肖亮 国家重点青年人才项目入选者、福建省新世纪优秀人才、教授、博士生导师

厦门大学科技处副处长

美国罗格斯大学(Rutgers Univ.) 博士(2009)

研究方向:无线通信,网络安全,大数据,机器学习

电子邮件:lxiao (AT) xmu.edu.cn

个人主页:http://lxiao.xmu.edu.cn

个人简历:

主讲课程:

无线通信工程(本科生课程)

信息安全基础(本科生课程)

无线通信网络(研究生课程)

学术研究:

从事智能网络安全等方面研究,入选国家级青年人才计划、IEEE通信学会杰出讲师、Elsevier中国高被引学者和斯坦福大学全球前2%顶尖科学家榜单。作为第一完成人荣获福建省科技进步奖一等奖、中国电子学会自然科学奖二等奖,中国通信学会青年科技奖。多篇论文入选IEEE通信学会推荐的领域最佳读物和IEEE期刊热点论文;荣获ICC等多个国际会议最佳论文奖,福建省自然科学优秀学术论文奖。

学术兼职:

  IEEE高级会员,IEEE ComSoc 大数据技术委员会委员,

  中国电子学会高级会员,青年科学家俱乐部会员

  中国计算机学会高级会员,网络与数据通信专委会委员,物联网专委会委员

  中国通信学会青年工作委员会委员,通信理论与信号处理委员会委员

  IEEE Transactions on Communications (TCOM)编委

  IEEE Transactions on Dependable and Secure Computing编委

  IEEE Transactions on Information Forensics and Security编委

  《网络与信息安全学报》编委

  China Communications》编委

  《计算机科学》编委

在研项目:

  非预知物理层密钥的无线网络抗敌意干扰技术研究,国家自然科学基金面上项目,2013-2016

  基于前景理论的无线网络安全博弈理论与机制研究国家自然科学基金面上项目, 2017 -2020

  无人机智能抗干扰通信技术研究, 国家自然科学基金面上项目, 2020-2023

代表性论文:

Book Chapter:

1.       L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Chapter 13: Channel-Based Authentication, in Securing Wireless Communications at the Physical Layer," W. Trappe and R. Liu, Eds., Springer-Verlag New York, 2010.

2.       L. Xiao, "Anti-jamming Transmissions in Cognitive Radio Networks," Springer, 2015, ISBN: 978-3-319-24290-3.

3.       L. Xiao,"Chapter 4. Reinforcement Learning Based PHY-Layer Authentication in Cognitive Radio Networks," in "Cognitive Radio Networks: Performance, Applications and Technology", Chee Wei Tan, Eds., NOVA, 2018, ISBN: 978-1-53613-068-3.

4.       L. Xiao,"Reinforcement learning based wireless communications against jamming and interference," Encyclopedia of Wireless Networks, Jun. 2018.

5.       L. Xiao, W. Zhuang, S. Zhou, C. Chen, "Learning-based VANET Communication and Security Techniques" Springer, 2019, ISBN: 978-3-030-01731-6.

期刊论文

1.       H. Zhuang, L. Dai, L. Xiao, and Y. Yao," Spectral efficiency of distributed antenna system with random antenna layout, " Electronics Letter, vol. 39, no 6, pp. 495-496, Mar. 2003.

2.       L. Xiao, L. Greenstein, and N. Mandayam, " Sensor-assisted localization in cellular systems," IEEE Trans. Wireless Comm., vol. 6, no. 12, pp. 4244-4248, Dec. 2007.

3.       L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, "Distributed measurements for estimating and updating cellular system performance," IEEE Trans. Comm., vol. 56, no. 6, pp. 991-998, Jun. 2008.

4.       L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.

5.       L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5948 - 5956, Dec. 2009.

6.       L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks," IEEE Trans. Information Forensics & Security, vol. 4, no. 3, pp. 492-503, Sept. 2009.

7.       L. Xiao, H. Dai and P. Ning, "Jamming-resistant collaborative broadcast using uncoordinated frequency hopping," IEEE Trans. Information Forensics & Security, vol. 7, no. 1, pp. 297 – 309, Feb. 2012.

8.       L. Xiao, H. Dai, P. Ning, "MAC design of uncoordinated FH-based collaborative broadcast," IEEE Wireless Comm. Letters, vol. 1, no. 3, pp. 261 - 264, Jun. 2012.

9.       C. Li, H. Dai, L. Xiao, P. Ning, "Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks," IEEE Trans. Signal Processing, vol. 60, no. 10, pp. 5281 - 5292, Oct. 2012.

10.   L. Xiao, W.S Lin, Y. Chen, K.J.R Liu, "Indirect reciprocity security game for large-scale mobile wireless networks," IEEE Trans. Information Forensics & Security, vol. 7, no. 4, pp. 1368 – 1380, Aug. 2012.

11.   C. Zhao, L. Xiao et al., "Secure relay selection based on learning with negative externality in wireless networks," EURASIP Journal on Advances in Signal Processing, vol. 2013, no. 1, pp. 1-7, Dec. 2013.

12.   L. Xiao, Q. Yan, W. Lou, G. Chen, Y.T. Hou, "Proximity-based security techniques for mobile users in wireless networks," IEEE Trans. Information Forensics & Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.

13.   L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect theoretic analysis of energy exchange among microgrids," IEEE Trans. Smart Grids, vol. 6, no. 1, pp. 63-72, Jan. 2015.

14.   L. Xiao, T. Chen, J. Liu, H. Dai, "Anti-jamming transmission stackelberg game with observation errors," IEEE Comm. Letters, vol. 19, no. 6, pp. 949-952, Jun. 2015.

15.   L. Xiao, Y. Li, J. Liu, Y. Zhao, "Power control with reinforcement learning in cooperative cognitive radio networks against jamming," Journal of Supercomputing, vol. 71, no. 9, pp. 3237-3257, Apr. 2015.

16.   J. Liu, L. Xiao, G. Liu, Y. Zhao, "Active authentication with reinforcement learning based on ambient radio signals," Springer Multimedia Tools and Applications, vol. 76, no. 3, pp. 3979-3998, Oct. 2015.

17.   L. Xiao, J. Liu, Q. Li, N. B. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Information Forensics & Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.

18.   L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, "PHY-layer spoofing detection with reinforcement learning in wireless networks," IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.

19.   肖亮, 李强达, 刘金亮, "云存储安全技术研究进展综述," 数据采集与处理, 2016, 31(3):464-472.

20.   L. Xiao, D. Xu, C. Xie, N. B. Mandayam, and H. V. Poor, "Cloud storage defense against advanced persistent threats: A prospect theoretic study," IEEE Journal on Selected Areas in Comm., vol. 35, no. 3, pp. 534-544, Jan. 2017. Code.

21.   L. Xiao, T. Chen, G. Han, W. Zhuang, and L. Sun, "Game theoretic study on channel-based authentication in MIMO systems," IEEE Trans. Vehicular Technology, vol. 66, no. 8, pp. 7474-7484, Jan. 2017. Code.

22.   N. Wang, T. Jiang, S. Lv and L. Xiao, "Physical-layer authentication based on extreme learning machine," IEEE Comm. Letters, vol. 21, no. 1, pp. 1557-1560, Jul. 2017.

23.   L. Xiao, Y. Li, X. Huang, and X. Du, "Cloud-based malware detection game for mobile device with offloading," IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742-2750, Oct. 2017.

24.   L. Xiao, X. Wan, and Z. Han, "PHY-layer authentication with multiple landmarks with reduced overhead," IEEE Trans. Wireless Comm., vol. 17, no. 3, pp. 1676-1687, Dec. 2017. Code.

25.   L. Xiao, Y. Li, G. Han, H. Dai, and H. V. Poor, "A secure mobile crowdsensing game with deep reinforcement learning," IEEE Trans. Information Forensics & Security, vol. 13, no. 1, pp. 35-47, Jan. 2018. Code.

26.   L. Xiao, T. Chen, C. Xie, H. Dai, and H. V. Poor, "Mobile crowdsensing games in vehicular networks," IEEE Trans. Vehicular Technology, vol. 67, no. 2, pp. 1535-1545, Feb. 2018. Code.

27.   L. Xiao, D. Jiang, X. Wan, W. Su, and Y. Tang, "Anti-jamming underwater transmission with mobility and learning," IEEE Comm. Letters, vol. 22, no. 3, pp. 542-545, Mar. 2018. Code.

28.   L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor, "Reinforcement learning-based NOMA power allocation in the presence of smart jamming," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3377-3389, Apr. 2018.

29.   L. Xiao, C. Xie, M. Min, and W. Zhuang, "User-centric view of unmanned aerial vehicle transmission against smart attacks," IEEE Trans. Vehicular Technology, vol. 67, no. 4, pp. 3420-3430, Apr. 2018.

30.   L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, and W. Zhuang, "UAV relay in VANETs against smart jamming with reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 5, pp. 4087-4097, May 2018.

31.   L. Xiao, D. Xu, N. B. Mandayam, and H. V. Poor, "Attacker-centric view of a detection game against advanced persistent threats," IEEE Trans. Mobile Computing, vol. 17, no. 11, pp. 2512-2523, Nov. 2018. Code.

32.   L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, and M. Guizani, "Security in mobile edge caching with reinforcement learning," IEEE Wireless Comm. Magazine, vol. 25, no. 3, pp. 116-122, Jun. 2018.

33.   L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, "IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?," IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018.

34.   陈烨, 许冬瑾, 肖亮, "基于区块链的网络安全技术综述," 电信科学, 2018, 34(03):10-16.

35.   M. Min, L. Xiao, C. Xie, M. Hajimirsadeghi, N. B. Mandayam, "Defense against advanced persistent threats in dynamic cloud storage: A colonel blotto game approach," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4250-4261, Dec. 2018.

36.   L. Xiao, D. Jiang, D. Xu, H. Zhu, Y. Zhang, and H. V. Poor, "Two-dimensional antijamming mobile communication based on reinforcement learning," IEEE Trans. Vehicular Technology, vol. 67, no. 10, pp. 9499-9512, Oct. 2018.

37.   G. Sheng, M. Min, L. Xiao, and S. Liu, "Reinforcement learning based control for unmanned aerial vehicles," Journal of Communications and Information Networks, vol. 3, no. 3, pp. 39-48, Oct. 2018.

38.   L. Xiao, D. Jiang, D. Xu, W. Su, N. An and D. Wang, "Secure mobile crowdsensing based on deep learning," China Communications, vol. 15, no. 10, pp. 1-11, Oct. 2018.

39.   M. Min, X. Wan, L. Xiao, Y. Chen, M. Xia, D. Wu, H. Dai, "Learning-based privacy-aware offloading for healthcare IoT with energy harvesting," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4307-4316, Oct. 2018.

40.   Z. Deng, Y. Zhou, D. Wu, G. Ye, M. Chen, and L. Xiao, "Utility maximization of cloud-based in-car video recording over vehicular access networks," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5213-5226, Dec. 2018.

41.   L. Xiao, G. Sheng, X. Wan, W. Su, and P. Cheng, "Learning-based PHY-layer authentication for underwater sensor networks," IEEE Comm. Letters, vol. 23, no. 1, pp. 60-63, Jan. 2019.

42.   S. Liu, L. Xiao, L. Huang, X. Wang, "Impulsive noise recovery and elimination: A sparse machine learning based approach," IEEE Trans. Vehicular Technology, vol. 68, no. 3, pp. 2306-2315, Mar. 2019.

43.   M. Min, L. Xiao, Y. Chen, P. Cheng, D. Wu, and W. Zhuang, "Learning-based computation offloading for IoT devices with energy harvesting," IEEE Trans. Vehicular Technology, vol. 68, no. 2, pp. 1930-1941, Jan. 2019.

44.   M. Hu, L. Zhuang, D. Wu, X. Chen, and L. Xiao, "Learning driven computation offloading for asymmetrically informed edge computing," IEEE Trans. Parallel and Distributed Systems, vol. 30, no. 7, pp. 1802-1815, Aug. 2019.

45.   L. Xiao, D. Jiang, Y. Chen, W. Su, and Y. Tang, "Reinforcement-learning-based relay mobility and power allocation for UWSNs against jamming," IEEE Journal of Oceanic Engineering, vol. 45, no. 3, pp. 1148-1156, May 2019.

46.   S. Liu, L. Xiao, Z. Han, and Y. Tang, "Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6919-6932, Aug. 2019.

47.   L. Xiao, G. Sheng, S. Liu, H. Dai, M. Peng, and J. Song, "Deep reinforcement learning-enabled secure visible light communication against eavesdropping," IEEE Trans. Comm., vol. 67, no. 10, pp. 6994-7005, Oct. 2019.

48.   黄锦灏, 江东华, 丁钰真, 肖亮, 范业仙, 陈建成, "基于强化学习的能量采集物联网视频编码技术," 厦门大学学报(自然科学版), 2019, 58(06):889-893.

49.   X. Lu, X. Xiao, L. Xiao, C. Dai, M. Peng, and H. V. Poor, "Reinforcement learning based microgrid energy trading with a reduced power plant schedule," IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10728-10737, Dec. 2019.

50.   L. Xiao, H. Zhang, Y. Xiao, X. Wan, S. Liu, L. Wang and H. V. Poor, "Reinforcement learning-based downlink interference control for ultra-dense small cells," IEEE Trans. Wireless Comm., vol. 19, no. 1, pp. 423-434, Jan. 2020.

51.   X. Lu, L. Xiao, C. Dai, and H. Dai, "UAV-aided cellular communications with deep reinforcement learning against jamming," IEEE Wireless Comm. Magazine, vol. 27, no. 4, pp. 48-53, Aug. 2020.

52.   X. Lu, L. Xiao, T. Xu, Y. Zhao, Y. Tang, and W. Zhuang, "Reinforcement learning based PHY authentication for VANETs," IEEE Trans. Vehicular Technology, vol. 69, no. 3, pp. 3068 - 3079, Mar. 2020.

53.   M. Hu, Z. Xie, D. Wu, Y. Zhou, X. Chen, and L. Xiao, "Heterogeneous edge offloading with incomplete information: A minority game approach," IEEE Trans. Parallel and Distributed Systems, vol. 31, no. 9, pp. 2139 - 2154, Sep. 2020.

54.   L. Xiao, Y. Ding, D. Jiang, J. Huang, D. Wang, J. Li, and H. V. Poor, "A reinforcement learning and blockchain-based trust mechanism for edge networks," IEEE Trans. Comm., vol. 68, no. 9, pp. 5460-5470, Sept. 2020.

55.   黄锦灏, 丁钰真, 肖亮, 沈志荣, 朱珍民, "一种基于强化学习的嵌入式系统抗拒绝服务攻击的缓存调度方案," 计算机科学, 2020.

56.   L. Xiao, X. Lu, T. Xu, X. Wan, W. Ji, and Y. Zhang, "Reinforcement learning based mobile offloading for edge computing against jamming and interference," IEEE Trans. Comm., vol. 68, no. 10, pp. 6114-6126, Oct. 2020. Code.

57.   H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, "Deep reinforcement learning based intelligent reflecting surface for secure wireless communications," IEEE Trans. Wireless Comm., in press.

58.   Y. Xiao, L. Xiao, X. Lu, H. Zhang, S. Yu, and H. V. Poor, "Deep reinforcement learning based user profile perturbation for privacy aware recommendation," IEEE Internet of Things Journal, in press.

59.   徐堂炜, 张海璐, 刘楚环, 肖亮, 朱珍民, "基于强化学习的低时延车联网群密钥分配管理技术," 网络与信息安全学报, 2020, 6(5): 119-125.

60.   刘思聪, 肖亮, "面向5G的“无线通信原理”教学改革探索," 高教学刊, 2020(35): 132-135.

61.   W. Su, J. Tao, Y. Pei, X. You, L. Xiao, and E. Cheng, "Reinforcement learning based effficient underwater image communicaiton," IEEE Comm. Letters, in press.

62.   Y. Xiao, G. Niu, L. Xiao, Y. Ding, S. Liu, and Y. Fan, "Reinforcement learning based energy-efficient internet-of-things video transmission," Intelligent and Converged Networks, in press.

63.   X. Lu, J. Jie, Z. Lin, L. Xiao, J. Li, and Y. Zhang, "Reinforcement learning based energy efficient robot relay for unmanned aerial vehicles against smart jamming," SCIENCE CHINA Information Sciences, in press.