[ Home | Research Projects | Publications | Honors & Awards | Teaching | Students | Professional Activities | Invited Talk


[ Selected Publications | Journal Publications | Books & Book Chapters | Conference Publications | By Year | By Topic

Personal use of the material posted on this homepage is permitted. However, permission to use this material for any other purposes must be obtained from related publishers.

Publications on Emerging Topics

  1. L. Liu, B. Yin, S. Zhang, X. Cao, and Y. Cheng "Deep learning meets wireless network optimization: Identify critical links," accepted to IEEE Transactions on Network Science and Engineering, to appear. IEEE early access https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8340067

  2. X. Cao, R. Ma, L. Liu, H. Shi, Y. Cheng, and C. Sun, "A machine learning based algorithm for joint scheduling and power control in wireless networks," accepted to IEEE Internet of Things Journal, to appear. IEEE early access https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8405562

  3. L. Liu, Y. Cheng, X. Cao, S. Zhou, Z. Niu, and P. Wang "Joint optimization of scheduling and power control in wireless networks: multi-dimensional modeling and decomposition" accepted to IEEE Transactions on Mobile Computing, to appear. IEEE early access https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8424081

  4. X. Cao, L. Liu, Y. Cheng, and X. Shen, "Towards energy-efficient wireless networking in the big data era: A survey," IEEE Communications Surveys & Tutorials., vol. 20, no. 1, pp. 303-332, 2018.

  5. W. Shen, B. Yin, X. Cao, Y. Cheng, and X. Shen, "A distributed secure outsourcing scheme for solving linear algebraic equations in ad hoc clouds," accepted to IEEE Transactions on Cloud Computing, to appear. IEEE early access http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7805146.

  6. R. Hou, Y. Cheng, J. Li, M. Sheng, and K.-S. Lui, "Capacity of hybrid wireless networks with long-range social contacts behavior," IEEE/ACM Transactions on Networking, vol. 25, no. 2, pp. 834-848, Apr. 2017.

  7. D. Manikantan Shila, W. Shen, Y. Cheng, X. Tian, and X. Shen, "AMCloud: Towards a Secure Autonomic Mobile Ad Hoc Cloud Computing System," IEEE Wireless Communications, vol. 24, no. 2, pp. 74-81, April 2017. (Google Scholar Citation: 16)

  8. X. Cao, L. Liu, W. Shen, A. Laha, J. Tang, and Y. Cheng, "Real-time misbehavior detection and mitigation in cyber-physical systems over WLANs," IEEE Transactions on Industrial Informatics, vol. 13, no. 1, pp. 186-197, Feb. 2017. (Google Scholar Citation: 9)

  9. X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou, and J. Chen, "Ghost-in-ZigBee: Energy depletion attack on ZigBee based wireless networks," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 2016. (Google Scholar Citation: 30)

  10. W. Shen, B. Yin, X. Cao, L. X. Cai and Y. Cheng, "Secure device-to-device communications over WiFi Direct," IEEE Network, vol. 30, no. 5, pp. 4-9, Sept.-Oct. 2016. (Google Scholar Citation: 18)

  11. X. Cao, L. Liu, Y. Cheng, L.X. Cai, and C. Sun, "On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 7905-7916, Oct. 2016. (Google Scholar Citation: 23)

  12. Y. Wen, J. Shi, Q. Zhang, X. Tian, Z. Huang, H. Yu, Y. Cheng, and X. Shen, "Quality-driven auction based incentive mechanism for mobile crowd sensing," IEEE Transactions on Vehicular Technology, vol. 6, no. 9, pp. 4203-4214, Sept. 2015. (Google Scholar Citation: 69)

  13. J. Liu, T. Zhao, S. Zhou, Y. Cheng, and Z. Niu, "CONCERT: A cloud-based architecture for next-generation cellular systems," IEEE Wireless Communications, vol. 21, no. 6, pp. 14-22, December 2014. (Google Scholar Citation: 75)


Selected Recent Publications

    [BOOK] J. Tang and Y. Cheng, Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks, Springer, 2013

    [BOOK] X. Tian and Y. Cheng, Scalable Multicasting over Next-Generation Internet: Design, Analysis and Applications, Springer, 2012.

  1. X. Cao, L. Liu, W. Shen, A. Laha, J. Tang, and Y. Cheng, "Real-time misbehavior detection and mitigation in cyber-physical systems over WLANs," IEEE Transactions on Industrial Informatics, vol. 13, no. 1, pp. 186-197, Feb. 2017. (Google Scholar Citation: 16)

  2. Z. Chen, L. X. Cai, Y. Cheng, and H. Shan"Sustainable cooperative communication in wireless powered networks with energy harvesting relay," IEEE Transactions on Wireless Communications , vol. 16, no. 12, pp. 8175-8189, Dec. 2017. (Google Scholar Citation: 8)

  3. L. Liu, X. Cao, W. Shen, Y. Cheng, and L. Cai "DAFEE: A decomposed approach for energy efficient networking in multi-radio multi-channel wireless networks," in Proc. IEEE INFOCOM , San Francisco, CA, USA, April 10-15, 2016 (Google Scholar Citation: 7)

  4. Y. Cheng, H. Li, D. Manikantan Shila, and X. Cao, "A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks," IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1342-1355, August 2015. (Google Scholar Citation: 9)

  5. X. Cao, J. Chen, Y. Cheng, X. Shen, and Y. Sun, "An analytical MAC model for IEEE 802.15.4 enabled wireless networks with periodic traffic," IEEE Transactions on Wireless Communications , vol. 14, no. pp. 5261-5273, Oct. 2015. (Google Scholar Citation: 19)

  6. X. Cao, X. Zhou, L. Liu, and Y. Cheng, "Energy-efficient spectrum sensing for cognitive radio enabled remote state estimation over wireless channels," IEEE Transactions on Wireless Communications, vol. 14, no. 4, pp. 2058-2071, April 2015. (Google Scholar Citation: 17)

  7. Y. Cheng, X. Cao, X. Shen, D. Manikantan Shila, and H. Li, "A systematic study of the delayed column generation method for optimizing wireless networks," in Proc. ACM MobiHoc 2014, Best Paper Runner-Up Award, Philadelphia, PA, USA, August 11-14, 2014.(Google Scholar Citation: 8)

  8. J. Tang, Y. Cheng, Y. Hao, and W. Song, "SIP flooding attack detection with a multi-dimensonal sketch design," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 582-595, Nov./Dec. 2014. (Google Scholar Citation: 29)

  9. L. Liu, X. Cao, Y. Cheng, L. Du, W. Song, and Y. Wang, "Energy-efficient capacity optimization in wireless networks," in Proc. IEEE INFOCOM 2014, Toronto, Canada, April 27-May 2, 2014. (Google Scholar Citation: 23)

  10. X. Cao, P. Cheng, J. Chen, S. Ge, Y. Cheng, and Y. Sun, "Cognitive radio based state estimation in cyber-physical systems," IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 489-502, Mar. 2014. (Google Scholar Citation: 33)

  11. J. Tang, Y. Cheng, and W. Zhuang, "Real-time misbehavior detection in IEEE 802.11 based wireless networks: An analytical approach," IEEE Transactions on Mobile Computing, vol. 13, no. 1, pp. 146-158, Jan. 2014. (Google Scholar Citation: 35)

  12. H. Li, Y. Cheng, C. Zhou, and W. Zhuang, "Routing metrics for minimizing end-to-end delay in multiradio multichannel wireless networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 11, pp. 2293-2303, Nov. 2013.(Google Scholar Citation: 35)

  13. Y. Hao, J. Tang, and Y. Cheng, "Secure cooperative data downloading in vehicular ad hoc networks," IEEE Journal on Selected Areas of Communications, vol. 31, no. 9, pp. 132-141, Sept. 2013. (Google Scholar Citation: 30)

  14. Y. Cheng, H. Li, P.-J. Wan and X. Wang, "Wireless mesh network capacity achievable over the CSMA/CA MAC," IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3151-3165, Sept. 2012. (Google Scholar Citation: 34)

  15. J. Tang, Y. Cheng, and Y. Hao, "Detection and prevention of SIP flooding attacks in voice over IP networks," in Proc. IEEE INFOCOM, Orlando, Florida, Mar. 25-30, 2012. (Google Scholar Citation: 29)

  16. J. Tang and Y. Cheng, "Quick detection of stealthy SIP flooding attacks in VoIP networks," in Proc. IEEE ICC, Best Paper Award, June 5-9, Kyoto, Japan, 2011. (Google Scholar Citation: 37)

  17. Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A distributed key management framework with cooperative message authentication in VANETs," IEEE Journal on Selected Areas of Communications, vol. 29, no. 3, pp. 616-629, March 2011. (Google Scholar Citation: 145)

  18. D. Shila, Y. Cheng, and T. Anjali, "Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks", in Proc. IEEE INFOCOM, Shanghai, China, Apr. 10-15, 2011. (Google Scholar Citation: 45)

  19. D. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661-1675, May 2010. (Google Scholar Citation: 67)

  20. B. Guo, H. Li, C. Zhou and Y. Cheng "Analysis of general network coding conditions and design of a free-ride-oriented routing metric," IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1714-1727, May 2011. (Google Scholar Citation: 52)

  21. H. Li, Y. Cheng, C. Zhou, and P. Wan, "Multi-dimensional conflict graph based computing for optimal capacity in MR-MC wireless networks", in Proc. IEEE ICDCS, Genoa, Italy, June 21-25, 2010. (Google Scholar Citation: 93)

  22. H. Li, Y. Cheng, C. Zhou, and W. Zhuang, "Minimizing end-to-end delay: a novel routing metric for multi-radio wireless mesh networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, Apr. 19-25, 2009.(Google Scholar Citation: 125)


[ Home | Research Projects | Publications | Honors & Awards | Teaching | Students | Professional Activities | Invited Talk
  
FUTURE NETWORKING RESEARCH LABORATORY
                     (under development)
  
Last Updated: Aug. 2018