基本信息
肖杨  男  博导  The University of Alabama
电子邮件: yangxiao@ieee.org
通信地址: Tuscaloosa, AL 35487-0290 USA
邮政编码: 870290

招生信息

   
招生专业
081101-控制理论与控制工程
081104-模式识别与智能系统
招生方向
计算机/网络安全, 远程医疗
无线传感器网络, 无线网络

教育背景

1996-09--2001-07   美国莱特州立大学   博士
1985-09--1989-07   吉林大学   本科
1982-09--1985-07   长春市十一中学   高中

工作经历

   
工作简历
2007-09~2009-09,浙江大学, 海外学术骨干/兼任教授
2007-07~2011-12,中科院沈阳自动化研究所, 客座研究员
2007-04~2012-04,吉林大学, 客座教授
2006-07~现在, 美国阿拉巴马大学, 终身教授
社会兼职
2007-07-03-2012-07-03,客座教授, 客座教授
2007-07-01-2011-12-31,客座研究员, 客座研究员

教授课程

Computer Securi
Computer and Ne
GENI and Emulab

专利与奖励

   
专利成果
( 1 ) 一种基于窃电嫌疑程度的智能电网邻域网络的恶意用户检测方法, 发明, 2016, 第 4 作者, 专利号: 201611077571.0

出版信息

   
发表论文
[1] Pei, Chao, Xiao, Yang, Liang, Wei, Han, Xiaojia. Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING[J]. 2021, 8(2): 971-983, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000680892400015.
[2] Xiao Yang. GTHI: A Group Testing based Heuristic Inspection Algorithm to Detect Malicious Users in Smart Grids. IEEE Transactions on Network Science and Engineering. 2020, [3] Pei, Chao, Xiao, Yang, Liang, Wei, Han, Xiaojia. PMU Placement Protection Against Coordinated False Data Injection Attacks in Smart Grid. IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS[J]. 2020, 56(4): 4381-4393, http://dx.doi.org/10.1109/TIA.2020.2979793.
[4] Xia, Xiaofang, Xiao, Yang, Liang, Wei. SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 361-374, http://dx.doi.org/10.1109/TIFS.2019.2921232.
[5] Xia, Xiaofang, Xiao, Yang, Liang, Wei. ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid. IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY[J]. 2019, 14(2): 445-458, http://119.78.100.139/handle/173321/22150.
[6] Xiao Yang. Coded Grouping-based Inspection Approach to Detect Malicious Meters in Neighborhood Area Smart Grid. Computers & Security. 2018, [7] Han, Wenlin, Xiao, Yang. Deploying Throwboxes to Enhance Fault-Tolerance Performance in Delay Tolerant Networks. WIRELESS PERSONAL COMMUNICATIONS[J]. 2018, 99(3): 1247-1278, http://dx.doi.org/10.1007/s11277-017-5183-2.
[8] Pei, Chao, Xiao, Yang, Liang, Wei, Han, Xiaojia. Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING[J]. 2018, https://doaj.org/article/c3bce3805e4e4ea2adcc3e3f968ee7ff.
[9] Fu, Bo, Xiao, Yang, Chen, Hui. FNF: Flow-net based fingerprinting and its applications. COMPUTERS & SECURITY[J]. 2018, 75: 167-181, http://dx.doi.org/10.1016/j.cose.2018.02.005.
[10] Han, Wenlin, Xiao, Yang. NFD: Non-technical loss fraud detection in Smart Grid. COMPUTERS & SECURITY[J]. 2017, 65: 187-201, http://dx.doi.org/10.1016/j.cose.2016.11.009.
[11] Xiao Yang. IP2DM: Integrated Privacy-Preserving Data Management Architecture for Smart Grid V2G Networks. Wireless Communications and Mobile Computing (WCMC) Journal. 2017, [12] Han, Wenlin, Xiao, Yang. A novel detector to detect colluded non-technical loss frauds in smart grid. COMPUTER NETWORKS[J]. 2017, 117: 19-31, http://dx.doi.org/10.1016/j.comnet.2016.10.011.
[13] Liu, Jing, Han, Wenlin, Xiao, Yang. Enhancements of Temporal Accountability in Medical Sensor Networks. AD HOC & SENSOR WIRELESS NETWORKS[J]. 2017, 37(1-4): 71-93, https://www.webofscience.com/wos/woscc/full-record/WOS:000410882900004.
[14] Xia, Xiaofang, Liang, Wei, Xiao, Yang, Zheng, Meng. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid. COMPUTER JOURNAL[J]. 2017, 60(12): 1852-1870, https://www.webofscience.com/wos/woscc/full-record/WOS:000425258700010.
[15] Zeng Lei, Chen Hui, Xiao Yang. Accountable administration in operating systems. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY[J]. 2017, [16] Xiao, Zhifeng, Xiao, Yang, Wu, Jie. P-Accountability: A Quantitative Study of Accountability in Networked Systems. WIRELESS PERSONAL COMMUNICATIONS[J]. 2017, 95(4): 3785-3812, https://www.webofscience.com/wos/woscc/full-record/WOS:000407399800016.
[17] Fnu Shalini, Yang Xiao. Security Issues in ProtoGENI. EAI ENDORSED TRANSACTIONS ON INDUSTRIAL NETWORKS AND INTELLIGENT SYSTEMS[J]. 2016, 3(6): https://doaj.org/article/777b1ea271ac4ad797bc429f8e057ae6.
[18] Zeng, Lei, Xiao, Yang, Chen, Hui, Sun, Bo, Han, Wenlin. Computer operating system logging and security issues: a survey. SECURITY AND COMMUNICATION NETWORKSnull. 2016, 9(17): 4804-4821, https://www.webofscience.com/wos/woscc/full-record/WOS:000389253400061.
[19] Han, Wenlin, Xiao, Yang. Design a fast Non-Technical Loss fraud detector for smart grid. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5116-5132, https://www.webofscience.com/wos/woscc/full-record/WOS:000398221800022.
[20] McCary, Eric, Xiao, Yang. Home area network accountability with varying consumption devices in smart grid. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(10): 977-995, https://www.webofscience.com/wos/woscc/full-record/WOS:000379052200004.
[21] Han, Wenlin, Xiao, Yang. Privacy preservation for V2G networks in smart grid: A survey. COMPUTER COMMUNICATIONSnull. 2016, 91-92: 17-28, http://dx.doi.org/10.1016/j.comcom.2016.06.006.
[22] Zeng, Lei, Xiao, Yang, Chen, Hui. Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(18): 3523-3534, https://www.webofscience.com/wos/woscc/full-record/WOS:000367922500017.
[23] Xiao Yang. ProtoGENI Experiments. International Journal of Security and Networks. 2015, [24] Xiao Yang. Network Forensics Analysis Using Wireshark. International Journal of Security and Networks. 2015, [25] Xiao Yang. Security Tests and Attack Experimentations of ProtoGENI. International Journal of Security and Networks. 2015, [26] Eric McCary, Yang Xiao. Smart Grid Attacks and Countermeasures. EAI ENDORSED TRANSACTIONS ON INDUSTRIAL NETWORKS AND INTELLIGENT SYSTEMS[J]. 2015, 2(2): https://doaj.org/article/16c33281cf8140bb943aae832776385a.
[27] Fu, Bo, Xiao, Yang, Liang, Xiannuan, Chen, C L Philip. Bio-inspired Group Modeling and Analysis for Intruder Detection in Mobile Sensor/Robotic Networks. IEEE TRANSACTIONS ON CYBERNETICS[J]. 2015, 45(1): 103-115, https://www.webofscience.com/wos/woscc/full-record/WOS:000346734300009.
[28] Ozdemir, Suat, Peng, Miao, Xiao, Yang. PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2015, 15(4): 615-628, https://www.webofscience.com/wos/woscc/full-record/WOS:000349890100002.
[29] Xiao, Zhifeng, Xiao, Yang. Achieving Accountable MapReduce in cloud computing. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2014, 30: 1-13, http://dx.doi.org/10.1016/j.future.2013.07.001.
[30] Xiao Yang. Achieving Accountability in Smart Grids. IEEE Systems Journal. 2014, [31] Fu, Bo, Xiao, Yang. Accountability and Q-Accountable Logging in Wireless Networks. WIRELESS PERSONAL COMMUNICATIONS[J]. 2014, 75(3): 1715-1746, https://www.webofscience.com/wos/woscc/full-record/WOS:000333417300007.
[32] Xiao, Zhifeng, Xiao, Yang, Chen, Hui. An Accountable Framework for Sensing-Oriented Mobile Cloud Computing. JOURNAL OF INTERNET TECHNOLOGY[J]. 2014, 15(5): 813-822, https://www.webofscience.com/wos/woscc/full-record/WOS:000342605500012.
[33] Zhifeng Xiao, Yang Xiao. Achieving Accountable MapReduce in cloud computing. FUTURE GENERATION COMPUTER SYSTEMS. 2014, 30: 1-13, http://dx.doi.org/10.1016/j.future.2013.07.001.
[34] Xiao Yang. A Review of GENI Authentication and Access Control Mechanisms. International Journal of Security and Networks. 2013, [35] Xiao, Zhifeng, Xiao, Yang, Du, David HungChang. Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids. IEEE TRANSACTIONS ON SMART GRID[J]. 2013, 4(1): 214-226, https://www.webofscience.com/wos/woscc/full-record/WOS:000325485600021.
[36] Xiao, Zhifeng, Xiao, Yang, Du, David HungChang. Non-Repudiation in Neighborhood Area Networks for Smart Grid. IEEE COMMUNICATIONS MAGAZINE[J]. 2013, 51(1): 18-26, https://www.webofscience.com/wos/woscc/full-record/WOS:000313427200003.
[37] Tinnirello, Ilenia, Bianchi, Giuseppe, Xiao, Yang. Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2010, 59(3): 1055-1067, https://www.webofscience.com/wos/woscc/full-record/WOS:000275659600002.
[38] Xiao, Yang, Chen, Hui, Wu, Kui, Sun, Bo, Zhang, Ying, Sun, Xinyu, Liu, Chong. Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks. IEEE TRANSACTIONS ON COMPUTERS[J]. 2010, 59(4): 507-521, https://www.webofscience.com/wos/woscc/full-record/WOS:000274794100007.
[39] Olteanu, Alina, Xiao, Yang, Wu, Kui, Du, Xiaojiang. Weaving a Proper Net to Catch Large Objects in Wireless Sensor Networks. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS[J]. 2010, 9(4): 1360-1369, https://www.webofscience.com/wos/woscc/full-record/WOS:000276817400017.
[40] Olteanu, Alina, Xiao, Yang. Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS[J]. 2010, 9(1): 218-226, https://www.webofscience.com/wos/woscc/full-record/WOS:000273567500028.
[41] Liang, Xiannuan, Xiao, Yang. Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS[J]. 2010, 40(3): 683-693, https://www.webofscience.com/wos/woscc/full-record/WOS:000277774700013.
[42] Olteanu, Alina, Xiao, Yang, Zhang, Yan. Optimization Between AES Security and Performance for IEEE 802.15.3 WPAN. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS[J]. 2009, 8(12): 6030-6037, https://www.webofscience.com/wos/woscc/full-record/WOS:000272732600040.
[43] Zhang, Yan, Xiao, Yang, Leung, Victor C M. Energy Management Analysis and Enhancement in IEEE 802.16e WirelessMAN. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2009, 58(7): 3738-3752, https://www.webofscience.com/wos/woscc/full-record/WOS:000269155100054.
[44] Peng, Miao, Xiao, Yang, Wang, Pu Patrick. Error Analysis and Kernel Density Approach of Scheduling Sleeping Nodes in Cluster-Based Wireless Sensor Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2009, 58(9): 5105-5114, https://www.webofscience.com/wos/woscc/full-record/WOS:000271679800037.
[45] Xiao, Yang, Chen, Hui, Du, Xiaojiang, Zhang, Yan, Chen, HsiaoHwa, Guizani, Mohsen. On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS[J]. 2009, 8(9): 4406-4410, https://www.webofscience.com/wos/woscc/full-record/WOS:000269621700007.
发表著作
(1) 无线局域网与蓝牙, Wireless LANs and Bluetooth, Nova Science Publishers, 2005-07, 第 2 作者
(2) 传感网中的安全, Security in Sensor Networks, Auerbach Publications, 2005-07, 第 2 作者
(3) 无线网络的设计与分析, Design and Analysis of Wireless Networks, Nova Science Publishers, 2005-07, 第 2 作者
(4) 无线网络中的安全与路由, Security and Routing in Wireless Networks, Nova Science Publishers, 2005-07, 第 2 作者
(5) Ad Hoc与传感网, Ad Hoc and Sensor Networks, Nova Science Publishers, 2006-07, 第 1 作者
(6) 无线多媒介网络适应技术, Adaptation Techniques in Wireless Multimedia Networks, Nova Science Publishers, 2006-07, 第 1 作者
(7) 无线网络安全, Wireless Network Security, Springer, 2007-07, 第 1 作者
(8) 认知无线网络, Cognitive Radio Networks, Auerbach Publications, 2009-07, 第 1 作者
(9) 安全与网络手册, Handbook on Security and Networks, World Scientific Publishing Co., 2010-07, 第 1 作者
(10) 水下声敏传感器, Underwater Acoustic Sensor Networks, Auerbach Publications, 2010-07, 第 1 作者
(11) 生物启发计算及组网, Bio-inspired Computing and Networking,  CRC Press, 2011-08, 第 1 作者

科研活动

   
科研项目
( 1 ) 面向智能电网高可信电表的问责制研究, 主持, 国家级, 2014-01--2017-12

指导学生

已指导学生

杨博  博士研究生  081101-控制理论与控制工程  

现指导学生

夏小芳  博士研究生  081101-控制理论与控制工程  

罗龙祥  博士研究生  081101-控制理论与控制工程  

裴超  博士研究生  081101-控制理论与控制工程