
Hai-Xin Duan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j12]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [c68]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c67]Yiming Zhang, Baojun Liu, Chaoyi Lu, Zhou Li
, Haixin Duan, Shuang Hao, Mingxuan Liu, Ying Liu, Dong Wang, Qiang Li:
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China. CCS 2020: 521-534 - [c66]Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan:
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels. CCS 2020: 1337-1350 - [c65]Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang:
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks. CCS 2020: 1939-1952 - [c64]Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang, Haixin Duan, Shuang Hao, Xiarun Chen, Yao Wang:
CDN Backfired: Amplification Attacks Based on HTTP Range Requests. DSN 2020: 14-25 - [c63]Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li
, Qi Li, Haixin Duan, Donghong Sun:
Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539 - [c62]Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:
CDN Judo: Breaking the CDN DoS Protection with Itself. NDSS 2020 - [c61]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [c60]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. IEEE Symposium on Security and Privacy 2020: 1071-1087 - [c59]Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian:
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices. USENIX Security Symposium 2020: 577-593 - [i2]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. CoRR abs/2011.08420 (2020)
2010 – 2019
- 2019
- [j11]Jia Zhang, Hai-Xin Duan, Jian Jiang, Jinjin Liang, Jianping Wu:
Finding the best answer: measuring the optimization of public and authoritative DNS. Sci. China Inf. Sci. 62(3): 39107:1-39107:3 (2019) - [c58]Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li
, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. ACSAC 2019: 500-513 - [c57]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li
, Shuang Hao, Min Yang
:
Who is answering my queries: understanding and characterizing interception of the DNS resolution path. ANRW 2019: 15-16 - [c56]Baojun Liu, Zhou Li
, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c55]Guanyu Li, Menghao Zhang, Chang Liu, Xiao Kong, Ang Chen, Guofei Gu, Haixin Duan:
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering. ICNP 2019: 1-12 - [c54]Chaoyi Lu, Baojun Liu, Zhou Li
, Shuang Hao, Hai-Xin Duan, Mingming Zhang, Chunying Leng, Ying Liu, Zaifeng Zhang, Jianping Wu:
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? Internet Measurement Conference 2019: 22-35 - [c53]Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Shuang Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang:
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams. SecureComm (2) 2019: 3-25 - [c52]Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge, Haixin Duan:
Fuzzing IPC with Knowledge Inference. SRDS 2019: 11-20 - [i1]Shuqiang Lu, Lingyun Ying, Wenjie Lin, Yu Wang, Meining Nie, Kaiwen Shen, Lu Liu, Haixin Duan:
New Era of Deeplearning-Based Malware Intrusion Detection: The Malware Detection and Prediction Based On Deep Learning. CoRR abs/1907.08356 (2019) - 2018
- [c51]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang
, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian
, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c50]Fuqing Chen, Hai-Xin Duan, Xiaofeng Zheng, Jian Jiang, Jianjun Chen:
Path Leaks of HTTPS Side-Channel by Cookie Injection. COSADE 2018: 189-203 - [c49]Baojun Liu, Chaoyi Lu, Zhou Li
, Ying Liu, Hai-Xin Duan, Shuang Hao, Zaifeng Zhang:
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. DSN 2018: 654-665 - [c48]Jian Jiang, Jia Zhang, Hai-Xin Duan, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7 - [c47]Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Hai-Xin Duan:
ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software. ISC 2018: 67-84 - [c46]Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Hai-Xin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia:
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation. SRDS 2018: 1-10 - [c45]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang
:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. USENIX Security Symposium 2018: 1079-1093 - [c44]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li
, Shuang Hao, Min Yang
:
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. USENIX Security Symposium 2018: 1113-1128 - [c43]Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Hai-Xin Duan:
Measuring Privacy Threats in China-Wide Mobile Networks. FOCI @ USENIX Security Symposium 2018 - [c42]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - 2017
- [c41]Daiping Liu, Zhou Li
, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan:
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. CCS 2017: 537-552 - [c40]Jia Zhang, Hai-Xin Duan, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. GLOBECOM 2017: 1-7 - [c39]Hao Yang, Xiulin Ma, Kun Du, Zhou Li
, Hai-Xin Duan, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy. IEEE Symposium on Security and Privacy 2017: 751-769 - 2016
- [j10]Song Li, Hai-Xin Duan, Zhiliang Wang, Jinjin Liang, Xing Li:
An accurate distributed scheme for detection of prefix interception. Sci. China Inf. Sci. 59(5): 052105:1-052105:17 (2016) - [j9]Yi Guo, Hai-Xin Duan, Jikun Chen, Fu Miao:
MAF-SAM: An effective method to perceive data plane threats of inter domain routing system. Comput. Networks 110: 69-78 (2016) - [j8]Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. IEEE/ACM Trans. Netw. 24(1): 43-57 (2016) - [c38]Wei Liu, Yueqian Zhang, Zhou Li
, Hai-Xin Duan:
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps. SPSM@CCS 2016: 23-32 - [c37]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson:
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. CCS 2016: 1516-1527 - [c36]Jianjun Chen, Xiaofeng Zheng, Hai-Xin Duan, Jinjin Liang, Jian Jiang, Kang Li, Tao Wan, Vern Paxson:
Forwarding-Loop Attacks in Content Delivery Networks. NDSS 2016 - [c35]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - [c34]Kun Du, Hao Yang, Zhou Li
, Hai-Xin Duan, Kehuan Zhang:
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. USENIX Security Symposium 2016: 245-262 - 2015
- [c33]Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:
Route Leaks Identification by Detecting Routing Loops. SecureComm 2015: 313-329 - [c32]Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Hai-Xin Duan, Shuo Chen, Tao Wan, Nicholas Weaver:
Cookies Lack Integrity: Real-World Implications. USENIX Security Symposium 2015: 707-721 - 2014
- [c31]Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan:
IntentFuzzer: detecting capability leaks of android applications. AsiaCCS 2014: 531-536 - [c30]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu:
When HTTPS Meets CDN: A Case of Authentication in Delegated Service. IEEE Symposium on Security and Privacy 2014: 67-82 - 2013
- [c29]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Jianping Wu:
Measuring Query Latency of Top Level DNS Servers. PAM 2013: 145-154 - [c28]Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan:
An empirical reexamination of global DNS behavior. SIGCOMM 2013: 267-278 - [c27]Ming Zheng, Jianping Wu, Hai-Xin Duan:
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication. TrustCom/ISPA/IUCC 2013: 651-658 - 2012
- [c26]Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. NDSS 2012 - 2011
- [j7]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. Comput. Commun. 34(3): 358-366 (2011) - [c25]Jian Jiang, Hai-Xin Duan, Tao Lin, Fenglin Qin, Hong Zhang:
A federated identity management system with centralized trust and unified Single Sign-On. CHINACOM 2011: 785-789 - [c24]Wu Liu, Ping Ren, Ke Liu, Hai-Xin Duan:
User cooperation trust model and its application in network security management. FSKD 2011: 2335-2339 - [c23]Ming Zheng, Hai-Xin Duan, Jianping Wu:
Anonymous Communication over Invisible Mix Rings. ICA3PP (1) 2011: 182-193 - [c22]Wu Liu, Hai-Xin Duan, Ping Ren:
Cooperation-Based Trust Model and Its Application in Network Security Management. ICA3PP (1) 2011: 453-459 - 2010
- [c21]Lei Hou, Hai-Xin Duan, Jianping Wu:
Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer Networks. CIT 2010: 1002-1008 - [c20]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. AINA Workshops 2010: 860-865 - [c19]Wu Liu, Hai-Xin Duan, Ping Ren, Jianping Wu:
IABA: An improved PNN Algorithm for anomaly detection in network security management. ICNC 2010: 335-339
2000 – 2009
- 2009
- [j6]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network. IEICE Trans. Commun. 92-B(10): 3183-3194 (2009) - [c18]Lei Hou, Hai-Xin Duan, Jianping Wu:
Selecting Trust Peers Based on Updated Credit Value in Peer-to-Peer Networks. Security and Management 2009: 628-634 - 2008
- [j5]Hong Zhang, Hai-Xin Duan, Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci. China Ser. F Inf. Sci. 51(11): 1871-1882 (2008) - [j4]Lanjia Wang, Hai-Xin Duan, Xing Li:
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. Sci. China Ser. F Inf. Sci. 51(11): 1883-1897 (2008) - [c17]Lei Hou, Hai-Xin Duan, Jianping Wu:
Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks. ICPADS 2008: 470-477 - [c16]Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li, Jian-Ping Wu:
Attacking Test and Online Forensics in IPv6 Networks. IMF 2008: 87-106 - [c15]Yuan Liang, Hai-Xin Duan:
An Admission Control Policy Based on Social Networks for P2P Systems. WAIM 2008: 487-492 - [c14]Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System. WAIM 2008: 501-507 - 2005
- [j3]Feng Yang, Hai-Xin Duan, Xing Li:
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation. Sci. China Ser. F Inf. Sci. 48(1): 91-106 (2005) - [j2]Quang-Anh Tran, Xing Li, Hai-Xin Duan:
Efficient performance estimate for one-class support vector machine. Pattern Recognit. Lett. 26(8): 1174-1182 (2005) - [c13]Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. CIS (2) 2005: 482-487 - [c12]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. CIS (2) 2005: 518-525 - [c11]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Algorithm Mining Intrusion Patterns. FSKD (2) 2005: 774-777 - [c10]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Method for Intrusion Features Mining in IDS. ICIC (1) 2005: 429-437 - [c9]Lanjia Wang, Hai-Xin Duan, Xing Li:
Port Scan Behavior Diagnosis by Clustering. ICICS 2005: 243-255 - [c8]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. ICITA (2) 2005: 564-567 - [c7]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. ICITA (2) 2005: 759-762 - [c6]Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li:
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. ISNN (3) 2005: 476-481 - 2004
- [j1]Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li:
Workflow Oriented Network Management - A Web/Java Approach. J. Netw. Syst. Manag. 12(4): 431-439 (2004) - [c5]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren:
XML Based X.509 Authorization in CERNET Grid. GCC 2004: 325-332 - [c4]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren:
Algorithms for Congestion Detection and Control. GCC Workshops 2004: 374-381 - [c3]Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren:
Improved algorithms tracing back to attacking sources. Parallel and Distributed Computing and Networks 2004: 222-226 - 2003
- [c2]Wu Liu, Hai-Xin Duan, Jianping Wu, Ping Ren, Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources. GCC (1) 2003: 859-866 - 2000
- [c1]Hai-Xin Duan, Jianping Wu, Xing Li:
Policy based access control framework for large networks. ICON 2000: 267-272
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-03 00:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint