Xuan Liu

Xuan Liu
Yangzhou University · College of Information Engineering (College of Artificial Intelligence)

PhD/Supervisor, SMIEEE
Future Content Networking and Security

About

29
Publications
7,366
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
489
Citations
Introduction
Xuan Liu (S’11-M’17-SM’21) received Ph.D. degree in Computer Science and Engineering at Southeast University, China, and is a lecturer currently with College of Information Engineering at Yangzhou University, China. He is also serving as an EB Member of ComCom, TELS, IET Networks, etc. He served(s) as a TPC Member of MobiCom, INFOCOM, ICC, GlobeCom, WCNC, etc. His main research interests focus on future content networking and security (Future Internet architecture, DAN, ICN, CDN, SDN, VLC, V2R).
Additional affiliations
June 2020 - December 2020
Yangzhou University
Position
  • Lecturer
October 2019 - August 2021
Wiley
Position
  • Consultant
September 2019 - present
Taylor & Francis
Position
  • Editor

Publications

Publications (29)
Article
As the future Internet architecture, information centric networking(ICN) can also offer superior architectural support for mobile ad hoc networking. Therefore, information-centric mobile ad hoc networks (ICMANET), a new cross-cutting research area, is gradually forming. In the paper, we firstly introduce the current advances in ICN and analyze its...
Article
Full-text available
Service function chains (SFCs) built by network functions (NFs) are usually required to be low‐latency, especially in some tight latency scenarios such as Distributed Denial of Service (DDoS) defense. However, different NFs in SFCs are likely to perform identical operations of matching specific packet header fields (e.g., source IP address). Such a...
Article
Full-text available
Nowadays, smartphones are provided with an abundance of capabilities. During the last decade, the availability of smartphone users and online mobile payment services and applications have substantially grown. Besides, the Android infotainment market is exponentially growing and thus potentially becoming a primary target for cyber adversaries and at...
Article
Full-text available
Millimetre-wave ultra-dense high capacity networks are an important component of future 5G and 6G cellular systems since they are providing extremely high network capacity and speed to the end users. However, disparate types of users coexist in such scenarios, which can make the heterogeneous network unfair in terms of allocation of resources to va...
Article
Full-text available
Collaborative filtering (CF) is a prevailing technique utilized for recommendation systems and has been comprehensively explored to tackle the problem of information overload particularly in the Big Data context. The traditional CF algorithms are capable to perform adequately under various circumstances, nevertheless, there exist some shortcomings...
Article
The topology discovery service in Software-Defined Networking (SDN) provides the controller with a global view of the substrate network topology, allowing for central management of the entire network. Unfortunately, emerging topology attacks can poison the network topology and result in unforeseeable disasters. Although researchers have made great...
Article
Full-text available
Network Anomaly Detection (NAD) has become the foundation for network management and security due to the rapid development and adoption of edge computing technologies. There are two main characteristics of NAD tasks: tabular input data and imbalanced classes. Tabular input data format means NAD tasks take both sparse categorical features and dense...
Article
Full-text available
In modern decentralized cellular-vehicle-to-anything (C-V2X) infrastructures, connected autonomous smart vehicles (CASVs) exchange vehicular information with peer CASVs. To leverage responsive communication, sensors deployed in CASVs communicate through responsive edge computing (REC) infrastructures to support device-to-device (D2D) based communic...
Preprint
Full-text available
Millimetre-wave ultra-dense high capacity networks by providing an important component of future 5G cellular systems, by providing extremely high capacity to end users. Disparate types of users coexist in such scenarios, which can make the heterogeneous network unfair in terms of allocation of resources. A mechanism is required for effective spectr...
Article
Full-text available
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Article
Full-text available
Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include smart things, smart transportation, smart cities, smart healthcare, smart personal care, smart house, smart industries, and so on. Due to the sensitive applications...
Article
Full-text available
Smart cities or Smart societies require Internet of Things (IoT), for connecting numerous devices to enormous asset pools in cloud computing. This coordination of embedded tools plus cloud servers conveys the extensive applicability of IoT in Smart Cities. However, authentication and data protection, play a major job in secure coordination of these...
Chapter
Network function virtualization (NFV) brings the potential to provide the flexible implementation of network functions and reduce overall hardware cost by running service function chains (SFCs) on commercial off-the-shelf servers with many-core processors. Towards this direction, both academia and industry have spent vast amounts of effort to addre...
Article
Full-text available
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing w...
Article
Android smartphones are being utilized by a vast majority of users for everyday planning, data exchanges, correspondences, social interaction, business execution, bank transactions, and almost in each walk of everyday lives. With the expansion of human reliance on smartphone technology, cyberattacks against these devices have surged exponentially....
Research Proposal
Full-text available
This special issue targets a timely coverage of the latest research advances on cutting-edge communication and networking techniques which have played an increasingly instrumental role in smart cities. Specifically, we aim to investigate and address the following two major research problems: 1) How 5G-and-beyond communication and networking technol...
Research Proposal
Full-text available
Sensing applications and IoT are indispensable for the construction of smart cities and provision of improved public services. Sensors act as the nerves of a smart city, enabling the collection of information that provides for intelligent decisions to be made, both in terms of future planning and immediate actuation. Internet of Things technologies...
Article
Full-text available
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled connected vehicles to work together to accomplish complex jobs that they are unable to perform individually. Connectivity not only being an inevitable blessing but also poses growing cybersecurity challenges for connected vehicles. The overall risk of connected v...
Article
Automatically summarizing a group of short texts that mainly share one topic is a fundamental task in many applications, e.g., summarizing the main symptoms for a disease based on a group of medical texts that are usually short. Conventional unsupervised short text summarization techniques tend to find the most representative short text document. H...
Article
Full-text available
To eliminate the phenomenon of the digital divide in the area lacking Internet infrastructure support and accomplish the vision of “The Internet is for everyone” envisaged by Vint Cerf, our group pioneered a dual-structural edge networking paradigm, being utilized to construct a DSN (dual-structural network) for multimedia content delivery. The aim...
Conference Paper
Dual-Structural Network (DSN), pioneered by our group for content sharing, is a networking paradigm with the Internet as primary structure and the broadcast-storage network (BSN) as secondary structure. In order to quantitatively evaluate its content sharing capability, in this paper, we generally adopt a deductive methodology, namely that DSN is f...
Article
Content sharing plays the essential role to achieve the vision of "The Internet is for Everyone". To this end, Prof. Li Youping, academician of the Chinese Academy of Engineering, pioneered the concept of DAN (Dual-Architecture Network), which is composed of primary architecture (refers to Internet) and secondary architecture(refers to broadcast-st...
Conference Paper
In order to deliver Internet content to people of the world for achieving the vision of “The Internet is for everyone”, our group pioneered a collaborative dual-architecture network (DAN). For quantitative analysis of DAN’s content delivery capability, in this paper we firstly propose a unified comparative model, in which network performance and us...
Article
The distinctive features make content-centric networking (CCN) as a potential networking scheme for mobile ad hoc networks (MANETs), such as asynchronous communication paradigm, in-network caching and multi-path forwarding, and thus, content-centric mobile ad hoc network (CCM) is becoming a hot issue in the area of CCN. Firstly, a content routing m...

Network

Cited By