default search action
Jiahai Yang 0001
Person information
- affiliation: Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
Other persons with the same name
- Jiahai Yang — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j51]Wenqi Chen, Zhiliang Wang, Liyuan Chang, Kai Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi:
Network anomaly detection via similarity-aware ensemble learning with ADSim. Comput. Networks 247: 110423 (2024) - [j50]Yirui Luo, Chenglong Li, Zhiliang Wang, Jiahai Yang:
IPREDS: Efficient Prediction System for Internet-wide Port and Service Scanning. Proc. ACM Netw. 2(CoNEXT1): 1-24 (2024) - [j49]Chenxin Duan, Sainan Li, Hai Lin, Wenqi Chen, Guanglei Song, Chenglong Li, Jiahai Yang, Zhiliang Wang:
IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3931-3947 (2024) - [j48]Ying Zhong, Zhiliang Wang, Xingang Shi, Jiahai Yang, Keqin Li:
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. IEEE Trans. Inf. Forensics Secur. 19: 5895-5910 (2024) - [j47]Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Shize Zhang, Xiaoqing Sun, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Xihui Yang, Zhiliang Wang, Jiahai Yang:
Proactive Telemetry in Large-Scale Multi-Tenant Cloud Overlay Networks. IEEE/ACM Trans. Netw. 32(4): 3002-3017 (2024) - [j46]Guanglei Song, Lin He, Feiyu Zhu, Jinlei Lin, Wenjian Zhang, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang:
AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System. IEEE/ACM Trans. Netw. 32(5): 3870-3887 (2024) - [j45]Jinlei Lin, Chenglong Li, Wenwen Gong, Guanglei Song, Linna Fan, Zhiliang Wang, Jiahai Yang:
ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content. IEEE/ACM Trans. Netw. 32(5): 4398-4413 (2024) - [j44]Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Shuai Yang, Biao Lyu, Shunmin Zhu, Enhuan Dong, Zhiliang Wang, Jiahai Yang:
CouldPin-Fast: Effient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. IEEE Trans. Serv. Comput. 17(3): 850-864 (2024) - 2023
- [j43]Enhuan Dong, Peng Gao, Yuan Yang, Mingwei Xu, Xiaoming Fu, Jiahai Yang:
SmartSBD: Smart shared bottleneck detection for efficient multipath congestion control over heterogeneous networks. Comput. Networks 237: 110047 (2023) - [j42]Lin He, Gang Ren, Ying Liu, Guanglei Song, Jinlong E, Jiahai Yang, Mingwei Xu:
SAV6: A Novel Inter-AS Source Address Validation Protocol for IPv6 Internet. IEEE Netw. 37(5): 64-70 (2023) - [j41]Linna Fan, Lin He, Yichao Wu, Shize Zhang, Zhiliang Wang, Jia Li, Jiahai Yang, Chaocan Xiang, Xiaoqian Ma:
AutoIoT: Automatically Updated IoT Device Identification With Semi-Supervised Learning. IEEE Trans. Mob. Comput. 22(10): 5769-5786 (2023) - 2022
- [j40]Linna Fan, Lin He, Enhuan Dong, Jiahai Yang, Chenglong Li, Jinlei Lin, Zhiliang Wang:
EvoIoT: An evolutionary IoT and non-IoT classification model in open environments. Comput. Networks 219: 109450 (2022) - [j39]Songyun Wu, Bo Wang, Zhiliang Wang, Shuhan Fan, Jiahai Yang, Jia Li:
Joint prediction on security event and time interval through deep learning. Comput. Secur. 117: 102696 (2022) - [j38]Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang:
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning. IEEE Trans. Inf. Forensics Secur. 17: 3972-3987 (2022) - [j37]Qing Li, Yichao Wu, Jingpu Duan, Jiahai Yang, Yong Jiang:
Weighted NSFIB Aggregation With Generalized Next Hop of Strict Partial Order. IEEE Trans. Netw. Serv. Manag. 19(2): 890-904 (2022) - [j36]Chenxin Duan, Hao Gao, Guanglei Song, Jiahai Yang, Zhiliang Wang:
ByteIoT: A Practical IoT Device Identification System Based on Packet Length Distribution. IEEE Trans. Netw. Serv. Manag. 19(2): 1717-1728 (2022) - [j35]Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai John Yang:
IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry. IEEE Trans. Netw. Serv. Manag. 19(3): 2854-2868 (2022) - [j34]Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, Xiaowen Quan:
DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE/ACM Trans. Netw. 30(4): 1629-1643 (2022) - 2021
- [j33]Lin He, Peng Kuang, Ying Liu, Gang Ren, Jiahai Yang:
Towards securing Duplicate Address Detection using P4. Comput. Networks 198: 108323 (2021) - [j32]Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin:
A novel workload scheduling framework for intrusion detection system in NFV scenario. Comput. Secur. 106: 102271 (2021) - [j31]Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin:
Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors. IEEE J. Sel. Areas Commun. 39(8): 2632-2647 (2021) - [j30]Bo Wang, Fengyuan Ren, Jiahai Yang, Chao Zhou:
Improving the Performance of Online Bitrate Adaptation with Multi-Step Prediction Over Cellular Networks. IEEE Trans. Mob. Comput. 20(1): 174-187 (2021) - [j29]Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. IEEE/ACM Trans. Netw. 29(1): 78-91 (2021) - [j28]Lin He, Gang Ren, Ying Liu, Jiahai Yang:
PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet. IEEE/ACM Trans. Netw. 29(2): 695-708 (2021) - 2020
- [j27]Ying Zhong, Wenqi Chen, Zhiliang Wang, Yifan Chen, Kai Wang, Yahui Li, Xia Yin, Xingang Shi, Jiahai Yang, Keqin Li:
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning. Comput. Networks 169: 107049 (2020) - [j26]Xiaoqing Sun, Zhiliang Wang, Jiahai Yang, Xinran Liu:
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks. Comput. Secur. 99: 102057 (2020) - [j25]Hui Yu, Jiahai Yang, Carol J. Fung:
Fine-Grained Cloud Resource Provisioning for Virtual Network Function. IEEE Trans. Netw. Serv. Manag. 17(3): 1363-1376 (2020) - [j24]Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Yingya Guo, Haijun Geng, Jiahai Yang:
Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning. IEEE/ACM Trans. Netw. 28(4): 1573-1586 (2020) - 2019
- [j23]Hui Yu, Jiahai Yang, Hui Wang, Hui Zhang:
Towards predictable performance via two-layer bandwidth allocation in cloud datacenter. J. Parallel Distributed Comput. 126: 34-47 (2019) - 2018
- [j22]Jianping Weng, Jessie Hui Wang, Jiahai Yang, Yang Yang:
Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. IEEE/ACM Trans. Netw. 26(4): 1646-1659 (2018) - 2017
- [j21]Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu:
Optimal construction of virtual networks for Cloud-based MapReduce workflows. Comput. Networks 112: 194-207 (2017) - [j20]Cong Xu, Jiahai Yang, Jianping Weng, Ye Wang, Hui Yu:
Optimising the deployment of virtual machine image replicas in cloud storage clusters. Int. J. High Perform. Comput. Netw. 10(4/5): 423-435 (2017) - [j19]Haifeng Ma, Jiahai Yang, Nianmin Yao, Mingshan Guan:
一种层次式远程数据持有检测方法 (Hierarchical Remote Data Possession Checking Method). 计算机科学 44(3): 55-58 (2017) - 2016
- [j18]Fuliang Li, Jiahai Yang, Xingwei Wang, Tian Pan, Changqing An, Jianping Wu:
Characteristics analysis at prefix granularity: A case study in an IPv6 network. J. Netw. Comput. Appl. 70: 156-170 (2016) - [j17]Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang:
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments. J. Parallel Distributed Comput. 90-91: 52-66 (2016) - [j16]Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Xueren Yang, Mingui Zhang, Huichen Dai, Bin Liu:
Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Trans. Netw. 24(3): 1448-1461 (2016) - 2015
- [j15]Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang:
Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability. Comput. Commun. 67: 11-22 (2015) - [j14]Jessie Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang:
Solving multicast problem in cloud networks using overlay routing. Comput. Commun. 70: 1-14 (2015) - [j13]Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Xingwei Wang:
Towards centralized and semi-automatic VLAN management. Int. J. Netw. Manag. 25(1): 52-73 (2015) - 2014
- [j12]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Hui Zhang:
A study of traffic from the perspective of a large pure IPv6 ISP. Comput. Commun. 37: 40-52 (2014) - [j11]Fuliang Li, Jiahai Yang, Jianping Wu, Zhiyan Zheng, Huijing Zhang, Xingwei Wang:
Configuration analysis and recommendation: Case studies in IPv6 networks. Comput. Commun. 53: 37-51 (2014) - 2013
- [j10]Bin Zhang, Jiahai Yang, Jianping Wu, Ziyu Wang:
MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability. Comput. J. 56(10): 1176-1188 (2013) - [j9]Mingwei Xu, Meijia Hou, Dan Wang, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. Comput. Networks 57(1): 117-133 (2013) - 2012
- [j8]Bin Zhang, Jiahai Yang, Jian-Ping Wu, Ying-Wu Zhu:
Diagnosing Traffic Anomalies Using a Two-Phase Model. J. Comput. Sci. Technol. 27(2): 313-327 (2012) - 2011
- [j7]Jianping Wu, Jessie Hui Wang, Jiahai Yang:
CNGI-CERNET2: an IPv6 deployment in China. Comput. Commun. Rev. 41(2): 48-52 (2011) - [j6]Jessie Hui Wang, Changqing An, Jiahai Yang:
A study of traffic, user behavior and pricing policies in a large campus network. Comput. Commun. 34(16): 1922-1931 (2011) - [j5]Jessie Hui Wang, Chungang Wang, Jiahai Yang, Changqing An:
A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management. Peer-to-Peer Netw. Appl. 4(4): 410-419 (2011) - 2009
- [j4]Jiahai Yang, Hui Zhang, Jinxiang Zhang, Changqing An:
Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. J. Comput. Sci. Technol. 24(3): 482-494 (2009) - 2008
- [j3]Jingjing Zhou, Jiahai Yang, Yang Yang, Hongbo Liu, Ming Zeng:
Traffic matrix estimation based on a square root Kalman filtering algorithm. Int. J. Netw. Manag. 18(6): 539-551 (2008) - 2004
- [j2]Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li:
Workflow Oriented Network Management - A Web/Java Approach. J. Netw. Syst. Manag. 12(4): 431-439 (2004) - 2003
- [j1]Chuanhai Liu, Scott A. Vander Wiel, Jiahai Yang:
A nonstationary traffic train model for fine scale inference from coarse scale counts. IEEE J. Sel. Areas Commun. 21(6): 895-907 (2003)
Conference and Workshop Papers
- 2024
- [c110]Mingxuan Liu, Zhenglong Jin, Jiahai Yang, Baoiun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang:
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse. DSN 2024: 507-521 - [c109]Xin He, Enhuan Dong, Jiahai Yang, Shize Zhang, Zhiliang Wang, Zejie Wang, Ye Yang, Jun Zhou, Xiaoqing Sun, Enge Song, Jianyuan Lu, Biao Lyu, Shunmin Zhu:
CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud Networks. INFOCOM 2024: 741-750 - [c108]Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan:
CP-IoT: A Cross-Platform Monitoring System for Smart Home. NDSS 2024 - [c107]Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang:
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. NDSS 2024 - [c106]Shangdong Wang, Zhiliang Wang, Chenglong Li, Dongqi Han, Jiahai Yang, Hui Zhang:
TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning. NOMS 2024: 1-9 - [c105]Hongbin Sun, Su Wang, Zhiliang Wang, Zheyu Jiang, Dongqi Han, Jiahai Yang:
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection. RAID 2024: 263-277 - [c104]Xiao Li, Shicheng Wang, Menghao Zhang, Zhiliang Wang, Mingwei Xu, Jiahai Yang:
POSTER: RDMA Network Performance Anomalies Diagnosis with Hawkeye. SIGCOMM (Posters and Demos) 2024: 1-3 - 2023
- [c103]Rui Yu, Fei Xiao, Zhiliang Wang, Jiahai Yang, Dongqi Han, Zhihua Wang, Minghui Jin, Chenglong Li, Enhuan Dong, Shutao Xia:
Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks. ISCC 2023: 1280-1286 - [c102]Linna Fan, Lin He, Xiaoqing Sun, Enhuan Dong, Jiahai Yang, Zhiliang Wang, Jinlei Lin, Guanglei Song:
GraphIoT: Accurate IoT Identification based on Heterogeneous Graph. IWQoS 2023: 1-4 - [c101]Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang:
Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning. IWQoS 2023: 1-10 - [c100]Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin:
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. NDSS 2023 - [c99]Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu:
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels. NDSS 2023 - [c98]Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin:
BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. NDSS 2023 - [c97]Dongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin:
Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild. IFIP Networking 2023: 1-9 - [c96]Yunfeng Zhao, Wenchi Zhang, Zhiliang Wang, Shize Zhang, Kaixin Sui, Enhuan Dong, Jiahai Yang:
Multi-stage Location for Root-Cause Metrics in Online Service Systems. NOMS 2023: 1-9 - 2022
- [c95]Yaozhong Liu, Long Pan, Chenglong Li, Lin He, Yirui Luo, Guanglei Song, Jiahai Yang, Zhiliang Wang:
PerfTrace: A New Multi-metric Network Performance Monitoring Tool. CNSM 2022: 240-246 - [c94]Leyao Nie, Lin He, Guanglei Song, Hao Gao, Chenglong Li, Zhiliang Wang, Jiahai Yang:
Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers. CNSM 2022: 303-309 - [c93]Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang:
Zoonet: a proactive telemetry system for large-scale cloud networks. CoNEXT 2022: 321-336 - [c92]Yaozhong Liu, Zhiliang Wang, Jiahai Yang, Long Pan, Lin He, Jinlei Lin, Guanglei Song, Chenglong Li:
Both Efficient and Accurate: A Large-scale One-way Delay Measurement Scheme. GLOBECOM 2022: 395-400 - [c91]Yaozhong Liu, Jiahai Yang, Zhiliang Wang, Long Pan, Lin He, Jinlei Lin, Guanglei Song, Chenglong Li:
What Causes Delay Asymmetry: A Large-scale One-way Delay Measurement and Empirical Study. GLOBECOM 2022: 6127-6132 - [c90]Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang:
Centralized Network Utility Maximization with Accelerated Gradient Method. ICNP 2022: 1-11 - [c89]Xiaoqing Sun, Jiahai Yang:
HetGLM: Lateral Movement Detection by Discovering Anomalous Links with Heterogeneous Graph Neural Network. IPCCC 2022: 404-411 - [c88]Yichao Wu, Chenglong Li, Jiahai Yang, Zhiliang Wang, Wei Hu, Ang Xia, Yong Jiang, Yao Wang, Liuli Wu:
WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics. ISCC 2022: 1-7 - [c87]Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi:
ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. NDSS 2022 - [c86]Chenxin Duan, Kai Wang, Wenqi Chen, Guanglei Song, Jiahai Yang, Zhiliang Wang:
Monitoring Smart Home Traffic under Differential Privacy. NOMS 2022: 1-10 - [c85]Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, Yaozhong Liu, Zhongxiang Sun:
AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System. USENIX ATC 2022: 309-326 - 2021
- [c84]Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu:
MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking. ACSAC 2021: 1051-1063 - [c83]Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin:
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. CCS 2021: 3197-3217 - [c82]Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang, Yingya Guo, Haijun Geng:
Traffic Engineering with Segment Routing Considering Probabilistic Failures. CNSM 2021: 21-27 - [c81]Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai Yang:
IntStream: An Intent-driven Streaming Network Telemetry Framework. CNSM 2021: 473-481 - [c80]Xin Cheng, Zhiliang Wang, Shize Zhang, Jia Li, Jiahai Yang, Xinran Liu:
Slider: Towards Precise, Robust and Updatable Sketch-based DDoS Flooding Attack Detection. GLOBECOM 2021: 1-6 - [c79]Jieling Liu, Zhiliang Wang, Jiahai Yang, Bo Wang, Lin He, Guanglei Song, Xinran Liu:
Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats. ICC 2021: 1-6 - [c78]Shize Zhang, Zhiliang Wang, Jiahai Yang, Dongbin Bai, Fuliang Li, Zimu Li, Jianping Wu, Xinran Liu:
Unsupervised IoT Fingerprinting Method via Variational Auto-encoder and K-means. ICC 2021: 1-6 - [c77]Chenxin Duan, Shize Zhang, Jiahai Yang, Zhiliang Wang, Yang Yang, Jia Li:
PINBALL: Universal and Robust Signature Extraction for Smart Home Devices. IM 2021: 1-9 - [c76]Wenqi Chen, Zhiliang Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi:
ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble Learning. IM 2021: 608-612 - [c75]Ying Zhong, Ziqi Gao, Rui Li, Citong Que, Xinjie Yang, Zhiliang Wang, Jiahai Yang, Xia Yin, Xingang Shi, Keqin Li:
STRAD: Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network Environment. ISCC 2021: 1-8 - [c74]Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, Lin He, Jianping Wu:
CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. ISSRE 2021: 367-377 - [c73]Nan Geng, Mingwei Xu, Yuan Yang, Chenyi Liu, Jiahai Yang, Qi Li, Shize Zhang:
Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning. IWQoS 2021: 1-10 - 2020
- [c72]Linna Fan, Shize Zhang, Yichao Wu, Zhiliang Wang, Chenxin Duan, Jia Li, Jiahai Yang:
An IoT Device Identification Method based on Semi-supervised Learning. CNSM 2020: 1-7 - [c71]Xin Fang, Xiaoqing Sun, Jiahai Yang, Xinran Liu:
Domain-Embeddings Based DGA Detection with Incremental Training Method. ISCC 2020: 1-6 - [c70]Guanglei Song, Lin He, Zhiliang Wang, Jiahai Yang, Tao Jin, Jieling Liu, Guo Li:
Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space. IWQoS 2020: 1-10 - [c69]Xiaoqing Sun, Jiahai Yang, Zhiliang Wang, Heng Liu:
HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection. NOMS 2020: 1-9 - [c68]Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. TrustCom 2020: 468-474 - 2019
- [c67]Shize Zhang, Hui Zhang, Jiahai Yang, Guanglei Song, Jianping Wu:
Measurement and Analysis of Adult Websites in IPv6 Networks. APNOMS 2019: 1-6 - [c66]Shuhan Fan, Songyun Wu, Zhiliang Wang, Zimu Li, Jiahai Yang, Heng Liu, Xinran Liu:
ALEAP: Attention-based LSTM with Event Embedding for Attack Projection. IPCCC 2019: 1-8 - [c65]Mingkai Tong, Xiaoqing Sun, Jiahai Yang, Hui Zhang, Shuang Zhu, Xinran Liu, Heng Liu:
D3N: DGA Detection with Deep-Learning Through NXDomain. KSEM (1) 2019: 464-471 - [c64]Chenxi Li, Jiahai Yang, Guo Li, Kang Wang:
A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher. LCN Symposium 2019: 175-182 - [c63]Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu:
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. RAID 2019: 399-412 - 2018
- [c62]Hui Yu, Jiahai Yang, Carol J. Fung:
Elastic Network Service Chain with Fine-Grained Vertical Scaling. GLOBECOM 2018: 1-7 - [c61]Hui Yu, Jiahai Yang, Carol J. Fung, Raouf Boutaba, Yi Zhuang:
ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds. ICPADS 2018: 34-41 - 2017
- [c60]Ziyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li:
Robust regression for anomaly detection. ICC 2017: 1-6 - [c59]Jianping Weng, Jessie Hui Wang, Jiahai Yang, Yang Yang:
Root cause analysis of anomalies of multitier services in public clouds. IWQoS 2017: 1-6 - [c58]Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang:
Generic and agile service function chain verification on cloud. IWQoS 2017: 1-10 - 2016
- [c57]Xiao Ling, Jiahai Yang, Dan Wang, Jinfeng Chen, Liyao Li:
Fast Community Detection in Large Weighted Networks Using GraphX in the Cloud. HPCC/SmartCity/DSS 2016: 1-8 - [c56]Hui Yu, Jiahai Yang, Carol J. Fung:
SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud Datacenter. HPCC/SmartCity/DSS 2016: 86-93 - [c55]Fuliang Li, Xingwei Wang, Tian Pan, Jiahai Yang:
Packet delay, loss and reordering in IPv6 world: A case study. ICNC 2016: 1-6 - [c54]Pengcheng Du, Jessie Hui Wang, Jiahai Yang, Jianfeng Wang, Youjian Zhao:
Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs. ICOIN 2016: 155-160 - [c53]Di Fu, Jiahai Yang, Xiao Ling, Hui Zhang:
Load-aware hybrid scheduling in large compute clusters. ISCC 2016: 791-796 - [c52]Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang:
Tetris: Optimizing cloud resource usage unbalance with elastic VM. IWQoS 2016: 1-10 - [c51]Hui Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang:
SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placement. NOMS 2016: 410-417 - [c50]Ziyu Wang, Jiahai Yang, Hui Zhang, Chenxi Li, Shize Zhang, Hui Wang:
Towards online anomaly detection by combining multiple detection methods and Storm. NOMS 2016: 804-807 - [c49]Ziyu Wang, Jiahai Yang, Shize Zhang, Chenxi Li, Hui Zhang:
Automatic Model Selection for Anomaly Detection. Trustcom/BigDataSE/ISPA 2016: 276-283 - 2015
- [c48]Fuliang Li, Jiahai Yang, Xingwei Wang:
MOE-A framework integrating network performance monitoring, optimization and evaluation. APNOMS 2015: 262-267 - [c47]Chenxi Li, Jiahai Yang, Ziyu Wang, Fuliang Li, Yang Yang:
A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows. GLOBECOM 2015: 1-6 - [c46]Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang:
Cluster Scheduler on Heterogeneous Cloud. HPCC/CSS/ICESS 2015: 772-777 - [c45]Fuliang Li, Tian Pan, Jiahai Yang, Changqing An, Xingwei Wang, Jianping Wu:
Investigating the prefix-level characteristics: A case study in an IPv6 network. ICNC 2015: 824-829 - [c44]Zejia Chen, Jiahai Yang, Jessie Hui Wang:
MuLTI: Multiple location tags inference for users in social networks. ISCC 2015: 555-561 - 2014
- [c43]Fuliang Li, Jiahai Yang, Huijing Zhang, Suogang Li, Xingwei Wang, Jianping Wu:
Evolution of network configurations: High-level analysis of an operational IP backbone network. APNOMS 2014: 1-4 - [c42]Ziyu Wang, Jiahai Yang, Fuliang Li:
An on-line anomaly detection method based on LMS algorithm. APNOMS 2014: 1-6 - [c41]Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang:
Optimizing the Topologies of Virtual Networks for Cloud-Based Big Data Processing. HPCC/CSS/ICESS 2014: 189-196 - [c40]Kun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin:
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. ICCCN 2014: 1-6 - [c39]Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu:
Towards zero-time wakeup of line cards in power-aware routers. INFOCOM 2014: 190-198 - [c38]Zejia Chen, Jiahai Yang, Jessie Hui Wang:
A cascading framework for uncovering spammers in social networks. Networking 2014: 1-9 - [c37]Miao Li, Jessie Hui Wang, Jiahai Yang, Chenxi Li:
A value based framework for provider selection of regional ISPs. NOMS 2014: 1-8 - [c36]Cong Xu, Jiahai Yang, Di Fu, Hui Zhang:
Towards Optimal Collaboration of Policies in the Two-Phase Scheduling of Cloud Tasks. NPC 2014: 306-320 - [c35]Ziyu Wang, Jiahai Yang, Fuliang Li:
A New Anomaly Detection Method Based on IGTE and IGFE. SecureComm (2) 2014: 93-109 - [c34]Ziyu Wang, Jiahai Yang, Fuliang Li:
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio. TrustCom 2014: 90-97 - 2013
- [c33]Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Siyang Wang, Ning Jiang:
CSS-VM: A centralized and semi-automatic system for VLAN management. IM 2013: 623-629 - [c32]Miao Li, Jiahai Yang, Changqing An, Chenxi Li, Fuliang Li:
IPv6 network topology discovery method based on novel graph mapping algorithms. ISCC 2013: 554-560 - 2012
- [c31]Donghong Qin, Jiahai Yang, Zhuolin Liu, Jessie Hui Wang, Bin Zhang, Wei Zhang:
AMIR: Another Multipath Interdomain Routing. AINA 2012: 581-588 - [c30]Miao Li, Jessie Hui Wang, Jiahai Yang:
Flattening and preferential attachment in the internet evolution. APNOMS 2012: 1-8 - [c29]Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang:
Separating identifier from locator with extended DNS. ICC 2012: 2747-2751 - [c28]Donghong Qin, Jiahai Yang, Jessie Hui Wang, Bin Zhang, Lei Gao, Zhuolin Liu:
Multipath interdomain routing via deviation from primary path. ICOIN 2012: 222-227 - [c27]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen:
Unravel the characteristics and development of current IPv6 network. LCN 2012: 316-319 - [c26]Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao:
PCA-subspace method - Is it good enough for network-wide anomaly detection. NOMS 2012: 359-367 - [c25]Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang:
What's going on in Chinese IPv6 world. NOMS 2012: 534-537 - 2011
- [c24]Lei Gao, Jiahai Yang, Hui Zhang, Bin Zhang, Donghong Qin:
FlowInfra: A fault-resilient scalable infrastructure for network-wide flow level measurement. APNOMS 2011: 1-8 - [c23]Ning Jiang, Changqing An, Jiahai Yang:
Adaptive tuning of operation parameters for automatically learned filter table. APNOMS 2011: 1-8 - [c22]Fuliang Li, Changqing An, Jiahai Yang, Ning Jiang, Jianping Wu:
Investigating the efficiency of fine granularity source address validation in IPv6 networks. APNOMS 2011: 1-8 - [c21]Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao:
MCST: Anomaly detection using feature stability for packet-level traffic. APNOMS 2011: 1-8 - [c20]Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin:
An efficient parallel TCAM scheme for the forwarding engine of the next-generation router. Integrated Network Management 2011: 454-461 - [c19]Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang:
On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation. INFOCOM 2011: 321-325 - [c18]Changqing An, Jessie Hui Wang, Jiahai Yang:
MIB design and application for source address validation improvement protocol. ISCC 2011: 677-680 - 2010
- [c17]Lei Gao, Jiahai Yang, Jessie Hui Wang, Hui Zhang:
A measure of growth of user community in OSNs. IWQoS 2010: 1-2 - [c16]Bin Zhang, Jianping Wu, Qi Li, Jiahai Yang:
Efficient parallel searching with TCAMs. IWQoS 2010: 1-2 - [c15]Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li:
Efficient searching with parallel TCAM chips. LCN 2010: 228-321 - 2009
- [c14]Guanqun Zhang, Jessie Hui Wang, Jiahai Yang:
Understanding Web Hosting Utility of Chinese ISPs. APNOMS 2009: 11-20 - [c13]Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang:
Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing. ICDCS 2009: 68-75 - [c12]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
BPR: a bit-level packet recovery in wireless sensor networks. SAC 2009: 59-65 - 2008
- [c11]Shaojun Huang, Changqing An, Jessie Hui Wang, Jiahai Yang:
Understanding IPv6 Usage: Communities and Behaviors. APNOMS 2008: 256-265 - [c10]Jingjing Zhou, Jiahai Yang, Yang Yang, Guanqun Zhang:
Traffic Matrix Estimation Using Square Root Filtering/Smoothing Algorithm. APNOMS 2008: 519-522 - [c9]Jinxiang Zhang, Jiahai Yang, Jianping Wu:
A Novel Management Information Retrieval Algorithm Based on NGI. ICYCS 2008: 259-263 - [c8]Jianping He, Jiahai Yang, Changqing An, Hongbo Liu, Xuenong Li:
Analysis on MAC layer retransmission scheme in wireless networks. MOBIWAC 2008: 161-165 - [c7]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
A study of collisions in wireless network coding system. Wireless Days 2008: 1-5 - [c6]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
Transmission power selection for ad hoc networks. WICON 2008: 18 - 2007
- [c5]Jilong Wang, Miaohui Zhang, Jiahai Yang:
Internet Management Network. APNOMS 2007: 599-602 - [c4]Yunqi Li, Jiahai Yang, Changqing An, Hui Zhang:
Finding hierarchical heavy hitters in network measurement system. SAC 2007: 232-236 - 2006
- [c3]Wei She, Jiahai Yang, Jianping Wu:
Passive Inter-Domain Routing Monitor Based on Routing Interaction. CIT 2006: 104 - 2005
- [c2]Jun Zhang, Jiahai Yang, Changqing An, Jilong Wang:
Traffic Measurement and Analysis of TUNET. CW 2005: 330-334 - 2000
- [c1]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
Informal and Other Publications
- 2024
- [i8]Cong Dong, Jiahai Yang, Yun Li, Yue Wu, Yufan Chen, Chenglong Li, Haoran Jiao, Xia Yin, Yuling Liu:
E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet. CoRR abs/2403.12363 (2024) - [i7]Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang:
Centralized Network Utility Maximization with Accelerated Gradient Method. CoRR abs/2408.08034 (2024) - 2022
- [i6]Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu:
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels. CoRR abs/2210.13088 (2022) - 2021
- [i5]Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin:
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. CoRR abs/2109.11495 (2021) - [i4]Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Hongbin Sun, Xingang Shi, Jiahai Yang:
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning. CoRR abs/2111.04333 (2021) - 2020
- [i3]Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin:
Practical Traffic-space Adversarial Attacks on Learning-based NIDSs. CoRR abs/2005.07519 (2020) - [i2]Xin Fang, Xiaoqing Sun, Jiahai Yang, Xinran Liu:
Domain-Embeddings Based DGA Detection with Incremental Training Method. CoRR abs/2009.09959 (2020) - 2019
- [i1]Xiaoqing Sun, Mingkai Tong, Jiahai Yang:
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. CoRR abs/1909.01590 (2019)
Coauthor Index
aka: Jessie Hui Wang
aka: Jian-Ping Wu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint