Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Fang Yu
2010 – today
- 2013
[c61]Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao: SocialWatch: detection of online service abuse via large-scale social graphs. ASIACCS 2013: 143-148
[c60]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee: Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013
[c59]Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang: Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. IEEE Symposium on Security and Privacy 2013: 112-126- 2012
[c58]Chi-Yao Hong, Fang Yu, Yinglian Xie: Populated IP addresses: classification and applications. ACM Conference on Computer and Communications Security 2012: 329-340
[c57]Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao: Innocent by association: early recognition of legitimate users. ACM Conference on Computer and Communications Security 2012: 353-364
[c56]Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang: Knowing your enemy: understanding and detecting malicious web advertising. ACM Conference on Computer and Communications Security 2012: 674-686
[c55]Fang Yu, Toshiya Kaihara, Nobutada Fujii: Game Theory Based Multi-attribute Negotiation between MA and MSAs. APMS (2) 2012: 535-543
[c54]Fang Yu, Shun-Ching Yang, Farn Wang, Guan-Cheng Chen, Che-Chang Chan: Symbolic consistency checking of OpenMp parallel programs. LCTES 2012: 139-148
[c53]Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi: Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS 2012
[c52]Jie Zhao, Fang Yu, Minfeng Tang, Wenliao Du, Jin Yuan: Study on the Design of Automatic Cotton Bale Inspecting Management System. WISM 2012: 1-8- 2011
[j12]Shailesh Agrawal, Kavitha Athota, Pramod Bhatotia, Piyush Goyal, Phani Krisha, Kirtika Ruchandan, Nishanth Sastry, Gurmeet Singh, Sujesha Sudevalayam, Immanuel Ilavarasan Thomas, Arun Vishwanath, Tianyin Xu, Fang Yu: Session reports for SIGCOMM 2010. Computer Communication Review 41(1): 66-83 (2011)
[j11]Fang Yu, Tevfik Bultan, Oscar H. Ibarra: Relational String Verification Using Multi-Track Automata. Int. J. Found. Comput. Sci. 22(8): 1909-1924 (2011)
[j10]Fang Yu, Haijun Jiang: Global exponential synchronization of fuzzy cellular neural networks with delays and reaction-diffusion terms. Neurocomputing 74(4): 509-515 (2011)
[c51]Farn Wang, Chung-Hao Huang, Fang Yu: A Temporal Logic for the Interaction of Strategies. CONCUR 2011: 466-481
[c50]Fang Yu, Muath Alkhalaf, Tevfik Bultan: Patching vulnerabilities with sanitization synthesis. ICSE 2011: 251-260
[c49]Fang Yu, Toshiya Kaihara, Nobutada Fujii: A Multi-agent Based Negotiation for Supply Chain Network Using Game Theory. APMS 2011: 299-308
[c48]Fang Yu, Vijay Gopalakrishnan, David Lee, K. K. Ramakrishnan: Nemor: A congestion-aware protocol for anonymous peer-based content distribution. Peer-to-Peer Computing 2011: 260-269
[c47]Fang Yu, Tevfik Bultan, Ben Hardekopf: String Abstractions for String Verification. SPIN 2011: 20-37
[c46]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi: deSEO: Combating Search-Result Poisoning. USENIX Security Symposium 2011
[c45]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi: Heat-seeking honeypots: design and experience. WWW 2011: 207-216
[e1]- 2010
[c44]Qing Zhou, Fang Yu, Liming Cheng, Limin Chen: A knowledge-based decision making tool in competitive environments. BIC-TA 2010: 359-363
[c43]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage: How to tell an airport from a home: techniques and applications. HotNets 2010: 13
[c42]Tevfik Bultan, Fang Yu, Aysu Betin-Can: Modular verification of synchronization with reentrant locks. MEMOCODE 2010: 59-68
[c41]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu: On Network-level Clusters for Spam Detection. NDSS 2010
[c40]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu: Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. IEEE Symposium on Security and Privacy 2010: 207-222
[c39]Fang Yu, Muath Alkhalaf, Tevfik Bultan: Stranger: An Automata-Based String Analysis Tool for PHP. TACAS 2010: 154-157
[c38]John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy: Searching the Searchers with SearchAudit. USENIX Security Symposium 2010: 127-142
[c37]Fang Yu, Tevfik Bultan, Oscar H. Ibarra: Relational String Verification Using Multi-track Automata. CIAA 2010: 290-299
[c36]
2000 – 2009
- 2009
[c35]Qing Zhou, Fang Yu, Binqiang Wang: An Algorithm Evaluating System Stability to Process. ICA3PP 2009: 626-637
[c34]Fang Yu, Muath Alkhalaf, Tevfik Bultan: Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. ASE 2009: 605-609
[c33]Vaneet Aggarwal, A. Robert Calderbank, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan, Fang Yu: The effectiveness of intelligent scheduling for multicast video-on-demand. ACM Multimedia 2009: 421-430
[c32]Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, Eliot Gillum: BotGraph: Large Scale Spamming Botnet Detection. NSDI 2009: 321-334
[c31]Yinglian Xie, Fang Yu, Martín Abadi: De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86
[c30]Fang Yu, Tevfik Bultan, Oscar H. Ibarra: Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336- 2008
[j9]Oscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun: On spiking neural P systems and partially blind counter machines. Natural Computing 7(1): 3-19 (2008)
[c29]Qing Zhou, Fang Yu: Knowledge-Based Major Choosing Decision Making for Remote Students. CSSE (5) 2008: 474-478
[c28]John D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang: A practical reconfigurable hardware accelerator for Boolean satisfiability solvers. DAC 2008: 780-785
[c27]Guifang Shao, Yuhua Wen, Fang Yu, Zushu Li: Target Localization for Autonomous Soccer Robot Based on Vision Perception. ISICA 2008: 831-840
[c26]John D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang: Designing an Efficient Hardware Implication Accelerator for SAT Solving. SAT 2008: 48-62
[c25]Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov: Spamming botnets: signatures and characteristics. SIGCOMM 2008: 171-182
[c24]Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan: Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202
[c23]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra: Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324- 2007
[c22]Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber: How dynamic are IP addresses? SIGCOMM 2007: 301-312
[c21]Fang Yu, Tevfik Bultan, Erik Peterson: Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340
[c20]Dongling Chen, Daling Wang, Ge Yu, Fang Yu: A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation. APWeb/WAIM 2007: 606-613- 2006
[j8]Fang Yu, Bow-Yaw Wang: Sat-based Model Checking for Region Automata. Int. J. Found. Comput. Sci. 17(4): 775-796 (2006)
[j7]Fang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz: Efficient Multimatch Packet Classification for Network Security Applications. IEEE Journal on Selected Areas in Communications 24(10): 1805-1816 (2006)
[j6]Farn Wang, Geng-Dian Huang, Fang Yu: TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. IEEE Trans. Software Eng. 32(7): 510-526 (2006)
[c19]Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, Randy H. Katz: Fast and memory-efficient regular expression matching for deep packet inspection. ANCS 2006: 93-102
[c18]Xuyao Luo, Fang Yu, Jun Zhang: Study of Parametric Relation in Ant Colony Optimization Approach to Traveling Salesman Problem. ICIC (3) 2006: 22-32
[c17]Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. SIGCOMM 2006: 339-350
[c16]Oscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun: On Spiking Neural P Systems and Partially Blind Counter Machines. UC 2006: 113-129- 2005
[j5]Farn Wang, Geng-Dian Huang, Fang Yu: Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol. J. Embedded Computing 1(1): 39-56 (2005)
[j4]Fang Yu, Randy H. Katz, T. V. Lakshman: Efficient Multimatch Packet Classification and Lookup with TCAM. IEEE Micro 25(1): 50-59 (2005)
[c15]Fang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz: SSA: a power and memory efficient scheme to multi-match packet classification. ANCS 2005: 105-113
[c14]Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo: Efficient Exact Spare Allocation via Boolean Satisfiability. DFT 2005: 361-370- 2004
[j3]Farn Wang, Karsten Schmidt, Fang Yu, Geng-Dian Huang, Bow-Yaw Wang: BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. IEEE Trans. Software Eng. 30(6): 403-417 (2004)
[c13]
[c12]Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo: Verifying Web Applications Using Bounded Model Checking. DSN 2004: 199-208
[c11]Fang Yu, Bow-Yaw Wang, Yao-Wen Huang: Bounded Model Checking for Region Automata. FORMATS/FTRTFT 2004: 246-262
[c10]Fang Yu, Randy H. Katz: Efficient multi-match packet classification with TCAM. Hot Interconnects 2004: 28-34
[c9]Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo: Securing web application code by static analysis and runtime protection. WWW 2004: 40-52- 2003
[j2]Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu: Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. MONET 8(4): 427-442 (2003)
[j1]Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang: QoS-adaptive proxy caching for multimedia streaming over the Internet. IEEE Trans. Circuits Syst. Video Techn. 13(3): 257-269 (2003)
[c8]Farn Wang, Geng-Dian Hwang, Fang Yu: Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. FORTE 2003: 160-176
[c7]Farn Wang, Fang Yu: OVL Assertion-Checking of Embedded Software with Dense-Time Semantics. RTCSA 2003: 254-278
[c6]Farn Wang, Geng-Dian Huang, Fang Yu: Symbolic Simulation of Real-Time Concurrent Systems. RTCSA 2003: 595-617
[c5]Farn Wang, Geng-Dian Hwang, Fang Yu: TCTL Inevitability Analysis of Dense-Time Systems. CIAA 2003: 176-187
[i2]Farn Wang, Geng-Dian Hwang, Fang Yu: TCTL Inevitability Analysis of Dense-time Systems. CoRR cs.SC/0304003 (2003)
[i1]Farn Wang, Geng-Dian Hwang, Fang Yu: Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. CoRR cs.SE/0303027 (2003)- 2002
[c4]Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker: GHT: a geographic hash table for data-centric storage. WSNA 2002: 78-87- 2001
[c3]Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang: Network-Adaptive Cache Management Schemes for Mixed Media. IEEE Pacific Rim Conference on Multimedia 2001: 685-692- 2000
[c2]Fang Yu, Wen Jin: An Effective Approach to Mining Exeption Class Association Rules. Web-Age Information Management 2000: 145-150
[c1]Shuigeng Zhou, Ye Fan, Jiangtao Hu, Fang Yu, Yunfa Hu: Hierachically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure. Web-Age Information Management 2000: 215-226
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:20 CEST by the dblp team



