default search action
Kaiqi Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c66]Philip Dai, Kai Yue, Richeng Jin, Matt Tianfu Wu, Kaiqi Xiong:
Enhancing Approximate Message Passing via Diffusion Models Towards On-Device Intelligence. ICC Workshops 2024: 890-895 - [c65]Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani:
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. ICCCN 2024: 1-9 - [i12]Ali Alfatemi, Mohamed Rahouti, Ruhul Amin, Sarah ALJamal, Kaiqi Xiong, Yufeng Xin:
Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling. CoRR abs/2401.03116 (2024) - [i11]Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani:
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach. CoRR abs/2406.02632 (2024) - [i10]Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost:
Nonlinear Transformations Against Unlearnable Datasets. CoRR abs/2406.02883 (2024) - 2023
- [j27]Mohamed Rahouti, Damian M. Lyons, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. IT Prof. 25(6): 71-81 (2023) - [c64]Xirong Cao, Mohamed Rahouti, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong:
Psychological Information Sharing Using Ethereum Blockchain and Smart Contracts. BCCA 2023: 561-568 - [c63]Richeng Jin, Philip Dai, Kaiqi Xiong:
Communication-Efficient Federated Learning with Channel-Aware Sparsification over Wireless Networks. CISS 2023: 1-6 - [c62]Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis. CNS 2023: 1-6 - [c61]Shujun Zhao, Lesther Santana, Evans Owusu, Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection with Feature Engineering : IEEE CNS 23 Poster. CNS 2023: 1-2 - [c60]Long Dang, Thushari Hapuarachchi, Kaiqi Xiong, Jing Lin:
Improving Machine Learning Robustness via Adversarial Training. ICCCN 2023: 1-10 - [i9]Long Dang, Thushari Hapuarachchi, Kaiqi Xiong, Jing Lin:
Improving Machine Learning Robustness via Adversarial Training. CoRR abs/2309.12593 (2023) - [i8]Mohamed Rahouti, Damian M. Lyons, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. CoRR abs/2310.00906 (2023) - [i7]Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin:
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis. CoRR abs/2312.00006 (2023) - [i6]Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kaiqi Xiong, Abdellah Chehri, Nasir Ghani, Jan Bieniek:
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach. CoRR abs/2312.06928 (2023) - 2022
- [j26]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed:
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges. IEEE Access 10: 45820-45854 (2022) - [j25]Ting Sun, Jing Lin, Kaiqi Xiong, Chuangbai Xiao:
Route recommendation for evacuation networks using MMPP/M/1/N queueing models. Comput. Commun. 185: 23-39 (2022) - [j24]Jing Lin, Laurent L. Njilla, Kaiqi Xiong:
Secure machine learning against adversarial samples at test time. EURASIP J. Inf. Secur. 2022(1): 1 (2022) - [c59]Jing Lin, Ryan Luley, Kaiqi Xiong:
From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model. ICC 2022: 2351-2356 - [c58]Mohamed Rahouti, Kaiqi Xiong, Jing Lin:
Developing Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud. ICCSE (3) 2022: 438-448 - 2021
- [j23]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin:
Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends. IEEE Access 9: 12083-12113 (2021) - [j22]Jing Lin, Kaiqi Xiong:
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation. Comput. Secur. 108: 102326 (2021) - [j21]Minh Pham, Kaiqi Xiong:
A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 109: 102269 (2021) - [j20]Mohamed Rahouti, Kaiqi Xiong, Nasir Ghani, Farooq Shaikh:
SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks. IET Networks 10(2): 76-87 (2021) - [j19]Tommy Chin, Kaiqi Xiong, Eric Blasch:
CRAMStrack: Enhanced Nonlinear RSSI Tracking by Using Circular Multi-Sectors. J. Signal Process. Syst. 93(1): 79-97 (2021) - [c57]Yi Li, Jing Lin, Kaiqi Xiong:
An Adversarial Attack Defending System for Securing In-Vehicle Networks. CCNC 2021: 1-6 - [c56]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani:
A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. CCNC 2021: 1-2 - [c55]Jing Lin, Ryan Luley, Kaiqi Xiong:
Active Learning Under Malicious Mislabeling and Poisoning Attacks. GLOBECOM 2021: 1-6 - [c54]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani:
QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. IPCCC 2021: 1-7 - [i5]Jing Lin, Ryan Luley, Kaiqi Xiong:
Active Learning Under Malicious Mislabeling and Poisoning Attacks. CoRR abs/2101.00157 (2021) - [i4]Jing Lin, Kaiqi Xiong:
Applying the Mahalanobis Distance to Develop Robust Approaches Against False Data Injection Attacks on Dynamic Power State Estimation. CoRR abs/2105.08873 (2021) - [i3]Jing Lin, Long Dang, Mohamed Rahouti, Kaiqi Xiong:
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks. CoRR abs/2112.02797 (2021) - 2020
- [j18]Ting Sun, Yaqin Zhang, Kaiqi Xiong, Chuangbai Xiao:
Aggregation Measure Factor-Based Workflow Application Scheduling in Heterogeneous Environments. IEEE Access 8: 89850-89865 (2020) - [c53]Jing Lin, Laurent L. Njilla, Kaiqi Xiong:
Robust Machine Learning against Adversarial Samples at Test Time. ICC 2020: 1-6 - [c52]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin:
Prototyping an SDN Control Framework for QoS Guarantees. TRIDENTCOM 2020: 3-16 - [i2]Minh Pham, Kaiqi Xiong:
A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles. CoRR abs/2007.08041 (2020) - [i1]Yi Li, Jing Lin, Kaiqi Xiong:
An Adversarial Attack Defending System for Securing In-Vehicle Networks. CoRR abs/2008.11278 (2020)
2010 – 2019
- 2019
- [j17]Yi Li, Kaiqi Xiong, Tommy Chin, Chengbin Hu:
A Machine Learning Framework for Domain Generation Algorithm-Based Malware Detection. IEEE Access 7: 32765-32782 (2019) - [j16]Farooq Shaikh, Mohamed Rahouti, Nasir Ghani, Kaiqi Xiong, Elias Bou-Harb, Jamal Haque:
A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems. IEEE Access 7: 63164-63180 (2019) - [j15]Yi Li, Kaiqi Xiong, Xiangyang Li:
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. EAI Endorsed Trans. Security Safety 6(21): e3 (2019) - [c51]Mohamed Rahouti, Kaiqi Xiong:
A Customized Educational Booster for Online Students in Cybersecurity Education. CSEDU (2) 2019: 535-541 - [c50]Mohamed Rahouti, Kaiqi Xiong, Tommy Chin, Peizhao Hu, Diogo Oliveira:
A Preemption-Based Timely Software Defined Networking Framework for Emergency Response Traffic Delivery. HPCC/SmartCity/DSS 2019: 452-459 - [c49]Yi Li, Marcos Serrano, Tommy Chin, Kaiqi Xiong, Jing Lin:
A Software-defined Networking-based Detection and Mitigation Approach against KRACK. ICETE (2) 2019: 244-251 - [c48]Yi Li, Kaiqi Xiong, Xiangyang Li:
An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques. ICETE (2) 2019: 529-534 - [c47]Yi Li, Kaiqi Xiong, Xiangyang Li:
Understanding User Behaviors When Phishing Attacks Occur. ISI 2019: 222 - [c46]Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani:
LatencySmasher: A Software-Defined Networking-Based Framework for End-to-End Latency Optimization. LCN 2019: 202-209 - 2018
- [j14]Tommy Chin, Kaiqi Xiong, Chengbin Hu:
Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking. IEEE Access 6: 42516-42531 (2018) - [j13]Mohamed Rahouti, Kaiqi Xiong, Nasir Ghani:
Bitcoin Concepts, Threats, and Machine-Learning Security Solutions. IEEE Access 6: 67189-67205 (2018) - [j12]Kaiqi Xiong:
The performance analysis of public key cryptography-based authentication. EAI Endorsed Trans. Security Safety 4(14): e2 (2018) - [j11]Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
Kernel-Space Intrusion Detection Using Software-Defined Networking. EAI Endorsed Trans. Security Safety 5(15): e2 (2018) - [c45]Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li:
A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware. SecureComm (1) 2018: 433-448 - [c44]Tommy Chin, Kaiqi Xiong:
KrackCover: A Wireless Security Framework for Covering KRACK Attacks. WASA 2018: 733-739 - 2017
- [c43]Uttam Ghosh, Pushpita Chatterjee, Deepak K. Tosh, Sachin Shetty, Kaiqi Xiong, Charles A. Kamhoua:
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks. CLOUD 2017: 749-752 - [c42]Xiao Chen, Kaiqi Xiong:
A payment scheme in crowdsourcing. ICC 2017: 1-6 - [c41]Tommy Chin, Kaiqi Xiong:
A Forensic Methodology for Software-Defined Network Switches. IFIP Int. Conf. Digital Forensics 2017: 97-110 - [c40]Tommy Chin, Mohamed Rahouti, Kaiqi Xiong:
End-to-End Delay Minimization Approaches Using Software-Defined Networking. RACS 2017: 184-189 - [c39]Kaiqi Xiong, Mufaddal Makati:
Assessing end-to-end performance and security in cloud computing. SAC 2017: 405-410 - [c38]Tommy Chin, Kaiqi Xiong, Mohamed Rahouti:
SDN-Based Kernel Modular Countermeasure for Intrusion Detection. SecureComm 2017: 270-290 - [c37]Mengqi Hu, Yang Chen, Xiaopeng Li, Kaiqi Xiong:
An agent-based simulation model for distributed vehicle sharing operations. WSC 2017: 1336-1347 - 2016
- [c36]Tommy Chin, Kaiqi Xiong:
Dynamic generation containment systems (DGCS): A Moving Target Defense approach. EITEC@CPSWeek 2016: 11-16 - [c35]Ajay Pantangi, Kaiqi Xiong, Mufaddal Makati:
SECUPerf: End-to-End Security and Performance Assessment of Cloud Services. Trustcom/BigDataSE/ISPA 2016: 1747-1752 - [c34]Tommy Chin, Kaiqi Xiong:
MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks. WASA 2016: 487-498 - 2015
- [c33]Tommy Chin, Kaiqi Xiong, Erik Blasch:
Nonlinear target tracking for threat detection using RSSI and optical fusion. FUSION 2015: 1946-1953 - [c32]Xiao Chen, Kaiqi Xiong:
Dynamic social feature-based diffusion in mobile social networks. ICCC 2015: 1-6 - [c31]Kaiqi Xiong, Xiao Chen:
Ensuring Cloud Service Guarantees via Service Level Agreement (SLA)-Based Resource Allocation. ICDCS Workshops 2015: 35-41 - [c30]Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong:
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN). ICDCS Workshops 2015: 95-99 - [c29]Brandy Warwick, Nicholas Symons, Xiao Chen, Kaiqi Xiong:
Detecting Driver Drowsiness Using Wireless Wearables. MASS 2015: 585-588 - [c28]Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong:
An SDN-supported collaborative approach for DDoS flooding detection and containment. MILCOM 2015: 659-664 - [c27]Kaiqi Xiong, Peng Ning:
Cost-efficient and attack-resilient approaches for state estimation in power grids. SAC 2015: 2192-2197 - [c26]Kaiqi Xiong:
Secure Network Bandwidth Provisioning for Quality of Services (QoS) Guarantees. UIC/ATC/ScalCom 2015: 444-451 - [c25]Nirmala Shenoy, John F. Hamilton, Andres Kwasinski, Kaiqi Xiong:
An improved IEEE 802.11 CSMA/CA medium access mechanism through the introduction of random short delays. WiOpt 2015: 331-338 - 2014
- [j10]Kaiqi Xiong, Harry G. Perros:
Resilient and performance-guaranteed composite services in cloud computing. Int. J. Cloud Comput. 3(4): 315-325 (2014) - [c24]Anand V. Akella, Kaiqi Xiong:
Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN). DASC 2014: 7-13 - [c23]Xiao Chen, Zhen Jiang, Kaiqi Xiong, Jian Shen:
Practical Routing Protocol for Impromptu Mobile Social Networks. EUC 2014: 258-264 - 2013
- [c22]Swetha Reddy Lenkala, Sachin Shetty, Kaiqi Xiong:
Security Risk Assessment of Cloud Carrier. CCGRID 2013: 442-449 - [c21]Kaiqi Xiong:
Highlights of RIT's Summer Camp (GREE-SC 2012). GREE 2013: 68-72 - [c20]Kaiqi Xiong, Yin Pan:
Understanding ProtoGENI in Networking Courses for Research and Education. GREE 2013: 119-123 - [c19]Kaiqi Xiong, Yuxiong He:
Power-effiicent resource allocation in MapReduce clusters. IM 2013: 603-608 - [e1]Joanna Kolodziej, Beniamino Di Martino, Domenico Talia, Kaiqi Xiong:
Algorithms and Architectures for Parallel Processing - 13th International Conference, ICA3PP 2013, Vietri sul Mare, Italy, December 18-20, 2013, Proceedings, Part I. Lecture Notes in Computer Science 8285, Springer 2013, ISBN 978-3-319-03858-2 [contents] - 2012
- [j9]Xiao Chen, Neil C. Rowe, Jie Wu, Kaiqi Xiong:
Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks. J. Parallel Distributed Comput. 72(8): 1008-1018 (2012) - [j8]Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning:
Containing bogus packet insertion attacks for broadcast authentication in sensor networks. ACM Trans. Sens. Networks 8(3): 20:1-20:30 (2012) - [c18]Sachin Shetty, Nicholas Luna, Kaiqi Xiong:
Assessing network path vulnerabilities for secure cloud computing. ICC 2012: 5548-5552 - [c17]Kaiqi Xiong, David J. Thuente:
Locating jamming attackers in malicious wireless sensor networks. IPCCC 2012: 400-407 - [c16]Kaiqi Xiong:
Energy-efficient Resource Management for QoS-guaranteed Computing Clusters. MASCOTS 2012: 516-518 - [c15]Kaiqi Xiong:
The Performance of Public Key-Based Authentication Protocols. NSS 2012: 206-219 - 2011
- [c14]Kaiqi Xiong, Kyoung-Don Kang, Xiao Chen:
A Priority-Type Resource Allocation Approach in Cluster Computing. HPCC 2011: 271-278 - [c13]Kaiqi Xiong:
Power and Performance Management in Priority-Type Cluster Computing Systems. IPDPS 2011: 24-35 - 2010
- [c12]Kaiqi Xiong:
Power-aware resource provisioning in cluster computing. IPDPS 2010: 1-11 - [c11]Kaiqi Xiong, Sang C. Suh:
Resource Provisioning in SLA-Based Cluster Computing. JSSPP 2010: 1-15
2000 – 2009
- 2009
- [j7]Kaiqi Xiong, Harry G. Perros, Steven Blake:
Bandwidth provisioning in ADSL access networks. Int. J. Netw. Manag. 19(5): 427-444 (2009) - [j6]Kaiqi Xiong, David J. Thuente:
Dynamic Localization Schemes in Malicious Sensor Networks. J. Networks 4(8): 677-686 (2009) - [c10]Kaiqi Xiong, Sang C. Suh, Mary Qu Yang, Jack Y. Yang, Hamid R. Arabnia:
Next Generation Sequence Analysis Using Genetic Algorithms on Multi-core Technology. IJCBS 2009: 190-191 - [c9]Kaiqi Xiong:
Multiple priority customer service guarantees in cluster computing. IPDPS 2009: 1-12 - [c8]Mary Qu Yang, Sang C. Suh, Kaiqi Xiong, Jack Y. Yang, Hamid R. Arabnia:
The Impact of Supercomputing in the Next Generation Sequencing Data Mining. PDPTA 2009: 532 - [c7]Kaiqi Xiong, Harry G. Perros:
Service Performance and Analysis in Cloud Computing. SERVICES I 2009: 693-700 - 2008
- [j5]Kaiqi Xiong, Harry G. Perros:
Trustworthy Web services provisioning for differentiated customer services. Telecommun. Syst. 39(3-4): 171-185 (2008) - [c6]Kaiqi Xiong, Harry G. Perros:
SLA-based resource allocation in cluster computing systems. IPDPS 2008: 1-12 - [c5]Kaiqi Xiong, Harry G. Perros:
SLA-Based Service Composition in Enterprise Computing. IWQoS 2008: 30-39 - [c4]Kaiqi Xiong, David J. Thuente:
Efficient Localization Schemes in Sensor Networks with Malicious Nodes. SECRYPT 2008: 190-196 - 2006
- [c3]Kaiqi Xiong, Harry G. Perros:
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing. GLOBECOM 2006 - [c2]Kaiqi Xiong, Harry G. Perros:
Trust-based Resource Allocation in Web Services. ICWS 2006: 663-672 - [c1]Kaiqi Xiong, Harry G. Perros:
Computer Resource Optimization for Differentiated Customer Services. MASCOTS 2006: 226-238 - 2000
- [j4]Kazufumi Ito, Kaiqi Xiong:
Gaussian filters for nonlinear filtering problems. IEEE Trans. Autom. Control. 45(5): 910-927 (2000)
1990 – 1999
- 1999
- [j3]Ping Liang, Kaiqi Xiong:
On the analysis of neural networks with asymmetric connection weights or noninvertible transfer functions. IEEE Trans. Syst. Man Cybern. Part B 29(5): 632-636 (1999) - 1995
- [j2]Kaiqi Xiong:
Necessary and sufficient conditions for the existence of a G-type Lyapunov function. Autom. 31(5): 787-791 (1995) - 1993
- [j1]Kaiqi Xiong:
Comments on 'on absolute stability and the aizerman conjecture'. Autom. 29(2): 559 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint