肖亮

职称: 
教授
E-mail: 
xiaoliang3@mail.sysu.edu.cn, adalittlel@gmail.com
办公地点: 
广州市大学城外环东路132号中山大学东区超算楼530E
教师简介: 

中山大学“百人计划”学术带头人引进教授,诚招研究生,博士后和本科生。欢迎同学们来本实验室攻读博士,硕士学位,或者进行本科科研训练!

更多信息见个人主页:http://lxiao.xmu.edu.cn/

研究领域: 

网络安全、人工智能、大数据、机器学习

教育背景: 

2004.9-2009.5,美国Rutgers新泽西州立大学,电子与计算机工程,博士

2000.9-2003.7,清华大学,电子工程,硕士

1996.9-2000.7,南京邮电学院,通信工程,本科

工作经历: 

2017.6-至今,中山大学数据科学与计算机学院,教授

2013.8 -2017,厦门大学信息科学与技术学院,教授

2015.8-2016.8,普林斯顿大学,电子工程系,访问学者

2009.6 - 2013.7,厦门大学信息科学与技术学院,副教授

2012.6-2012.9,弗吉尼亚理工大学,计算机科学系,访问学者

2011.6-2011.9,马里兰大学,电子与计算机工程系,访问学者

2004.9-2009.5,Rutgers新泽西州立大学,WINLAB实验室,助研

2008.6-2008.8,美国InterDigital公司,实习研究员

2007.6-2007.8,美国阿尔卡特朗讯贝尔实验室(Bell Labs),实习研究员

2003.8-2004.5,美国北卡州立大学,电子与计算机工程系,助教

2000.9-2003.7,清华大学,微波与数字通信国家重点实验室,助研

海外经历: 

2015.8-2016.8,普林斯顿大学,电子工程系,访问学者

2012.6-2012.9,弗吉尼亚理工大学,计算机科学系,访问学者

2011.6-2011.9,马里兰大学,电子与计算机工程系,访问学者

2004.9-2009.5,Rutgers新泽西州立大学,WINLAB实验室,助研,博士

2008.6-2008.8,美国InterDigital公司,实习研究员

2007.6-2007.8,美国阿尔卡特朗讯贝尔实验室(Bell Labs),实习研究员

2003.8-2004.5,美国北卡州立大学,电子与计算机工程系,助教

获奖及荣誉: 

1、福建省高等学校新世纪优秀人才支持计划,福建省教育厅,省级,2011

2、厦门大学校庆中国建设银行奖教金(科研类),厦门大学,校级,2013

3. "Mobile Offloading Game Against Smart Attacks"获IEEE International Conference on Computer Communications (INFOCOM) BigSecurity WS 最佳论文奖,2016

4. IEEE International Conference on Computer Communications (INFOCOM) 优秀技术委员会委员奖,2017.

5. "Energy Trading Game for Microgrids Using Reinforcement Learning,"获第七届EAI International Conference on Game Theory for Network的最佳论文奖,2017.

6. "PHY-layer Authentication with Multiple Landmarks with Reduced Communication Overhead"获IEEE International Conference on Communications (ICC) 最佳论文奖,2017

7. 中山大学“百人计划”学术带头人, 2017.

科研项目: 

1、国家高技术研究发展计划(863)、2015AA01A707、第五代移动通信系统(5G)研究开发先期研究(二期),基于物理层增强安全的未来无线通信传输技术研究、2015/01-2016/12。

2、国家自然科学基金面上项目、61271242、非预知物理层密钥的无线网络抗敌意干扰技术研究、2013/01-2016/12。

3、CCF-启明星辰“鸿雁”科研基金, 针对主观攻击者的高级持续安全威胁博弈模型研究, 2016.09.15-2017.10.31。

4、国家自然科学基金青年项目、61001072、基于信道信息的无线网络认证技术研究、2011/01-2013/12、25万元。

5、福建省高等学校新世纪优秀人才支持计划,2011年、福建省教育厅。

6、教育部留学回国人员科研启动金、2011/01-2012/12、41批、教育部。

7、清华大学-IBM联合研究项目、无线网络云中物理层安全解决方案开源研究与开发、2011/03-2012/09。

8、福建省自然科学基金面上项目、2010J01347、基于物理层信息的无线网络的认证算法及其应用研究、2010/06-2013/05。

9、国家自然科学基金面上项目、61671396、基于前景理论的无线网络安全博弈理论与机制研究、2017/01-2020/12。

10、物联网信息安全技术北京市重点实验室开放课题、无线网络安全博弈理论与方法研究、2016/01-2016/12。

主要学术兼职: 
  • 担任IEEE Transactions on Information Forensics and Security, IET Communications, Wiley's Security and Communication Networks Journal和KSII Transactions on Internet and Information Systems等国际SCI期刊编委;
  • IEEE Journal on Selected Topics in Signal Processing等期刊客座编辑;
  • 担任2013年度IEEE VTC'F Recent Results Track副主席;
  • 担任IEEE INFOCOM, ICC,GLOBECOM,WCNC,PIMRC和CHINACOM等国际学术会议的技术委员会委员,担任国际会议分会主席二十余次;
  • IEEE高级会员,中国电子学会高级会员;
  • 中国通信学会青年工作委员会委员;
  • 中国计算机协会高级会员,网络与数据通信专业委员会委员;
  • 厦门大学信息科学与技术学院教授委员会委员,2015-2017;
  • 厦门大学工程与实验技术教授委员会委员,2015-2017;
  • IEEE大数据技术委员会委员2016.

 

代表性论著: 

专著:

1. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Chapter 13: Channel-Based Authentication, in Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York, 2010.

2. L. Xiao, "Anti-jamming Transmissions in Cognitive Radio Networks," Springer, 2015, ISBN: 978-3-319-24290-3.

期刊论文:

1. L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study," IEEE Journal on Selected Areas in Communications, vol. 35, no. 3, pp. 534-544, Mar. 2017.

2. L. Xiao, T. Chen, G. Han, W. Zhuang, L. Sun, "Game Theoretic Study on Channel-based Authentication in MIMO Systems," IEEE Trans. Vehicular Technology, Jan. 2017. DOI: 10.1109/TVT.2017.2652484.

3. L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, "PHY-layer Spoofing Detection with Reinforcement Learning in Wireless Networks," IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.  

4. L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric View of Jamming Games in Cognitive Radio Networks," IEEE Trans. Information Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.

5. L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect Theoretic Analysis of Energy Exchange Among Microgrids," IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.

6. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, , vol. 4, pp. 2281-2291, May 2016.

7. L. Xiao, Q. Yan, W. Lou, G. Chen, Y.T. Hou, "Proximity-based Security Techniques for Mobile Users in Wireless Networks," IEEE Trans. Information Forensics & Security, pp. 2089-2100, vol. 8, no. 12, Dec 2013.

8. L. Xiao, H. Dai and P. Ning, “Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping," IEEE Trans. Information Forensics & Security, vol. 7, no. 1, pp. 297 – 309, Feb. 2012.

9. L. Xiao, H. Dai, P. Ning, " MAC Design of Uncoordinated FH-Based Collaborative Broadcast," IEEE Wireless Comm. Letters, vol. 1, No. 3, pp. 261 - 264, June 2012.

10. C. Li, H. Dai, L. Xiao, P. Ning, "Communication Efficiency of Anti-jamming Broadcast in Large-scale Multi-Channel Wireless Networks," IEEE Trans. Signal Processing, vol. 60, pp. 5281 - 5292, Oct. 2012.

11. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, “Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks,” IEEE Trans. Information Forensics & Security, vol. 7, No. 4, pp. 1368 – 1380, Aug. 2012.

12. L. Xiao, T. Chen, J. Liu, H. Dai, "Anti-jamming Transmission Stackelberg Game with Observation Errors," IEEE Comm. Letters, vol. 19, no. 6, pp. 949-952, Jun. 2015.

13. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Communications, vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.

14. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks," IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.

15. L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Communications, vol. 7, pp. 2571-2579, Jul. 2008. 

16. L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, "Distributed measurements for estimating and updating cellular system performance," IEEE Trans. Communications, vol. 56, pp. 991-998, Jun. 2008. 

17. L. Xiao, L. Greenstein, and N. Mandayam, "Sensor-assisted localization in cellular systems," IEEE Trans. Wireless Communications, vol. 6, pp. 4244-4248, Dec. 2007. 

18. C. Zhao, L. Xiao et al., “Secure relay selection based on learning with negative externality in wireless networks,” EURASIP Journal on Advances in Signal Processing, pp. 1-7, April 2013.

19. L. Xiao, Y. Li, J. Liu, Y. Zhao, "Power Control with Reinforcement Learning in Cooperative Cognitive Radio Networks against Jamming," Journal of Supercomputing, vol. 71, no. 9, pp. 3237-3257, April 2015.

20. H. Zhuang, L. Dai, L. Xiao, and Y. Yao, "Spectral efficiency of distributed antenna system with random antenna layout," Electronics Letter, vol. 39, pp.495, March 2003.

21. J. Liu, L. Xiao, G. Liu, Y. Zhao, "Active authentication with reinforcement learning based on ambient radio signals," Springer Multimedia Tools and Applications, pp. 1-20, Oct. 2015.

22. L. Xiao, Q. Li, and J. Liu, "Survey on Secure Cloud Storage," Journal of Data Acquisition and Processing, vol. 31, No. 3, pp. 464-472, May 2016.

23. L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor, "Mobile Crowdsensing Games in Vehicular Networks," IEEE Trans. Vehicular Technology, Jan. 2017. DOI: 10.1109/TVT.2016.2647624.

24. N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-Layer Authentication Based on Extreme Learning Machine," IEEE Communication Letters, April 2017. DOI:10.1109/LCOMM.2017.2690437.

25. A. Abass, L. Xiao, N. B. Mandayam, and Z. Gaijic, "Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage," IEEE Access, April 2017. DOI:10.1109/ACCESS.2017.2691326.

26. L. Xiao, Y. Li, X. Huang and X. Du, "Cloud-based Malware Detetction Game for Mobile Device with Offloading," IEEE Transactions on Mobile Computing, Mar. 2017. DOI:10.1109/TMC.2017.2687918.

 

2. 会议论文

1. L. Xiao, L. Dai, S. Zhou, and Y. Yao, "Information-theoretic capacity analysis in MIMO distributed antenna systems," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 1, pp. 779-782, Jeju, Korea, April 2003.

2. L. Xiao, S. Zhou, and Y. Yao, "QoS-oriented scheduling algorithm for 4G mobile multimedia OFDM communications," in Proc. IEEE International Symposium on Personal, Indoor and Mobile Radio (PIMRC), vol. 1, pp. 545-549, Sept. 2003, Beijing, China.

3. L. Xiao, A. Wang, S. Zhou, and Y. Yao, "A dynamic resource scheduling algorithm for OFDM system," in Proc. Asia-Pacific Conference on Communications (APCC), vol. 2, pp. 444-447, Malaysia, Sept. 2003.

4. A. Wang, L. Xiao, S. Zhou, X. Xu, and Y. Yao, "Dynamic Resource Management in the Fourth Generation Wireless Systems," in Proc. International Conference on Communication Technology (ICCT), Beijing, China, April 2003.

5. L. Xiao and M. Xiao, "A new kind of MIMO-sensor networks M-SENMA," in Proc. IEEE Vehicular Technology Conference (VTC), vol. 4, pp. 2941-2945, Los Angeles, CA, Sept. 2004.

6. H. Dai, L. Xiao, and Q. Zhou, "Energy efficiency of MIMO transmission strategies in wireless sensor networks," in Proc. 2004 International Conference on Computing, Communications and Control Technologies (CCCT), Austin, TX, Aug. 2004.

7. L. Xiao, L. J. Greenstein, N. B. Mandayam, and S. Periyalwar, "Sensor networks for estimating and updating the performance of cellular system," in Proc. IEEE International Conference on Communications(ICC), vol. 5, pp. 2107-2111, June 2006. 

8. D. Samardzija, L. Xiao, and N. Mandayam, "Impact of pilot assisted channel state estimation on multiple antenna multiuser TDD systems with spatial filtering," in Proc. IEEE Conference on Information Sciences and Systems (CISS), pp. 381-385, Princeton, NJ, March 2006.

9. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: using the physical layer for wireless authentication," in Proc. IEEE International Conference on Communications(ICC), pp. 4646-4651, June 2007. 

10. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "MIMO-assisted channel-based authentication in wireless networks," in Proc. Conference on Information Sciences and Systems (CISS), pp. 642-646, Princeton, NJ, Mar. 2008. 

11. L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proc. IEEE International Conference on Communications (ICC), pp. 1520-1524, May 2008. 

12. L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. Greenstein, and N. Mandayam, "PHY-Authentication Protocol for Spoofing Detection in Wireless Networks", in Proc. IEEE Global communications conference (GLOBECOM), 2010.

13. C. Li, H. Dai, L. Xiao, P. Ning, “Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks,” in Proc. 44th Asilomar Conference on Signals, Systems and Computers (Asilomar), California, USA, Nov. 2010.

14. L. Xiao, H. Dai, P. Ning, “Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-hop Networks,” in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.

15. L. Xiao, H. Dai, P. Ning, “Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks,” in Proc. IEEE Global communications conference (GLOBECOM'11), Houston, TX, 2011.

16. L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, “Indirect reciprocity game modeling for secure wireless networks,” in Proc. IEEE International conference on communications (ICC), Ottawa, Canada, June 2012.

17. L. Xiao, Q. Yan, W. Lou and Y. T. Hou, "Proximity-based security using ambient radio signals," in Proc. IEEE International conference on communications (ICC), Budapest, Hungary, June 2013.

18. L. Xiao, Y. Chen, K.J.R Liu, "Anti-Cheating Prosumer Energy Exchange based on Indirect Reciprocity," in Proc. IEEE International conference on communications (ICC), Sydney, Australia, June 2014.

20. L. Xiao, J. Liu, Q. Li, and H. V. Poor, “Secure Mobile Crowdsensing Game,” in Proc. IEEE Int’l Conf. on Commun., (ICC), London, Jun., 2015.

21. J. Liu, L. Xiao, Y. Li and L. Huang, “User-Centric Analysis on Jamming Game with Action Detection Error,” in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.

22. Y. Li, L. Xiao, J. Liu and Y. Tang, “Power Control Stackelberg Game in Cooperative Anti-Jamming Communications,” in Proc. Int’l Conf. on Game Theory for Networks, Beijing, China, Dec. 2014.

23. T. Chen, J. Liu, L. Xiao and L. Huang, “Learning-based Anti-jamming Transmissions in Heterogenous Cognitive Radio Networks”, in Proc. IEEE Wireless Communications and Networking Conference, So-HetNets Workshop, New Orleans, LA, Mar. 2015.

24. G. Liu, J. Liu, Y. Li, L. Xiao and Y. Tang, “Detection of Jamming Attacks over Smartphones,” in Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.

25. G. Chen, Y. Li, L. Xiao and L. Huang, “Collaborative Anti-jamming Broadcast with Uncoordinated Frequency Hopping over USRP,” in Proc. IEEE Vehicular Technology Conf., Glasgow, Scotland, May 2015.

26. Y. Li, Q. Li, J. Liu, L. Xiao, “Mobile Cloud Offloading for Malware Detections with Learning,” in Proc. International Conference on Computer Communications (INFOCOM), BigSecurity, Hongkong, April 2015.

27. L. Xiao, Y. Li, G. Liu, Q. Li, W. Zhuang, “Spoofing Detection with Reinforcement Learning in Wireless Networks," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.

28. L. Xiao, Q. Li, T. Chen, E. Cheng, H. Dai, “Jamming Games in Underwater Sensor Networks with Reinforcement Learning," in Proc. IEEE Global Communications Conference, San Diego, CA, Dec. 2015.

29. L. Xiao, T. Chen, C. Xie, J. Liu, "Mobile Crowdsensing Game in Vehicular Networks," in Proc. IEEE Region 10 Conference (TENCON), invited talk, Nov. 2015.

30. Y. Li, L. Xiao, Q. Li, W. Su, "Spoofing Detection Games in Underwater Sensor Networks," in Proc. MTS/ IEEE Oceans, Washington, DC, Oct. 2015.

31. L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "Mobile Offloading Game Against Smart Attacks," in Proc. International Conference on Computer Communications (INFOCOM), -BigSecurity, San Francisco, CA, April 2016. (最佳论文奖)

32. D. Xu, Y. Li, L. Xiao, N. B. Mandayam, and H. V. Poor, " Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, Dec. 2016.

33. L. Xiao, T. Chen, G. Han, Y. Li, W. Zhuang, and L. Sun, " Channel-Based Authentication Game in MIMO Systems,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC , Dec. 2016.

34. C. Xie, and L. Xiao, "User-Centric View of Smart Attacks in Wireless Networks," in Proc. IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), invited talk, Nanjing, China, Oct.2016.

35. G. Han, L. Xiao, H. V. Poor, " Two-Dimensional Anti-Jamming Communication Based on Deep Reinforcement Learning," in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, Mar. 2017.

36. Y. Li, L. Xiao, H. Dai, H. V. Poor, " Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017. (最佳论文奖)

37. X. Wan, L. Xiao, Q. Li, Z. Han, " Phy-layer Authentication with Multiple Landmarks with Reduced Communication Overhead, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.

38. M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, " Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach, " in Proc. IEEE International Conference on Communications (ICC), Paris, May 2017.

39. D. Xu, L. Xiao, N. B. Mandayam, H. V. Poor, " Cumulative Prospect Theoretic Study of a Cloud Storage Defense Game Against Advanced Persistent Threats, " in Proc. IEEE International Conference on Computer Communications (INFOCOM WKSHPS), -BigSecurity, Atlanta, GA, May 2017.

40. Q. HU, S. Lv, Z. Shi, L. Sun and L. Xiao, " Defense Against Advanced Persistent Threats with Expert Systerm for Internet of Things, " in Proc. IEEE/IFIP International Conference on Wireless Algorithms, Systems, and Application, Gui Lin, China, June 2017.

41. Y. Qu, S. Yu, L. Gao, S.Peng, Y. Xiang, and L. Xiao, " FuzzyDP: Fuzzy-based Big Data Publising Aginst Inquiry Attacks, " in Proc. IEEE Conference on Computer Communication Workshops (INFOCOM WKSHPS), - MobiSec, Atlanta, GA, May 2017.

42. X. Xiao, C. Dai, Y. li, C. Zhou, and L. Xiao, "Energy Trading Game for Microgrids Using Reinforcement Learning," in Proc. EAI International Conference on Game Theory for Network, Knoxville, Tennessee, May 2017. (最佳论文奖)

专利:

1. Liang Xiao*, Chunxuan Ye, Suhas Mathur, Yogendra C Shah, Alexander Reznik, "Authentication for secure wireless communication, " 美国专利:PCTUS0957477,2014.6.19,已授权.

2. 肖亮*、颜蜜、杜亮、黄联芬. "一种基于联合干扰的防御认知无线电自私攻击方法[P]. " 中国专利:CN102625313B,2014.07.02,已授权.

3. 肖亮*、康姗、颜蜜. "基于传感器的认知无线网络对多种类型攻击的检测方法[P]. " 中国专利:CN102595411B, 2014.7.2,已授权.

4. 肖亮*、李强达、陈桂权、黄联芬、唐余亮. "一种检测和识别考场内开机手机的方法[P]. " 中国专利:CN104092505B,2016.02,已授权.

5. 肖亮*、李炎达、刘金亮、李燕. "一种基于移动群智感知的路况信息汇集方法[P]. " 中国专利:CN104700640A,2016.09,已授权.

软件著作权:

1. " 抗敌意干扰的无线认知网络非协调跳频广播系统. " 软件著作权: 2013SR153783, 2013.12.23.

2. " 基于RSS的无线信道指纹采集与实时识别系统. " 软件著作权: 2012SR110529, 2012.11.19.

3. " 认知无线电网络中基于间接互惠的安全系统 . " 软件著作权 : 2013SR153776, 2013.04.16.

4. " 基于跨层设计的USRP无线指纹识别系统. " 软件著作权: 2013SR081611, 2013.12.23.

5. " 安卓手机的敌意干扰检测软件. " 软件著作权: 2014SR168163, 2014.7.6.

6. " 抗敌意干扰的节点协作跳频广播系统. " 软件著作权: 2014SR077739, 2014.2.25.

7. " 基于强化学习的认知无线网络的抗敌意干扰系统. " 软件著作权: 2015SR148443, 2015.7.31.

8. " 基于环境指纹的安卓手机认证系统. " 软件著作权: 2016SR108135, 2016.5.17.

特邀报告:

1. “Channel-Based Spoofing Detection in Wireless Networks,” 电子科大’ 08, 厦大’ 08, Bell Lab’ 09, InterDigital’ 09, 北邮’09.

2. “Jamming-Resistant Collaborative Broadcast In Wireless Networks,” 香港城大’11, UMD’11, UIC’2011, Northwestern’ 11,上交’12.

3. “Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks,” 台湾国立交通大学'12, Stevens' 12, Rutgers'12.

4.《当用户遭遇无线攻击:对无线网络安全博弈的探索》, 2014年通信理论与信号处理学术年会大会报告.

5. "User-centric game theoretic study on network security,"西交'14, 西电'14, 浙大'15, U Houston’15, Stevens’16.

6. "Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study," Rutgers’16, Columiba’16, Princeton’16,电子科大'16,东南大学'16,南邮'16,美亚柏科'16,中大'16.

7. "智能数据时代的网络安全研究," CCF广州论坛: 从"大数据"到"智能数据" , 2016.11.23, 广州.

8. "Mobile Offloading for Cloud-based Malware Detections with Learning," 第六届"山海论坛"-大数据与高性能计算, 2016.11.23, 广州.