Selected Publications

  • Research Book: K. Xiong, Resource Optimization and Security for Cloud Services, Wiley-ISTE, 2014.
  • Edited Book: J. Kolodziej, B. Martino, D. Talia, and K. Xiong (Eds.), Algorithms and Architecture for Parallel Processing, LNCS-8285, Springer-Verlag, 2013.
  • ACM TOSN: K. Xiong, R. Wang, W. (Kevin) Du, and P. Ning, Containing bogus packet insertion attacks for broadcast authentication in sensor networks, ACM Transactions on Sensor Networks, 2012.
  • JPDC: X. Chen, N. Rowe, J. Wu, and K. Xiong, Improving the localization of accuracy of targets by using their spatial-temporal relationships in wireless sensor networks, Journal of Parallel Distributed Computing (JPDC), 2012.
  • IEEE Trans AC: K. Ito and K. Xiong, New Gaussian filters for nonlinear filtering problems, IEEE Transactions on Automatic Control, 2000.
  • DigitalForenscis: T. Chin and K. Xiong, FAST: A Tactical Forensics Analysis Methodology for Software Defined Networking (SDN) Switches, Proceedings of the 13th IFIP WG 11.9 International Conference on Digital Forensics, 2017.
  • ACM-SAC: K. Xiong and M. Makati, Assessing End-to-End Performance and Security in Cloud Computing, Proceedings of the 32nd ACM/SIGPP SAC, 2017.
  • ICC: X. Chen and K. Xiong, A payment scheme in crowdsourcing, Proceedings of the IEEE International Conference on Communications (ICC), 2017.
  • CPS Week: T. Chin and K. Xiong, Dynamic Generation Containment Systems (DGCS): a moving target defense approach, Proceedings of the CPS Week - EITEC, 2016.
  • WASA: T. Chin and K. Xiong, A moving target defense approach for base station security in wireless sensor networks, Proceedings of the 11th WASA, 2016.
  • UbiSafe: K. Xiong, A. Pantangi and M. Makati, SECUPerf: End-to-end security and performance assessment of cloud services, Proceedings of the 8th IEEE UbiSafe, 2016.
  • ACM-SAC: K. Xiong and P. Ning, Cost-efficient, attack-resilient state estimation in power grids, Proceedings of the 30th ACM/SIGPP Symposium on Applied Computing - Computer Security Track (SAC-SEC), 2015.
  • ICDCS-CNERT: T. Chin, X. Mountrouidou, X. Li, and K. Xiong, Selective packet inspection to detect DoS flooding using Software Defined Networking (SDN), Proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS) - CNERT Workshop, 2015.
  • FUSION: T. Chin, K. Xiong, and E. Blasch, Nonlinear target tracking for threat detection using RSSI and optical fusion, Proceedings of the 18th International Conference on Information Fusion (FUSION), 2015.
  • CCGrid: S. Reddy, S. Shetty, and K. Xiong, Security risk assessment of cloud carriers, Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2013.
  • IEEE Services: K. Xiong and H. Perros, Service performance and analysis in cloud computing, Proceedings of the World Congress on Services, 2009.
  • NSS: K. Xiong, The performance of public-key based authentication protocols, Proceedings of the International Conference on Network and System Security (NSS), 2012.
  • IPDPS: K. Xiong, Power and performance management in priority-type cluster computing systems, Proceedings of the 25th IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2011.
  • IPDPS: K. Xiong, Power-aware resource provisioning in cluster computing, Proceedings of the 24th IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2010.
  • IPDPS: K. Xiong, Multiple priority customer service guarantees in cluster computing, Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2009.
  • IPDPS: K. Xiong and H. Perros, SLA-based resource allocation in cluster computing systems, Proceedings of the 22nd IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2008.