BibTeX records: Yan Chen 0004

download as .bib file

@article{DBLP:journals/tmc/YingZLXWCFLWWC24,
  author       = {Jie Ying and
                  Tiantian Zhu and
                  Qiang Liu and
                  Chunlin Xiong and
                  Zhengqiu Weng and
                  Tieming Chen and
                  Lei Fu and
                  Mingqi Lv and
                  Han Wu and
                  Ting Wang and
                  Yan Chen},
  title        = {TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time
                  Mobile User Authentication System With High Accuracy},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {4},
  pages        = {2832--2848},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3265071},
  doi          = {10.1109/TMC.2023.3265071},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/YingZLXWCFLWWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZengKLJC23,
  author       = {Qingyang Zeng and
                  Mohammad Kavousi and
                  Yinhong Luo and
                  Ling Jin and
                  Yan Chen},
  title        = {Full-stack vulnerability analysis of the cloud-native platform},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103173},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103173},
  doi          = {10.1016/J.COSE.2023.103173},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZengKLJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JinCCZC23,
  author       = {Ling Jin and
                  Yinzhi Cao and
                  Yan Chen and
                  Di Zhang and
                  Simone Campanoni},
  title        = {ExGen: Cross-platform, Automated Exploit Generation for Smart Contract
                  Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {650--664},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3141396},
  doi          = {10.1109/TDSC.2022.3141396},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/JinCCZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuYXCYYCZLCWF23,
  author       = {Tiantian Zhu and
                  Jinkai Yu and
                  Chunlin Xiong and
                  Wenrui Cheng and
                  Qixuan Yuan and
                  Jie Ying and
                  Tieming Chen and
                  Jiabo Zhang and
                  Mingqi Lv and
                  Yan Chen and
                  Ting Wang and
                  Yuan Fan},
  title        = {{APTSHIELD:} {A} Stable, Efficient and Real-Time {APT} Detection System
                  for Linux Hosts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {5247--5264},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3243667},
  doi          = {10.1109/TDSC.2023.3243667},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuYXCYYCZLCWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/DuPCHFCX23,
  author       = {Xuechao Du and
                  Xiang Pan and
                  Yinzhi Cao and
                  Boyuan He and
                  Gan Fang and
                  Yan Chen and
                  Daigang Xu},
  title        = {FlowCog: Context-Aware Semantic Extraction and Analysis of Information
                  Flow Leaks in Android Apps},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {11},
  pages        = {6460--6476},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2022.3197638},
  doi          = {10.1109/TMC.2022.3197638},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/DuPCHFCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YuZCCM23,
  author       = {Se{-}Young Yu and
                  Qingyang Zeng and
                  Jim Chen and
                  Yan Chen and
                  Joe Mambretti},
  title        = {{AIDTN:} Towards a Real-Time {AI} Optimized {DTN} System With NVMeoF},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {6},
  pages        = {1731--1742},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2023.3260806},
  doi          = {10.1109/TPDS.2023.3260806},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/YuZCCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/XiongLCZWYR22,
  author       = {Chunlin Xiong and
                  Zhenyuan Li and
                  Yan Chen and
                  Tiantian Zhu and
                  Jian Wang and
                  Hai Yang and
                  Wei Ruan},
  title        = {Generic, efficient, and effective deobfuscation and semantic-aware
                  attack detection for PowerShell scripts},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {23},
  number       = {3},
  pages        = {361--381},
  year         = {2022},
  url          = {https://doi.org/10.1631/FITEE.2000436},
  doi          = {10.1631/FITEE.2000436},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/XiongLCZWYR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiongZDRYCCCC22,
  author       = {Chunlin Xiong and
                  Tiantian Zhu and
                  Weihao Dong and
                  Linqi Ruan and
                  Runqing Yang and
                  Yueqiang Cheng and
                  Yan Chen and
                  Shuai Cheng and
                  Xutong Chen},
  title        = {Conan: {A} Practical Real-Time {APT} Detection System With High Accuracy
                  and Efficiency},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {551--565},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2971484},
  doi          = {10.1109/TDSC.2020.2971484},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XiongZDRYCCCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangCXCXRKLXC22,
  author       = {Runqing Yang and
                  Xutong Chen and
                  Haitao Xu and
                  Yueqiang Cheng and
                  Chunlin Xiong and
                  Linqi Ruan and
                  Mohammad Kavousi and
                  Zhenyuan Li and
                  Liheng Xu and
                  Yan Chen},
  title        = {RATScope: Recording and Reconstructing Missing {RAT} Semantic Behaviors
                  for Forensic Analysis on Windows},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1621--1638},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3032570},
  doi          = {10.1109/TDSC.2020.3032570},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangCXCXRKLXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhuWSCLCLC22,
  author       = {Tiantian Zhu and
                  Zhengqiu Weng and
                  Qijie Song and
                  Yuan Chen and
                  Qiang Liu and
                  Yan Chen and
                  Mingqi Lv and
                  Tieming Chen},
  title        = {EspialCog: General, Efficient and Robust Mobile User Implicit Authentication
                  in Noisy Environment},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {555--572},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2020.3012491},
  doi          = {10.1109/TMC.2020.3012491},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhuWSCLCLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/HouLCY22,
  author       = {Kaiyu Hou and
                  Sen Lin and
                  Yan Chen and
                  Vinod Yegneswaran},
  editor       = {Ada Gavrilovska and
                  Deniz Altinb{\"{u}}ken and
                  Carsten Binnig},
  title        = {QFaaS: accelerating and securing serverless cloud networks with {QUIC}},
  booktitle    = {Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, San
                  Francisco, California, November 7-11, 2022},
  pages        = {240--256},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3542929.3563458},
  doi          = {10.1145/3542929.3563458},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/HouLCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCYCR21,
  author       = {Zhenyuan Li and
                  Qi Alfred Chen and
                  Runqing Yang and
                  Yan Chen and
                  Wei Ruan},
  title        = {Threat detection and investigation with system-level provenance graphs:
                  {A} survey},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102282},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102282},
  doi          = {10.1016/J.COSE.2021.102282},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCYCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuFLLCC21,
  author       = {Tiantian Zhu and
                  Lei Fu and
                  Qiang Liu and
                  Zi Lin and
                  Yan Chen and
                  Tieming Chen},
  title        = {One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With
                  Clustering},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {553--568},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3016819},
  doi          = {10.1109/TIFS.2020.3016819},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuFLLCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuWRXYLCLC21,
  author       = {Tiantian Zhu and
                  Jiayu Wang and
                  Linqi Ruan and
                  Chunlin Xiong and
                  Jinkai Yu and
                  Yaosheng Li and
                  Yan Chen and
                  Mingqi Lv and
                  Tieming Chen},
  title        = {General, Efficient, and Real-Time Data Compaction Strategy for {APT}
                  Forensic Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3312--3325},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3076288},
  doi          = {10.1109/TIFS.2021.3076288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuWRXYLCLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JinHWXCG21,
  author       = {Ling Jin and
                  Boyuan He and
                  Guangyao Weng and
                  Haitao Xu and
                  Yan Chen and
                  Guanyu Guo},
  title        = {MAdLens: Investigating Into Android In-App Ad Practice at {API} Granularity},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1138--1155},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2019.2953609},
  doi          = {10.1109/TMC.2019.2953609},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JinHWXCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/HouLCY21,
  author       = {Kaiyu Hou and
                  Sen Lin and
                  Yan Chen and
                  Vinod Yegneswaran},
  editor       = {Georg Carle and
                  J{\"{o}}rg Ott},
  title        = {Accelerate and secure serverless networks with {QUIC}},
  booktitle    = {CoNEXT '21: The 17th International Conference on emerging Networking
                  EXperiments and Technologies, Virtual Event, Munich, Germany, December
                  7 - 10, 2021},
  pages        = {477--478},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485983.3493350},
  doi          = {10.1145/3485983.3493350},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/HouLCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/HouLYCZ21,
  author       = {Kaiyu Hou and
                  You Li and
                  Yinbo Yu and
                  Yan Chen and
                  Hai Zhou},
  editor       = {Suman Banerjee and
                  Luca Mottola and
                  Xia Zhou},
  title        = {Discovering emergency call pitfalls for cellular networks with formal
                  methods},
  booktitle    = {MobiSys '21: The 19th Annual International Conference on Mobile Systems,
                  Applications, and Services, Virtual Event, Wisconsin, USA, 24 June
                  - 2 July, 2021},
  pages        = {296--309},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3458864.3466625},
  doi          = {10.1145/3458864.3466625},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/HouLYCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenI0GY21,
  author       = {Xutong Chen and
                  Hassaan Irshad and
                  Yan Chen and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CLARION:} Sound and Clear Provenance Tracking for Microservice Deployments},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3989--4006},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-xutong},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenI0GY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09008,
  author       = {Tiantian Zhu and
                  Jinkai Yu and
                  Tieming Chen and
                  Jiayu Wang and
                  Jie Ying and
                  Ye Tian and
                  Mingqi Lv and
                  Yan Chen and
                  Yuan Fan and
                  Ting Wang},
  title        = {{APTSHIELD:} {A} Stable, Efficient and Real-time {APT} Detection System
                  for Linux Hosts},
  journal      = {CoRR},
  volume       = {abs/2112.09008},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09008},
  eprinttype    = {arXiv},
  eprint       = {2112.09008},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/WuHLLYWC20,
  author       = {Xiaochun Wu and
                  Kaiyu Hou and
                  Xue Leng and
                  Xing Li and
                  Yinbo Yu and
                  Bo Wu and
                  Yan Chen},
  title        = {State of the Art and Research Challenges in the Security Technologies
                  of Network Function Virtualization},
  journal      = {{IEEE} Internet Comput.},
  volume       = {24},
  number       = {1},
  pages        = {25--35},
  year         = {2020},
  url          = {https://doi.org/10.1109/MIC.2019.2956712},
  doi          = {10.1109/MIC.2019.2956712},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/WuHLLYWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhuQXZSCPY20,
  author       = {Tiantian Zhu and
                  Zhengyang Qu and
                  Haitao Xu and
                  Jingsi Zhang and
                  Zhengyue Shao and
                  Yan Chen and
                  Sandeep Prabhakar and
                  Jianfeng Yang},
  title        = {RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices
                  in the Wild},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {466--483},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2892440},
  doi          = {10.1109/TMC.2019.2892440},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhuQXZSCPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YangMXZ020,
  author       = {Runqing Yang and
                  Shiqing Ma and
                  Haitao Xu and
                  Xiangyu Zhang and
                  Yan Chen},
  title        = {UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation
                  for {GUI} Applications},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/uiscope-accurate-instrumentation-free-and-visible-attack-investigation-for-gui-applications/},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YangMXZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiHZC20,
  author       = {You Li and
                  Kaiyu Hou and
                  Hai Zhou and
                  Yan Chen},
  title        = {Network protocol safe configuration search in one shot},
  booktitle    = {{SIGCOMM} '20: {ACM} {SIGCOMM} 2020 Conference, Virtual Event, August
                  10-14, 2020, Poster and Demo Sessions},
  pages        = {21--23},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3405837.3411377},
  doi          = {10.1145/3405837.3411377},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiHZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-01722,
  author       = {Zhenyuan Li and
                  Qi Alfred Chen and
                  Runqing Yang and
                  Yan Chen},
  title        = {Threat Detection and Investigation with System-level Provenance Graphs:
                  {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2006.01722},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.01722},
  eprinttype    = {arXiv},
  eprint       = {2006.01722},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-01722.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LengHCBSL19,
  author       = {Xue Leng and
                  Kaiyu Hou and
                  Yan Chen and
                  Kai Bu and
                  Libin Song and
                  You Li},
  title        = {A lightweight policy enforcement system for resource protection and
                  management in the SDN-based cloud},
  journal      = {Comput. Networks},
  volume       = {161},
  pages        = {68--81},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.05.022},
  doi          = {10.1016/J.COMNET.2019.05.022},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LengHCBSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YuLBCY19,
  author       = {Yinbo Yu and
                  Xing Li and
                  Kai Bu and
                  Yan Chen and
                  Jianfeng Yang},
  title        = {Falcon: Differential fault localization for {SDN} control plane},
  journal      = {Comput. Networks},
  volume       = {162},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.07.007},
  doi          = {10.1016/J.COMNET.2019.07.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YuLBCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/YuLLSBCYZCX19,
  author       = {Yinbo Yu and
                  Xing Li and
                  Xue Leng and
                  Libin Song and
                  Kai Bu and
                  Yan Chen and
                  Jianfeng Yang and
                  Liang Zhang and
                  Kang Cheng and
                  Xin Xiao},
  title        = {Fault Management in Software-Defined Networking: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {1},
  pages        = {349--392},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2018.2868922},
  doi          = {10.1109/COMST.2018.2868922},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/YuLLSBCYZCX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiCXCZY19,
  author       = {Zhenyuan Li and
                  Qi Alfred Chen and
                  Chunlin Xiong and
                  Yan Chen and
                  Tiantian Zhu and
                  Hai Yang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Effective and Light-Weight Deobfuscation and Semantic-Aware Attack
                  Detection for PowerShell Scripts},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1831--1847},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363187},
  doi          = {10.1145/3319535.3363187},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiCXCZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/LiYBCYQ19,
  author       = {Xing Li and
                  Yinbo Yu and
                  Kai Bu and
                  Yan Chen and
                  Jianfeng Yang and
                  Ruijie Quan},
  editor       = {Joe Betser and
                  Carol J. Fung and
                  Alex Clemm and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shingo Ata},
  title        = {Thinking inside the Box: Differential Fault Localization for {SDN}
                  Control Plane},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2019, Washington, DC, USA, April 09-11, 2019},
  pages        = {353--359},
  publisher    = {{IFIP}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/document/8717815},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/LiYBCYQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/DangLLZCXCY19,
  author       = {Fan Dang and
                  Zhenhua Li and
                  Yunhao Liu and
                  Ennan Zhai and
                  Qi Alfred Chen and
                  Tianyin Xu and
                  Yan Chen and
                  Jingyu Yang},
  editor       = {Junehwa Song and
                  Minkyong Kim and
                  Nicholas D. Lane and
                  Rajesh Krishna Balan and
                  Fahim Kawsar and
                  Yunxin Liu},
  title        = {Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud},
  booktitle    = {Proceedings of the 17th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2019, Seoul, Republic
                  of Korea, June 17-21, 2019},
  pages        = {482--493},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3307334.3326083},
  doi          = {10.1145/3307334.3326083},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/DangLLZCXCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LengJ0L19,
  author       = {Xue Leng and
                  Tzung{-}Han Juang and
                  Yan Chen and
                  Han Liu},
  title        = {{AOMO:} An AI-aided Optimizer for Microservices Orchestration},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
                  {SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342280.3342287},
  doi          = {10.1145/3342280.3342287},
  timestamp    = {Thu, 15 Aug 2019 09:02:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LengJ0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/YuLHCZY19,
  author       = {Yinbo Yu and
                  You Li and
                  Kaiyu Hou and
                  Yan Chen and
                  Hai Zhou and
                  Jianfeng Yang},
  title        = {CellScope: Automatically Specifying and Verifying Cellular Network
                  Protocols},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
                  {SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
  pages        = {21--23},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342280.3342294},
  doi          = {10.1145/3342280.3342294},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/YuLHCZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ShaoRCPGZR18,
  author       = {Rui Shao and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Xiang Pan and
                  Guanyu Guo and
                  Shihong Zou and
                  Ryan D. Riley},
  title        = {Understanding In-App Ads and Detecting Hidden Attacks through the
                  Mobile App-Web Interface},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {11},
  pages        = {2675--2688},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2018.2809727},
  doi          = {10.1109/TMC.2018.2809727},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ShaoRCPGZR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeXJGCW18,
  author       = {Boyuan He and
                  Haitao Xu and
                  Ling Jin and
                  Guanyu Guo and
                  Yan Chen and
                  Guangyao Weng},
  title        = {An Investigation into Android In-App Ad Practice: Implications for
                  App Developers},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2465--2473},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486010},
  doi          = {10.1109/INFOCOM.2018.8486010},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HeXJGCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LengH0BS18,
  author       = {Xue Leng and
                  Kaiyu Hou and
                  Yan Chen and
                  Kai Bu and
                  Libin Song},
  title        = {SDNKeeper: Lightweight Resource Protection and Management System for
                  SDN-Based Cloud},
  booktitle    = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2018, Banff, AB, Canada, June 4-6, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWQoS.2018.8624135},
  doi          = {10.1109/IWQOS.2018.8624135},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/LengH0BS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PanCDHFS018,
  author       = {Xiang Pan and
                  Yinzhi Cao and
                  Xuechao Du and
                  Boyuan He and
                  Gan Fang and
                  Rui Shao and
                  Yan Chen},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {FlowCog: Context-aware Semantics Extraction and Analysis of Information
                  Flow Leaks in Android Apps},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1669--1685},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/pan},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PanCDHFS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlamQRCR17,
  author       = {Shahid Alam and
                  Zhengyang Qu and
                  Ryan D. Riley and
                  Yan Chen and
                  Vaibhav Rastogi},
  title        = {DroidNative: Automating and optimizing detection of Android native
                  code malware variants},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {230--246},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.011},
  doi          = {10.1016/J.COSE.2016.11.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlamQRCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChenWMCXHDL17,
  author       = {Kai Chen and
                  Xitao Wen and
                  Xingyu Ma and
                  Yan Chen and
                  Yong Xia and
                  Chengchen Hu and
                  Qunfeng Dong and
                  Yongqiang Liu},
  title        = {Toward {A} Scalable, Fault-Tolerant, High-Performance Optical Data
                  Center Architecture},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {4},
  pages        = {2281--2294},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2688376},
  doi          = {10.1109/TNET.2017.2688376},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ChenWMCXHDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WenBYCLCYL17,
  author       = {Xitao Wen and
                  Kai Bu and
                  Bo Yang and
                  Yan Chen and
                  Li Erran Li and
                  Xiaolin Chen and
                  Jianfeng Yang and
                  Xue Leng},
  title        = {RuleScope: Inspecting Forwarding Faults for Software-Defined Networking},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {4},
  pages        = {2347--2360},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2686443},
  doi          = {10.1109/TNET.2017.2686443},
  timestamp    = {Mon, 16 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WenBYCLCYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/QuACZHR17,
  author       = {Zhengyang Qu and
                  Shahid Alam and
                  Yan Chen and
                  Xiaoyong Zhou and
                  Wangjun Hong and
                  Ryan D. Riley},
  title        = {DyDroid: Measuring Dynamic Code Loading and Its Security Implications
                  in Android Applications},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {415--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.14},
  doi          = {10.1109/DSN.2017.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/QuACZHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/GaoYJCPGD16,
  author       = {Hongyu Gao and
                  Vinod Yegneswaran and
                  Jian Jiang and
                  Yan Chen and
                  Phillip A. Porras and
                  Shalini Ghosh and
                  Hai{-}Xin Duan},
  title        = {Reexamining {DNS} From a Global Recursive Resolver Perspective},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {1},
  pages        = {43--57},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2014.2358637},
  doi          = {10.1109/TNET.2014.2358637},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/GaoYJCPGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhuGYBCDLC16,
  author       = {Tiantian Zhu and
                  Hongyu Gao and
                  Yi Yang and
                  Kai Bu and
                  Yan Chen and
                  Doug Downey and
                  Kathy Lee and
                  Alok N. Choudhary},
  title        = {Beating the Artificial Chaos: Fighting {OSN} Spam Using Its Own Templates},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {6},
  pages        = {3856--3869},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2016.2557849},
  doi          = {10.1109/TNET.2016.2557849},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/ZhuGYBCDLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PanCLZCZ16,
  author       = {Xiang Pan and
                  Yinzhi Cao and
                  Shuangping Liu and
                  Yu Zhou and
                  Yan Chen and
                  Tingzhe Zhou},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {CSPAutoGen: Black-box Enforcement of Content Security Policy upon
                  Real-world Websites},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {653--665},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978384},
  doi          = {10.1145/2976749.2978384},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PanCLZCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PanYCPS16,
  author       = {Xiang Pan and
                  Vinod Yegneswaran and
                  Yan Chen and
                  Phillip A. Porras and
                  Seungwon Shin},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {HogMap: Using SDNs to Incentivize Collaborative Security Monitoring},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2876019.2876023},
  doi          = {10.1145/2876019.2876023},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/PanYCPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WenYCHWLC16,
  author       = {Xitao Wen and
                  Bo Yang and
                  Yan Chen and
                  Chengchen Hu and
                  Yi Wang and
                  Bin Liu and
                  Xiaolin Chen},
  title        = {SDNShield: Reconciliating Configurable Application Permissions for
                  {SDN} App Markets},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {121--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.20},
  doi          = {10.1109/DSN.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WenYCHWLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WenYCLBZYH16,
  author       = {Xitao Wen and
                  Bo Yang and
                  Yan Chen and
                  Li Erran Li and
                  Kai Bu and
                  Peng Zheng and
                  Yang Yang and
                  Chengchen Hu},
  title        = {RuleTris: Minimizing Rule Update Latency for TCAM-Based {SDN} Switches},
  booktitle    = {36th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  pages        = {179--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDCS.2016.41},
  doi          = {10.1109/ICDCS.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WenYCLBZYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BuWYCLC16,
  author       = {Kai Bu and
                  Xitao Wen and
                  Bo Yang and
                  Yan Chen and
                  Li Erran Li and
                  Xiaolin Chen},
  title        = {Is every flow on the right track?: Inspect {SDN} forwarding with RuleScope},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524333},
  doi          = {10.1109/INFOCOM.2016.7524333},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/BuWYCLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RastogiSCPZR16,
  author       = {Vaibhav Rastogi and
                  Rui Shao and
                  Yan Chen and
                  Xiang Pan and
                  Shihong Zou and
                  Ryan D. Riley},
  title        = {Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web
                  Interfaces},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/ads-safe-detecting-hidden-attacks-through-mobile-app-web-interfaces.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/RastogiSCPZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/QuGSRCCH16,
  author       = {Zhengyang Qu and
                  Guanyu Guo and
                  Zhengyue Shao and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Hao Chen and
                  Wangjun Hong},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {AppShield: Enabling Multi-entity Access Control Cross Platforms for
                  Mobile App Management},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_1},
  doi          = {10.1007/978-3-319-59608-2\_1},
  timestamp    = {Wed, 20 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/QuGSRCCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlamQRCR16,
  author       = {Shahid Alam and
                  Zhengyang Qu and
                  Ryan D. Riley and
                  Yan Chen and
                  Vaibhav Rastogi},
  title        = {DroidNative: Semantic-Based Detection of Android Native Code Malware},
  journal      = {CoRR},
  volume       = {abs/1602.04693},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.04693},
  eprinttype    = {arXiv},
  eprint       = {1602.04693},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlamQRCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CaoPC15,
  author       = {Yinzhi Cao and
                  Xiang Pan and
                  Yan Chen},
  title        = {SafePay: Protecting against credit card forgery with existing magnetic
                  card readers},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {164--172},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346825},
  doi          = {10.1109/CNS.2015.7346825},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CaoPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0005WMCXHD15,
  author       = {Kai Chen and
                  Xitao Wen and
                  Xingyu Ma and
                  Yan Chen and
                  Yong Xia and
                  Chengchen Hu and
                  Qunfeng Dong},
  title        = {WaveCube: {A} scalable, fault-tolerant, high-performance optical data
                  center architecture},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {1903--1911},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218573},
  doi          = {10.1109/INFOCOM.2015.7218573},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0005WMCXHD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15,
  author       = {Yinzhi Cao and
                  Yanick Fratantonio and
                  Antonio Bianchi and
                  Manuel Egele and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Yan Chen},
  title        = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions
                  through the Android Framework},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PanCC15,
  author       = {Xiang Pan and
                  Yinzhi Cao and
                  Yan Chen},
  title        = {I Do Not Know What You Visited Last Summer: Protecting users from
                  stateful third-party web tracking with TrackingFree browser},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/i-do-not-know-what-you-visited-last-summer-protecting-users-third-party-web-tracking},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PanCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RastogiQMCC15,
  author       = {Vaibhav Rastogi and
                  Zhengyang Qu and
                  Jedidiah McClurg and
                  Yinzhi Cao and
                  Yan Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Uranine: Real-time Privacy Leakage Monitoring without System Modification
                  for Android},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {256--276},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_14},
  doi          = {10.1007/978-3-319-28865-9\_14},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RastogiQMCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HeRCCVYZ15,
  author       = {Boyuan He and
                  Vaibhav Rastogi and
                  Yinzhi Cao and
                  Yan Chen and
                  V. N. Venkatakrishnan and
                  Runqing Yang and
                  Zhenrui Zhang},
  title        = {Vetting {SSL} Usage in Applications with {SSLINT}},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {519--534},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.38},
  doi          = {10.1109/SP.2015.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HeRCCVYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZouW0HCLXH14,
  author       = {Shihong Zou and
                  Xitao Wen and
                  Kai Chen and
                  Shan Huang and
                  Yan Chen and
                  Yongqiang Liu and
                  Yong Xia and
                  Chengchen Hu},
  title        = {VirtualKnotter: Online virtual machine shuffling for congestion resolving
                  in virtualized datacenter},
  journal      = {Comput. Networks},
  volume       = {67},
  pages        = {141--153},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.03.025},
  doi          = {10.1016/J.COMNET.2014.03.025},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZouW0HCLXH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/0005CPCBPZ14,
  author       = {Kai Chen and
                  David R. Choffnes and
                  Rahul Potharaju and
                  Yan Chen and
                  Fabian E. Bustamante and
                  Dan Pei and
                  Yao Zhao},
  title        = {Where the Sidewalk Ends: Extending the Internet {AS} Graph Using Traceroutes
                  from {P2P} Users},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {4},
  pages        = {1021--1036},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2013.149},
  doi          = {10.1109/TC.2013.149},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/0005CPCBPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RastogiCJ14,
  author       = {Vaibhav Rastogi and
                  Yan Chen and
                  Xuxian Jiang},
  title        = {Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {1},
  pages        = {99--108},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2290431},
  doi          = {10.1109/TIFS.2013.2290431},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RastogiCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/0005SSRXZWC14,
  author       = {Kai Chen and
                  Ankit Singla and
                  Atul Singh and
                  Kishore Ramachandran and
                  Lei Xu and
                  Yueping Zhang and
                  Xitao Wen and
                  Yan Chen},
  title        = {{OSA:} An Optical Switching Architecture for Data Center Networks
                  With Unprecedented Flexibility},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {22},
  number       = {2},
  pages        = {498--511},
  year         = {2014},
  url          = {https://doi.org/10.1109/TNET.2013.2253120},
  doi          = {10.1109/TNET.2013.2253120},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/0005SSRXZWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/HuLZ0CCW14,
  author       = {Chengchen Hu and
                  Bin Liu and
                  Hongbo Zhao and
                  Kai Chen and
                  Yan Chen and
                  Yu Cheng and
                  Hao Wu},
  title        = {Discount Counting for Fast Flow Statistics on Flow Size and Flow Volume},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {22},
  number       = {3},
  pages        = {970--981},
  year         = {2014},
  url          = {https://doi.org/10.1109/TNET.2013.2270439},
  doi          = {10.1109/TNET.2013.2270439},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/HuLZ0CCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GaoYBCDLC14,
  author       = {Hongyu Gao and
                  Yi Yang and
                  Kai Bu and
                  Yan Chen and
                  Doug Downey and
                  Kathy Lee and
                  Alok N. Choudhary},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Spam ain't as diverse as it seems: throttling {OSN} spam with templates
                  underneath},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {76--85},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664251},
  doi          = {10.1145/2664243.2664251},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GaoYBCDLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CaoPCZ14,
  author       = {Yinzhi Cao and
                  Xiang Pan and
                  Yan Chen and
                  Jianwei Zhuge},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {JShield: towards real-time and vulnerability-based detection of polluted
                  drive-by download attacks},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {466--475},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664256},
  doi          = {10.1145/2664243.2664256},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CaoPCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QuRZCZC14,
  author       = {Zhengyang Qu and
                  Vaibhav Rastogi and
                  Xinyi Zhang and
                  Yan Chen and
                  Tiantian Zhu and
                  Zhong Chen},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {AutoCog: Measuring the Description-to-permission Fidelity in Android
                  Applications},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1354--1365},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660287},
  doi          = {10.1145/2660267.2660287},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QuRZCZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author       = {Yinzhi Cao and
                  Yan Shoshitaishvili and
                  Kevin Borgolte and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Yan Chen},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Protecting Web-Based Single Sign-on Protocols against Relying Party
                  Impersonation Attacks through a Dedicated Bi-directional Authenticated
                  Secure Channel},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {276--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_14},
  doi          = {10.1007/978-3-319-11379-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/CaoYRCG14,
  author       = {Yinzhi Cao and
                  Chao Yang and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Guofei Gu},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation
                  of Add-On Cross Site Scripting Attacks},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {582--601},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_45},
  doi          = {10.1007/978-3-319-23829-6\_45},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/CaoYRCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WenDZCLYB14,
  author       = {Xitao Wen and
                  Chunxiao Diao and
                  Xun Zhao and
                  Yan Chen and
                  Li Erran Li and
                  Bo Yang and
                  Kai Bu},
  editor       = {Aditya Akella and
                  Albert G. Greenberg},
  title        = {Compiling minimum incremental update for modular {SDN} languages},
  booktitle    = {Proceedings of the third workshop on Hot topics in software defined
                  networking, HotSDN '14, Chicago, Illinois, USA, August 22, 2014},
  pages        = {193--198},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2620728.2620733},
  doi          = {10.1145/2620728.2620733},
  timestamp    = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WenDZCLYB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZhaoCCZG13,
  author       = {Yao Zhao and
                  Yinzhi Cao and
                  Yan Chen and
                  Ming Zhang and
                  Anup Goyal},
  title        = {Rake: Semantics Assisted Network-Based Tracing Framework},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {3--14},
  year         = {2013},
  url          = {https://doi.org/10.1109/TNSM.2012.091912.120224},
  doi          = {10.1109/TNSM.2012.091912.120224},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZhaoCCZG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RastogiCJ13,
  author       = {Vaibhav Rastogi and
                  Yan Chen and
                  Xuxian Jiang},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {DroidChameleon: evaluating Android anti-malware against transformation
                  attacks},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {329--334},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484355},
  doi          = {10.1145/2484313.2484355},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RastogiCJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/RastogiCE13,
  author       = {Vaibhav Rastogi and
                  Yan Chen and
                  William Enck},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {AppsPlayground: automatic security analysis of smartphone applications},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {209--220},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435379},
  doi          = {10.1145/2435349.2435379},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/RastogiCE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CaoRLCM13,
  author       = {Yinzhi Cao and
                  Vaibhav Rastogi and
                  Zhichun Li and
                  Yan Chen and
                  Alexander Moshchuk},
  title        = {Redefining web browser principals with a Configurable Origin Policy},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575317},
  doi          = {10.1109/DSN.2013.6575317},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CaoRLCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LuZWCC13,
  author       = {Xun Lu and
                  Jianwei Zhuge and
                  Ruoyu Wang and
                  Yinzhi Cao and
                  Yan Chen},
  title        = {De-obfuscation and Detection of Malicious {PDF} Files with High Accuracy},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {4890--4899},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.166},
  doi          = {10.1109/HICSS.2013.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LuZWCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WenCHSW13,
  author       = {Xitao Wen and
                  Yan Chen and
                  Chengchen Hu and
                  Chao Shi and
                  Yi Wang},
  editor       = {Nate Foster and
                  Rob Sherwood},
  title        = {Towards a secure controller platform for openflow applications},
  booktitle    = {Proceedings of the Second {ACM} {SIGCOMM} Workshop on Hot Topics in
                  Software Defined Networking, HotSDN 2013, The Chinese University of
                  Hong Kong, Hong Kong, China, Friday, August 16, 2013},
  pages        = {171--172},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491185.2491212},
  doi          = {10.1145/2491185.2491212},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WenCHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GaoYCPGJD13,
  author       = {Hongyu Gao and
                  Vinod Yegneswaran and
                  Yan Chen and
                  Phillip A. Porras and
                  Shalini Ghosh and
                  Jian Jiang and
                  Hai{-}Xin Duan},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {An empirical reexamination of global {DNS} behavior},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {267--278},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2486018},
  doi          = {10.1145/2486001.2486018},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/GaoYCPGJD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/HuLWTCC12,
  author       = {Chengchen Hu and
                  Bin Liu and
                  Sheng Wang and
                  Jia Tian and
                  Yu Cheng and
                  Yan Chen},
  title        = {{ANLS:} Adaptive Non-Linear Sampling Method for Accurate Flow Size
                  Measurement},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {60},
  number       = {3},
  pages        = {789--798},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCOMM.2011.112311.100622},
  doi          = {10.1109/TCOMM.2011.112311.100622},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/HuLWTCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/HuCCLV12,
  author       = {Chengchen Hu and
                  Kai Chen and
                  Yan Chen and
                  Bin Liu and
                  Athanasios V. Vasilakos},
  title        = {A Measurement Study on Potential Inter-Domain Routing Diversity},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {268--278},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNSM.2012.070512.110191},
  doi          = {10.1109/TNSM.2012.070512.110191},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/HuCCLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChenGWYFCLW12,
  author       = {Kai Chen and
                  Chuanxiong Guo and
                  Haitao Wu and
                  Jing Yuan and
                  Zhenqian Feng and
                  Yan Chen and
                  Songwu Lu and
                  Wenfei Wu},
  title        = {{DAC:} Generic and Automatic Address Configuration for Data Center
                  Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {20},
  number       = {1},
  pages        = {84--99},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNET.2011.2157520},
  doi          = {10.1109/TNET.2011.2157520},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ChenGWYFCLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/DaiLCW12,
  author       = {Huichen Dai and
                  Bin Liu and
                  Yan Chen and
                  Yi Wang},
  editor       = {Tilman Wolf and
                  Andrew W. Moore and
                  Viktor K. Prasanna},
  title        = {On pending interest table in named data networking},
  booktitle    = {Symposium on Architecture for Networking and Communications Systems,
                  {ANCS} '12, Austin, TX, {USA} - October 29 - 30, 2012},
  pages        = {211--222},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2396556.2396600},
  doi          = {10.1145/2396556.2396600},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ancs/DaiLCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRCW12,
  author       = {Yinzhi Cao and
                  Zhichun Li and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Xitao Wen},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Virtual browser: a virtualized browser to sandbox third-party JavaScripts
                  with enhanced security},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {8--9},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414460},
  doi          = {10.1145/2414456.2414460},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoLRCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WenCCLXH12,
  author       = {Xitao Wen and
                  Kai Chen and
                  Yan Chen and
                  Yongqiang Liu and
                  Yong Xia and
                  Chengchen Hu},
  title        = {VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving
                  in Virtualized Datacenter},
  booktitle    = {2012 {IEEE} 32nd International Conference on Distributed Computing
                  Systems, Macau, China, June 18-21, 2012},
  pages        = {12--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCS.2012.25},
  doi          = {10.1109/ICDCS.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WenCCLXH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangHDMJLC12,
  author       = {Yi Wang and
                  Keqiang He and
                  Huichen Dai and
                  Wei Meng and
                  Junchen Jiang and
                  Bin Liu and
                  Yan Chen},
  title        = {Scalable Name Lookup in {NDN} Using Effective Name Component Encoding},
  booktitle    = {2012 {IEEE} 32nd International Conference on Distributed Computing
                  Systems, Macau, China, June 18-21, 2012},
  pages        = {688--697},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCS.2012.35},
  doi          = {10.1109/ICDCS.2012.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangHDMJLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/MaHCZZZCS12,
  author       = {Xingyu Ma and
                  Chengchen Hu and
                  Kai Chen and
                  Che Zhang and
                  Hongtao Zhang and
                  Kai Zheng and
                  Yan Chen and
                  Xianda Sun},
  title        = {Error Tolerant Address Configuration for Data Center Networks with
                  Malfunctioning Devices},
  booktitle    = {2012 {IEEE} 32nd International Conference on Distributed Computing
                  Systems, Macau, China, June 18-21, 2012},
  pages        = {708--717},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCS.2012.27},
  doi          = {10.1109/ICDCS.2012.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/MaHCZZZCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CaoYPC12,
  author       = {Yinzhi Cao and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Yan Chen},
  title        = {PathCutter: Severing the Self-Propagation Path of {XSS} JavaScript
                  Worms in Social Web Networks},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/pathcutter-severing-self-propagation-path-xss-javascript-worms-social-web-networks},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CaoYPC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GaoCLPC12,
  author       = {Hongyu Gao and
                  Yan Chen and
                  Kathy Lee and
                  Diana Palsetia and
                  Alok N. Choudhary},
  title        = {Towards Online Spam Filtering in Social Networks},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/towards-online-spam-filtering-social-networks},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GaoCLPC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/SinglaSC12,
  author       = {Kai Chen and
                  Ankit Singla and
                  Atul Singh and
                  Kishore Ramachandran and
                  Lei Xu and
                  Yueping Zhang and
                  Xitao Wen and
                  Yan Chen},
  editor       = {Steven D. Gribble and
                  Dina Katabi},
  title        = {{OSA:} An Optical Switching Architecture for Data Center Networks
                  with Unprecedented Flexibility},
  booktitle    = {Proceedings of the 9th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2012, San Jose, CA, USA, April 25-27, 2012},
  pages        = {239--252},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/chen\_kai},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/SinglaSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/GaoHHWC11,
  author       = {Hongyu Gao and
                  Jun Hu and
                  Tuo Huang and
                  Jingnan Wang and
                  Yan Chen},
  title        = {Security Issues in Online Social Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {15},
  number       = {4},
  pages        = {56--63},
  year         = {2011},
  url          = {https://doi.org/10.1109/MIC.2011.50},
  doi          = {10.1109/MIC.2011.50},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/GaoHHWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiGCK11,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Aleksandar Kuzmanovic},
  title        = {Measurement and diagnosis of address misconfigured {P2P} traffic},
  journal      = {{IEEE} Netw.},
  volume       = {25},
  number       = {3},
  pages        = {22--28},
  year         = {2011},
  url          = {https://doi.org/10.1109/MNET.2011.5772057},
  doi          = {10.1109/MNET.2011.5772057},
  timestamp    = {Sun, 14 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LiGCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenHZZCV11,
  author       = {Kai Chen and
                  Chengchen Hu and
                  Xin Zhang and
                  Kai Zheng and
                  Yan Chen and
                  Athanasios V. Vasilakos},
  title        = {Survey on routing in data centers: insights and future directions},
  journal      = {{IEEE} Netw.},
  volume       = {25},
  number       = {4},
  pages        = {6--10},
  year         = {2011},
  url          = {https://doi.org/10.1109/MNET.2011.5958002},
  doi          = {10.1109/MNET.2011.5958002},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenHZZCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiGCP11,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  title        = {Towards Situational Awareness of Large-Scale Botnet Probing Events},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {175--188},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2086445},
  doi          = {10.1109/TIFS.2010.2086445},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiGCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoYPC11,
  author       = {Yinzhi Cao and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Yan Chen},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: a path-cutting approach to blocking {XSS} worms in social
                  web networks},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {745--748},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093483},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoYPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoCLPC11,
  author       = {Hongyu Gao and
                  Yan Chen and
                  Kathy Lee and
                  Diana Palsetia and
                  Alok N. Choudhary},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: online spam filtering in social networks},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {769--772},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093489},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoCLPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuGLC11,
  author       = {Jun Hu and
                  Hongyu Gao and
                  Zhichun Li and
                  Yan Chen},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: {CUD:} crowdsourcing for {URL} spam detection},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {785--788},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093493},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuGLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhaoCCZG11,
  author       = {Yao Zhao and
                  Yinzhi Cao and
                  Yan Chen and
                  Ming Zhang and
                  Anup Goyal},
  title        = {Rake: Semantics assisted network-based tracing framework},
  booktitle    = {19th International Workshop on Quality of Service, IWQoS 2011, San
                  Jose, California, USA, 6-7 June 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWQOS.2011.5931314},
  doi          = {10.1109/IWQOS.2011.5931314},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhaoCCZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiTCRCLS11,
  author       = {Zhichun Li and
                  Yi Tang and
                  Yinzhi Cao and
                  Vaibhav Rastogi and
                  Yan Chen and
                  Bin Liu and
                  Clint Sbisa},
  title        = {WebShield: Enabling Various Web Defense Techniques without Client
                  Side Modifications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/webshield-enabling-various-web-defense-techniques-without-client-side-modifications},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiTCRCLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiGC10,
  author       = {Zhichun Li and
                  Yan Gao and
                  Yan Chen},
  title        = {HiFIND: {A} high-speed flow-level intrusion detection approach with
                  DoS resiliency},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {8},
  pages        = {1282--1299},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2009.10.016},
  doi          = {10.1016/J.COMNET.2009.10.016},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LiGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LuCBBL10,
  author       = {Guohan Lu and
                  Yan Chen and
                  Stefan Birrer and
                  Fabi{\'{a}}n E. Bustamante and
                  Xing Li},
  title        = {{POPI:} a user-level tool for inferring router packet forwarding priority},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {1--14},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816288.1816289},
  doi          = {10.1145/1816288.1816289},
  timestamp    = {Thu, 07 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/LuCBBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangLCFL10,
  author       = {Lanjia Wang and
                  Zhichun Li and
                  Yan Chen and
                  Zhi Fu and
                  Xing Li},
  title        = {Thwarting zero-day polymorphic worms with network-level length-based
                  signature generation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816288.1816293},
  doi          = {10.1145/1816288.1816293},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangLCFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoLRC10,
  author       = {Yinzhi Cao and
                  Zhichun Li and
                  Vaibhav Rastogi and
                  Yan Chen},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Virtual browser: a web-level sandbox to secure third-party JavaScript
                  without sacrificing functionality},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {654--656},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866387},
  doi          = {10.1145/1866307.1866387},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoLRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoHWLCZ10,
  author       = {Hongyu Gao and
                  Jun Hu and
                  Christo Wilson and
                  Zhichun Li and
                  Yan Chen and
                  Ben Y. Zhao},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Detecting and characterizing social spam campaigns},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {681--683},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866396},
  doi          = {10.1145/1866307.1866396},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoHWLCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/HuLZCCWC10,
  author       = {Chengchen Hu and
                  Bin Liu and
                  Hongbo Zhao and
                  Kai Chen and
                  Yan Chen and
                  Chunming Wu and
                  Yu Cheng},
  title        = {{DISCO:} Memory Efficient and Accurate Flow Statistics for Network
                  Measurement},
  booktitle    = {2010 International Conference on Distributed Computing Systems, {ICDCS}
                  2010, Genova, Italy, June 21-25, 2010},
  pages        = {665--674},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCS.2010.57},
  doi          = {10.1109/ICDCS.2010.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/HuLZCCWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/GaoHWLCZ10,
  author       = {Hongyu Gao and
                  Jun Hu and
                  Christo Wilson and
                  Zhichun Li and
                  Yan Chen and
                  Ben Y. Zhao},
  editor       = {Mark Allman},
  title        = {Detecting and characterizing social spam campaigns},
  booktitle    = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages        = {35--47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1879141.1879147},
  doi          = {10.1145/1879141.1879147},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/GaoHWLCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HuCCL10,
  author       = {Chengchen Hu and
                  Kai Chen and
                  Yan Chen and
                  Bin Liu},
  title        = {Evaluating Potential Routing Diversity for Internet Failure Recovery},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {321--325},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462219},
  doi          = {10.1109/INFCOM.2010.5462219},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/HuCCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiGCK10,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Aleksandar Kuzmanovic},
  title        = {Measurement and Diagnosis of Address Misconfigured {P2P} Traffic},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {1091--1099},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5461939},
  doi          = {10.1109/INFCOM.2010.5461939},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiGCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/LiZZCGW10,
  author       = {Zhichun Li and
                  Ming Zhang and
                  Zhaosheng Zhu and
                  Yan Chen and
                  Albert G. Greenberg and
                  Yi{-}Min Wang},
  title        = {WebProphet: Automating Performance Prediction for Web Services},
  booktitle    = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
                  {USA}},
  pages        = {143--158},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/nsdi10/tech/full\_papers/li.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/LiZZCGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ChenGWYFCLW10,
  author       = {Kai Chen and
                  Chuanxiong Guo and
                  Haitao Wu and
                  Jing Yuan and
                  Zhenqian Feng and
                  Yan Chen and
                  Songwu Lu and
                  Wenfei Wu},
  editor       = {Shivkumar Kalyanaraman and
                  Venkata N. Padmanabhan and
                  K. K. Ramakrishnan and
                  Rajeev Shorey and
                  Geoffrey M. Voelker},
  title        = {Generic and automatic address configuration for data center networks},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  New Delhi, India, August 30 -September 3, 2010},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851182.1851190},
  doi          = {10.1145/1851182.1851190},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ChenGWYFCLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiXGTCLJL10,
  author       = {Zhichun Li and
                  Gao Xia and
                  Hongyu Gao and
                  Yi Tang and
                  Yan Chen and
                  Bin Liu and
                  Junchen Jiang and
                  Yuezhou Lv},
  editor       = {Shivkumar Kalyanaraman and
                  Venkata N. Padmanabhan and
                  K. K. Ramakrishnan and
                  Rajeev Shorey and
                  Geoffrey M. Voelker},
  title        = {NetShield: massive semantics-based vulnerability signature matching
                  for high-speed networks},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2010 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  New Delhi, India, August 30 -September 3, 2010},
  pages        = {279--290},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851182.1851216},
  doi          = {10.1145/1851182.1851216},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiXGTCLJL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordCGLPY10,
  author       = {Paul Barford and
                  Yan Chen and
                  Anup Goyal and
                  Zhichun Li and
                  Vern Paxson and
                  Vinod Yegneswaran},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Employing Honeynets For Network Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {71--102},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_5},
  doi          = {10.1007/978-1-4419-0140-8\_5},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/Zhao010,
  author       = {Yao Zhao and
                  Yan Chen},
  editor       = {Graham Cormode and
                  Marina Thottan},
  title        = {Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis},
  booktitle    = {Algorithms for Next Generation Networks},
  series       = {Computer Communications and Networks},
  pages        = {319--340},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-84882-765-3\_14},
  doi          = {10.1007/978-1-84882-765-3\_14},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/Zhao010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhaoC09,
  author       = {Yao Zhao and
                  Yan Chen},
  title        = {{FAD} and {SPA:} End-to-end link-level loss rate inference without
                  infrastructure},
  journal      = {Comput. Networks},
  volume       = {53},
  number       = {9},
  pages        = {1303--1318},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comnet.2008.12.022},
  doi          = {10.1016/J.COMNET.2008.12.022},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZhaoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhaoCB09,
  author       = {Yao Zhao and
                  Yan Chen and
                  David Bindel},
  title        = {Towards unbiased end-to-end network diagnosis},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {17},
  number       = {6},
  pages        = {1724--1737},
  year         = {2009},
  url          = {http://doi.acm.org/10.1145/1721711.1721714},
  doi          = {10.1145/1721711.1721714},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/ZhaoCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiGCP09,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen and
                  Vern Paxson},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Automating analysis of large-scale botnet probing events},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533063},
  doi          = {10.1145/1533057.1533063},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiGCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChenCPCBPZ09,
  author       = {Kai Chen and
                  David R. Choffnes and
                  Rahul Potharaju and
                  Yan Chen and
                  Fabian E. Bustamante and
                  Dan Pei and
                  Yao Zhao},
  editor       = {J{\"{o}}rg Liebeherr and
                  Giorgio Ventre and
                  Ernst W. Biersack and
                  Srinivasan Keshav},
  title        = {Where the sidewalk ends: extending the internet as graph using traceroutes
                  from {P2P} users},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Emerging Networking Experiments
                  and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009},
  pages        = {217--228},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1658939.1658964},
  doi          = {10.1145/1658939.1658964},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/ChenCPCBPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhaoVCCZF09,
  author       = {Yao Zhao and
                  Sagar Vemuri and
                  Jiazhen Chen and
                  Yan Chen and
                  Hai Zhou and
                  Zhi Fu},
  title        = {Exception triggered DoS attacks on wireless networks},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270358},
  doi          = {10.1109/DSN.2009.5270358},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhaoVCCZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChenHZCL09,
  author       = {Kai Chen and
                  Chengchen Hu and
                  Wenwen Zhang and
                  Yan Chen and
                  Bin Liu},
  title        = {On the Eyeshots of {BGP} Vantage Points},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425389},
  doi          = {10.1109/GLOCOM.2009.5425389},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ChenHZCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhaoZCPW09,
  author       = {Yao Zhao and
                  Zhaosheng Zhu and
                  Yan Chen and
                  Dan Pei and
                  Jia Wang},
  title        = {Towards Efficient Large-Scale {VPN} Monitoring and Diagnosis under
                  Operational Constraints},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {531--539},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5061959},
  doi          = {10.1109/INFCOM.2009.5061959},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhaoZCPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ZhaoXYKYCG09,
  author       = {Yao Zhao and
                  Yinglian Xie and
                  Fang Yu and
                  Qifa Ke and
                  Yuan Yu and
                  Yan Chen and
                  Eliot Gillum},
  editor       = {Jennifer Rexford and
                  Emin G{\"{u}}n Sirer},
  title        = {BotGraph: Large Scale Spamming Botnet Detection},
  booktitle    = {Proceedings of the 6th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2009, April 22-24, 2009, Boston, MA, {USA}},
  pages        = {321--334},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/nsdi09/tech/full\_papers/zhao/zhao.pdf},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/ZhaoXYKYCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhuYC09,
  author       = {Zhaosheng Zhu and
                  Vinod Yegneswaran and
                  Yan Chen},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Using Failure Information Analysis to Detect Enterprise Zombies},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_11},
  doi          = {10.1007/978-3-642-05284-2\_11},
  timestamp    = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhuYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DengGCK08,
  author       = {Leiwen Deng and
                  Yan Gao and
                  Yan Chen and
                  Aleksandar Kuzmanovic},
  title        = {Pollution attacks and defenses for Internet caching systems},
  journal      = {Comput. Networks},
  volume       = {52},
  number       = {5},
  pages        = {935--956},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comnet.2007.11.019},
  doi          = {10.1016/J.COMNET.2007.11.019},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/DengGCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ZhuLCFRH08,
  author       = {Zhaosheng Zhu and
                  Guohan Lu and
                  Yan Chen and
                  Zhi (Judy) Fu and
                  Phil Roberts and
                  Keesook Han},
  title        = {Botnet Research Survey},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {967--972},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.205},
  doi          = {10.1109/COMPSAC.2008.205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ZhuLCFRH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HuWTLCC08,
  author       = {Chengchen Hu and
                  Sheng Wang and
                  Jia Tian and
                  Bin Liu and
                  Yu Cheng and
                  Yan Chen},
  title        = {Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear
                  Sampling Method},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {26--30},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.14},
  doi          = {10.1109/INFOCOM.2008.14},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HuWTLCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ZhaoCR08,
  author       = {Yao Zhao and
                  Yan Chen and
                  Sylvia Ratnasamy},
  title        = {Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor
                  Networks},
  booktitle    = {Proceedings of the Fifth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2008,
                  June 16-20, 2008, Crowne Plaza, San Francisco International Airport,
                  California, {USA}},
  pages        = {560--568},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/SAHCN.2008.73},
  doi          = {10.1109/SAHCN.2008.73},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/ZhaoCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiGC08,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Honeynet-based Botnet Scan Traffic Analysis},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {25--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_2},
  doi          = {10.1007/978-0-387-68768-1\_2},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhaoCLZ07,
  author       = {Yao Zhao and
                  Yan Chen and
                  Bo Li and
                  Qian Zhang},
  title        = {Hop {ID:} {A} Virtual Coordinate-Based Routing for Sparse Mobile Ad
                  Hoc Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {6},
  number       = {9},
  pages        = {1075--1089},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMC.2007.1042},
  doi          = {10.1109/TMC.2007.1042},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhaoCLZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/SchwellerLCGGZDKM07,
  author       = {Robert T. Schweller and
                  Zhichun Li and
                  Yan Chen and
                  Yan Gao and
                  Ashish Gupta and
                  Yin Zhang and
                  Peter A. Dinda and
                  Ming{-}Yang Kao and
                  Gokhan Memik},
  title        = {Reversible sketches: enabling monitoring and analysis over high-speed
                  data streams},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {5},
  pages        = {1059--1072},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1322413.1322420},
  doi          = {10.1145/1322413.1322420},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/SchwellerLCGGZDKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChenBSK07,
  author       = {Yan Chen and
                  David Bindel and
                  Han Hee Song and
                  Randy H. Katz},
  title        = {Algebra-based scalable overlay network monitoring: algorithms, evaluation,
                  and applications},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {5},
  pages        = {1084--1097},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1322413.1322422},
  doi          = {10.1145/1322413.1322422},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ChenBSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiWCF07,
  author       = {Zhichun Li and
                  Lanjia Wang and
                  Yan Chen and
                  Zhi Fu},
  title        = {Network-based and Attack-resilient Length Signature Generation for
                  Zero-day Polymorphic Worms},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375847},
  doi          = {10.1109/ICNP.2007.4375847},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/LiWCF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuCBBCL07,
  author       = {Guohan Lu and
                  Yan Chen and
                  Stefan Birrer and
                  Fabi{\'{a}}n E. Bustamante and
                  C. Y. Cheung and
                  Xing Li},
  title        = {End-to-End Inference of Router Packet Forwarding Priority},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {1784--1792},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.208},
  doi          = {10.1109/INFCOM.2007.208},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LuCBBCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhaoC07,
  author       = {Yao Zhao and
                  Yan Chen},
  title        = {A Suite of Schemes for User-Level Network Diagnosis without Infrastructure},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {2171--2179},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.251},
  doi          = {10.1109/INFCOM.2007.251},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhaoC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/GaoZSVCSK07,
  author       = {Yan Gao and
                  Yao Zhao and
                  Robert T. Schweller and
                  Shobha Venkataraman and
                  Yan Chen and
                  Dawn Xiaodong Song and
                  Ming{-}Yang Kao},
  title        = {Detecting Stealthy Spreaders Using Online Outdegree Histograms},
  booktitle    = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS
                  2007, Evanston, Illinois, USA, June 21-22, 2007},
  pages        = {145--153},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IWQOS.2007.376561},
  doi          = {10.1109/IWQOS.2007.376561},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/GaoZSVCSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cga/RenGLCW06,
  author       = {Pin Ren and
                  Yan Gao and
                  Zhichun Li and
                  Yan Chen and
                  Benjamin Watson},
  title        = {IDGraphs: Intrusion Detection and Analysis Using Stream Compositing},
  journal      = {{IEEE} Computer Graphics and Applications},
  volume       = {26},
  number       = {2},
  pages        = {28--39},
  year         = {2006},
  url          = {https://doi.org/10.1109/MCG.2006.36},
  doi          = {10.1109/MCG.2006.36},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cga/RenGLCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GaoLC06,
  author       = {Yan Gao and
                  Zhichun Li and
                  Yan Chen},
  title        = {A DoS Resilient Flow-level Intrusion Detection Approach for High-speed
                  Networks},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {39},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.6},
  doi          = {10.1109/ICDCS.2006.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GaoLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/GaoDKC06,
  author       = {Yan Gao and
                  Leiwen Deng and
                  Aleksandar Kuzmanovic and
                  Yan Chen},
  title        = {Internet Cache Pollution Attacks and Countermeasures},
  booktitle    = {Proceedings of the 14th {IEEE} International Conference on Network
                  Protocols, {ICNP} 2006, November 12-15, 2006, Santa Barbara, California,
                  {USA}},
  pages        = {54--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICNP.2006.320198},
  doi          = {10.1109/ICNP.2006.320198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/GaoDKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SchwellerLCGGZDKM06,
  author       = {Robert T. Schweller and
                  Zhichun Li and
                  Yan Chen and
                  Yan Gao and
                  Ashish Gupta and
                  Yin Zhang and
                  Peter A. Dinda and
                  Ming{-}Yang Kao and
                  Gokhan Memik},
  title        = {Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation,
                  and Applications},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.203},
  doi          = {10.1109/INFOCOM.2006.203},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SchwellerLCGGZDKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ZhaoCB06,
  author       = {Yao Zhao and
                  Yan Chen and
                  David Bindel},
  editor       = {Luigi Rizzo and
                  Thomas E. Anderson and
                  Nick McKeown},
  title        = {Towards unbiased end-to-end network diagnosis},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2006 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Pisa, Italy, September 11-15, 2006},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1159913.1159939},
  doi          = {10.1145/1159913.1159939},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ZhaoCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/ZhaoCB06,
  author       = {Yao Zhao and
                  Yan Chen and
                  David Bindel},
  editor       = {Raymond A. Marie and
                  Peter B. Key and
                  Evgenia Smirni},
  title        = {Towards deterministic network diagnosis},
  booktitle    = {Proceedings of the Joint International Conference on Measurement and
                  Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo,
                  France, June 26-30, 2006},
  pages        = {387--388},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1140277.1140333},
  doi          = {10.1145/1140277.1140333},
  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/ZhaoCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiSCKC06,
  author       = {Zhichun Li and
                  Manan Sanghi and
                  Yan Chen and
                  Ming{-}Yang Kao and
                  Brian Chavez},
  title        = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with
                  Provable Attack Resilience},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {32--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.18},
  doi          = {10.1109/SP.2006.18},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiSCKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhaoLZCZ05,
  author       = {Yao Zhao and
                  Bo Li and
                  Qian Zhang and
                  Yan Chen and
                  Wenwu Zhu},
  title        = {Efficient Hop {ID} based Routing for Sparse Ad Hoc Networks},
  booktitle    = {13th {IEEE} International Conference on Network Protocols {(ICNP}
                  2005), 6-9 November 2005, Boston, MA, {USA}},
  pages        = {179--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICNP.2005.13},
  doi          = {10.1109/ICNP.2005.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ZhaoLZCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RenGLCW05,
  author       = {Pin Ren and
                  Yan Gao and
                  Zhichun Li and
                  Yan Chen and
                  Benjamin Watson},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {IDGraphs: Intrusion Detection and Analysis Using Histographs},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {5},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.7},
  doi          = {10.1109/VIZSEC.2005.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/SchwellerGPC04,
  author       = {Robert T. Schweller and
                  Ashish Gupta and
                  Elliot Parsons and
                  Yan Chen},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {Reversible sketches for efficient and accurate change detection over
                  network data streams},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {207--212},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028814},
  doi          = {10.1145/1028788.1028814},
  timestamp    = {Mon, 08 Jul 2019 07:25:59 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/SchwellerGPC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ChenBSK04,
  author       = {Yan Chen and
                  David Bindel and
                  Han Hee Song and
                  Randy H. Katz},
  editor       = {Raj Yavatkar and
                  Ellen W. Zegura and
                  Jennifer Rexford},
  title        = {An algebraic approach to practical and scalable overlay network monitoring},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2004 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communication,
                  August 30 - September 3, 2004, Portland, Oregon, {USA}},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015467.1015475},
  doi          = {10.1145/1015467.1015475},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ChenBSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChenQCNK03,
  author       = {Yan Chen and
                  Lili Qiu and
                  Weiyu Chen and
                  Luan Nguyen and
                  Randy H. Katz},
  title        = {Efficient and adaptive Web replication using content clustering},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {6},
  pages        = {979--994},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2003.814608},
  doi          = {10.1109/JSAC.2003.814608},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ChenQCNK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ChenBK03,
  author       = {Yan Chen and
                  David Bindel and
                  Randy H. Katz},
  title        = {Tomography-based overlay network monitoring},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2003, Miami Beach, FL, USA, October 27-29, 2003},
  pages        = {216--231},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948205.948233},
  doi          = {10.1145/948205.948233},
  timestamp    = {Mon, 08 Jul 2019 07:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ChenBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KrishnamurthySZC03,
  author       = {Balachander Krishnamurthy and
                  Subhabrata Sen and
                  Yin Zhang and
                  Yan Chen},
  title        = {Sketch-based change detection: methods, evaluation, and applications},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2003, Miami Beach, FL, USA, October 27-29, 2003},
  pages        = {234--247},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948205.948236},
  doi          = {10.1145/948205.948236},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/KrishnamurthySZC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/ChenLKO02,
  author       = {Yan Chen and
                  Khian Hao Lim and
                  Randy H. Katz and
                  Chris Overton},
  title        = {On the stability of network distance estimation},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {30},
  number       = {2},
  pages        = {21--30},
  year         = {2002},
  url          = {https://doi.org/10.1145/588160.588164},
  doi          = {10.1145/588160.588164},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/ChenLKO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ChenQCNK02,
  author       = {Yan Chen and
                  Lili Qiu and
                  Weiyu Chen and
                  Luan Nguyen and
                  Randy H. Katz},
  title        = {Clustering Web Content for Efficient Replication},
  booktitle    = {10th {IEEE} International Conference on Network Protocols {(ICNP}
                  2002), 12-15 November 2002, Paris, France, Proceedings},
  pages        = {165--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICNP.2002.1181397},
  doi          = {10.1109/ICNP.2002.1181397},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ChenQCNK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/ChenKK02,
  author       = {Yan Chen and
                  Randy H. Katz and
                  John Kubiatowicz},
  editor       = {Peter Druschel and
                  M. Frans Kaashoek and
                  Antony I. T. Rowstron},
  title        = {Dynamic Replica Placement for Scalable Content Delivery},
  booktitle    = {Peer-to-Peer Systems, First International Workshop, {IPTPS} 2002,
                  Cambridge, MA, USA, March 7-8, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2429},
  pages        = {306--318},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45748-8\_29},
  doi          = {10.1007/3-540-45748-8\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/ChenKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/RamanACCCJLLMMPRSSSSSZJKS02,
  author       = {Bhaskaran Raman and
                  Sharad Agarwal and
                  Yan Chen and
                  Matthew Caesar and
                  Weidong Cui and
                  Per Johansson and
                  Kevin Lai and
                  Tal Lavian and
                  Sridhar Machiraju and
                  Zhuoqing Morley Mao and
                  George Porter and
                  Timothy Roscoe and
                  Mukund Seshadri and
                  Jimmy S. Shih and
                  Keith Sklower and
                  Lakshminarayanan Subramanian and
                  Takashi Suzuki and
                  Shelley Zhuang and
                  Anthony D. Joseph and
                  Randy H. Katz and
                  Ion Stoica},
  editor       = {Friedemann Mattern and
                  Mahmoud Naghshineh},
  title        = {The {SAHARA} Model for Service Composition across Multiple Providers},
  booktitle    = {Pervasive Computing, First International Conference, Pervasive 2002,
                  Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2414},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45866-2\_1},
  doi          = {10.1007/3-540-45866-2\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/RamanACCCJLLMMPRSSSSSZJKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/ChenKK02,
  author       = {Yan Chen and
                  Randy H. Katz and
                  John Kubiatowicz},
  editor       = {Friedemann Mattern and
                  Mahmoud Naghshineh},
  title        = {{SCAN:} {A} Dynamic, Scalable, and Efficient Content Distribution
                  Network},
  booktitle    = {Pervasive Computing, First International Conference, Pervasive 2002,
                  Z{\"{u}}rich, Switzerland, August 26-28, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2414},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45866-2\_22},
  doi          = {10.1007/3-540-45866-2\_22},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/ChenKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenBBKK01,
  author       = {Yan Chen and
                  Adam W. Bargteil and
                  David Bindel and
                  Randy H. Katz and
                  John Kubiatowicz},
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {Quantifying Network Denial of Service: {A} Location Service Case Study},
  booktitle    = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  pages        = {340--351},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7\_37},
  doi          = {10.1007/3-540-45600-7\_37},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChenBBKK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/KubiatowiczBCCEGGRWWWZ00,
  author       = {John Kubiatowicz and
                  David Bindel and
                  Yan Chen and
                  Steven E. Czerwinski and
                  Patrick R. Eaton and
                  Dennis Geels and
                  Ramakrishna Gummadi and
                  Sean C. Rhea and
                  Hakim Weatherspoon and
                  Westley Weimer and
                  Chris Wells and
                  Ben Y. Zhao},
  editor       = {Larry Rudolph and
                  Anoop Gupta},
  title        = {OceanStore: An Architecture for Global-Scale Persistent Storage},
  booktitle    = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Cambridge,
                  MA, USA, November 12-15, 2000},
  pages        = {190--201},
  publisher    = {{ACM} Press},
  year         = {2000},
  url          = {https://doi.org/10.1145/378993.379239},
  doi          = {10.1145/378993.379239},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/KubiatowiczBCCEGGRWWWZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cgf/ZhuCK98,
  author       = {Qing{-}hong Zhu and
                  Yan Chen and
                  Arie E. Kaufman},
  title        = {Real-time Biomechanically-based Muscle Volume Deformation using {FEM}},
  journal      = {Comput. Graph. Forum},
  volume       = {17},
  number       = {3},
  pages        = {275--284},
  year         = {1998},
  url          = {https://doi.org/10.1111/1467-8659.00274},
  doi          = {10.1111/1467-8659.00274},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cgf/ZhuCK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ca/ChenZKM98,
  author       = {Yan Chen and
                  Qing{-}hong Zhu and
                  Arie E. Kaufman and
                  Shigeru Muraki},
  title        = {Physically-based Animation of Volumetric Objects},
  booktitle    = {Computer Animation 1998, {CA} 1998, Philadelphia, Pennsylvania, USA,
                  June 8-10, 1998},
  pages        = {154--160},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CA.1998.681920},
  doi          = {10.1109/CA.1998.681920},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ca/ChenZKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics