Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yan Chen 0004
@article{DBLP:journals/tmc/YingZLXWCFLWWC24, author = {Jie Ying and Tiantian Zhu and Qiang Liu and Chunlin Xiong and Zhengqiu Weng and Tieming Chen and Lei Fu and Mingqi Lv and Han Wu and Ting Wang and Yan Chen}, title = {TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {23}, number = {4}, pages = {2832--2848}, year = {2024}, url = {https://doi.org/10.1109/TMC.2023.3265071}, doi = {10.1109/TMC.2023.3265071}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/YingZLXWCFLWWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZengKLJC23, author = {Qingyang Zeng and Mohammad Kavousi and Yinhong Luo and Ling Jin and Yan Chen}, title = {Full-stack vulnerability analysis of the cloud-native platform}, journal = {Comput. Secur.}, volume = {129}, pages = {103173}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103173}, doi = {10.1016/J.COSE.2023.103173}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZengKLJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinCCZC23, author = {Ling Jin and Yinzhi Cao and Yan Chen and Di Zhang and Simone Campanoni}, title = {ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {650--664}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3141396}, doi = {10.1109/TDSC.2022.3141396}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/JinCCZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuYXCYYCZLCWF23, author = {Tiantian Zhu and Jinkai Yu and Chunlin Xiong and Wenrui Cheng and Qixuan Yuan and Jie Ying and Tieming Chen and Jiabo Zhang and Mingqi Lv and Yan Chen and Ting Wang and Yuan Fan}, title = {{APTSHIELD:} {A} Stable, Efficient and Real-Time {APT} Detection System for Linux Hosts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {5247--5264}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3243667}, doi = {10.1109/TDSC.2023.3243667}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuYXCYYCZLCWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/DuPCHFCX23, author = {Xuechao Du and Xiang Pan and Yinzhi Cao and Boyuan He and Gan Fang and Yan Chen and Daigang Xu}, title = {FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {11}, pages = {6460--6476}, year = {2023}, url = {https://doi.org/10.1109/TMC.2022.3197638}, doi = {10.1109/TMC.2022.3197638}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/DuPCHFCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YuZCCM23, author = {Se{-}Young Yu and Qingyang Zeng and Jim Chen and Yan Chen and Joe Mambretti}, title = {{AIDTN:} Towards a Real-Time {AI} Optimized {DTN} System With NVMeoF}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {34}, number = {6}, pages = {1731--1742}, year = {2023}, url = {https://doi.org/10.1109/TPDS.2023.3260806}, doi = {10.1109/TPDS.2023.3260806}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YuZCCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/XiongLCZWYR22, author = {Chunlin Xiong and Zhenyuan Li and Yan Chen and Tiantian Zhu and Jian Wang and Hai Yang and Wei Ruan}, title = {Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {23}, number = {3}, pages = {361--381}, year = {2022}, url = {https://doi.org/10.1631/FITEE.2000436}, doi = {10.1631/FITEE.2000436}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/XiongLCZWYR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiongZDRYCCCC22, author = {Chunlin Xiong and Tiantian Zhu and Weihao Dong and Linqi Ruan and Runqing Yang and Yueqiang Cheng and Yan Chen and Shuai Cheng and Xutong Chen}, title = {Conan: {A} Practical Real-Time {APT} Detection System With High Accuracy and Efficiency}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {551--565}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2971484}, doi = {10.1109/TDSC.2020.2971484}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XiongZDRYCCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangCXCXRKLXC22, author = {Runqing Yang and Xutong Chen and Haitao Xu and Yueqiang Cheng and Chunlin Xiong and Linqi Ruan and Mohammad Kavousi and Zhenyuan Li and Liheng Xu and Yan Chen}, title = {RATScope: Recording and Reconstructing Missing {RAT} Semantic Behaviors for Forensic Analysis on Windows}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1621--1638}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3032570}, doi = {10.1109/TDSC.2020.3032570}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangCXCXRKLXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhuWSCLCLC22, author = {Tiantian Zhu and Zhengqiu Weng and Qijie Song and Yuan Chen and Qiang Liu and Yan Chen and Mingqi Lv and Tieming Chen}, title = {EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {2}, pages = {555--572}, year = {2022}, url = {https://doi.org/10.1109/TMC.2020.3012491}, doi = {10.1109/TMC.2020.3012491}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ZhuWSCLCLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/HouLCY22, author = {Kaiyu Hou and Sen Lin and Yan Chen and Vinod Yegneswaran}, editor = {Ada Gavrilovska and Deniz Altinb{\"{u}}ken and Carsten Binnig}, title = {QFaaS: accelerating and securing serverless cloud networks with {QUIC}}, booktitle = {Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, San Francisco, California, November 7-11, 2022}, pages = {240--256}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3542929.3563458}, doi = {10.1145/3542929.3563458}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud/HouLCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCYCR21, author = {Zhenyuan Li and Qi Alfred Chen and Runqing Yang and Yan Chen and Wei Ruan}, title = {Threat detection and investigation with system-level provenance graphs: {A} survey}, journal = {Comput. Secur.}, volume = {106}, pages = {102282}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102282}, doi = {10.1016/J.COSE.2021.102282}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCYCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuFLLCC21, author = {Tiantian Zhu and Lei Fu and Qiang Liu and Zi Lin and Yan Chen and Tieming Chen}, title = {One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {553--568}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3016819}, doi = {10.1109/TIFS.2020.3016819}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuFLLCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuWRXYLCLC21, author = {Tiantian Zhu and Jiayu Wang and Linqi Ruan and Chunlin Xiong and Jinkai Yu and Yaosheng Li and Yan Chen and Mingqi Lv and Tieming Chen}, title = {General, Efficient, and Real-Time Data Compaction Strategy for {APT} Forensic Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3312--3325}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3076288}, doi = {10.1109/TIFS.2021.3076288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuWRXYLCLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JinHWXCG21, author = {Ling Jin and Boyuan He and Guangyao Weng and Haitao Xu and Yan Chen and Guanyu Guo}, title = {MAdLens: Investigating Into Android In-App Ad Practice at {API} Granularity}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {3}, pages = {1138--1155}, year = {2021}, url = {https://doi.org/10.1109/TMC.2019.2953609}, doi = {10.1109/TMC.2019.2953609}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JinHWXCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/HouLCY21, author = {Kaiyu Hou and Sen Lin and Yan Chen and Vinod Yegneswaran}, editor = {Georg Carle and J{\"{o}}rg Ott}, title = {Accelerate and secure serverless networks with {QUIC}}, booktitle = {CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7 - 10, 2021}, pages = {477--478}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485983.3493350}, doi = {10.1145/3485983.3493350}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/HouLCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/HouLYCZ21, author = {Kaiyu Hou and You Li and Yinbo Yu and Yan Chen and Hai Zhou}, editor = {Suman Banerjee and Luca Mottola and Xia Zhou}, title = {Discovering emergency call pitfalls for cellular networks with formal methods}, booktitle = {MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June - 2 July, 2021}, pages = {296--309}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3458864.3466625}, doi = {10.1145/3458864.3466625}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/HouLYCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenI0GY21, author = {Xutong Chen and Hassaan Irshad and Yan Chen and Ashish Gehani and Vinod Yegneswaran}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3989--4006}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09008, author = {Tiantian Zhu and Jinkai Yu and Tieming Chen and Jiayu Wang and Jie Ying and Ye Tian and Mingqi Lv and Yan Chen and Yuan Fan and Ting Wang}, title = {{APTSHIELD:} {A} Stable, Efficient and Real-time {APT} Detection System for Linux Hosts}, journal = {CoRR}, volume = {abs/2112.09008}, year = {2021}, url = {https://arxiv.org/abs/2112.09008}, eprinttype = {arXiv}, eprint = {2112.09008}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/WuHLLYWC20, author = {Xiaochun Wu and Kaiyu Hou and Xue Leng and Xing Li and Yinbo Yu and Bo Wu and Yan Chen}, title = {State of the Art and Research Challenges in the Security Technologies of Network Function Virtualization}, journal = {{IEEE} Internet Comput.}, volume = {24}, number = {1}, pages = {25--35}, year = {2020}, url = {https://doi.org/10.1109/MIC.2019.2956712}, doi = {10.1109/MIC.2019.2956712}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/WuHLLYWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhuQXZSCPY20, author = {Tiantian Zhu and Zhengyang Qu and Haitao Xu and Jingsi Zhang and Zhengyue Shao and Yan Chen and Sandeep Prabhakar and Jianfeng Yang}, title = {RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {2}, pages = {466--483}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2892440}, doi = {10.1109/TMC.2019.2892440}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ZhuQXZSCPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YangMXZ020, author = {Runqing Yang and Shiqing Ma and Haitao Xu and Xiangyu Zhang and Yan Chen}, title = {UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for {GUI} Applications}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/uiscope-accurate-instrumentation-free-and-visible-attack-investigation-for-gui-applications/}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YangMXZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiHZC20, author = {You Li and Kaiyu Hou and Hai Zhou and Yan Chen}, title = {Network protocol safe configuration search in one shot}, booktitle = {{SIGCOMM} '20: {ACM} {SIGCOMM} 2020 Conference, Virtual Event, August 10-14, 2020, Poster and Demo Sessions}, pages = {21--23}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3405837.3411377}, doi = {10.1145/3405837.3411377}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/LiHZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01722, author = {Zhenyuan Li and Qi Alfred Chen and Runqing Yang and Yan Chen}, title = {Threat Detection and Investigation with System-level Provenance Graphs: {A} Survey}, journal = {CoRR}, volume = {abs/2006.01722}, year = {2020}, url = {https://arxiv.org/abs/2006.01722}, eprinttype = {arXiv}, eprint = {2006.01722}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01722.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LengHCBSL19, author = {Xue Leng and Kaiyu Hou and Yan Chen and Kai Bu and Libin Song and You Li}, title = {A lightweight policy enforcement system for resource protection and management in the SDN-based cloud}, journal = {Comput. Networks}, volume = {161}, pages = {68--81}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.05.022}, doi = {10.1016/J.COMNET.2019.05.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LengHCBSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YuLBCY19, author = {Yinbo Yu and Xing Li and Kai Bu and Yan Chen and Jianfeng Yang}, title = {Falcon: Differential fault localization for {SDN} control plane}, journal = {Comput. Networks}, volume = {162}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.07.007}, doi = {10.1016/J.COMNET.2019.07.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YuLBCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/YuLLSBCYZCX19, author = {Yinbo Yu and Xing Li and Xue Leng and Libin Song and Kai Bu and Yan Chen and Jianfeng Yang and Liang Zhang and Kang Cheng and Xin Xiao}, title = {Fault Management in Software-Defined Networking: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {1}, pages = {349--392}, year = {2019}, url = {https://doi.org/10.1109/COMST.2018.2868922}, doi = {10.1109/COMST.2018.2868922}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/YuLLSBCYZCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiCXCZY19, author = {Zhenyuan Li and Qi Alfred Chen and Chunlin Xiong and Yan Chen and Tiantian Zhu and Hai Yang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1831--1847}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363187}, doi = {10.1145/3319535.3363187}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiCXCZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/LiYBCYQ19, author = {Xing Li and Yinbo Yu and Kai Bu and Yan Chen and Jianfeng Yang and Ruijie Quan}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {Thinking inside the Box: Differential Fault Localization for {SDN} Control Plane}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {353--359}, publisher = {{IFIP}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8717815}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/LiYBCYQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/DangLLZCXCY19, author = {Fan Dang and Zhenhua Li and Yunhao Liu and Ennan Zhai and Qi Alfred Chen and Tianyin Xu and Yan Chen and Jingyu Yang}, editor = {Junehwa Song and Minkyong Kim and Nicholas D. Lane and Rajesh Krishna Balan and Fahim Kawsar and Yunxin Liu}, title = {Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud}, booktitle = {Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019}, pages = {482--493}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3307334.3326083}, doi = {10.1145/3307334.3326083}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/DangLLZCXCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LengJ0L19, author = {Xue Leng and Tzung{-}Han Juang and Yan Chen and Han Liu}, title = {{AOMO:} An AI-aided Optimizer for Microservices Orchestration}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {1--2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342280.3342287}, doi = {10.1145/3342280.3342287}, timestamp = {Thu, 15 Aug 2019 09:02:14 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/LengJ0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/YuLHCZY19, author = {Yinbo Yu and You Li and Kaiyu Hou and Yan Chen and Hai Zhou and Jianfeng Yang}, title = {CellScope: Automatically Specifying and Verifying Cellular Network Protocols}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {21--23}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342280.3342294}, doi = {10.1145/3342280.3342294}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/YuLHCZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ShaoRCPGZR18, author = {Rui Shao and Vaibhav Rastogi and Yan Chen and Xiang Pan and Guanyu Guo and Shihong Zou and Ryan D. Riley}, title = {Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {17}, number = {11}, pages = {2675--2688}, year = {2018}, url = {https://doi.org/10.1109/TMC.2018.2809727}, doi = {10.1109/TMC.2018.2809727}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ShaoRCPGZR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeXJGCW18, author = {Boyuan He and Haitao Xu and Ling Jin and Guanyu Guo and Yan Chen and Guangyao Weng}, title = {An Investigation into Android In-App Ad Practice: Implications for App Developers}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2465--2473}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486010}, doi = {10.1109/INFOCOM.2018.8486010}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HeXJGCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LengH0BS18, author = {Xue Leng and Kaiyu Hou and Yan Chen and Kai Bu and Libin Song}, title = {SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud}, booktitle = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2018, Banff, AB, Canada, June 4-6, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWQoS.2018.8624135}, doi = {10.1109/IWQOS.2018.8624135}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/LengH0BS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PanCDHFS018, author = {Xiang Pan and Yinzhi Cao and Xuechao Du and Boyuan He and Gan Fang and Rui Shao and Yan Chen}, editor = {William Enck and Adrienne Porter Felt}, title = {FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1669--1685}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/pan}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/PanCDHFS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlamQRCR17, author = {Shahid Alam and Zhengyang Qu and Ryan D. Riley and Yan Chen and Vaibhav Rastogi}, title = {DroidNative: Automating and optimizing detection of Android native code malware variants}, journal = {Comput. Secur.}, volume = {65}, pages = {230--246}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.011}, doi = {10.1016/J.COSE.2016.11.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlamQRCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChenWMCXHDL17, author = {Kai Chen and Xitao Wen and Xingyu Ma and Yan Chen and Yong Xia and Chengchen Hu and Qunfeng Dong and Yongqiang Liu}, title = {Toward {A} Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {4}, pages = {2281--2294}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2688376}, doi = {10.1109/TNET.2017.2688376}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ChenWMCXHDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WenBYCLCYL17, author = {Xitao Wen and Kai Bu and Bo Yang and Yan Chen and Li Erran Li and Xiaolin Chen and Jianfeng Yang and Xue Leng}, title = {RuleScope: Inspecting Forwarding Faults for Software-Defined Networking}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {4}, pages = {2347--2360}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2686443}, doi = {10.1109/TNET.2017.2686443}, timestamp = {Mon, 16 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WenBYCLCYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/QuACZHR17, author = {Zhengyang Qu and Shahid Alam and Yan Chen and Xiaoyong Zhou and Wangjun Hong and Ryan D. Riley}, title = {DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {415--426}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.14}, doi = {10.1109/DSN.2017.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/QuACZHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/GaoYJCPGD16, author = {Hongyu Gao and Vinod Yegneswaran and Jian Jiang and Yan Chen and Phillip A. Porras and Shalini Ghosh and Hai{-}Xin Duan}, title = {Reexamining {DNS} From a Global Recursive Resolver Perspective}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {1}, pages = {43--57}, year = {2016}, url = {https://doi.org/10.1109/TNET.2014.2358637}, doi = {10.1109/TNET.2014.2358637}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/GaoYJCPGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhuGYBCDLC16, author = {Tiantian Zhu and Hongyu Gao and Yi Yang and Kai Bu and Yan Chen and Doug Downey and Kathy Lee and Alok N. Choudhary}, title = {Beating the Artificial Chaos: Fighting {OSN} Spam Using Its Own Templates}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {6}, pages = {3856--3869}, year = {2016}, url = {https://doi.org/10.1109/TNET.2016.2557849}, doi = {10.1109/TNET.2016.2557849}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ZhuGYBCDLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PanCLZCZ16, author = {Xiang Pan and Yinzhi Cao and Shuangping Liu and Yu Zhou and Yan Chen and Tingzhe Zhou}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {653--665}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978384}, doi = {10.1145/2976749.2978384}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PanCLZCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/PanYCPS16, author = {Xiang Pan and Vinod Yegneswaran and Yan Chen and Phillip A. Porras and Seungwon Shin}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {HogMap: Using SDNs to Incentivize Collaborative Security Monitoring}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, pages = {7--12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2876019.2876023}, doi = {10.1145/2876019.2876023}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/PanYCPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WenYCHWLC16, author = {Xitao Wen and Bo Yang and Yan Chen and Chengchen Hu and Yi Wang and Bin Liu and Xiaolin Chen}, title = {SDNShield: Reconciliating Configurable Application Permissions for {SDN} App Markets}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {121--132}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.20}, doi = {10.1109/DSN.2016.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WenYCHWLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WenYCLBZYH16, author = {Xitao Wen and Bo Yang and Yan Chen and Li Erran Li and Kai Bu and Peng Zheng and Yang Yang and Chengchen Hu}, title = {RuleTris: Minimizing Rule Update Latency for TCAM-Based {SDN} Switches}, booktitle = {36th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2016, Nara, Japan, June 27-30, 2016}, pages = {179--188}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDCS.2016.41}, doi = {10.1109/ICDCS.2016.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WenYCLBZYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BuWYCLC16, author = {Kai Bu and Xitao Wen and Bo Yang and Yan Chen and Li Erran Li and Xiaolin Chen}, title = {Is every flow on the right track?: Inspect {SDN} forwarding with RuleScope}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524333}, doi = {10.1109/INFOCOM.2016.7524333}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BuWYCLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RastogiSCPZR16, author = {Vaibhav Rastogi and Rui Shao and Yan Chen and Xiang Pan and Shihong Zou and Ryan D. Riley}, title = {Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/ads-safe-detecting-hidden-attacks-through-mobile-app-web-interfaces.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/RastogiSCPZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/QuGSRCCH16, author = {Zhengyang Qu and Guanyu Guo and Zhengyue Shao and Vaibhav Rastogi and Yan Chen and Hao Chen and Wangjun Hong}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {3--23}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_1}, doi = {10.1007/978-3-319-59608-2\_1}, timestamp = {Wed, 20 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/QuGSRCCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlamQRCR16, author = {Shahid Alam and Zhengyang Qu and Ryan D. Riley and Yan Chen and Vaibhav Rastogi}, title = {DroidNative: Semantic-Based Detection of Android Native Code Malware}, journal = {CoRR}, volume = {abs/1602.04693}, year = {2016}, url = {http://arxiv.org/abs/1602.04693}, eprinttype = {arXiv}, eprint = {1602.04693}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlamQRCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CaoPC15, author = {Yinzhi Cao and Xiang Pan and Yan Chen}, title = {SafePay: Protecting against credit card forgery with existing magnetic card readers}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {164--172}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346825}, doi = {10.1109/CNS.2015.7346825}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/CaoPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0005WMCXHD15, author = {Kai Chen and Xitao Wen and Xingyu Ma and Yan Chen and Yong Xia and Chengchen Hu and Qunfeng Dong}, title = {WaveCube: {A} scalable, fault-tolerant, high-performance optical data center architecture}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {1903--1911}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218573}, doi = {10.1109/INFOCOM.2015.7218573}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0005WMCXHD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15, author = {Yinzhi Cao and Yanick Fratantonio and Antonio Bianchi and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Yan Chen}, title = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PanCC15, author = {Xiang Pan and Yinzhi Cao and Yan Chen}, title = {I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/i-do-not-know-what-you-visited-last-summer-protecting-users-third-party-web-tracking}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PanCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RastogiQMCC15, author = {Vaibhav Rastogi and Zhengyang Qu and Jedidiah McClurg and Yinzhi Cao and Yan Chen}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {256--276}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_14}, doi = {10.1007/978-3-319-28865-9\_14}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RastogiQMCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HeRCCVYZ15, author = {Boyuan He and Vaibhav Rastogi and Yinzhi Cao and Yan Chen and V. N. Venkatakrishnan and Runqing Yang and Zhenrui Zhang}, title = {Vetting {SSL} Usage in Applications with {SSLINT}}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {519--534}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.38}, doi = {10.1109/SP.2015.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HeRCCVYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZouW0HCLXH14, author = {Shihong Zou and Xitao Wen and Kai Chen and Shan Huang and Yan Chen and Yongqiang Liu and Yong Xia and Chengchen Hu}, title = {VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter}, journal = {Comput. Networks}, volume = {67}, pages = {141--153}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.03.025}, doi = {10.1016/J.COMNET.2014.03.025}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZouW0HCLXH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/0005CPCBPZ14, author = {Kai Chen and David R. Choffnes and Rahul Potharaju and Yan Chen and Fabian E. Bustamante and Dan Pei and Yao Zhao}, title = {Where the Sidewalk Ends: Extending the Internet {AS} Graph Using Traceroutes from {P2P} Users}, journal = {{IEEE} Trans. Computers}, volume = {63}, number = {4}, pages = {1021--1036}, year = {2014}, url = {https://doi.org/10.1109/TC.2013.149}, doi = {10.1109/TC.2013.149}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/0005CPCBPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RastogiCJ14, author = {Vaibhav Rastogi and Yan Chen and Xuxian Jiang}, title = {Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {1}, pages = {99--108}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2290431}, doi = {10.1109/TIFS.2013.2290431}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RastogiCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/0005SSRXZWC14, author = {Kai Chen and Ankit Singla and Atul Singh and Kishore Ramachandran and Lei Xu and Yueping Zhang and Xitao Wen and Yan Chen}, title = {{OSA:} An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {22}, number = {2}, pages = {498--511}, year = {2014}, url = {https://doi.org/10.1109/TNET.2013.2253120}, doi = {10.1109/TNET.2013.2253120}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/0005SSRXZWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/HuLZ0CCW14, author = {Chengchen Hu and Bin Liu and Hongbo Zhao and Kai Chen and Yan Chen and Yu Cheng and Hao Wu}, title = {Discount Counting for Fast Flow Statistics on Flow Size and Flow Volume}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {22}, number = {3}, pages = {970--981}, year = {2014}, url = {https://doi.org/10.1109/TNET.2013.2270439}, doi = {10.1109/TNET.2013.2270439}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/HuLZ0CCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaoYBCDLC14, author = {Hongyu Gao and Yi Yang and Kai Bu and Yan Chen and Doug Downey and Kathy Lee and Alok N. Choudhary}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Spam ain't as diverse as it seems: throttling {OSN} spam with templates underneath}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {76--85}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664251}, doi = {10.1145/2664243.2664251}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaoYBCDLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CaoPCZ14, author = {Yinzhi Cao and Xiang Pan and Yan Chen and Jianwei Zhuge}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {466--475}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664256}, doi = {10.1145/2664243.2664256}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CaoPCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuRZCZC14, author = {Zhengyang Qu and Vaibhav Rastogi and Xinyi Zhang and Yan Chen and Tiantian Zhu and Zhong Chen}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {AutoCog: Measuring the Description-to-permission Fidelity in Android Applications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1354--1365}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660287}, doi = {10.1145/2660267.2660287}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuRZCZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CaoSBKVC14, author = {Yinzhi Cao and Yan Shoshitaishvili and Kevin Borgolte and Christopher Kr{\"{u}}gel and Giovanni Vigna and Yan Chen}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {276--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_14}, doi = {10.1007/978-3-319-11379-1\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/CaoYRCG14, author = {Yinzhi Cao and Chao Yang and Vaibhav Rastogi and Yan Chen and Guofei Gu}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {582--601}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_45}, doi = {10.1007/978-3-319-23829-6\_45}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WenDZCLYB14, author = {Xitao Wen and Chunxiao Diao and Xun Zhao and Yan Chen and Li Erran Li and Bo Yang and Kai Bu}, editor = {Aditya Akella and Albert G. Greenberg}, title = {Compiling minimum incremental update for modular {SDN} languages}, booktitle = {Proceedings of the third workshop on Hot topics in software defined networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014}, pages = {193--198}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2620728.2620733}, doi = {10.1145/2620728.2620733}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WenDZCLYB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZhaoCCZG13, author = {Yao Zhao and Yinzhi Cao and Yan Chen and Ming Zhang and Anup Goyal}, title = {Rake: Semantics Assisted Network-Based Tracing Framework}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {10}, number = {1}, pages = {3--14}, year = {2013}, url = {https://doi.org/10.1109/TNSM.2012.091912.120224}, doi = {10.1109/TNSM.2012.091912.120224}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ZhaoCCZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RastogiCJ13, author = {Vaibhav Rastogi and Yan Chen and Xuxian Jiang}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {DroidChameleon: evaluating Android anti-malware against transformation attacks}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {329--334}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484355}, doi = {10.1145/2484313.2484355}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RastogiCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/RastogiCE13, author = {Vaibhav Rastogi and Yan Chen and William Enck}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {AppsPlayground: automatic security analysis of smartphone applications}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {209--220}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435379}, doi = {10.1145/2435349.2435379}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/RastogiCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CaoRLCM13, author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen and Alexander Moshchuk}, title = {Redefining web browser principals with a Configurable Origin Policy}, booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSN.2013.6575317}, doi = {10.1109/DSN.2013.6575317}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CaoRLCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LuZWCC13, author = {Xun Lu and Jianwei Zhuge and Ruoyu Wang and Yinzhi Cao and Yan Chen}, title = {De-obfuscation and Detection of Malicious {PDF} Files with High Accuracy}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {4890--4899}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.166}, doi = {10.1109/HICSS.2013.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LuZWCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WenCHSW13, author = {Xitao Wen and Yan Chen and Chengchen Hu and Chao Shi and Yi Wang}, editor = {Nate Foster and Rob Sherwood}, title = {Towards a secure controller platform for openflow applications}, booktitle = {Proceedings of the Second {ACM} {SIGCOMM} Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, The Chinese University of Hong Kong, Hong Kong, China, Friday, August 16, 2013}, pages = {171--172}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491185.2491212}, doi = {10.1145/2491185.2491212}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/WenCHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/GaoYCPGJD13, author = {Hongyu Gao and Vinod Yegneswaran and Yan Chen and Phillip A. Porras and Shalini Ghosh and Jian Jiang and Hai{-}Xin Duan}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {An empirical reexamination of global {DNS} behavior}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {267--278}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2486018}, doi = {10.1145/2486001.2486018}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/GaoYCPGJD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HuLWTCC12, author = {Chengchen Hu and Bin Liu and Sheng Wang and Jia Tian and Yu Cheng and Yan Chen}, title = {{ANLS:} Adaptive Non-Linear Sampling Method for Accurate Flow Size Measurement}, journal = {{IEEE} Trans. Commun.}, volume = {60}, number = {3}, pages = {789--798}, year = {2012}, url = {https://doi.org/10.1109/TCOMM.2011.112311.100622}, doi = {10.1109/TCOMM.2011.112311.100622}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/HuLWTCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/HuCCLV12, author = {Chengchen Hu and Kai Chen and Yan Chen and Bin Liu and Athanasios V. Vasilakos}, title = {A Measurement Study on Potential Inter-Domain Routing Diversity}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {9}, number = {3}, pages = {268--278}, year = {2012}, url = {https://doi.org/10.1109/TNSM.2012.070512.110191}, doi = {10.1109/TNSM.2012.070512.110191}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/HuCCLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChenGWYFCLW12, author = {Kai Chen and Chuanxiong Guo and Haitao Wu and Jing Yuan and Zhenqian Feng and Yan Chen and Songwu Lu and Wenfei Wu}, title = {{DAC:} Generic and Automatic Address Configuration for Data Center Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {20}, number = {1}, pages = {84--99}, year = {2012}, url = {https://doi.org/10.1109/TNET.2011.2157520}, doi = {10.1109/TNET.2011.2157520}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ChenGWYFCLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/DaiLCW12, author = {Huichen Dai and Bin Liu and Yan Chen and Yi Wang}, editor = {Tilman Wolf and Andrew W. Moore and Viktor K. Prasanna}, title = {On pending interest table in named data networking}, booktitle = {Symposium on Architecture for Networking and Communications Systems, {ANCS} '12, Austin, TX, {USA} - October 29 - 30, 2012}, pages = {211--222}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2396556.2396600}, doi = {10.1145/2396556.2396600}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/DaiLCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoLRCW12, author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Yan Chen and Xitao Wen}, editor = {Heung Youl Youm and Yoojae Won}, title = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {8--9}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414460}, doi = {10.1145/2414456.2414460}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WenCCLXH12, author = {Xitao Wen and Kai Chen and Yan Chen and Yongqiang Liu and Yong Xia and Chengchen Hu}, title = {VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter}, booktitle = {2012 {IEEE} 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012}, pages = {12--21}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCS.2012.25}, doi = {10.1109/ICDCS.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WenCCLXH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangHDMJLC12, author = {Yi Wang and Keqiang He and Huichen Dai and Wei Meng and Junchen Jiang and Bin Liu and Yan Chen}, title = {Scalable Name Lookup in {NDN} Using Effective Name Component Encoding}, booktitle = {2012 {IEEE} 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012}, pages = {688--697}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCS.2012.35}, doi = {10.1109/ICDCS.2012.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangHDMJLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/MaHCZZZCS12, author = {Xingyu Ma and Chengchen Hu and Kai Chen and Che Zhang and Hongtao Zhang and Kai Zheng and Yan Chen and Xianda Sun}, title = {Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices}, booktitle = {2012 {IEEE} 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012}, pages = {708--717}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCS.2012.27}, doi = {10.1109/ICDCS.2012.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/MaHCZZZCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoYPC12, author = {Yinzhi Cao and Vinod Yegneswaran and Phillip A. Porras and Yan Chen}, title = {PathCutter: Severing the Self-Propagation Path of {XSS} JavaScript Worms in Social Web Networks}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/pathcutter-severing-self-propagation-path-xss-javascript-worms-social-web-networks}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoYPC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GaoCLPC12, author = {Hongyu Gao and Yan Chen and Kathy Lee and Diana Palsetia and Alok N. Choudhary}, title = {Towards Online Spam Filtering in Social Networks}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/towards-online-spam-filtering-social-networks}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GaoCLPC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/SinglaSC12, author = {Kai Chen and Ankit Singla and Atul Singh and Kishore Ramachandran and Lei Xu and Yueping Zhang and Xitao Wen and Yan Chen}, editor = {Steven D. Gribble and Dina Katabi}, title = {{OSA:} An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility}, booktitle = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012}, pages = {239--252}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/chen\_kai}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/SinglaSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/GaoHHWC11, author = {Hongyu Gao and Jun Hu and Tuo Huang and Jingnan Wang and Yan Chen}, title = {Security Issues in Online Social Networks}, journal = {{IEEE} Internet Comput.}, volume = {15}, number = {4}, pages = {56--63}, year = {2011}, url = {https://doi.org/10.1109/MIC.2011.50}, doi = {10.1109/MIC.2011.50}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/GaoHHWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiGCK11, author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic}, title = {Measurement and diagnosis of address misconfigured {P2P} traffic}, journal = {{IEEE} Netw.}, volume = {25}, number = {3}, pages = {22--28}, year = {2011}, url = {https://doi.org/10.1109/MNET.2011.5772057}, doi = {10.1109/MNET.2011.5772057}, timestamp = {Sun, 14 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LiGCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenHZZCV11, author = {Kai Chen and Chengchen Hu and Xin Zhang and Kai Zheng and Yan Chen and Athanasios V. Vasilakos}, title = {Survey on routing in data centers: insights and future directions}, journal = {{IEEE} Netw.}, volume = {25}, number = {4}, pages = {6--10}, year = {2011}, url = {https://doi.org/10.1109/MNET.2011.5958002}, doi = {10.1109/MNET.2011.5958002}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenHZZCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiGCP11, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, title = {Towards Situational Awareness of Large-Scale Botnet Probing Events}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {175--188}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2086445}, doi = {10.1109/TIFS.2010.2086445}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiGCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoYPC11, author = {Yinzhi Cao and Vinod Yegneswaran and Phillip A. Porras and Yan Chen}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: a path-cutting approach to blocking {XSS} worms in social web networks}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {745--748}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093483}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoYPC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoCLPC11, author = {Hongyu Gao and Yan Chen and Kathy Lee and Diana Palsetia and Alok N. Choudhary}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: online spam filtering in social networks}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {769--772}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093489}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoCLPC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuGLC11, author = {Jun Hu and Hongyu Gao and Zhichun Li and Yan Chen}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: {CUD:} crowdsourcing for {URL} spam detection}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {785--788}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093493}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuGLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhaoCCZG11, author = {Yao Zhao and Yinzhi Cao and Yan Chen and Ming Zhang and Anup Goyal}, title = {Rake: Semantics assisted network-based tracing framework}, booktitle = {19th International Workshop on Quality of Service, IWQoS 2011, San Jose, California, USA, 6-7 June 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWQOS.2011.5931314}, doi = {10.1109/IWQOS.2011.5931314}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/ZhaoCCZG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiTCRCLS11, author = {Zhichun Li and Yi Tang and Yinzhi Cao and Vaibhav Rastogi and Yan Chen and Bin Liu and Clint Sbisa}, title = {WebShield: Enabling Various Web Defense Techniques without Client Side Modifications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/webshield-enabling-various-web-defense-techniques-without-client-side-modifications}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiTCRCLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiGC10, author = {Zhichun Li and Yan Gao and Yan Chen}, title = {HiFIND: {A} high-speed flow-level intrusion detection approach with DoS resiliency}, journal = {Comput. Networks}, volume = {54}, number = {8}, pages = {1282--1299}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.10.016}, doi = {10.1016/J.COMNET.2009.10.016}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LuCBBL10, author = {Guohan Lu and Yan Chen and Stefan Birrer and Fabi{\'{a}}n E. Bustamante and Xing Li}, title = {{POPI:} a user-level tool for inferring router packet forwarding priority}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {1--14}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816289}, doi = {10.1145/1816288.1816289}, timestamp = {Thu, 07 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/LuCBBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoLRC10, author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Yan Chen}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {654--656}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866387}, doi = {10.1145/1866307.1866387}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoLRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {681--683}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866396}, doi = {10.1145/1866307.1866396}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/HuLZCCWC10, author = {Chengchen Hu and Bin Liu and Hongbo Zhao and Kai Chen and Yan Chen and Chunming Wu and Yu Cheng}, title = {{DISCO:} Memory Efficient and Accurate Flow Statistics for Network Measurement}, booktitle = {2010 International Conference on Distributed Computing Systems, {ICDCS} 2010, Genova, Italy, June 21-25, 2010}, pages = {665--674}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCS.2010.57}, doi = {10.1109/ICDCS.2010.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/HuLZCCWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Mark Allman}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {35--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879147}, doi = {10.1145/1879141.1879147}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HuCCL10, author = {Chengchen Hu and Kai Chen and Yan Chen and Bin Liu}, title = {Evaluating Potential Routing Diversity for Internet Failure Recovery}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {321--325}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462219}, doi = {10.1109/INFCOM.2010.5462219}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/HuCCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiGCK10, author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic}, title = {Measurement and Diagnosis of Address Misconfigured {P2P} Traffic}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1091--1099}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461939}, doi = {10.1109/INFCOM.2010.5461939}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiGCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/LiZZCGW10, author = {Zhichun Li and Ming Zhang and Zhaosheng Zhu and Yan Chen and Albert G. Greenberg and Yi{-}Min Wang}, title = {WebProphet: Automating Performance Prediction for Web Services}, booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, pages = {143--158}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/nsdi10/tech/full\_papers/li.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/LiZZCGW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ChenGWYFCLW10, author = {Kai Chen and Chuanxiong Guo and Haitao Wu and Jing Yuan and Zhenqian Feng and Yan Chen and Songwu Lu and Wenfei Wu}, editor = {Shivkumar Kalyanaraman and Venkata N. Padmanabhan and K. K. Ramakrishnan and Rajeev Shorey and Geoffrey M. Voelker}, title = {Generic and automatic address configuration for data center networks}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010}, pages = {39--50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851182.1851190}, doi = {10.1145/1851182.1851190}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ChenGWYFCLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiXGTCLJL10, author = {Zhichun Li and Gao Xia and Hongyu Gao and Yi Tang and Yan Chen and Bin Liu and Junchen Jiang and Yuezhou Lv}, editor = {Shivkumar Kalyanaraman and Venkata N. Padmanabhan and K. K. Ramakrishnan and Rajeev Shorey and Geoffrey M. Voelker}, title = {NetShield: massive semantics-based vulnerability signature matching for high-speed networks}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010}, pages = {279--290}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851182.1851216}, doi = {10.1145/1851182.1851216}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiXGTCLJL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordCGLPY10, author = {Paul Barford and Yan Chen and Anup Goyal and Zhichun Li and Vern Paxson and Vinod Yegneswaran}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Employing Honeynets For Network Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {71--102}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_5}, doi = {10.1007/978-1-4419-0140-8\_5}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/Zhao010, author = {Yao Zhao and Yan Chen}, editor = {Graham Cormode and Marina Thottan}, title = {Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis}, booktitle = {Algorithms for Next Generation Networks}, series = {Computer Communications and Networks}, pages = {319--340}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-84882-765-3\_14}, doi = {10.1007/978-1-84882-765-3\_14}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ccn/Zhao010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhaoC09, author = {Yao Zhao and Yan Chen}, title = {{FAD} and {SPA:} End-to-end link-level loss rate inference without infrastructure}, journal = {Comput. Networks}, volume = {53}, number = {9}, pages = {1303--1318}, year = {2009}, url = {https://doi.org/10.1016/j.comnet.2008.12.022}, doi = {10.1016/J.COMNET.2008.12.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhaoC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhaoCB09, author = {Yao Zhao and Yan Chen and David Bindel}, title = {Towards unbiased end-to-end network diagnosis}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {17}, number = {6}, pages = {1724--1737}, year = {2009}, url = {http://doi.acm.org/10.1145/1721711.1721714}, doi = {10.1145/1721711.1721714}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ZhaoCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiGCP09, author = {Zhichun Li and Anup Goyal and Yan Chen and Vern Paxson}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Automating analysis of large-scale botnet probing events}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533063}, doi = {10.1145/1533057.1533063}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiGCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ChenCPCBPZ09, author = {Kai Chen and David R. Choffnes and Rahul Potharaju and Yan Chen and Fabian E. Bustamante and Dan Pei and Yao Zhao}, editor = {J{\"{o}}rg Liebeherr and Giorgio Ventre and Ernst W. Biersack and Srinivasan Keshav}, title = {Where the sidewalk ends: extending the internet as graph using traceroutes from {P2P} users}, booktitle = {Proceedings of the 2009 {ACM} Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009}, pages = {217--228}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1658939.1658964}, doi = {10.1145/1658939.1658964}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/ChenCPCBPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhaoVCCZF09, author = {Yao Zhao and Sagar Vemuri and Jiazhen Chen and Yan Chen and Hai Zhou and Zhi Fu}, title = {Exception triggered DoS attacks on wireless networks}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270358}, doi = {10.1109/DSN.2009.5270358}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/ZhaoVCCZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ChenHZCL09, author = {Kai Chen and Chengchen Hu and Wenwen Zhang and Yan Chen and Bin Liu}, title = {On the Eyeshots of {BGP} Vantage Points}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425389}, doi = {10.1109/GLOCOM.2009.5425389}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ChenHZCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhaoZCPW09, author = {Yao Zhao and Zhaosheng Zhu and Yan Chen and Dan Pei and Jia Wang}, title = {Towards Efficient Large-Scale {VPN} Monitoring and Diagnosis under Operational Constraints}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {531--539}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5061959}, doi = {10.1109/INFCOM.2009.5061959}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhaoZCPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/ZhaoXYKYCG09, author = {Yao Zhao and Yinglian Xie and Fang Yu and Qifa Ke and Yuan Yu and Yan Chen and Eliot Gillum}, editor = {Jennifer Rexford and Emin G{\"{u}}n Sirer}, title = {BotGraph: Large Scale Spamming Botnet Detection}, booktitle = {Proceedings of the 6th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2009, April 22-24, 2009, Boston, MA, {USA}}, pages = {321--334}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/nsdi09/tech/full\_papers/zhao/zhao.pdf}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/ZhaoXYKYCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhuYC09, author = {Zhaosheng Zhu and Vinod Yegneswaran and Yan Chen}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Using Failure Information Analysis to Detect Enterprise Zombies}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {185--206}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_11}, doi = {10.1007/978-3-642-05284-2\_11}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ZhuYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DengGCK08, author = {Leiwen Deng and Yan Gao and Yan Chen and Aleksandar Kuzmanovic}, title = {Pollution attacks and defenses for Internet caching systems}, journal = {Comput. Networks}, volume = {52}, number = {5}, pages = {935--956}, year = {2008}, url = {https://doi.org/10.1016/j.comnet.2007.11.019}, doi = {10.1016/J.COMNET.2007.11.019}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DengGCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ZhuLCFRH08, author = {Zhaosheng Zhu and Guohan Lu and Yan Chen and Zhi (Judy) Fu and Phil Roberts and Keesook Han}, title = {Botnet Research Survey}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {967--972}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.205}, doi = {10.1109/COMPSAC.2008.205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ZhuLCFRH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HuWTLCC08, author = {Chengchen Hu and Sheng Wang and Jia Tian and Bin Liu and Yu Cheng and Yan Chen}, title = {Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {26--30}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.14}, doi = {10.1109/INFOCOM.2008.14}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HuWTLCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ZhaoCR08, author = {Yao Zhao and Yan Chen and Sylvia Ratnasamy}, title = {Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks}, booktitle = {Proceedings of the Fifth Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2008, June 16-20, 2008, Crowne Plaza, San Francisco International Airport, California, {USA}}, pages = {560--568}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/SAHCN.2008.73}, doi = {10.1109/SAHCN.2008.73}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/ZhaoCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiGC08, author = {Zhichun Li and Anup Goyal and Yan Chen}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Honeynet-based Botnet Scan Traffic Analysis}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {25--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_2}, doi = {10.1007/978-0-387-68768-1\_2}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhaoCLZ07, author = {Yao Zhao and Yan Chen and Bo Li and Qian Zhang}, title = {Hop {ID:} {A} Virtual Coordinate-Based Routing for Sparse Mobile Ad Hoc Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {6}, number = {9}, pages = {1075--1089}, year = {2007}, url = {https://doi.org/10.1109/TMC.2007.1042}, doi = {10.1109/TMC.2007.1042}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/ZhaoCLZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/SchwellerLCGGZDKM07, author = {Robert T. Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda and Ming{-}Yang Kao and Gokhan Memik}, title = {Reversible sketches: enabling monitoring and analysis over high-speed data streams}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {5}, pages = {1059--1072}, year = {2007}, url = {http://doi.acm.org/10.1145/1322413.1322420}, doi = {10.1145/1322413.1322420}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/SchwellerLCGGZDKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChenBSK07, author = {Yan Chen and David Bindel and Han Hee Song and Randy H. Katz}, title = {Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {15}, number = {5}, pages = {1084--1097}, year = {2007}, url = {http://doi.acm.org/10.1145/1322413.1322422}, doi = {10.1145/1322413.1322422}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ChenBSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuCBBCL07, author = {Guohan Lu and Yan Chen and Stefan Birrer and Fabi{\'{a}}n E. Bustamante and C. Y. Cheung and Xing Li}, title = {End-to-End Inference of Router Packet Forwarding Priority}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1784--1792}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.208}, doi = {10.1109/INFCOM.2007.208}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuCBBCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhaoC07, author = {Yao Zhao and Yan Chen}, title = {A Suite of Schemes for User-Level Network Diagnosis without Infrastructure}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {2171--2179}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.251}, doi = {10.1109/INFCOM.2007.251}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhaoC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/GaoZSVCSK07, author = {Yan Gao and Yao Zhao and Robert T. Schweller and Shobha Venkataraman and Yan Chen and Dawn Xiaodong Song and Ming{-}Yang Kao}, title = {Detecting Stealthy Spreaders Using Online Outdegree Histograms}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {145--153}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376561}, doi = {10.1109/IWQOS.2007.376561}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/GaoZSVCSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cga/RenGLCW06, author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Benjamin Watson}, title = {IDGraphs: Intrusion Detection and Analysis Using Stream Compositing}, journal = {{IEEE} Computer Graphics and Applications}, volume = {26}, number = {2}, pages = {28--39}, year = {2006}, url = {https://doi.org/10.1109/MCG.2006.36}, doi = {10.1109/MCG.2006.36}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cga/RenGLCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/GaoLC06, author = {Yan Gao and Zhichun Li and Yan Chen}, title = {A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {39}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.6}, doi = {10.1109/ICDCS.2006.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/GaoLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/GaoDKC06, author = {Yan Gao and Leiwen Deng and Aleksandar Kuzmanovic and Yan Chen}, title = {Internet Cache Pollution Attacks and Countermeasures}, booktitle = {Proceedings of the 14th {IEEE} International Conference on Network Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California, {USA}}, pages = {54--64}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICNP.2006.320198}, doi = {10.1109/ICNP.2006.320198}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/GaoDKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SchwellerLCGGZDKM06, author = {Robert T. Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda and Ming{-}Yang Kao and Gokhan Memik}, title = {Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.203}, doi = {10.1109/INFOCOM.2006.203}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SchwellerLCGGZDKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhaoCB06, author = {Yao Zhao and Yan Chen and David Bindel}, editor = {Luigi Rizzo and Thomas E. Anderson and Nick McKeown}, title = {Towards unbiased end-to-end network diagnosis}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006}, pages = {219--230}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1159913.1159939}, doi = {10.1145/1159913.1159939}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhaoCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/ZhaoCB06, author = {Yao Zhao and Yan Chen and David Bindel}, editor = {Raymond A. Marie and Peter B. Key and Evgenia Smirni}, title = {Towards deterministic network diagnosis}, booktitle = {Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo, France, June 26-30, 2006}, pages = {387--388}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1140277.1140333}, doi = {10.1145/1140277.1140333}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/ZhaoCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiSCKC06, author = {Zhichun Li and Manan Sanghi and Yan Chen and Ming{-}Yang Kao and Brian Chavez}, title = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {32--47}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.18}, doi = {10.1109/SP.2006.18}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiSCKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ZhaoLZCZ05, author = {Yao Zhao and Bo Li and Qian Zhang and Yan Chen and Wenwu Zhu}, title = {Efficient Hop {ID} based Routing for Sparse Ad Hoc Networks}, booktitle = {13th {IEEE} International Conference on Network Protocols {(ICNP} 2005), 6-9 November 2005, Boston, MA, {USA}}, pages = {179--190}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICNP.2005.13}, doi = {10.1109/ICNP.2005.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ZhaoLZCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RenGLCW05, author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Benjamin Watson}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {IDGraphs: Intrusion Detection and Analysis Using Histographs}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {5}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.7}, doi = {10.1109/VIZSEC.2005.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SchwellerGPC04, author = {Robert T. Schweller and Ashish Gupta and Elliot Parsons and Yan Chen}, editor = {Alfio Lombardo and James F. Kurose}, title = {Reversible sketches for efficient and accurate change detection over network data streams}, booktitle = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004}, pages = {207--212}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1028788.1028814}, doi = {10.1145/1028788.1028814}, timestamp = {Mon, 08 Jul 2019 07:25:59 +0200}, biburl = {https://dblp.org/rec/conf/imc/SchwellerGPC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ChenBSK04, author = {Yan Chen and David Bindel and Han Hee Song and Randy H. Katz}, editor = {Raj Yavatkar and Ellen W. Zegura and Jennifer Rexford}, title = {An algebraic approach to practical and scalable overlay network monitoring}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, {USA}}, pages = {55--66}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1015467.1015475}, doi = {10.1145/1015467.1015475}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ChenBSK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenQCNK03, author = {Yan Chen and Lili Qiu and Weiyu Chen and Luan Nguyen and Randy H. Katz}, title = {Efficient and adaptive Web replication using content clustering}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {6}, pages = {979--994}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2003.814608}, doi = {10.1109/JSAC.2003.814608}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ChenQCNK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ChenBK03, author = {Yan Chen and David Bindel and Randy H. Katz}, title = {Tomography-based overlay network monitoring}, booktitle = {Proceedings of the 3rd {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2003, Miami Beach, FL, USA, October 27-29, 2003}, pages = {216--231}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948205.948233}, doi = {10.1145/948205.948233}, timestamp = {Mon, 08 Jul 2019 07:25:53 +0200}, biburl = {https://dblp.org/rec/conf/imc/ChenBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KrishnamurthySZC03, author = {Balachander Krishnamurthy and Subhabrata Sen and Yin Zhang and Yan Chen}, title = {Sketch-based change detection: methods, evaluation, and applications}, booktitle = {Proceedings of the 3rd {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2003, Miami Beach, FL, USA, October 27-29, 2003}, pages = {234--247}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948205.948236}, doi = {10.1145/948205.948236}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KrishnamurthySZC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/ChenLKO02, author = {Yan Chen and Khian Hao Lim and Randy H. Katz and Chris Overton}, title = {On the stability of network distance estimation}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {30}, number = {2}, pages = {21--30}, year = {2002}, url = {https://doi.org/10.1145/588160.588164}, doi = {10.1145/588160.588164}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/ChenLKO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ChenQCNK02, author = {Yan Chen and Lili Qiu and Weiyu Chen and Luan Nguyen and Randy H. Katz}, title = {Clustering Web Content for Efficient Replication}, booktitle = {10th {IEEE} International Conference on Network Protocols {(ICNP} 2002), 12-15 November 2002, Paris, France, Proceedings}, pages = {165--174}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICNP.2002.1181397}, doi = {10.1109/ICNP.2002.1181397}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ChenQCNK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ChenKK02, author = {Yan Chen and Randy H. Katz and John Kubiatowicz}, editor = {Peter Druschel and M. Frans Kaashoek and Antony I. T. Rowstron}, title = {Dynamic Replica Placement for Scalable Content Delivery}, booktitle = {Peer-to-Peer Systems, First International Workshop, {IPTPS} 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2429}, pages = {306--318}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45748-8\_29}, doi = {10.1007/3-540-45748-8\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/ChenKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pervasive/RamanACCCJLLMMPRSSSSSZJKS02, author = {Bhaskaran Raman and Sharad Agarwal and Yan Chen and Matthew Caesar and Weidong Cui and Per Johansson and Kevin Lai and Tal Lavian and Sridhar Machiraju and Zhuoqing Morley Mao and George Porter and Timothy Roscoe and Mukund Seshadri and Jimmy S. Shih and Keith Sklower and Lakshminarayanan Subramanian and Takashi Suzuki and Shelley Zhuang and Anthony D. Joseph and Randy H. Katz and Ion Stoica}, editor = {Friedemann Mattern and Mahmoud Naghshineh}, title = {The {SAHARA} Model for Service Composition across Multiple Providers}, booktitle = {Pervasive Computing, First International Conference, Pervasive 2002, Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2414}, pages = {1--14}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45866-2\_1}, doi = {10.1007/3-540-45866-2\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pervasive/RamanACCCJLLMMPRSSSSSZJKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pervasive/ChenKK02, author = {Yan Chen and Randy H. Katz and John Kubiatowicz}, editor = {Friedemann Mattern and Mahmoud Naghshineh}, title = {{SCAN:} {A} Dynamic, Scalable, and Efficient Content Distribution Network}, booktitle = {Pervasive Computing, First International Conference, Pervasive 2002, Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2414}, pages = {282--296}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45866-2\_22}, doi = {10.1007/3-540-45866-2\_22}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pervasive/ChenKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenBBKK01, author = {Yan Chen and Adam W. Bargteil and David Bindel and Randy H. Katz and John Kubiatowicz}, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {Quantifying Network Denial of Service: {A} Location Service Case Study}, booktitle = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, pages = {340--351}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7\_37}, doi = {10.1007/3-540-45600-7\_37}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChenBBKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/KubiatowiczBCCEGGRWWWZ00, author = {John Kubiatowicz and David Bindel and Yan Chen and Steven E. Czerwinski and Patrick R. Eaton and Dennis Geels and Ramakrishna Gummadi and Sean C. Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Y. Zhao}, editor = {Larry Rudolph and Anoop Gupta}, title = {OceanStore: An Architecture for Global-Scale Persistent Storage}, booktitle = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000}, pages = {190--201}, publisher = {{ACM} Press}, year = {2000}, url = {https://doi.org/10.1145/378993.379239}, doi = {10.1145/378993.379239}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/KubiatowiczBCCEGGRWWWZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cgf/ZhuCK98, author = {Qing{-}hong Zhu and Yan Chen and Arie E. Kaufman}, title = {Real-time Biomechanically-based Muscle Volume Deformation using {FEM}}, journal = {Comput. Graph. Forum}, volume = {17}, number = {3}, pages = {275--284}, year = {1998}, url = {https://doi.org/10.1111/1467-8659.00274}, doi = {10.1111/1467-8659.00274}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cgf/ZhuCK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ca/ChenZKM98, author = {Yan Chen and Qing{-}hong Zhu and Arie E. Kaufman and Shigeru Muraki}, title = {Physically-based Animation of Volumetric Objects}, booktitle = {Computer Animation 1998, {CA} 1998, Philadelphia, Pennsylvania, USA, June 8-10, 1998}, pages = {154--160}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CA.1998.681920}, doi = {10.1109/CA.1998.681920}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ca/ChenZKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.