


default search action
Xia Yin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xia Yin 0001
— Tsinghua University, Department of Computer Science and Technology, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j28]Haijun Geng, Qi Ma, Haotian Chi, Zhi Zhang, Jing Yang, Xia Yin:
DUdetector: A dual-granularity unsupervised model for network anomaly detection. Comput. Networks 257: 110937 (2025)
[j27]Jiangyuan Yao
, Weiyang Xin
, Xia Yin, Xingang Shi, Zhiliang Wang, Li Zhou, Ting Jin:
A model checking-based framework for testing security properties of protocols under development. Comput. Networks 265: 111259 (2025)
[c57]Zhiyang Chen, Hailong Yao, Xia Yin:
PatLabor: Pareto Optimization of Timing-Driven Routing Trees. DAC 2025: 1-7
[c56]Zhiyang Chen, Hailong Yao, Xia Yin:
Learning Configurations for Data-Driven Multi-Objective Optimization. ICML 2025
[c55]Zitong Jin, Xingang Shi, Qiang Ma, Letong Sun, Zhiliang Wang, Xia Yin, Jianping Wu:
Which way to go? Inferring Fine-Grained AS Paths with PathRadar. INFOCOM 2025: 1-10
[c54]Zitong Jin, Xingang Shi, Ying Tian, Zhiliang Wang, Xia Yin, Jianping Wu:
Affinity-Model: Improving AS Routing Models via AS Affinity Behavior Inference. INFOCOM 2025: 1-10- 2024
[j26]Xixi Ji, Jing Chen, Xia Yin:
Coyote optimisation algorithm for separable nonlinear models using chaotic maps technique. Int. J. Model. Identif. Control. 44(4): 360-367 (2024)
[j25]Liangliang Tao
, Qingya Wang
, Zhicheng Zhu, Fen Yu, Xia Yin:
NCLWO: Newton's cooling law-based weighted oversampling algorithm for imbalanced datasets with feature noise. Neurocomputing 610: 128538 (2024)- 2023
[j24]Fei Xu, Jing Chen, Xia Yin:
The compound iterative algorithm for rational models based on the Coyote optimisation algorithm. Int. J. Comput. Appl. Technol. 72(4): 241-248 (2023)
[j23]Weihua Wu, Yang Yang
, Bangyu Wu
, Debo Ma, Zhanxin Tang, Xia Yin:
MTL-FaultNet: Seismic Data Reconstruction Assisted Multitask Deep Learning 3-D Fault Interpretation. IEEE Trans. Geosci. Remote. Sens. 61: 1-15 (2023)
[c53]Weiqing Ji
, Xingcheng Yao
, Hailong Yao
, Tsung-Yi Ho
, Ulf Schlichtmann
, Xia Yin
:
SOAER: Self-Obstacle Avoiding Escape Routing for Paper-Based Digital Microfluidic Biochips. ACM Great Lakes Symposium on VLSI 2023: 255-260
[c52]Weiqing Ji
, Hailong Yao
, Tsung-Yi Ho
, Ulf Schlichtmann
, Xia Yin
:
GAT-based Concentration Prediction for Random Microfluidic Mixers with Multiple Input Flow Rates. ACM Great Lakes Symposium on VLSI 2023: 483-488
[c51]Zhiyang Chen, Tsung-Yi Ho, Ulf Schlichtmann, Datao Chen, Mingyu Liu, Hailong Yao, Xia Yin:
NeuroEscape: Ordered Escape Routing via Monte-Carlo Tree Search and Neural Network. ICCAD 2023: 1-9- 2022
[j22]Andrew Chi-Chih Yao, Xia Yin, Yinqun Liu, Guoliang Li:
Perspectives from the second Global Forum on Development of Computer Science. Sci. China Inf. Sci. 65(7): 1-2 (2022)
[j21]Yan Yang, Xingang Shi, Qiang Ma, Yahui Li, Xia Yin, Zhiliang Wang:
Path stability in partially deployed secure BGP routing. Comput. Networks 206: 108762 (2022)- 2020
[c50]Zitong Jin, Xingang Shi, Yan Yang, Xia Yin, Zhiliang Wang, Jianping Wu:
TopoScope: Recover AS Relationships From Fragmentary Observations. Internet Measurement Conference 2020: 266-280
[c49]Su Wang
, Zhiliang Wang, Xia Yin, Xingang Shi:
Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector. INFOCOM Workshops 2020: 1308-1309
[c48]Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang, Xingyu Zhou:
The Understanding and Forecast of AS-Level Anycast Path Inflation. ISCC 2020: 1-7
2010 – 2019
- 2019
[j20]Yan Yang, Xia Yin, Xingang Shi, Zhiliang Wang, Jiong He, Tom Z. J. Fu
, Marianne Winslett:
Inter-domain routing bottlenecks and their aggravation. Comput. Networks 162 (2019)
[j19]Haijun Geng, Shuang Zhang, Xia Yin:
互联网域内路由可用性综述 (Overview of Routing Availability in Intra-domain Routing Networks). 计算机科学 46(7): 1-6 (2019)
[j18]Haijun Geng, Xia Yin:
基于增量最短路径优先的域内高效路由保护算法 (Efficient Intra-domain Routing Protection Algorithm Based on i-SPF). 计算机科学 46(8): 116-120 (2019)
[i3]Weihan Chen, Xia Yin, Zhiliang Wang, Xingang Shi:
Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Opportunities. CoRR abs/1910.02613 (2019)- 2018
[j17]Haijun Geng, Xingang Shi, Zhiliang Wang, Xia Yin:
A hop-by-hop dynamic distributed multipath routing mechanism for link state network. Comput. Commun. 116: 225-239 (2018)
[j16]Haijun Geng, Xingang Shi, Zhiliang Wang, Xia Yin, Shaoping Yin:
基于有向无环图的互联网域内节能路由算法 (Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph). 计算机科学 45(4): 112-116 (2018)
[c47]Zhiliang Wang, Changping Zhou, Yang Yu, Xingang Shi, Xia Yin, Jiangyuan Yao:
Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method. ICCCS (3) 2018: 44-55
[i2]Zongyi Zhao, Xingang Shi, Xia Yin, Zhiliang Wang:
HashFlow For Better Flow Record Collection. CoRR abs/1812.01846 (2018)
[i1]Zongyi Zhao, Xingang Shi, Xia Yin, Zhiliang Wang:
PriMe: Per-Flow Network Measurement by Combining SRAM with DRAM. CoRR abs/1812.02861 (2018)- 2017
[j15]Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Shaoping Yin:
Algebra and algorithms for multipath QoS routing in link state networks. J. Commun. Networks 19(2): 189-200 (2017)
[j14]Haijun Geng, Xingang Shi, Zhiliang Wang, Xia Yin, Shaoping Yin:
基于逐跳方式的单链路故障保护算法 (Single-link Failure Protection Algorithm Based on Hop-by-Hop Routing). 计算机科学 44(7): 68-73 (2017)
[c46]Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu:
MSAID: Automated interference detection for multiple SDN applications. ICNP 2017: 1-2
[c45]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Yahui Li, Chongrong Li:
Testing Black-Box SDN Applications with Formal Behavior Models. MASCOTS 2017: 110-120- 2016
[c44]Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang:
The Power of Prefix Hijackings in the Internet Hierarchy. Trustcom/BigDataSE/ISPA 2016: 228-235- 2015
[j13]Xia Yin, Dan Wu, Zhiliang Wang, Xingang Shi, Jianping Wu:
DIMR: Disjoint Interdomain Multipath Routing. Comput. Networks 91: 356-375 (2015)
[j12]Xia Yin, Jiangyuan Yao, Zhiliang Wang, Xingang Shi, Jun Bi, Jianping Wu:
Modeling and Testing of Network Protocols with Parallel State Machines. IEICE Trans. Inf. Syst. 98-D(12): 2091-2104 (2015)
[c43]Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Measuring the internet routing scalability from the perspective of address allocation. IPCCC 2015: 1-2
[c42]Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu:
TADOOP: Mining Network Traffic Anomalies with Hadoop. SecureComm 2015: 175-192- 2014
[c41]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Model Based Black-Box Testing of SDN Applications. CoNEXT Student Workshop 2014: 37-39
[c40]Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Wenlong Chen:
HSR: Using hybrid source routing to achieve scalable Internet routing. ICCCN 2014: 1-8
[c39]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Formal Modeling and Systematic Black-Box Testing of SDN Data Plane. ICNP 2014: 179-190
[c38]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Test oriented formal model of SDN applications. IPCCC 2014: 1-2- 2013
[j11]Yang Xiang, Xingang Shi, Jianping Wu, Zhiliang Wang, Xia Yin:
Sign what you really care about - Secure BGP AS-paths efficiently. Comput. Networks 57(10): 2250-2265 (2013)
[j10]Xia Yin, Zuhua Liao:
Study on Soft Groups. J. Comput. 8(4): 960-967 (2013)
[j9]Yusheng Xue, Tianran Li, Xia Yin, Zhaoyang Dong
, Fushuan Wen
, Jie Huang, Feng Xue:
Managements of Generalized Congestions. IEEE Trans. Smart Grid 4(3): 1675-1683 (2013)
[c37]Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Min Huang:
DIMR: Disjoint Interdomain Multipath Routing. HPCC/EUC 2013: 1382-1390
[c36]Jiangyuan Yao
, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Reachability Graph Based Hierarchical Test Generation for Network Protocols Modeled as Parallel Finite State Machines. ICCCN 2013: 1-9
[c35]Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang:
Dynamic distributed algorithm for computing multiple next-hops on a tree. ICNP 2013: 1-10
[c34]Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Min Huang:
Removing content consumers from mapping system. ICNP 2013: 1-2
[c33]Haijun Geng, Xia Yin, Xingang Shi, Zhiliang Wang:
MLSA: A link-state multipath routing algorithm. ISCC 2013: 330-335
[c32]Xiangxin Kong, Zhiliang Wang, Xingang Shi, Xia Yin, Dan Li:
Performance evaluation of software-defined networking with real-life ISP traffic. ISCC 2013: 541-547- 2012
[c31]Jigeon Lee, Zhiliang Wang, Xia Yin, Xingang Shi, Dan Wu, Suogang Li:
Least frequency-delay-product caching replacement for distributed mapping systems in the core-edge network separation architecture. BCFIC 2012: 206-213
[c30]Xingang Shi, Yang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu:
Detecting prefix hijackings in the internet with argus. Internet Measurement Conference 2012: 15-28
[c29]Yang Xiang, Zhiliang Wang, Jianping Wu, Xingang Shi, Xia Yin:
Sign What You Really Care about - Secure BGP AS Paths Efficiently. Networking (1) 2012: 259-273- 2011
[j8]Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu:
A formal approach to robustness testing of network protocol with time constraints. Secur. Commun. Networks 4(6): 622-632 (2011)
[c28]Jiangyuan Yao
, Zhiliang Wang, Xia Yin, Jianping Wu:
Testing of a source address validation protocol with parallel parameterized extended finite state machines. AINTEC 2011: 152-155
[c27]Yang Xiang, Xia Yin, Zhiliang Wang, Jianping Wu:
Internet Flattening: Monitoring and Analysis of Inter-Domain Routing. ICC 2011: 1-6
[c26]Yang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu:
Argus: An accurate and agile system to detecting IP prefix hijacking. ICNP 2011: 43-48
[c25]Li Zhou, Xia Yin, Zhiliang Wang:
Protocol Security Testing with SPIN and TTCN-3. ICST Workshops 2011: 511-519
[c24]Xia Yin, Qingguo Xu, Kunliang Han:
Modeling Predicate Abstraction of Timed Automata in PVS. iThings/CPSCom 2011: 438-443- 2010
[j7]Weiguo Zhang, Xia Yin, Jianping Wu, Wei Zhang, Shuangming Huang:
Real Aggregation for Reducing Routing Information Base Size. J. Convergence Inf. Technol. 5(6): 47-53 (2010)
[j6]Xia Yin, Weiguo Zhang, Jianping Wu, Wei Zhang:
Can Longest Prefix Matching Make The Path Length Shorter? J. Digit. Content Technol. its Appl. 4(8): 172-181 (2010)
[c23]Letong Sun, Xia Yin, Zhiliang Wang, Yang Xiang, Jianping Wu:
A neutral layered mapping system with two-stage cache for a scalable Internet. CNSM 2010: 499-504
2000 – 2009
- 2009
[c22]Yang Xiang, Zhiliang Wang, Xia Yin:
SIP Robustness Testing Based on TTCN-3. AINA Workshops 2009: 122-128
[c21]Hwan Hwang, Xia Yin, Zhiliang Wang, Huiming Wang:
The internet measurement of VoIP on different transport layer rotocols. ICOIN 2009: 1-3
[c20]Xia Yin, Xin Wu, Zhiliang Wang:
Measuring IP Address Fragmentation from BGP Routing Dynamics. Infoscale 2009: 46-57
[c19]Xin Wu, Xia Yin, Zhiliang Wang, Min Tang:
A three-step dynamic threshold method to cluster BGP updates into routing events. ISADS 2009: 67-72
[c18]Zhiliang Wang, Xia Yin, Yang Xiang, Ruiping Zhu, Shirui Gao, Xin Wu, Shijian Liu, Song Gao, Li Zhou, Peng Li:
TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks. TestCom/FATES 2009: 163-178- 2008
[j5]Xia Yin, Zhiliang Wang, Chuanming Jing, Xingang Shi:
A TTCN-3-based protocol testing system and its extension. Sci. China Ser. F Inf. Sci. 51(11): 1703-1722 (2008)
[j4]Zhiliang Wang, Xia Yin, Chuanming Jing:
A formal method to real-time protocol interoperability testing. Sci. China Ser. F Inf. Sci. 51(11): 1723-1744 (2008)
[c17]Chuanming Jing, Zhiliang Wang, Xingang Shi, Xia Yin, Jianping Wu:
Mutation Testing of Protocol Messages Based on Extended TTCN-3. AINA 2008: 667-674
[c16]Chuanming Jing, Xia Yin, Zhiliang Wang, Jianping Wu:
A Formal Approach to Robustness Testing of Network Protocol with Time Constraints. ICYCS 2008: 2168-2174
[c15]Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu:
Performance testing of Mobile IPv6 protocol. ISCC 2008: 772-779
[c14]Chuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu:
A Formal Approach to Robustness Testing of Network Protocol. NPC 2008: 24-37- 2007
[c13]Li Ji, Xia Yin, Xingang Shi, Zhiliang Wang:
A Synthetic Streaming Quality Measurement System on IP Networks. ICON 2007: 53-58- 2006
[j3]David Lee, Dongluo Chen, Ruibing Hao, Raymond E. Miller, Jianping Wu, Xia Yin:
Network protocol system monitoring: a formal approach with passive testing. IEEE/ACM Trans. Netw. 14(2): 424-437 (2006)
[c12]Yan Liu, Xia Yin, Jianping Wu:
Experience of Conformance Testing on IPv6 Protocols. ISCC 2006: 95-100
[c11]Zhiliang Wang, Jianping Wu, Xia Yin, Xingang Shi, Beihang Tian:
Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems. TestCom 2006: 324-340- 2004
[c10]Zhiliang Wang, Jianping Wu, Xia Yin:
Towards interoperability test generation of time dependent protocols: a case study. GLOBECOM 2004: 589-594
[c9]Zhongjie Li, Jianping Wu, Xia Yin:
Testing Multi Input/Output Transition System with All-Observer. TestCom 2004: 95-111
[c8]Zhongjie Li, Xia Yin, Jianping Wu:
Distributed Testing of Multi Input/Output Transition System. SEFM 2004: 271-280- 2003
[j2]Yixin Zhao, Xia Yin, Jianping Wu:
Problems in the Information Dissemination of the Internet Routing. J. Comput. Sci. Technol. 18(2): 139-152 (2003)
[c7]Jianping Wu, Zhongjie Li, Xia Yin:
Towards Modeling and Testing of IP Routing Protocols. TestCom 2003: 49-62- 2002
[j1]Yixin Zhao, Jianping Wu, Xia Yin:
From Active to Passive - Progress in Testing Internet Routing Protocols. J. Comput. Sci. Technol. 17(3): 264-283 (2002)
[c6]David Lee, Dongluo Chen, Ruibing Hao, Raymond E. Miller, Jianping Wu, Xia Yin:
A Formal Approach for Passive Testing of Protocol Data Portions. ICNP 2002: 122-131- 2001
[c5]Jianping Wu, Yixin Zhao, Xia Yin:
From Active to Passive: Progress in Testing of Internet Routing Protocols. FORTE 2001: 101-118
[c4]Xia Yin, Yixin Zhao, Jianping Wu:
IntegTTCN, a TTCN language extension for protocol integrated testing. ICC 2001: 2063-2067
[c3]Yixin Zhao, Xia Yin, Jianping Wu:
Generating fully executable test suite automatically. ICC 2001: 3251-3255
[c2]Yixin Zhao, Xia Yin, Jianping Wu:
OnLine Test System, an application of passive testing in routing protocols test. ICON 2001: 190-195
[c1]Yixin Zhao, Xia Yin, Bo Han, Jianping Wu:
On-Line Test System Applied in Routing Protocol Test. MASCOTS 2001: 331-338
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







