Xuhang Ying

ORCID: 0000-0001-6318-5864
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Wireless Networks and Protocols
  • Indoor and Outdoor Localization Technologies
  • Security and Verification in Computing
  • Mobile Crowdsensing and Crowdsourcing
  • Cognitive Functions and Memory
  • Advanced Wireless Network Optimization
  • Millimeter-Wave Propagation and Modeling
  • Network Time Synchronization Technologies
  • Advanced MIMO Systems Optimization
  • User Authentication and Security Systems
  • Autonomous Vehicle Technology and Safety
  • Air Traffic Management and Optimization
  • Mobile Ad Hoc Networks
  • Speech and Audio Processing
  • Adversarial Robustness in Machine Learning
  • Cooperative Communication and Network Coding
  • Forensic Toxicology and Drug Analysis
  • Numerical methods in inverse problems
  • Software-Defined Networks and 5G
  • Advanced Multi-Objective Optimization Algorithms
  • Anomaly Detection Techniques and Applications
  • Distributed Sensor Networks and Detection Algorithms
  • Auction Theory and Applications
  • Smart Grid Security and Resilience

Yanshan University
2024

University of Washington
2015-2021

Chinese University of Hong Kong
2013

Clemson University
1996

Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under assumption separating communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries able infiltrate network. Motivated these attacks, intrusion detection systems (IDSs) have...

10.1109/iccps.2018.00012 article EN 2018-04-01

It is a promising vision to utilize white spaces, i.e., vacant VHF and UHF TV channels, satisfy skyrocketing wireless data demand in both outdoor indoor scenarios. While most prior works have focused on exploring the story largely open for investigation. Motivated by this observation that 70% of spectrum comes from environments, we carry out comprehensive study spaces. We first present large-scale measurement occupancy 30+ diverse locations typical metropolis Hong Kong. Our results confirm...

10.1145/2500423.2500439 article EN 2013-01-01

This paper presents a new masquerade attack called the cloaking and provides formal analyses for clock skew-based intrusion detection systems (IDSs) that detect attacks in controller area network (CAN) automobiles. In attack, adversary manipulates message inter-transmission times of spoofed messages by adding delays so as to emulate desired skew avoid detection. order predict characterize impact terms success probability on given CAN bus IDS, we develop models two IDSs, i.e.,...

10.1109/tifs.2019.2895957 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2019-01-29

The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management also improves safety billions current future passengers. While benefits ADS-B are well known, lack basic security measures like encryption authentication introduces various exploitable vulnerabilities. One practical threat...

10.1109/cns.2019.8802732 article EN 2019-06-01

Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude operations using insecure Controller Area Network (CAN) bus in Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and safety passengers is at risk. In this paper, we present TACAN (Transmitter Authentication CAN), which provides secure authentication ECUs by...

10.1145/3302509.3313783 article EN 2019-04-04

The paradigm of shared spectrum allows secondary devices to opportunistically access bands underutilized by primary owners. Recently, the FCC has targeted sharing 3.5 GHz (3550-3700 MHz) federal with commercial systems such as small cells. rules require a system (SAS) accommodate three service tiers: 1) incumbent access; 2) priority (PA); and 3) generalized authorized (GAA). In this paper, we study SAS-assisted dynamic channel assignment (CA) for PA GAA tiers. We introduce node-channel-pair...

10.1109/twc.2018.2858261 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2018-07-31

White Space Networking crucially relies on the active monitoring of spectrum usage (to identify white space opportunities) in both and time. One way to achieve this is wide-area deployment sensors gather spatio-temporal data, use them construct better Radio Environment Maps (REMs) via suitable statistical interpolation techniques (i.e., Kriging). Cost such large-scale sensor can be reduced crowdsourcing, i.e., outsourcing sensing task mobile users equipped with sensorized high-end client...

10.1109/dyspan.2015.7343932 article EN 2015-09-01

Per FCC rules, secondary users in TV White Spaces must operate only within spectrum subject to a no-harmful-interference condition existing primary receivers. In effect, this translates into protection region around every transmitter, wherein nodes not transmit (on the same channel). This is implemented by requiring consult database prior any channel access so as obtain local prohibited channels/spatial zones (or equivalently free channels or Spaces). Construction of such regions for...

10.1109/comsnets.2015.7098692 article EN 2015-01-01

Networking on white spaces (i.e., locally unused spectrum) relies active monitoring of spectrum usage. Spectrum databases based empirical radio propagation models are widely adopted but shown to be error-prone, since they do not account for built environments (e.g., trees and man-made buildings). As an alternative, crowd-sensed mapping by mobile clients who acquire local data transmit it a central aggregator (platform) processing, results in more accurate maps. Success such crowd-sensing...

10.1109/tccn.2017.2701812 article EN publisher-specific-oa IEEE Transactions on Cognitive Communications and Networking 2017-05-05

The paradigm of shared spectrum allows secondary devices to opportunistically access bands underutilized by primary owners. As the first step, FCC targeted sharing 3.5 GHz (3550-3700 MHz) federal with commercial systems. proposed rules require a Spectrum Access System implement three-tiered management framework, and one its key functions is dynamic channel allocation (CA) for devices. In this paper, we introduce coexistence-aware radio-channel-pair conflict graphs capture pairwise...

10.1109/dyspan.2017.7920771 article EN 2017-03-01

It is a promising vision to exploit white spaces , that is, vacant VHF and UHF TV channels, meet the rapidly growing demand for wireless data services in both outdoor indoor scenarios. While most prior works have focused on space, story largely open investigation. Motivated by this observation discovering 70% of spectrum comes from environment, we carry out comprehensive study explore spaces. We first conduct large-scale measurement compare occupancy at 30+ diverse locations typical...

10.1145/3059149 article EN ACM Transactions on Intelligent Systems and Technology 2017-08-21

In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to widespread use legacy in-vehicle communication systems. As a representative bus system, Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial for vehicles functioning. this scenario, malicious actors can exploit CAN vulnerabilities, such as lack built-in authentication and encryption schemes, launch attacks (e.g., suspension, injection, masquerade attacks)...

10.1109/tdsc.2021.3068213 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2021-03-23

White Space (WS) Networking crucially relies on the active monitoring of spatio-temporal spectrum usage (to identify WS opportunities). To achieve this, one way is to gather data via wide-area sensor deployment and construct better Radio Environment Maps (REMs) with spatial models such as Kriging Gaussian Process (GP). An economically viable alternative incentivized crowdsourcing, i.e., outsourcing sensing tasks mobile users who have sensorized high-end client devices like tablets or...

10.1109/glocom.2016.7842167 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

Coexistence of Wi-Fi and LTE Unlicensed (LTE-U) in shared or unlicensed bands has drawn growing attention from both academia industry. An important consideration is fairness between duty cycled LTE-U, which often defined terms channel access time, as adopted by the LTE-U Forum. Despite many studies on cycle adaptation design for fair sharing, one crucial fact been neglected: systems unilaterally control cycles; hence, selfinterested users, they have incentives to misbehave, e.g.,...

10.1109/pimrc.2017.8292197 article EN 2017-10-01

The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management also improves safety billions current future passengers. While benefits ADS-B are well known, lack basic security measures like encryption authentication introduces various exploitable vulnerabilities. One practical threat...

10.48550/arxiv.1904.09969 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude operations using insecure Controller Area Network (CAN) bus in Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and safety passengers is at risk. In this paper, we present TACAN (Transmitter Authentication CAN), which provides secure authentication ECUs by...

10.48550/arxiv.1903.05231 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Traditional LiDAR and air-medium-based single-photon struggle to perform effectively in high-scattering environments. The laser beams are subject severe medium absorption multiple scattering phenomena such conditions, greatly limiting the maximum operational range imaging quality of system. high sensitivity temporal resolution enable high-resolution depth information acquisition under limited illumination power, making it highly suitable for operation environments with extremely poor...

10.3390/jmse12122223 article EN cc-by Journal of Marine Science and Engineering 2024-12-04

Coexistence of Wi-Fi and LTE Unlicensed (LTE-U) in shared or unlicensed bands has drawn growing attention from both academia industry. An important consideration is fairness between duty cycled LTE-U, which often defined terms channel access time, as adopted by the LTE-U Forum. Despite many studies on cycle adaptation design for fair sharing, one crucial fact been neglected: systems unilaterally control cycles; hence, self- interested users, they have incentives to misbehave, e.g.,...

10.48550/arxiv.1710.01705 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols designed under the assumption separating communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able infiltrate network. Motivated these attacks, intrusion detection systems (IDSs) have...

10.48550/arxiv.1710.02692 preprint EN other-oa arXiv (Cornell University) 2017-01-01
Coming Soon ...