[ Home | Research Projects | Publications | Honors & Awards | Teaching | Students | Professional Activities | Invited Talk


[ Selected Publications | Journal Publications | Books & Book Chapters | Conference Publications | By Year | By Topic

Personal use of the material posted on this homepage is permitted. However, permission to use this material for any other purposes must be obtained from related publishers.

Publications on Emerging Topics

  1. W. Shen, B. Yin, X. Cao, Y. Cheng, and X. Shen, "A distributed secure outsourcing scheme for solving linear algebraic equations in ad hoc clouds," accepted to IEEE Transactions on Cloud Computing, to appear. IEEE early access http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7805146. (To the best of our knowledge, this is the first work that systematically studies the security issues in outsourcing an linear algebraic equations (LAE) problem to a distributed ad hoc cloud.)

  2. R. Hou, Y. Cheng, J. Li, M. Sheng, and K.-S. Lui, "Capacity of hybrid wireless networks with long-range social contacts behavior," accepted to IEEE/ACM Transactions on Networking, to appear.

  3. D. Manikantan Shila, W. Shen, Y. Cheng, X. Tian, and X. Shen, "AMCloud: Towards a Secure Autonomic Mobile Ad Hoc Cloud Computing System," accepted to IEEE Wireless Communications, to appear.

  4. X. Cao, L. Liu, W. Shen, A. Laha, J. Tang, and Y. Cheng, "Real-time misbehavior detection and mitigation in cyber-physical systems over WLANs," accepted to IEEE Transactions on Industrial Informatics, to appear.

  5. C. Hu, H. Li, Y. Jiang, Y. Cheng, and P. Heegaard, "Deep semantics inspection over big network data at wire-speed," IEEE Network, vol. 30, no. 1, pp. 18-23, Jan./Feb. 2016.

  6. X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou, and J. Chen, "Ghost-in-ZigBee: Energy depletion attack on ZigBee based wireless networks," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 816-829, Oct. 2016.

  7. W. Shen, B. Yin, X. Cao, L. X. Cai and Y. Cheng, "Secure device-to-device communications over WiFi Direct," IEEE Network, vol. 30, no. 5, pp. 4-9, Sept.-Oct. 2016.

  8. X. Cao, L. Liu, Y. Cheng, L.X. Cai, and C. Sun, "On optimal device-to-device resource allocation for minimizing end-to-end delay in VANETs," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 7905-7916, Oct. 2016.

  9. Y. Wen, J. Shi, Q. Zhang, X. Tian, Z. Huang, H. Yu, Y. Cheng, and X. Shen, "Quality-driven auction based incentive mechanism for mobile crowd sensing," IEEE Transactions on Vehicular Technology, vol. 6, no. 9, pp. 4203-4214, Sept. 2015. (Google Scholar Citation: 20)

  10. J. Liu, T. Zhao, S. Zhou, Y. Cheng, and Z. Niu, "CONCERT: A cloud-based architecture for next-generation cellular systems," IEEE Wireless Communications, vol. 21, no. 6, pp. 14-22, December 2014. (Google Scholar Citation: 38)

  11. W. Shen, W. Hong, X. Cao, B. Yin, D. Manikantan Shila, and Y. Cheng, "Secure key establishment for device-to-device communications," in Proc. IEEE GLOBECOM 2014, Austin, TX, USA, Dec. 8-12, 2014. (Google Scholar Citation: 19)


Selected Recent Publications

    [BOOK] J. Tang and Y. Cheng, Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks, Springer, 2013

    [BOOK] X. Tian and Y. Cheng, Scalable Multicasting over Next-Generation Internet: Design, Analysis and Applications, Springer, 2012.

  1. L. Liu, X. Cao, W. Shen, Y. Cheng, and L. Cai "DAFEE: A decomposed approach for energy efficient networking in multi-radio multi-channel wireless networks," in Proc. IEEE INFOCOM , San Francisco, CA, USA, April 10-15, 2016

  2. Y. Cheng, H. Li, D. Manikantan Shila, and X. Cao, "A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks," IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1342-1355, August 2015.

  3. X. Cao, J. Chen, Y. Cheng, X. Shen, and Y. Sun, "An analytical MAC model for IEEE 802.15.4 enabled wireless networks with periodic traffic," IEEE Transactions on Wireless Communications , vol. 14, no. pp. 5261-5273, Oct. 2015.

  4. X. Cao, X. Zhou, L. Liu, and Y. Cheng, "Energy-efficient spectrum sensing for cognitive radio enabled remote state estimation over wireless channels," IEEE Transactions on Wireless Communications, vol. 14, no. 4, pp. 2058-2071, April 2015.

  5. Y. Cheng, X. Cao, X. Shen, D. Manikantan Shila, and H. Li, "A systematic study of the delayed column generation method for optimizing wireless networks," in Proc. ACM MobiHoc 2014, Best Paper Runner-Up Award, Philadelphia, PA, USA, August 11-14, 2014.

  6. X. Tian and Y. Cheng, "A scalable destination-oriented multicast protocol with incremental deployability," IEEE Transactions on Computers, vol. 63, no. 4, pp. 793-806, Apr. 2014.

  7. J. Tang, Y. Cheng, Y. Hao, and W. Song, "SIP flooding attack detection with a multi-dimensonal sketch design," IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 6, pp. 582-595, Nov./Dec. 2014. (Google Scholar Citation: 13)

  8. L. Liu, X. Cao, Y. Cheng, and Z. Liu, "Energy-efficient sleep scheduling for delay-constrained applications over WLANs," IEEE Transactions on Vehicular Technology, vol. 63, no. 5, pp. 2048-2058, June 2014. (Google Scholar Citation: 15)

  9. L. Liu, X. Cao, Y. Cheng, L. Du, W. Song, and Y. Wang, "Energy-efficient capacity optimization in wireless networks," in Proc. IEEE INFOCOM 2014, Toronto, Canada, April 27-May 2, 2014. (Google Scholar Citation: 12)

  10. X. Cao, P. Cheng, J. Chen, S. Ge, Y. Cheng, and Y. Sun, "Cognitive radio based state estimation in cyber-physical systems," IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 489-502, Mar. 2014. (Google Scholar Citation: 18)

  11. J. Tang, Y. Cheng, and W. Zhuang, "Real-time misbehavior detection in IEEE 802.11 based wireless networks: An analytical approach," IEEE Transactions on Mobile Computing, vol. 13, no. 1, pp. 146-158, Jan. 2014. (Google Scholar Citation: 26)

  12. H. Li, Y. Cheng, C. Zhou, and W. Zhuang, "Routing metrics for minimizing end-to-end delay in multiradio multichannel wireless networks," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 11, pp. 2293-2303, Nov. 2013.(Google Scholar Citation: 23)

  13. W. Shen, L. Liu, X. Cao, Y. Hao, and Y. Cheng, "Cooperative message authentication in vehicular cyber-physical systems," IEEE Transactions on Emerging Topics in Computing, vol. 1, no. 1, pp. 84-97, June 2013. (Google Scholar Citation: 12)

  14. Y. Hao, J. Tang, and Y. Cheng, "Secure cooperative data downloading in vehicular ad hoc networks," IEEE Journal on Selected Areas of Communications, vol. 31, no. 9, pp. 132-141, Sept. 2013. (Google Scholar Citation: 20)

  15. Y. Cheng, H. Li, P.-J. Wan and X. Wang, "Wireless mesh network capacity achievable over the CSMA/CA MAC," IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3151-3165, Sept. 2012. (Google Scholar Citation: 26)

  16. Y. Cheng, H. Li, and P. Wan, "A theoretical framework for optimal cooperative networking in multi-radio multi-channel wireless networks", IEEE Wireless Communications Magazine, vol. 19, no. 2, pp. 66-73, April 2012. (Google Scholar Citation: 16)

  17. J. Tang, Y. Cheng, and Y. Hao, "Detection and prevention of SIP flooding attacks in voice over IP networks," in Proc. IEEE INFOCOM, Orlando, Florida, Mar. 25-30, 2012. ((Google Scholar Citation: 17))

  18. H. Li, Y. Cheng, X. Tian, and X. Wang, "A generic framework for throughput-optimal control in MR-MC wireless networks," in Proc. IEEE INFOCOM, Orlando, Florida, Mar. 25-30, 2012. (Google Scholar Citation: 11)

  19. J. Tang and Y. Cheng, "Quick detection of stealthy SIP flooding attacks in VoIP networks," in Proc. IEEE ICC, Best Paper Award, June 5-9, Kyoto, Japan, 2011. (Google Scholar Citation: 28)

  20. Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A distributed key management framework with cooperative message authentication in VANETs," IEEE Journal on Selected Areas of Communications, vol. 29, no. 3, pp. 616-629, March 2011. (Google Scholar Citation: 95)

  21. D. Shila, Y. Cheng, and T. Anjali, "Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks", in Proc. IEEE INFOCOM, Shanghai, China, Apr. 10-15, 2011. (Google Scholar Citation: 40)

  22. D. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661-1675, May 2010. (Google Scholar Citation: 53)

  23. B. Guo, H. Li, C. Zhou and Y. Cheng "Analysis of general network coding conditions and design of a free-ride-oriented routing metric," IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1714-1727, May 2011. (Google Scholar Citation: 47)

  24. H. Li, Y. Cheng, C. Zhou, and P. Wan, "Multi-dimensional conflict graph based computing for optimal capacity in MR-MC wireless networks", in Proc. IEEE ICDCS, Genoa, Italy, June 21-25, 2010. (Google Scholar Citation: 74)

  25. H. Li, Y. Cheng, C. Zhou, and W. Zhuang, "Minimizing end-to-end delay: a novel routing metric for multi-radio wireless mesh networks", IEEE INFOCOM 2009, Rio de Janeiro, Brazil, Apr. 19-25, 2009.(Google Scholar Citation: 103)


[ Home | Research Projects | Publications | Honors & Awards | Teaching | Students | Professional Activities | Invited Talk
  
FUTURE NETWORKING RESEARCH LABORATORY
                     (under development)
  
Last Updated: Jan. 2017