Kaiping Xue

Kaiping Xue
  • University of Science and Technology of China

About

250
Publications
18,572
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,404
Citations
Current institution
University of Science and Technology of China

Publications

Publications (250)
Article
A Link Flooding Attack (LFA) is a type of link-aimed Distributed Denial of Service (DDoS) attack that can overwhelm the Internet critical links to cut off connections with lots of low-rate, seemingly benign traffic. To defend against such threats, a promising solution involves mitigating the attack through load balancing. However, adaptive attacks...
Article
As a promising quantum application, Quantum Key Distribution (QKD) technology has been rapidly developed from point-to-point communication to a large-scale commercial network. However, considering the cost of QKD components and network infrastructure, building a QKD network is challenged by its expensive capital expenditure, which significantly hin...
Article
The high mobility in Vehicular Ad-hoc Networks (VANETs) significantly affects the reliability of data transmission. To solve this problem, Named Data Networking (NDN)-based VANETs are proposed, utilizing in-network caching and named-based forwarding to overcome the dual challenges of mobility and connectivity. Although in-network caching enhances c...
Article
Mobile users often prefer to sense only a subset of tasks based on their preferences or physical conditions, which distinguishes sparse crowdsensing from traditional crowdsensing. Sparse crowdsensing not only introduces a potential risk of privacy leakage regarding users' preferences or conditions—due to the revelation of specific sensed objects—bu...
Article
IPSec is a widely used network security protocol that plays a crucial role in providing secure transmission channels in the current Internet. However, the advent of quantum computing poses unprecedented challenges to the security of traditional cryptographic methods, including those used in IPSec. Fortunately, quantum key distribution (QKD) offers...
Article
Named Data Networking (NDN) has emerged as a promising network paradigm for the future Internet. It revolutionizes content retrieval by decoupling it from specific locations, thereby overcoming the limitations of traditional IP addressing and significantly enhancing data delivery efficiency. Additionally, NDN’s stateful forwarding plane for routers...
Article
Real-time video streaming requires high throughput and low delivery time for enhanced user’s Quality of Experience (QoE). This motivates the use of multi-path transmission to improve performance. However, ensuring target performance within specified deadlines and priorities for video frames is particularly crucial for real-time communication and vi...
Article
Nowadays, Remote Direct Memory Access (RDMA) is gaining popularity in data centers for low CPU overhead, high throughput, and ultra-low latency. As one of the state-ofthe-art RDMA Congestion Control (CC) mechanisms, HPCC leverages the In-band Network Telemetry (INT) features to achieve accurate control and significantly shortens the Flow Completion...
Article
Named Data Networking (NDN), with a receiver-driven connectionless communication paradigm, naturally supports content delivery from multiple sources via multiple paths. In a dynamic environment, sources and paths may change unexpectedly and are uncontrollable for consumer, which requires flexible rate control and real-time multi-path management, st...
Article
Named Data Networking (NDN) stands out as a promising Information Centric Networking architecture capable of facilitating large-scale content distribution through in-network caching and location-independent data access. However, attackers can easily inject poisoned content into the network, called content poisoning attacks, which leads to a substan...
Article
Priority plays a crucial role in distinguishing the diverse demands of applications and improving the performance of underlying networks. However, application-provided priority is insufficient to cope with wide variations in traffic characteristics and dynamic network conditions. When assigning priorities to flows, existing proposals are limited to...
Article
Full-text available
Quantum networks can establish End-to-End (E2E) entanglement connections between two arbitrary nodes with desired entanglement fidelity by performing entanglement purification to support quantum applications reliably. The existing works mainly focus on link-level purification scheduling and lack consideration of purifications at network-level, whic...
Article
Quantum Key Distribution (QKD) offers a novel approach to address the challenges posed by quantum computations in classical ciphers. Due to hardware limitations and the stochastic nature of QKD protocols, the secure key generation rate is currently constrained and subject to fluctuations. However, users expect a consistent supply of keys at a stabl...
Article
With the development of datacenter networks (DCNs) towards high bandwidth and low latency, the demands of high-level datacenter applications are heading towards high performance and high reliability, which makes traffic congestion one of the most notable problems in DCNs and brings new challenges to transport protocols. Proactive transport protocol...
Article
Remote entanglement distribution in an efficient and reliable manner, especially in the context of a large-scale quantum network with multiple requests, remains an unsolved challenge. The key difficulties lie in achieving spontaneous and precise control over the entanglement distribution procedure, as multiple nodes need to reach a consensus on how...
Chapter
Radio tomographic imaging (RTI) is one of the most favorable device-free localization methods with many advantages. However, since its model is approximate and ill-posed, it has low multi-target localization accuracy in indoor environments. To overcome the problem, we propose an IGWL scheme, the intersection graph of wireless links based multi-targ...
Article
Sharding significantly enhances blockchain scalability by dividing the entire network into smaller shards that reach consensus and process transactions in parallel. Nevertheless, two new issues emerge with the adoption of sharding. One issue involves the shrinking size of consensus groups, which leads to vulnerability in consensus. Most existing wo...
Article
The surge in blockchain-based cryptocurrencies has created a pressing need for Cross-Chain Transaction (CCTx) solutions. Existing solutions either lack sufficient security, like centralized exchanges, or suffer from poor efficiency and scalability, such as atomic swaps. Inspired by the success of the Lightning Network in accelerating Bitcoin transa...
Article
With the ever-growing attention on communication security, machine learning-based network intrusion detection system (NIDS) is widely utilized to meet different security requirements. However, most of the existing methods manually extract or learn features from raw traffic, which is usually expensive, complicated, and time-consuming. Moreover, this...
Article
The lack of privacy-preserving capabilities hinders the further development of blockchains and smart contracts. While numerous privacy solutions have been proposed, limitations persist. Firstly, most existing solutions focus on specific privacy protections such as anonymous payments, private data, or multi-party computation tasks. However, these so...
Article
Set-valued data are commonly used to represent subsets of a universal set and are frequently utilized in online services, such as online shopping preferences, website browsing records, and recently visited places. By collecting set-valued data from users, service providers can perform statistical analysis to obtain a joint distribution of service u...
Article
The partial ordered data is typically used to describe the order of some elements within a set, and it widely exists in various fields, such as clinical investigations, preference ranking and voting. However, the collection of partial ordered data poses critical privacy concerns about abusing records to infer individuals’ identities and preferences...
Article
Searchable symmetric encryption (SSE) is a technique that enables secure outsourcing of data to an untrusted cloud server without sacrificing search functionality. Recently, multi-user SSE schemes for data sharing, which support access control from various users, have gained attention. However, the access control mechanisms in existing schemes are...
Article
Link-flooding attacks (LFAs) pose a significant challenge to Internet availability by attacking critical network links with high volumes of seemingly legitimate traffic. In response, researchers have developed network topology obfuscation (NTO) to safeguard critical links. However, state-of-the-art NTO defenses are coarse-grained, leading to less e...
Article
Quantum networks, which work by establishing entanglement between distant quantum end nodes (known as end-to-end entanglement distribution), are the promising infrastructure for quantum applications. However, the inherent loss in quantum channels and quantum decoherence contribute to the scarcity of entanglement resources in quantum networks. Conse...
Article
The entanglement transport protocol with a connection-oriented mode ensures the reliable distribution of remote entanglement by reserving dedicated resources on the selected path for users in a quantum network. In most existing protocols, entanglement generation and resource allocation operate with the support of global network-synchronized time sl...
Article
Quantum communication networks enable advanced quantum applications through remote entanglement distribution among source-destination pairs. Despite efforts to optimize entanglement distribution, fairness in multi-request scenarios has been neglected, potentially causing issues like “request starvation”. To address such issue, this paper concentrat...
Article
Electronic voting plays a crucial role in facilitating democratic and convenient decision-making in people's lives. However, implementing an electronic voting system poses challenges, such as meeting the stringent security requirements for anonymity, fairness, and verifiability. Another concern is the performance degradation when dealing with a lar...
Article
As a promising application of quantum information technology, Quantum Key Distribution (QKD) can provide information-theoretically secure key exchange for adjacent communication parties. To achieve long-distance secure communication and scale expansion against inherent channel loss, trusted relays, which are assumed to be absolutely secure, are int...
Article
The quantum network is designed to connect numerous quantum nodes and support various ground-breaking quantum applications. Most of these applications require communicating parties to share entangled pairs. Therefore, entanglement routing, a technology distributing entangled pairs between distant quantum nodes, plays a vital role in realizing quant...
Article
Data Center Networks (DCNs) suffer from synchronized bursts for segmentation and aggregation modes, leading to buffer overflows at switches and increasing network delay. To overcome this problem, some congestion control algorithms like DCTCP use Explicit Congestion Notification (ECN) to notify in-network congestion and reduce switch buffer occupanc...
Article
Multipath TCP is designed to utilize multiple network paths to achieve improved throughput and robustness against network failure. These features are supposed to make MPTCP preferable to single-path TCP in mobile networks. However, it fails to achieve the expected performance in practice. A key challenge of using MPTCP in mobile networks is how to...
Article
Multipath TCP (MPTCP) improves the bandwidth utilization in wireless network scenarios, since it can simultaneously utilize multiple interfaces for data transmission. However, with the fast growth of mobile devices and applications, link interruptions caused by handoffs still lead to drastic performance degradation in such scenarios. Typically, a s...
Article
Along with the rapid development of quantum information technologies, quantum networks that transmit quantum states have gradually shifted from laboratory to reality. However, the high cost of building a quantum network testbed seriously hinders the research progress of quantum networks, and the existing simulators have been developed with less exp...
Article
Existing congestion control algorithms for MPTCP that care about only long flow transmission aim at the Congestion-Avoidance (CA) phase and they need a long time to reach convergence states. We verified that the exponential growth of congestion window (cwnd) in the uncoupled Slow-Start (SS) leads to not only unfairness to TCP but also buffer overfl...
Preprint
Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum...
Article
To provide customized and high-quality network services under limited network resources, the 5G introduces the network slicing technology that divides physical networks into several logically independent virtual networks, improving the performance of network utilization. The slice management should satisfy the chief concerns of network operators an...
Preprint
Full-text available
Quantum networks can establish End-to-End (E2E) entanglement connections between two arbitrary nodes for various quantum applications through entanglement swapping. To support quantum applications reliably, quantum networks should establish E2E entanglement connections with desired entanglement fidelity by performing entanglement purification. The...
Article
The quantum network that allows users to communicate in a quantum way will be available in the foreseeable future. The network capable of distributing Bell state entangled pairs faces many challenges due to entanglement decoherence and limited network performance, especially when the network scale is enormous. Many entanglement distribution protoco...
Article
Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum...
Article
Entanglement distribution between distant quantum nodes plays an essential role in realizing quantum networks’ capabilities. In addition to path selection, remote entanglement distribution involves two pivotal quantum operations, i.e., entanglement generation and entanglement swapping. The existing studies mainly adopt two methods, i.e., Tell-and-G...
Article
Entanglement-based quantum networks provide unconditionally secure quantum communication by distributing end-to-end entangled pairs. To reach such goal, entanglement swapping and purification are two necessary operations, which can expand the entanglement distance and improve the fidelity of entangled pairs, respectively. During the end-to-end enta...
Article
Enabling in-network caching in a traditional IP network by progressively adding cache-enabled nodes into the network can provide a variety of advantages, such as efficient content distribution and improved network resource utilization. However, to maximize the performance, two crucial issues have to be addressed: 1) due to a limited budget, only se...
Article
Federated Learning (FL) enables multiple distributed clients to collaboratively train a model with owned datasets. To avoid the potential privacy threat in FL, researchers propose the DP-FL strategy, which utilizes differential privacy (DP) to add elaborate noise to the exchanged parameters to hide privacy information. DP-FL guarantees the privacy...
Article
Remote entanglement distribution plays a crucial role in quantum networks, which can support many essential and exciting quantum applications. As the network scale expands, it is urgent to design a general and efficient remote entanglement distribution protocol. Nowadays, connection-oriented remote entanglement distribution protocols are available...
Article
The utilization of Multi-path TCP (MPTCP) has been demonstrated to provide superior transport-layer support for data center networks (DCNs) due to its exceptional resource utilization and load-balancing capabilities. However, the substantial path diversity can make it challenging to utilize network resources to their full potential in DCNs. This pa...
Article
With the ever-growing interest in modeling complex graph structures, graph neural networks (GNN) provide a generalized form of exploiting non-Euclidean space data. However, the global graph may be distributed across multiple data centers, which makes conventional graph-based models incapable of modeling a complete graph structure. This also brings...
Article
Searchable Symmetric Encryption (SSE) is a valuable cryptographic tool that allows a client to retrieve its outsourced data from an untrusted server via keyword search. Initially, SSE research primarily focused on the efficiency-security trade-off. However, in recent years, attention has shifted towards range queries instead of exact keyword search...
Article
As a promising implementation of Information-Centric Networking (ICN), Named Data Networking (NDN) has potential advantages over the TCP/IP network in content distribution, mobility support, etc. However, the research on NDN is still in its infancy, and congestion control, NDN’s most important functional element, poses many challenges, such as cong...
Article
Quantum network is a promising platform for numerous quantum applications, including distributed quantum computing, secure communication, and improved sensing. Implementing entanglement distribution between remote quantum nodes plays a vital role in realizing the quantum network's capabilities, and it requires effective remote entanglement distribu...
Article
Remote entanglement distribution plays a crucial role in large-scale quantum networks, and the key enabler for entanglement distribution is quantum routers (or repeaters) that can extend the entanglement transmission distance. However, the performance of quantum routers is far from perfect yet. Amongst the causes, the limited quantum memories in qu...
Article
Entanglement routing establishes remote entanglement connection between two arbitrary nodes, which is one of the most important functions in quantum networks. The existing routing mechanisms mainly improve the robustness and throughput facing the failure of entanglement generations, which, however, rarely include the considerations on the most impo...
Article
Entanglement-based quantum networks can provide unconditionally secure communication by distributing entangled pairs between distant end nodes. To achieve end-to-end entanglement distribution, multiple operations of entanglement swapping in a quantum repeater chain are always required. However, due to the non-determinism of entanglement swapping ca...
Article
As one of the promising next generation network architectures, information centric networking (ICN) is highly anticipated to improve the bandwidth usage of the Internet and reduce duplicate traffic. Since contents in ICN are disseminated in the whole network, ICN is much more vulnerable and the issue of how to deliver contents securely has been int...
Article
Full-text available
Quantum key distribution (QKD), a cryptographic technology developed to generate random secure keys, can realize unconditional secure remote classical communication in theory. However, QKD technology is currently confronted with two core problems: the extension of key distribution distance and the implementation of concurrent key agreements between...
Article
Secure and real-time communication is an essential condition in mobile vehicular networks, and this requires secure authentication and seamless access enabled by roaming services. As a security inspector, roaming authentication ensures that legitimate users can access the network securely. However, today's roaming authentication protocols authentic...
Article
Energy harvesting (EH) endows device-to-device (D2D) communication and cellular equipment with the ability of continuous communication to provide internet-of-things (IoT) services in natural areas. While the available energy, which relies on EH, becomes an extra nonnegligible factor in resource allocation. Besides, we integrate uplink non-orthogona...
Article
By integrating traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the smart grid collect the users' power usage data on a regular basis and upload it to the control center to complete the smart grid data acq...
Article
It is often observed that people's data are scattered across various organizations and these data can be used to generate usable insights when integrated. However, data fusion from multiple data hosting sites could put user privacy at risk albeit with some security mechanisms. This paper studies a data-analytic platform that adopts the Kulldorff sc...
Article
Full-text available
Quantum networks create a completely new way for communication, and the most important function of a quantum network is to generate long-distance quantum entanglement to serve a number of quantum applications. As the scale of the network expands, in order to establish end-to-end entanglement between two remote nodes, entangled pairs need to be gene...
Article
The upgrade of network devices to be equipped with multiple network interfaces makes it possible to improve network throughput performance through multipath transmission protocols, especially multipath TCP (MPTCP). However, so far the mostly used MPTCP protocols have a common limitation, namely the rigid and conservative method. They have been desi...
Article
A QUIC (Quick UDP Internet Connections) protocol is designed to improve Hypertext Transfer Protocol (HTTP) traffic and carries a non-negligible portion of the traffic in the current Internet. As its extension, Multipath QUIC (MPQUIC) provides higher bandwidth and smoother network handover by using multiple network interfaces simultaneously. However...
Article
In mobile communication networks, when a user roams to and accesses a foreign network, the foreign operator needs to request the user's subscription data from a centralized authentication server managed by the user's home operator so as to provide corresponding network services to the user. However, centralized authentication introduces a single po...
Article
Service prioritization brings reasonable allocation of network resources and improves the overall quality of experience (QoE) of users, but it has not been thoroughly investigated in information centric networking (ICN). Existing works lack adaptability and they cannot ensure specific content provider (CP) get well caching service which is one of t...
Preprint
As one of the most important function in quantum networks, entanglement routing, i.e., how to efficiently establish remote entanglement connection between two arbitrary quantum nodes, becomes a critical problem that is worth to be studied. However, the entanglement fidelity, which can be regarded as the most important metric to evaluate the quality...
Article
Multipath TCP (MPTCP) proxy is a way to provide multipath transmissions for current Internet hosts. However, previous works on MPTCP mainly focus on the scenario where one end of the connection is MPTCP-capable, which is not the case in current networks. In this article, we propose a transparent MPTCP (T-MPTCP) transmission scheme to achieve MPTCP...
Article
The theory and experiment of quantum information have been studied extensively in recent years, and the feasibility of quantum communication has been proved. Although the fundamental technology is not yet mature, research on quantum internet should be conducted. To implement quantum internet, an architecture that describes how quantum nodes are lin...
Article
Recent advance of Intelligent Reflecting Surface (IRS) introduces a new dimension for secure communications by reconfiguring the transmission environments. In this paper, we devise a secure transmission scheme for multi-user MISO systems by leveraging multiple collaborative IRSs. Specifically, to guarantee the worst-case achievable secrecy rate amo...
Article
Power generation systems tend to be distributed and decentralized, and therefore the concept of microgrid has been proposed, which needs to implement decentralized data storage and power dispatching. The traditional power system architecture is no longer suitable in the decentralized microgrid system because there are no trusted third parties such...
Article
With the merit of bypassing the base station (BS) to directly communicate between user equipment (UE), D2D content sharing between socially connected users has revealed promising potential in future networks. However, D2D receivers (DRs) in different D2D pairs (DPs) may also have demand for additional content sharing services from the D2D transmitt...
Article
To reduce the duplicated traffic and improve the performance of distributing massive volumes of multimedia contents, in-network caching has been proposed recently. However, as in-network content caching can be directly utilized to respond users’ requests, multimedia content retrieval is beyond content providers’ control and makes it hard for them t...
Article
Inspired by Bitcoin, many different kinds of cryptocurrencies based on blockchain technology have turned up on the market. Due to the special structure of the blockchain, it has been deemed impossible to directly trade between traditional currencies and cryptocurrencies or between different types of cryptocurrencies. Generally, trading between diff...
Article
Full-text available
Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an indistinguishable signature cannot be efficiently simulated. To adapt quantum signatures in specific environments like E-voting and E-bidding, several quantum designated verifier signature (QDVS) s...
Article
Multipath TCP (MPTCP) utilizes multiple paths for simultaneous data transmission to enhance performance. However, existing MPTCP protocols are still far from satisfactory in wireless networks because of their loss-based congestion control and the difficulty of managing multiple subflows. To overcome these problems, we redesign the coupled congestio...

Network

Cited By