default search action
Yan Chen 0004
Person information
- unicode name: 陈焰
- affiliation: Northwestern University, Department of Electrical Engineering and Computer Science, Evanston, IL, USA
- affiliation: Zhejiang University, College of Computer Science and Technology, China
- affiliation (PhD 2003): University of California at Berkeley, CA, USA
Other persons with the same name
- Yan Chen — disambiguation page
- Yan Chen 0001 — Max Planck Institute for Software Systems, Saarbrüen, Germany
- Yan Chen 0002 — Science Systems and Applications, Inc.
- Yan Chen 0003 — University of Electronic Science and Technology of China, School of Automation, Chengdu, China
- Yan Chen 0005 — Shanghai Jiaotong University, Department of Electronics Engineering, China
- Yan Chen 0006 — Logistical Engineering University, Department of Petroleum Supply Engineering, Chongqing, China
- Yan Chen 0007 — University of Science and Technology of China, School of Cyber Science and Technology, China (and 3 more)
- Yan Chen 0008 — Shanghai University of Finance and Economics, China (and 1 more)
- Yan Chen 0009 — Borough of Manhattan Community College, CUNY, NY, USA
- Yan Chen 0010 — Huawei Technologies, Ottawa, ON, Canada (and 3 more)
- Yan Chen 0011 — Soochow University, Suzhou, China
- Yan Chen 0012 — University of Nottingham, UK (and 1 more)
- Yan Chen 0013 — Arizona State University, Polytechnic School, Dynamic Systems and Control Laboratory, Mesa, AZ, USA (and 1 more)
- Yan Chen 0014 — University of Michigan, School of Information, Ann Arbor, MI, USA
- Yan Chen 0015 — Dalian Maritime University, Dalian, China
- Yan Chen 0016 — Florida International University, College of Business, Miami, FL, USA (and 2 more)
- Yan Chen 0017 — Huaqiao University, College of Computer Science and Technology, Xiamen, China
- Yan Chen 0018 — Harbin Institute of Technology, Shenzhen, China
- Yan Chen 0019 — Beihang University, State Key Laboratory of Software Development Environment, Beijing, China
- Yan Chen 0020 — University of Technology, Sydney, Australia
- Yan Chen 0021 — York University, Department of Electrical Engineering and Computer Science, Toronto, ON, Canada
- Yan Chen 0022 — Duke University, Department of Computer Science, Durham, USA
- Yan Chen 0023 — Stevens Institute of Technology, School of Business, Hoboken, NJ, USA (and 2 more)
- Yan Chen 0024 — Kaiserslautern University of Technology, Germany
- Yan Chen 0025 — China University of Mining and Technology, School of Information and Control Engineering, China
- Yan Chen 0026 (aka: Wendy Yan Chen) — University of Hong Kong, Department of Geography, Hong Kong (and 1 more)
- Yan Chen 0027 — University of New Mexico, Albuquerque, NW, USA (and 1 more)
- Yan Chen 0028 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA
- Yan Chen 0029 — Japan Advanced Institute of Science and Technology, Nomi, Japan (and 1 more)
- Yan Chen 0030 — Donghua University, College of Information Science and Technology, Shanghai, China
- Yan Chen 0031 — Xi'an Jiaotong University, Department of Computer Science and Technology, MOEKLINNS Laboratory, China
- Yan Chen 0032 — Chongqing University of Technology, School of Electrical and Electronic Engineering, China
- Yan Chen 0033 — Virginia Tech, VA, USA (and 2 more)
- Yan Chen 0034 — South China University of Technology, Guangzhou, China
- Yan Chen 0035 — Nanyang Technological University, School of Computer Engineering, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Jie Ying, Tiantian Zhu, Qiang Liu, Chunlin Xiong, Zhengqiu Weng, Tieming Chen, Lei Fu, Mingqi Lv, Han Wu, Ting Wang, Yan Chen:
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy. IEEE Trans. Mob. Comput. 23(4): 2832-2848 (2024) - [c99]Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen:
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments. AsiaCCS 2024 - [c98]Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185 - [c97]You Li, Kaiyu Hou, Yunqi He, Yan Chen, Hai Zhou:
Property Guided Secure Configuration Space Search. ISC (2) 2024: 140-160 - [c96]Qingyang Zeng, Kaiyu Hou, Xue Leng, Yan Chen:
DirectFaaS: A Clean-Slate Network Architecture for Efficient Serverless Chain Communications. WWW 2024: 2759-2767 - [i6]Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang:
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events. CoRR abs/2403.12541 (2024) - [i5]Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen, Mingqi Lv, Yan Chen:
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time. CoRR abs/2405.02629 (2024) - [i4]Tiantian Zhu, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen:
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports. CoRR abs/2405.02826 (2024) - 2023
- [j51]Qingyang Zeng, Mohammad Kavousi, Yinhong Luo, Ling Jin, Yan Chen:
Full-stack vulnerability analysis of the cloud-native platform. Comput. Secur. 129: 103173 (2023) - [j50]Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, Simone Campanoni:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 20(1): 650-664 (2023) - [j49]Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen, Ting Wang, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. IEEE Trans. Dependable Secur. Comput. 20(6): 5247-5264 (2023) - [j48]Xuechao Du, Xiang Pan, Yinzhi Cao, Boyuan He, Gan Fang, Yan Chen, Daigang Xu:
FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps. IEEE Trans. Mob. Comput. 22(11): 6460-6476 (2023) - [j47]Se-Young Yu, Qingyang Zeng, Jim Chen, Yan Chen, Joe Mambretti:
AIDTN: Towards a Real-Time AI Optimized DTN System With NVMeoF. IEEE Trans. Parallel Distributed Syst. 34(6): 1731-1742 (2023) - 2022
- [j46]Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, Yan Chen:
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation. Comput. Secur. 122: 102889 (2022) - [j45]Chunlin Xiong, Zhenyuan Li, Yan Chen, Tiantian Zhu, Jian Wang, Hai Yang, Wei Ruan:
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts. Frontiers Inf. Technol. Electron. Eng. 23(3): 361-381 (2022) - [j44]Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. IEEE Trans. Dependable Secur. Comput. 19(1): 551-565 (2022) - [j43]Runqing Yang, Xutong Chen, Haitao Xu, Yueqiang Cheng, Chunlin Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, Yan Chen:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. IEEE Trans. Dependable Secur. Comput. 19(3): 1621-1638 (2022) - [j42]Tiantian Zhu, Zhengqiu Weng, Qijie Song, Yuan Chen, Qiang Liu, Yan Chen, Mingqi Lv, Tieming Chen:
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment. IEEE Trans. Mob. Comput. 21(2): 555-572 (2022) - [c95]Kaiyu Hou, Sen Lin, Yan Chen, Vinod Yegneswaran:
QFaaS: accelerating and securing serverless cloud networks with QUIC. SoCC 2022: 240-256 - 2021
- [j41]Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen, Wei Ruan:
Threat detection and investigation with system-level provenance graphs: A survey. Comput. Secur. 106: 102282 (2021) - [j40]Tiantian Zhu, Lei Fu, Qiang Liu, Zi Lin, Yan Chen, Tieming Chen:
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. IEEE Trans. Inf. Forensics Secur. 16: 553-568 (2021) - [j39]Tiantian Zhu, Jiayu Wang, Linqi Ruan, Chunlin Xiong, Jinkai Yu, Yaosheng Li, Yan Chen, Mingqi Lv, Tieming Chen:
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. IEEE Trans. Inf. Forensics Secur. 16: 3312-3325 (2021) - [j38]Ling Jin, Boyuan He, Guangyao Weng, Haitao Xu, Yan Chen, Guanyu Guo:
MAdLens: Investigating Into Android In-App Ad Practice at API Granularity. IEEE Trans. Mob. Comput. 20(3): 1138-1155 (2021) - [c94]Kaiyu Hou, Sen Lin, Yan Chen, Vinod Yegneswaran:
Accelerate and secure serverless networks with QUIC. CoNEXT 2021: 477-478 - [c93]Kaiyu Hou, You Li, Yinbo Yu, Yan Chen, Hai Zhou:
Discovering emergency call pitfalls for cellular networks with formal methods. MobiSys 2021: 296-309 - [c92]Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran:
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. USENIX Security Symposium 2021: 3989-4006 - [i3]Tiantian Zhu, Jinkai Yu, Tieming Chen, Jiayu Wang, Jie Ying, Ye Tian, Mingqi Lv, Yan Chen, Yuan Fan, Ting Wang:
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts. CoRR abs/2112.09008 (2021) - 2020
- [j37]Xiaochun Wu, Kaiyu Hou, Xue Leng, Xing Li, Yinbo Yu, Bo Wu, Yan Chen:
State of the Art and Research Challenges in the Security Technologies of Network Function Virtualization. IEEE Internet Comput. 24(1): 25-35 (2020) - [j36]Tiantian Zhu, Zhengyang Qu, Haitao Xu, Jingsi Zhang, Zhengyue Shao, Yan Chen, Sandeep Prabhakar, Jianfeng Yang:
RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild. IEEE Trans. Mob. Comput. 19(2): 466-483 (2020) - [c91]Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen:
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. NDSS 2020 - [c90]You Li, Kaiyu Hou, Hai Zhou, Yan Chen:
Network protocol safe configuration search in one shot. SIGCOMM Posters and Demos 2020: 21-23 - [i2]Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen:
Threat Detection and Investigation with System-level Provenance Graphs: A Survey. CoRR abs/2006.01722 (2020)
2010 – 2019
- 2019
- [j35]Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, You Li:
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud. Comput. Networks 161: 68-81 (2019) - [j34]Yinbo Yu, Xing Li, Kai Bu, Yan Chen, Jianfeng Yang:
Falcon: Differential fault localization for SDN control plane. Comput. Networks 162 (2019) - [j33]Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang Zhang, Kang Cheng, Xin Xiao:
Fault Management in Software-Defined Networking: A Survey. IEEE Commun. Surv. Tutorials 21(1): 349-392 (2019) - [c89]Zhenyuan Li, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang:
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. CCS 2019: 1831-1847 - [c88]Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie Quan:
Thinking inside the Box: Differential Fault Localization for SDN Control Plane. IM 2019: 353-359 - [c87]Fan Dang, Zhenhua Li, Yunhao Liu, Ennan Zhai, Qi Alfred Chen, Tianyin Xu, Yan Chen, Jingyu Yang:
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud. MobiSys 2019: 482-493 - [c86]Xue Leng, Tzung-Han Juang, Yan Chen, Han Liu:
AOMO: An AI-aided Optimizer for Microservices Orchestration. SIGCOMM Posters and Demos 2019: 1-2 - [c85]Yinbo Yu, You Li, Kaiyu Hou, Yan Chen, Hai Zhou, Jianfeng Yang:
CellScope: Automatically Specifying and Verifying Cellular Network Protocols. SIGCOMM Posters and Demos 2019: 21-23 - 2018
- [j32]Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, Ryan D. Riley:
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface. IEEE Trans. Mob. Comput. 17(11): 2675-2688 (2018) - [c84]Boyuan He, Haitao Xu, Ling Jin, Guanyu Guo, Yan Chen, Guangyao Weng:
An Investigation into Android In-App Ad Practice: Implications for App Developers. INFOCOM 2018: 2465-2473 - [c83]Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song:
SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud. IWQoS 2018: 1-10 - [c82]Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, Yan Chen:
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps. USENIX Security Symposium 2018: 1669-1685 - 2017
- [j31]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Automating and optimizing detection of Android native code malware variants. Comput. Secur. 65: 230-246 (2017) - [j30]Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong, Yongqiang Liu:
Toward A Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture. IEEE/ACM Trans. Netw. 25(4): 2281-2294 (2017) - [j29]Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Jianfeng Yang, Xue Leng:
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking. IEEE/ACM Trans. Netw. 25(4): 2347-2360 (2017) - [c81]Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley:
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. DSN 2017: 415-426 - 2016
- [j28]Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. IEEE/ACM Trans. Netw. 24(1): 43-57 (2016) - [j27]Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates. IEEE/ACM Trans. Netw. 24(6): 3856-3869 (2016) - [c80]Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou:
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. CCS 2016: 653-665 - [c79]Xiang Pan, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Seungwon Shin:
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring. SDN-NFV@CODASPY 2016: 7-12 - [c78]Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen:
SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets. DSN 2016: 121-132 - [c77]Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu:
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches. ICDCS 2016: 179-188 - [c76]Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen:
Is every flow on the right track?: Inspect SDN forwarding with RuleScope. INFOCOM 2016: 1-9 - [c75]Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, Ryan D. Riley:
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. NDSS 2016 - [c74]Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong:
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. SecureComm 2016: 3-23 - [i1]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Semantic-Based Detection of Android Native Code Malware. CoRR abs/1602.04693 (2016) - 2015
- [c73]Yinzhi Cao, Xiang Pan, Yan Chen:
SafePay: Protecting against credit card forgery with existing magnetic card readers. CNS 2015: 164-172 - [c72]Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong:
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture. INFOCOM 2015: 1903-1911 - [c71]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c70]Xiang Pan, Yinzhi Cao, Yan Chen:
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser. NDSS 2015 - [c69]Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276 - [c68]Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang:
Vetting SSL Usage in Applications with SSLINT. IEEE Symposium on Security and Privacy 2015: 519-534 - 2014
- [j26]Shihong Zou, Xitao Wen, Kai Chen, Shan Huang, Yan Chen, Yongqiang Liu, Yong Xia, Chengchen Hu:
VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter. Comput. Networks 67: 141-153 (2014) - [j25]Kai Chen, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei, Yao Zhao:
Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users. IEEE Trans. Computers 63(4): 1021-1036 (2014) - [j24]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. IEEE Trans. Inf. Forensics Secur. 9(1): 99-108 (2014) - [j23]Kai Chen, Ankit Singla, Atul Singh, Kishore Ramachandran, Lei Xu, Yueping Zhang, Xitao Wen, Yan Chen:
OSA: An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility. IEEE/ACM Trans. Netw. 22(2): 498-511 (2014) - [j22]Chengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen, Yan Chen, Yu Cheng, Hao Wu:
Discount Counting for Fast Flow Statistics on Flow Size and Flow Volume. IEEE/ACM Trans. Netw. 22(3): 970-981 (2014) - [c67]Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. ACSAC 2014: 76-85 - [c66]Yinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge:
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. ACSAC 2014: 466-475 - [c65]Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen:
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications. CCS 2014: 1354-1365 - [c64]Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. RAID 2014: 276-298 - [c63]Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu:
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks. SecureComm (1) 2014: 582-601 - [c62]Xitao Wen, Chunxiao Diao, Xun Zhao, Yan Chen, Li Erran Li, Bo Yang, Kai Bu:
Compiling minimum incremental update for modular SDN languages. HotSDN 2014: 193-198 - 2013
- [j21]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics Assisted Network-Based Tracing Framework. IEEE Trans. Netw. Serv. Manag. 10(1): 3-14 (2013) - [c61]Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
DroidChameleon: evaluating Android anti-malware against transformation attacks. AsiaCCS 2013: 329-334 - [c60]Vaibhav Rastogi, Yan Chen, William Enck:
AppsPlayground: automatic security analysis of smartphone applications. CODASPY 2013: 209-220 - [c59]Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. DSN 2013: 1-12 - [c58]Xun Lu, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen:
De-obfuscation and Detection of Malicious PDF Files with High Accuracy. HICSS 2013: 4890-4899 - [c57]Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, Yi Wang:
Towards a secure controller platform for openflow applications. HotSDN 2013: 171-172 - [c56]Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan:
An empirical reexamination of global DNS behavior. SIGCOMM 2013: 267-278 - 2012
- [j20]Chengchen Hu, Bin Liu, Sheng Wang, Jia Tian, Yu Cheng, Yan Chen:
ANLS: Adaptive Non-Linear Sampling Method for Accurate Flow Size Measurement. IEEE Trans. Commun. 60(3): 789-798 (2012) - [j19]Chengchen Hu, Kai Chen, Yan Chen, Bin Liu, Athanasios V. Vasilakos:
A Measurement Study on Potential Inter-Domain Routing Diversity. IEEE Trans. Netw. Serv. Manag. 9(3): 268-278 (2012) - [j18]Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu:
DAC: Generic and Automatic Address Configuration for Data Center Networks. IEEE/ACM Trans. Netw. 20(1): 84-99 (2012) - [c55]Huichen Dai, Bin Liu, Yan Chen, Yi Wang:
On pending interest table in named data networking. ANCS 2012: 211-222 - [c54]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen:
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security. AsiaCCS 2012: 8-9 - [c53]Xitao Wen, Kai Chen, Yan Chen, Yongqiang Liu, Yong Xia, Chengchen Hu:
VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter. ICDCS 2012: 12-21 - [c52]Yi Wang, Keqiang He, Huichen Dai, Wei Meng, Junchen Jiang, Bin Liu, Yan Chen:
Scalable Name Lookup in NDN Using Effective Name Component Encoding. ICDCS 2012: 688-697 - [c51]Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang, Kai Zheng, Yan Chen, Xianda Sun:
Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices. ICDCS 2012: 708-717 - [c50]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - [c49]Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary:
Towards Online Spam Filtering in Social Networks. NDSS 2012 - [c48]Kai Chen, Ankit Singla, Atul Singh, Kishore Ramachandran, Lei Xu, Yueping Zhang, Xitao Wen, Yan Chen:
OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility. NSDI 2012: 239-252 - 2011
- [j17]Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen:
Security Issues in Online Social Networks. IEEE Internet Comput. 15(4): 56-63 (2011) - [j16]Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic:
Measurement and diagnosis of address misconfigured P2P traffic. IEEE Netw. 25(3): 22-28 (2011) - [j15]Kai Chen, Chengchen Hu, Xin Zhang, Kai Zheng, Yan Chen, Athanasios V. Vasilakos:
Survey on routing in data centers: insights and future directions. IEEE Netw. 25(4): 6-10 (2011) - [j14]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Trans. Inf. Forensics Secur. 6(1): 175-188 (2011) - [c47]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - [c46]Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary:
Poster: online spam filtering in social networks. CCS 2011: 769-772 - [c45]Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen:
Poster: CUD: crowdsourcing for URL spam detection. CCS 2011: 785-788 - [c44]Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, Anup Goyal:
Rake: Semantics assisted network-based tracing framework. IWQoS 2011: 1-9 - [c43]Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. NDSS 2011 - 2010
- [j13]Zhichun Li, Yan Gao, Yan Chen:
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency. Comput. Networks 54(8): 1282-1299 (2010) - [j12]Guohan Lu, Yan Chen, Stefan Birrer, Fabián E. Bustamante, Xing Li:
POPI: a user-level tool for inferring router packet forwarding priority. IEEE/ACM Trans. Netw. 18(1): 1-14 (2010) - [j11]Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li:
Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM Trans. Netw. 18(1): 53-66 (2010) - [c42]Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen:
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality. CCS 2010: 654-656 - [c41]Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao:
Detecting and characterizing social spam campaigns. CCS 2010: 681-683 - [c40]Chengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen, Yan Chen, Chunming Wu, Yu Cheng:
DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement. ICDCS 2010: 665-674 - [c39]Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Y. Zhao:
Detecting and characterizing social spam campaigns. Internet Measurement Conference 2010: 35-47 - [c38]Chengchen Hu, Kai Chen, Yan Chen, Bin Liu:
Evaluating Potential Routing Diversity for Internet Failure Recovery. INFOCOM 2010: 321-325 - [c37]Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic:
Measurement and Diagnosis of Address Misconfigured P2P Traffic. INFOCOM 2010: 1091-1099 - [c36]Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert G. Greenberg, Yi-Min Wang:
WebProphet: Automating Performance Prediction for Web Services. NSDI 2010: 143-158 - [c35]Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu:
Generic and automatic address configuration for data center networks. SIGCOMM 2010: 39-50 - [c34]Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen, Bin Liu, Junchen Jiang, Yuezhou Lv:
NetShield: massive semantics-based vulnerability signature matching for high-speed networks. SIGCOMM 2010: 279-290 - [p3]Paul Barford, Yan Chen, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran:
Employing Honeynets For Network Situational Awareness. Cyber Situational Awareness 2010: 71-102 - [p2]Yao Zhao, Yan Chen:
Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis. Algorithms for Next Generation Networks 2010: 319-340
2000 – 2009
- 2009
- [j10]Yao Zhao, Yan Chen:
FAD and SPA: End-to-end link-level loss rate inference without infrastructure. Comput. Networks 53(9): 1303-1318 (2009) - [j9]Yao Zhao, Yan Chen, David Bindel:
Towards unbiased end-to-end network diagnosis. IEEE/ACM Trans. Netw. 17(6): 1724-1737 (2009) - [c33]Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson:
Automating analysis of large-scale botnet probing events. AsiaCCS 2009: 11-22 - [c32]Kai Chen, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian E. Bustamante, Dan Pei, Yao Zhao:
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users. CoNEXT 2009: 217-228 - [c31]Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou, Zhi Fu:
Exception triggered DoS attacks on wireless networks. DSN 2009: 13-22 - [c30]Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bin Liu:
On the Eyeshots of BGP Vantage Points. GLOBECOM 2009: 1-6 - [c29]Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wang:
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints. INFOCOM 2009: 531-539 - [c28]Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, Eliot Gillum:
BotGraph: Large Scale Spamming Botnet Detection. NSDI 2009: 321-334 - [c27]Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen:
Using Failure Information Analysis to Detect Enterprise Zombies. SecureComm 2009: 185-206 - 2008
- [j8]Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmanovic:
Pollution attacks and defenses for Internet caching systems. Comput. Networks 52(5): 935-956 (2008) - [c26]Zhaosheng Zhu, Guohan Lu, Yan Chen, Zhi (Judy) Fu, Phil Roberts, Keesook Han:
Botnet Research Survey. COMPSAC 2008: 967-972 - [c25]Chengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Cheng, Yan Chen:
Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method. INFOCOM 2008: 26-30 - [c24]Yao Zhao, Yan Chen, Sylvia Ratnasamy:
Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks. SECON 2008: 560-568 - [p1]Zhichun Li, Anup Goyal, Yan Chen:
Honeynet-based Botnet Scan Traffic Analysis. Botnet Detection 2008: 25-44 - 2007
- [j7]Yao Zhao, Yan Chen, Bo Li, Qian Zhang:
Hop ID: A Virtual Coordinate-Based Routing for Sparse Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(9): 1075-1089 (2007) - [j6]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reversible sketches: enabling monitoring and analysis over high-speed data streams. IEEE/ACM Trans. Netw. 15(5): 1059-1072 (2007) - [j5]Yan Chen, David Bindel, Han Hee Song, Randy H. Katz:
Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications. IEEE/ACM Trans. Netw. 15(5): 1084-1097 (2007) - [c23]Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu:
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. ICNP 2007: 164-173 - [c22]Guohan Lu, Yan Chen, Stefan Birrer, Fabián E. Bustamante, C. Y. Cheung, Xing Li:
End-to-End Inference of Router Packet Forwarding Priority. INFOCOM 2007: 1784-1792 - [c21]Yao Zhao, Yan Chen:
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure. INFOCOM 2007: 2171-2179 - [c20]Yan Gao, Yao Zhao, Robert T. Schweller, Shobha Venkataraman, Yan Chen, Dawn Xiaodong Song, Ming-Yang Kao:
Detecting Stealthy Spreaders Using Online Outdegree Histograms. IWQoS 2007: 145-153 - 2006
- [j4]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. IEEE Computer Graphics and Applications 26(2): 28-39 (2006) - [c19]Yan Gao, Zhichun Li, Yan Chen:
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. ICDCS 2006: 39 - [c18]Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan Chen:
Internet Cache Pollution Attacks and Countermeasures. ICNP 2006: 54-64 - [c17]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications. INFOCOM 2006 - [c16]Yao Zhao, Yan Chen, David Bindel:
Towards unbiased end-to-end network diagnosis. SIGCOMM 2006: 219-230 - [c15]Yao Zhao, Yan Chen, David Bindel:
Towards deterministic network diagnosis. SIGMETRICS/Performance 2006: 387-388 - [c14]Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez:
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. S&P 2006: 32-47 - 2005
- [c13]Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu:
Efficient Hop ID based Routing for Sparse Ad Hoc Networks. ICNP 2005: 179-190 - [c12]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs. VizSEC 2005: 5 - 2004
- [c11]Robert T. Schweller, Ashish Gupta, Elliot Parsons, Yan Chen:
Reversible sketches for efficient and accurate change detection over network data streams. Internet Measurement Conference 2004: 207-212 - [c10]Yan Chen, David Bindel, Han Hee Song, Randy H. Katz:
An algebraic approach to practical and scalable overlay network monitoring. SIGCOMM 2004: 55-66 - 2003
- [j3]Yan Chen, Lili Qiu, Weiyu Chen, Luan Nguyen, Randy H. Katz:
Efficient and adaptive Web replication using content clustering. IEEE J. Sel. Areas Commun. 21(6): 979-994 (2003) - [c9]Yan Chen, David Bindel, Randy H. Katz:
Tomography-based overlay network monitoring. Internet Measurement Conference 2003: 216-231 - [c8]Balachander Krishnamurthy, Subhabrata Sen, Yin Zhang, Yan Chen:
Sketch-based change detection: methods, evaluation, and applications. Internet Measurement Conference 2003: 234-247 - 2002
- [j2]Yan Chen, Khian Hao Lim, Randy H. Katz, Chris Overton:
On the stability of network distance estimation. SIGMETRICS Perform. Evaluation Rev. 30(2): 21-30 (2002) - [c7]Yan Chen, Lili Qiu, Weiyu Chen, Luan Nguyen, Randy H. Katz:
Clustering Web Content for Efficient Replication. ICNP 2002: 165-174 - [c6]Yan Chen, Randy H. Katz, John Kubiatowicz:
Dynamic Replica Placement for Scalable Content Delivery. IPTPS 2002: 306-318 - [c5]Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica:
The SAHARA Model for Service Composition across Multiple Providers. Pervasive 2002: 1-14 - [c4]Yan Chen, Randy H. Katz, John Kubiatowicz:
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network. Pervasive 2002: 282-296 - 2001
- [c3]Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz:
Quantifying Network Denial of Service: A Location Service Case Study. ICICS 2001: 340-351 - 2000
- [c2]John Kubiatowicz, David Bindel, Yan Chen, Steven E. Czerwinski, Patrick R. Eaton, Dennis Geels, Ramakrishna Gummadi, Sean C. Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Y. Zhao:
OceanStore: An Architecture for Global-Scale Persistent Storage. ASPLOS 2000: 190-201
1990 – 1999
- 1998
- [j1]Qing-hong Zhu, Yan Chen, Arie E. Kaufman:
Real-time Biomechanically-based Muscle Volume Deformation using FEM. Comput. Graph. Forum 17(3): 275-284 (1998) - [c1]Yan Chen, Qing-hong Zhu, Arie E. Kaufman, Shigeru Muraki:
Physically-based Animation of Volumetric Objects. CA 1998: 154-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint