Liang Xiao focuses on Computer network, Reinforcement learning, Spoofing attack, Transmitter power output and Authentication. His studies in Computer network integrate themes in fields like Transmission and Energy harvesting. His Reinforcement learning study integrates concerns from other disciplines, such as Server, Mobile edge computing, Cognitive radio, Base station and Benchmark.
His studies deal with areas such as Wireless, Wireless network, Physical layer and Attack model as well as Spoofing attack. His Transmitter power output study combines topics in areas such as Control theory, Power control, MIMO, Simulation and Game theory. His Authentication research is multidisciplinary, relying on both Information privacy, Communication channel and Overhead.
His primary areas of study are Computer network, Reinforcement learning, Communication channel, Real-time computing and Spoofing attack. The Computer network study combines topics in areas such as Wireless network, Nash equilibrium, Vehicular ad hoc network and Frequency-hopping spread spectrum. The concepts of his Reinforcement learning study are interwoven with issues in Power control, Sequential game, Game theory, Benchmark and Attack model.
His Communication channel research includes elements of Wireless, Beamforming and Transmitter. His Real-time computing research includes themes of Bandwidth and Transmitter power output. His Spoofing attack study combines topics from a wide range of disciplines, such as Eavesdropping, Authentication and Software-defined radio.
His primary areas of investigation include Reinforcement learning, Computer network, Real-time computing, Power control and Transmitter power output. Liang Xiao has researched Reinforcement learning in several fields, including Wireless, Communication channel, Benchmark, Sequential game and Attack model. His Computer network research incorporates elements of Enhanced Data Rates for GSM Evolution and Vehicular ad hoc network.
His study in Real-time computing is interdisciplinary in nature, drawing from both Bandwidth and Bandwidth. His Power control research integrates issues from MIMO, Electronic engineering and Telecommunications link. The study incorporates disciplines such as Node and Transmission in addition to Transmitter power output.
Liang Xiao mostly deals with Reinforcement learning, Computer network, Spoofing attack, Authentication and Sequential game. His research integrates issues of Cellular network, Communication channel, Base station and Telecommunications link in his study of Reinforcement learning. His studies deal with areas such as Energy harvesting and Bit error rate as well as Computer network.
His Spoofing attack research integrates issues from Wireless network, Channel state information, Attack model and Physical layer. Within one scientific family, Liang Xiao focuses on topics pertaining to Information privacy under Authentication, and may sometimes address concerns connected to Unsupervised learning and Access control. Liang Xiao studied Sequential game and Real-time computing that intersect with Secrecy.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Using the physical layer for wireless authentication in time-variant channels
Liang Xiao;L. Greenstein;N. Mandayam;W. Trappe.
IEEE Transactions on Wireless Communications (2008)
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Liang Xiao;L. Greenstein;N. Mandayam;W. Trappe.
international conference on communications (2007)
IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
Liang Xiao;Xiaoyue Wan;Xiaozhen Lu;Yanyong Zhang.
IEEE Signal Processing Magazine (2018)
Spectral efficiency of distributed antenna system with random antenna layout
Hairuo Zhuang;Lin Dai;Liang Xiao;Yan Yao.
Electronics Letters (2003)
Learning-Based Computation Offloading for IoT Devices With Energy Harvesting
Minghui Min;Liang Xiao;Ye Chen;Peng Cheng.
IEEE Transactions on Vehicular Technology (2019)
Channel-Based Detection of Sybil Attacks in Wireless Networks
Liang Xiao;L.J. Greenstein;N.B. Mandayam;W. Trappe.
IEEE Transactions on Information Forensics and Security (2009)
PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks
Liang Xiao;Yan Li;Guoan Han;Guolong Liu.
IEEE Transactions on Vehicular Technology (2016)
UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning
Liang Xiao;Xiaozhen Lu;Dongjin Xu;Yuliang Tang.
IEEE Transactions on Vehicular Technology (2018)
Information-theoretic capacity analysis in MIMO distributed antenna systems
Liang Xiao;Lin Dai;Hairuo Zhuang;Shidong Zhou.
vehicular technology conference (2003)
Cloud-Based Malware Detection Game for Mobile Devices with Offloading
Liang Xiao;Yanda Li;Xueli Huang;XiaoJiang Du.
IEEE Transactions on Mobile Computing (2017)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: