D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 4,604 127 World Ranking 8267 National Ranking 779
Electronics and Electrical Engineering D-index 30 Citations 4,123 96 World Ranking 3600 National Ranking 420

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Telecommunications
  • Artificial intelligence

Liang Xiao focuses on Computer network, Reinforcement learning, Spoofing attack, Transmitter power output and Authentication. His studies in Computer network integrate themes in fields like Transmission and Energy harvesting. His Reinforcement learning study integrates concerns from other disciplines, such as Server, Mobile edge computing, Cognitive radio, Base station and Benchmark.

His studies deal with areas such as Wireless, Wireless network, Physical layer and Attack model as well as Spoofing attack. His Transmitter power output study combines topics in areas such as Control theory, Power control, MIMO, Simulation and Game theory. His Authentication research is multidisciplinary, relying on both Information privacy, Communication channel and Overhead.

His most cited work include:

  • Using the physical layer for wireless authentication in time-variant channels (274 citations)
  • Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication (195 citations)
  • Spectral efficiency of distributed antenna system with random antenna layout (142 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Reinforcement learning, Communication channel, Real-time computing and Spoofing attack. The Computer network study combines topics in areas such as Wireless network, Nash equilibrium, Vehicular ad hoc network and Frequency-hopping spread spectrum. The concepts of his Reinforcement learning study are interwoven with issues in Power control, Sequential game, Game theory, Benchmark and Attack model.

His Communication channel research includes elements of Wireless, Beamforming and Transmitter. His Real-time computing research includes themes of Bandwidth and Transmitter power output. His Spoofing attack study combines topics from a wide range of disciplines, such as Eavesdropping, Authentication and Software-defined radio.

He most often published in these fields:

  • Computer network (42.33%)
  • Reinforcement learning (40.49%)
  • Communication channel (22.09%)

What were the highlights of his more recent work (between 2017-2021)?

  • Reinforcement learning (40.49%)
  • Computer network (42.33%)
  • Real-time computing (20.86%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Reinforcement learning, Computer network, Real-time computing, Power control and Transmitter power output. Liang Xiao has researched Reinforcement learning in several fields, including Wireless, Communication channel, Benchmark, Sequential game and Attack model. His Computer network research incorporates elements of Enhanced Data Rates for GSM Evolution and Vehicular ad hoc network.

His study in Real-time computing is interdisciplinary in nature, drawing from both Bandwidth and Bandwidth. His Power control research integrates issues from MIMO, Electronic engineering and Telecommunications link. The study incorporates disciplines such as Node and Transmission in addition to Transmitter power output.

Between 2017 and 2021, his most popular works were:

  • IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? (137 citations)
  • UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning (110 citations)
  • Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming (101 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Telecommunications
  • Artificial intelligence

Liang Xiao mostly deals with Reinforcement learning, Computer network, Spoofing attack, Authentication and Sequential game. His research integrates issues of Cellular network, Communication channel, Base station and Telecommunications link in his study of Reinforcement learning. His studies deal with areas such as Energy harvesting and Bit error rate as well as Computer network.

His Spoofing attack research integrates issues from Wireless network, Channel state information, Attack model and Physical layer. Within one scientific family, Liang Xiao focuses on topics pertaining to Information privacy under Authentication, and may sometimes address concerns connected to Unsupervised learning and Access control. Liang Xiao studied Sequential game and Real-time computing that intersect with Secrecy.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao;L. Greenstein;N. Mandayam;W. Trappe.
IEEE Transactions on Wireless Communications (2008)

345 Citations

Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

Liang Xiao;L. Greenstein;N. Mandayam;W. Trappe.
international conference on communications (2007)

253 Citations

IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?

Liang Xiao;Xiaoyue Wan;Xiaozhen Lu;Yanyong Zhang.
IEEE Signal Processing Magazine (2018)

252 Citations

Spectral efficiency of distributed antenna system with random antenna layout

Hairuo Zhuang;Lin Dai;Liang Xiao;Yan Yao.
Electronics Letters (2003)

185 Citations

Learning-Based Computation Offloading for IoT Devices With Energy Harvesting

Minghui Min;Liang Xiao;Ye Chen;Peng Cheng.
IEEE Transactions on Vehicular Technology (2019)

183 Citations

Channel-Based Detection of Sybil Attacks in Wireless Networks

Liang Xiao;L.J. Greenstein;N.B. Mandayam;W. Trappe.
IEEE Transactions on Information Forensics and Security (2009)

150 Citations

PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks

Liang Xiao;Yan Li;Guoan Han;Guolong Liu.
IEEE Transactions on Vehicular Technology (2016)

143 Citations

UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning

Liang Xiao;Xiaozhen Lu;Dongjin Xu;Yuliang Tang.
IEEE Transactions on Vehicular Technology (2018)

134 Citations

Information-theoretic capacity analysis in MIMO distributed antenna systems

Liang Xiao;Lin Dai;Hairuo Zhuang;Shidong Zhou.
vehicular technology conference (2003)

120 Citations

Cloud-Based Malware Detection Game for Mobile Devices with Offloading

Liang Xiao;Yanda Li;Xueli Huang;XiaoJiang Du.
IEEE Transactions on Mobile Computing (2017)

120 Citations

Best Scientists Citing Liang Xiao

Wade Trappe

Wade Trappe

Rutgers, The State University of New Jersey

Publications: 26

Shidong Zhou

Shidong Zhou

Tsinghua University

Publications: 25

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 23

Dusit Niyato

Dusit Niyato

Nanyang Technological University

Publications: 19

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 18

Xianbin Wang

Xianbin Wang

University of Western Ontario

Publications: 18

Zhu Han

Zhu Han

University of Houston

Publications: 17

H. Vincent Poor

H. Vincent Poor

Princeton University

Publications: 17

Narayan B. Mandayam

Narayan B. Mandayam

Rutgers, The State University of New Jersey

Publications: 16

Chunxiao Jiang

Chunxiao Jiang

Tsinghua University

Publications: 16

Inkyu Lee

Inkyu Lee

Korea University

Publications: 11

Jitendra K. Tugnait

Jitendra K. Tugnait

Auburn University

Publications: 11

Kai Zeng

Kai Zeng

George Mason University

Publications: 11

Alagan Anpalagan

Alagan Anpalagan

Ryerson University

Publications: 11

Ping Wang

Ping Wang

York University

Publications: 11

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.