Research publications (2018 onwards)

Books

  1. Gavin Zheng, Longxiang Gao, Liqun Huang and Jian Guan, Ethereum Smart Contract Development in Solidity, Springer, 2020.
  2. Bin Yan, Yong Xiang, and Guang Hua, Improving image quality in visual cryptography, Springer, 2020.
  3. Yushu Zhang, Yong Xiang, and Leo Yu Zhang, Secure compressive sensing in multimedia data, cloud computing and IoT, Springer, 2019.
  4. Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, and Kun Wang, Location Privacy in Mobile Applications, Springer, 2018.

Selected journal articles

  1. Youyang Qu, Longxiang Gao, Tom H. Luan, Yong Xiang, Shui Yu, and Bai Li, “Decentralized privacy using blockchain-enabled federated learning in Fog computing,” IEEE Internet of Things Journal, accepted on 19 Feb. 2020.
  2. Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Wanlei Zhou, and Yuan Yan Tang, “Simultaneous benefit maximization of conflicting opinions: Modeling and analysis,” IEEE Systems Journal, accepted on 31 Dec. 2019.
  3. Keshav Sood, Kallol Krishna Karmakar, Shui Yu, Vijay Varadharajan, Shiva Raj Pokhrel, and Yong Xiang, “Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security,” IEEE Internet of Things Journal, accepted on 5 Dec. 2019.
  4. Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Frank Jiang, and Wanlei Zhou, “Effective quarantine and recovery scheme against advanced persistent threat,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, accepted on 23 Nov. 2019.
  5. Yushu Zhang, Qi He, Guo Chen, Xinpeng Zhang, and Yong Xiang, “A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT,” IEEE Trans. on Industrial Informatics, accepted on 23 Nov. 2019.
  6. Russul Alanni, Jingyu Hou, Hasseeb Azzawi, and Yong Xiang, “Deep gene selection method to select genes from microarray datasets for cancer classification,” BMC Bioinformatics, accepted on 15 Oct. 2019.
  7. Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, and Sheng Zhong, “Secure and efficient outsourcing of PCA-based face recognition,” IEEE Trans. on Information Forensics and Security, accepted on 11 Oct. 2019.
  8. Yushu Zhang, Jin Jiang, Yong Xiang, Ye Zhu, Liangtian Wan, and Yiyuan Xie, “Cloud-assisted privacy-conscious large-scale Markowitz portfolio,” Information Sciences, accepted 24 Dec. 2018.
  9. Zuyuan Yang, Yu Zhang, Yong Xiang, Wei Yan, and Shengli Xie, “Non-negative matrix factorization with dual constraints for image clustering,” IEEE Trans. on Systems, Man, and Cybernetics: Systems, accepted on 20 Mar. 2018.
  10. Yushu Zhang, Jiantao Zhou, Yong Xiang, Leo Yu Zhou, Fei Chen, Shaoning Pang, and Xiaofeng Liao, “Computation outsourcing meets lossy channel: Secure sparse robustness decoding service in multi-clouds,” IEEE Trans. on Big Data, accepted on 29 May 2017.
  11. Hongwei Li, Yi Yang, Yuanshun Dai, Shui Yu, and Yong Xiang, “Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data,” IEEE Trans. on Cloud Computing, accepted on 9 Feb. 2017.
  12. Guang Hua, Yong Xiang, and Leo Yu Zhang, “Informed histogram-based watermarking,” IEEE Signal Processing Letters, vol. 27, no. 1, pp. 236-240, Dec. 2020.
  13. Ramendra Prasad, Mumtaz Ali, Yong Xiang, and Huma Khan, “A double decomposition-based modelling approach to forecast weekly solar radiation,” Renewable Energy, vol. 152, pp. 9-22, Jun. 2020.
  14. Yan Jiang, Youwen Zhu, Jian Wang, and Yong Xiang, “Efficient authentication protocol with anonymity and key protection for mobile Internet users,” Journal of Parallel and Distributed Computing, vol. 137, pp. 179-191, Mar. 2020.
  15. Xiaodong Wang, Longxiang Gao, Bruce Gu, Yongli Ren, Wenjie Ye, Shui Yu, and Yong Xiang, “A fog-based recommender system,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 1048-1060, Feb. 2020.
  16. Xiangjie Kong, Feng Xia, Jianxin Li, Mingliang Hou, Menglin Li, and Yong Xiang, “A shared bus profiling scheme for smart cities based on heterogeneous mobile crowdsourced data,” IEEE Trans. on Industrial Informatics, vol. 16, no. 2, pp. 1436-1444, Feb. 2020.
  17. Iynkaran Natgunanathan, Mohammad Belayet Hossain, Yong Xiang, Longxiang Gao, Dezhong Peng, and Jianxin Li “Progressive average based smart meter privacy enhancement using rechargeable batteries,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9816-9828, Dec. 2019.
  18. Jia Wang, Leo Yu Zhang, Jianqiang Li, Junxin Chen, Guang Hua, Yushu Zhang, and Yong Xiang, “Compressed sensing based selective encryption with data hiding capability,” IEEE Trans. on Industrial Informatics, vol. 15, no. 12, pp. 6560-6571, Dec. 2019.
  19. Fei Tang, Shuai Ma, Yong Xiang, and Changlu Lin, “An efficient authentication scheme for blockchain-based electronic health records,” IEEE Access, vol. 7, pp. 41678-41689, Dec. 2019.
  20. Qingyi Zhu, Seng W. Loke, Rolando Trujillo-Rasua, Frank Jiang, and Yong Xiang, “Applications of distributed ledger technologies to the internet of things: A survey,” ACM Computing Surveys, vol. 52, no. 6, 120:1-34, Nov. 2019.
  21. Peng Hu, Dezhong Peng, Yongsheng Sang, and Yong Xiang, “Multi-view linear discriminant analysis network,” IEEE Trans. on Image Processing, vol. 28, no. 11, pp. 5352-5365, Nov. 2019.
  22. Lu Zhou, Keshav Sood, and Yong Xiang, “ERM: An accurate approach to detect DDoS attacks using entropy rate measurement,” IEEE Communications Letters, vol. 23, no. 10, pp. 1700-1703, Oct. 2019.
  23. Yushu Zhang, Hui Huang, Lu-Xing Yang, Yong Xiang, and Ming Li, “Serious challenges and potential solutions for the industrial internet of things with edge intelligence,” IEEE Network, vol. 33, no. 5, pp. 41-45, Sept.-Oct. 2019.
  24. Lichuan Ma, Xuefeng Liu, Qingqi Pei, and Yong Xiang, “Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing,” IEEE Trans. on Services Computing, vol. 12, no. 5, pp. 786-799, Sept./Oct. 2019.
  25. Peng Hu, Dezhong Peng, Xu Wang, and Yong Xiang, “Multimodal adversarial network for cross-modal retrieval,” Knowledge-Based Systems, vol. 180, pp. 38-50, Sept. 2019.
  26. Yushu Zhang, Yong Xiang, Leo Yu Zhang, Lu-Xing Yang, and Jiantao Zhou, “Efficiently and securely outsourcing compressed sensing reconstruction to a cloud,” Information Sciences, vol. 496, pp. 150-160, Sept. 2019.
  27. Mohammad Belayet Hossain, Iynkaran Natgunanathan, Yong Xiang, Lu-Xing Yang, and Guangyan Huang, “Enhanced smart meter privacy protection using rechargeable batteries,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 7079-7092, Aug. 2019.
  28. Jiaojiao Jiang, Longxiang Gao, Jiong Jin, Tom H. Luan, Shui Yu, Yong Xiang, and Saurabh Garg, “Sustainability analysis for fog nodes with renewable energy supplies,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6725-6735, Aug. 2019.
  29. Lu-Xing Yang, Pengdeng Li, Yushu Zhang, Xiaofan Yang, Yong Xiang, and Wanlei Zhou, “Effective repair strategy against advanced persistent threat: A differential game approach,” IEEE Trans. on Information Forensics and Security, vol. 14, no. 7, pp. 1713-1728, Jul. 2019.
  30. Yushu Zhang, Yong Xiang, Leo Yu Zhang, Yue Rong, and Song Guo, “Secure wireless communications based on compressive sensing: A survey,” IEEE Communications Surveys and Tutorials, vo. 21, no. 2, pp. 1093-1111, second quarter 2019.
  31. Jie Li, Yong Xiang, Jingyu Hou, and Dan Xu, “Non-local texture optimization with Wasserstein regularization under convolutional neural network,” IEEE Trans. on Multimedia, vol. 21, no. 6, pp. 1437-1449, Jun. 2019.
  32. Lichuan Ma, Qingqi Pei, Yong Xiang, Lina Yao, and Shui Yu, “A reliable reputation computation framework for online items in e-commerce,” Journal of Network and Computer Applications, vol. 134, pp. 13-25, May 2019.
  33. Ming Li, Dandan Lu, Yong Xiang, Yushu Zhang, and Hua Ren, “Cryptanalysis of a chaotic image cipher using two-round permutation and diffusion,” Nonlinear Dynamics, vol. 96, no. 1, pp. 31-47, Apr. 2019.
  34. Iynkaran Natgunanathan, Abid Mehmood, Yong Xiang, Longxiang Gao, and Shui Yu, “Location privacy protection in smart health care system,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3055-3069, Apr. 2019.
  35. Guang Hua, Lifan Zhao, Haijian Zhang, Guoan Bi, and Yong Xiang, “Random matching pursuit for image watermarking,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 29, no. 3, pp. 625-639, Mar. 2019.
  36. Bin Yan, Yong Xiang, and Guang Hua, “Improving the visual quality of size invariant visual cryptography for grayscale images: An analysis-by-synthesis (AbS) approach,” IEEE Trans. on Image Processing, vol. 28, no. 2, pp. 896-911, Feb. 2019.
  37. Russul Alanni, Jingyu Hou, Hasseeb Azzawi, and Yong Xiang, “A novel gene selection algorithm for cancer classification using microarray datasets,” BMC Medical Genomics, 12:10, Jan 2019.
  38. Nusrat Fatema, Guang Hua, Yong Xiang, Dezhong Peng, and Iynkaran Natgunanathan, “Massive MIMO linear precoding: A survey,” IEEE Systems Journal, vol. 12, no. 4, pp. 3920-3931, Dec. 2018.
  39. Yushu Zhang, Qi He, Yong Xiang, Leo Yu Zhang, Bo Liu, Junxin Chen, and Yiyuan Xie, “Low-cost and confidentiality-preserving data acquisition for internet of multimedia things,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3442-3451, Oct. 2018.
  40. Kun Wang, Jun Yu, Yan Yu, Yirou Qian, Deze Zeng, Song Guo, Yong Xiang, and Jingsong Wu, “A survey on energy internet: Architecture, approach, and emerging technologies,” IEEE Systems Journal, vol. 12, no. 3, pp. 2403-2416, Sept. 2018. (2019 IEEE Systems Journal Best Paper Award (top 1%))
  41. Hui Huang, Xing He, Yong Xiang, Wenying Wen, and Yushu Zhang, “A compression-diffusion-permutation strategy for securing image,” Signal Processing, vol. 150, pp. 183-190, Sept. 2018.
  42. Ming Li, Haiju Fan, Yong Xiang, Yang Li, and Yushu Zhang, “Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system,” IEEE MultiMedia, vol. 25, no. 3, pp. 92-101, Jul./Sept. 2018.
  43. Jinsong Wu, Song Guo, Huawei Huang, William Liu, and Yong Xiang, “Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives,” IEEE Communications Surveys and Tutorials, vol. 20, no. 3, pp. 2389-2406, third quarter 2018.
  44. Lichuan Ma, Yong Xiang, Qingqi Pei, Yang Xiang, and Haojin Zhu, “Robust reputation-based cooperative spectrum sensing via imperfect common control channel,” IEEE Trans. on Vehicular Technology, vol. 67, no. 5, pp. 3950-3963, May 2018.
  45. Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Guang Hua, and Bo Liu, “Spread spectrum audio watermarking using multiple orthogonal PN sequences and variable embedding strengths and polarities,” IEEE/ACM Trans. on Audio, Speech and Language Processing, vol. 26, no. 3, pp. 529-539, Mar. 2018.
 

Selected conference papers

  1. Qi Zhong, Leo Yu Zhang, Jun Zhang, Longxiang Gao, and Yong Xiang, “Protecting IP of deep neural networks with watermarking: A new label helps,” The 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Singapore, May 2020, accepted on 28 Jan. 2020.
  2. Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang, and Longxiang Gao, “Reliable customized privacy-preserving in fog computing,” 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, Jun. 2020, accepted on 28 Jan. 2020.
  3. Chiranjibi Sitaula, Yong Xiang, Anish Basnet, Sunil Aryal, and Xuequan Lu, “Tag-based semantic features for scene image classification,” in Proc. of 26th International Conference on Neural Information Processing (ICONIP), Sydney, Australia, Dec. 2019, pp. 90-102.
  4. Bruce Gu, Xiaodong Wang, Youyang Qu, Jiong Jin, Yong Xiang, and Longxiang Gao, “Context-aware privacy preservation in a hierarchical fog computing system,” in Proc. of 2019 IEEE International Conference on Communications (ICC), Shanghai, China, May 2019, pp. 1-6.
  5. Ningning Gui, Jianxin Li, Xiaochun Yang, Bin Wang, Mark Reynolds, and Yong Xiang, “When geo-text meets security: Privacy-preserving Boolean spatial keyword queries,” in Proc. of 35th IEEE International Conference on Data Engineering (ICDE), Macau, China, Apr. 2019, pp. 1-12.
  6. Mohammad Reza Nosouhi, Shui Yu, Marthie Grobler, Yong Xiang, and Zuqing Zhu, “SPARSE: Privacy-aware and collusion resistant location proof generation and verification,” in Proc. of 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, Dec. 2018, pp. 1-6.
  7. Bo Liu, Ming Ding, Tianqing Zhu, Yong Xiang, and Wanlei Zhou, “Using adversarial noises to protect privacy in deep learning era,” in Proc. of 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, Dec. 2018, pp. 1-6.
  8. Borui Cai, Guangyan Huang, Yong Xiang, Jing He, Guang-Li Huang, Ke Deng, and Xiangmin Zhou, “Clustering of multiple density peaks,” in Proc. of The 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Melbourne, Australia, Jun. 2018, pp. 413-425.
back to top