectivity in Enterprises (2016) (2)
- Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings (2022) (2)
- A Machine Learning Approach to Blind Multi-Path Classification for Massive MIMO Systems (2020) (2)
- A template approach to group key establishment in dynamic ad-hoc groups (2016) (1)
- Unknown Tag Identification Protocol Based on Collision Slot Resolution in Large-Scale and Battery-less RFID System (2022) (1)
- Modeling Morphology of Cascades in Online Social Networks using Multi-Order Markov Chains (2012) (1)
- Optimizing Internet Transit Routing for Content Delivery Networks (2016) (1)
- Boosting powerline communications for ubiquitous connectivity in enterprises (2016) (1)
- Privacy and integrity preserving computation in distributed systems (2011) (1)
- Multi-Access Channel Based on Quantum Detection in Wireless Optical Communication (2022) (1)
- Formal specification and verification of a micropayment protocol (2004) (1)
- Unambiguous discrimination of binary coherent states (2020) (1)
- Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data (2022) (1)
- Identifying RFID Tags in Collisions (2022) (1)
- A De-compositional Approach to Regular Expression Matching for Network Security Applications (2016) (1)
- Structured firewall design q (2006) (1)
- Predictable Privacy-Preserving Mobile Crowd Sensing (2020) (1)
- OpenFunction: An Extensible Data Plane Abstraction Protocol for Platform-Independent Software-Defined Middleboxes (2018) (1)
- Monitoring Browsing Behavior of Customers in Retail Stores via RFID Imaging (2020) (1)
- K-Nearest Neighbor Queries Over Encrypted Data (2020) (1)
- Privacy Preserving Information Hub Identification in Social Networks (2020) (1)
- Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises (2016) (1)
- Radiation Constrained Wireless Charger Placement (2021) (1)
- Spectrum Sharing in mmWave Cellular Networks Using Clustering Algorithms (2020) (1)
- Mining Robust Frequent Items in Data Streams (2020) (1)
- A bidirectional redundancy deletion approach to high-throughput cooperative firewall (2013) (1)
- Zero-Error Coding via Classical and Quantum Channels in Sensor Networks (2019) (1)
- The Network-based Candidate Forwarding Set Optimization Approach for Opportunistic Routing in Wireless Sensor Network (2019) (1)
- Resolving Cross Domain Firewall Policy Anomalies (2016) (1)
- Predicting New Collaborations in Academic Citation Networks of IEEE and ACM Conferences (2014) (1)
- Privacy-Preserving Quantification of Cross-Domain Network Reachability (2015) (1)
- TX Human Interference Alexa Median Filter EMA Filter PCA Butterworth Filter CSI Processing Module CSI Stream Outlier Detection Module (2018) (0)
- PCIAS (2018) (0)
- The Numerical Results of Binary Coherent-State Signal's Quantum Detection in the Presence of Noise (2020) (0)
- RFID identification—fairness (2017) (0)
- A new approach to compare stateful firewall rule set based on SFDD (2014) (0)
- Dynamic camouflage event based malicious node detection architecture (2010) (0)
- Cloud Computing and Security (2016) (0)
- Wisdom of the Crowd - Papers from the AAAI Spring Symposium (2012) (0)
- Preface (1992) (0)
- RFID detection—unknown tags (2017) (0)
- Range Queries over Encrypted Data (2020) (0)
- Special Issue on IFIP Networking 2019 (2022) (0)
- Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function (2019) (0)
- An Inter-blockchain Escrow Approach for Fast Bitcoin Payment (2020) (0)
- Design and Implementation of Datacenter Protocols for Cloud Computing (2020) (0)
- Denial of Firewalling (2011) (0)
- A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic (2022) (0)
- Thresholded Monitoring in Distributed Data Streams (2020) (0)
- RFID queries—multiple category (2017) (0)
- Physical Layer Security in Distributed Antenna Systems Using One-Bit Feedback Information (2022) (0)
- Measuring and Clustering Network Attackers using Medium-Interaction Honeypots (2022) (0)
- Zero-error channel capacity of quantum 5-symbol obfuscation model (2020) (0)
- All-Match Redundancy Removal (2010) (0)
- Recognizing Driver Talking Direction in Running Vehicles with a Smartphone (2019) (0)
- OpenFunction: Data Plane Abstraction for Software-Defined Middleboxes (2016) (0)
- Wireless Charger Deployment with Communication Constraint (2020) (0)
- Modeling and Analysis of Real-time Hybrid Anti-worms (2011) (0)
- W.C. Carter Award (2005) (0)
- Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network against Adversarial Attacks (2022) (0)
- Stateful Firewall Model (2010) (0)
- A template approach for group key distribution in dynamic ad-hoc groups (2017) (0)
- Record and Replay of Online Traffic for Microservices with Automatic Mocking Point Identification (2022) (0)
- Quantum Algorithm for Appointment Scheduling (2019) (0)
- Nearest Neighbor Queries over Encrypted Data (2020) (0)
- Top-k Queries for Two-Tiered Sensor Networks (2020) (0)
- Firewall Redundancy Detection (2010) (0)
- RFID detection—missing tags (2017) (0)
- Distributed access control in wireless networks (2018) (0)
- RFID privacy and authentication protocols (2017) (0)
- Privacy Preserving Quantification of Cross-Domain Network Reachability (2020) (0)
- Field-Based Static Taint Analysis for Industrial Microservices (2022) (0)
- A Task-Based Model for the Lifespan of Peer-to-Peer Swarms (2012) (0)
- Author ' s personal copy Firewall policy verification and troubleshooting (2009) (0)
- RFID estimation—impact of blocker tags (2017) (0)
- Network reachability: quantification, verification, troubleshooting, and optimization (2011) (0)
- Special issue on natural computation, fuzzy systems and knowledge discovery from the ICNC&FSKD 2017 (2020) (0)
- 1st IEEE services workshop on network services (NET 2019): Message from the Workshop Chairs (2019) (0)
- An Optimization Framework for Active Physical-Layer Authentication (2022) (0)
- Quantum Multi-User Detection Based on Coherent State Signals (2019) (0)
- RFID estimation—design and optimization (2017) (0)
- RFID queries—single category (2017) (0)
- Modeling packet loss probability and busy time in multi-hop wireless networks (2016) (0)
- Differentially Private and Budget Limited Bandit Learning over Matroids (2020) (0)
- Distributed Spectrum Sharing for Enterprise Powerline Communication Networks (2021) (0)
- Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic (2017) (0)
- Differentially Private and Budget-Limited Bandit Learning over Matroids (2020) (0)
- Conference Committees (2018) (0)
- Hybrid Physical-Layer Authentication (2023) (0)
- Title Dynamic Scaling of Virtualized , Distributed Service Chains : ACase Study of IMS (2017) (0)
- Secure Graph Database Search with Oblivious Filter (2021) (0)
- Message FROM THE ICNP 2014 technical program chairs (2014) (0)
- Cross-Domain Privacy-Preserving Cooperative Firewall Optimization 1 (2015) (0)
- Breaching Privacy in Encrypted Instant Messaging Networks (2020) (0)
- Fit the elephant in a box - towards IP lookup at on-chip memory access speed (2016) (0)
- Feedforward neural network based on ensemble evolutionary algorithm with self-adaptive strategy and parameter for intrusion detection (2019) (0)
- A stochastic frame based approach to RFID tag searching (2016) (0)
- RFID identification—design and optimization (2017) (0)
- Editor's Note (2016) (0)
- Veri fi cation of Distributed Firewalls (2009) (0)
- Fast and Scalable Range and Keyword Query Processing Over Encrypted Data with Provable Adaptive Security (2020) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Alex Xiangyang Liu?
Alex Xiangyang Liu is affiliated with the following schools: