Ennan Zhai

Orcid: 0000-0003-4578-7858

According to our database1, Ennan Zhai authored at least 66 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Relational Network Verification.
CoRR, 2024

Reasoning about Network Traffic Load Property at Production Scale.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

Sirius: Composing Network Function Chains into P4-Capable Edge Gateways.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

LuoShen: A Hyper-Converged Programmable Gateway for Multi-Tenant Multi-Service Edge Clouds.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation.
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024

Cross-Platform Transpilation of Packet-Processing Programs using Program Synthesis.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

2023
Dependable Virtualized Fabric on Programmable Data Plane.
IEEE/ACM Trans. Netw., August, 2023

Automated Verification of an In-Production DNS Authoritative Engine.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

XRON: A Hybrid Elastic Cloud Overlay Network for Video Conferencing at Planetary Scale.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

CellFusion: Multipath Vehicle-to-Cloud Video Streaming with Network Coding in the Wild.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Norma: Towards Practical Network Load Testing.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

2022
Learning CI Configuration Correctness for Early Build Feedback.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Meissa: scalable network testing for programmable data planes.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Predictable vFabric on informative data plane.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Cetus: Releasing P4 Programmers from the Chore of Trial and Error Compiling.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

2021
Static detection of silent misconfigurations with deep interaction analysis.
Proc. ACM Program. Lang., 2021

Aquila: a practically usable verification system for production-scale programmable data planes.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

Campion: debugging router configuration differences.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

2020
HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting.
IEEE/ACM Trans. Netw., 2020

PriFi: Low-Latency Anonymity for Organizational Networks.
Proc. Priv. Enhancing Technol., 2020

Automated repair by example for firewalls.
Formal Methods Syst. Des., 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

Accuracy, Scalability, Coverage: A Practical Configuration Verifier on a Global WAN.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

Lyra: A Cross-Platform Language and Compiler for Data Plane Programming on Heterogeneous ASICs.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

Check before You Change: Preventing Correlated Failures in Service Updates.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2019

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.
IEEE Trans. Mob. Comput., 2019

Safely and automatically updating in-network ACL configurations with intent language.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Understanding and Detecting Overlay-based Android Malware at Market Scales.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Demo: Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
On the Synchronization Bottleneck of OpenStack Swift-Like Cloud Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2018

Statically Verifying Continuous Integration Configurations.
CoRR, 2018

Minimizing the Cask Effect of Multi-Source Content Delivery.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

H2Cloud: Maintaining the Whole Filesystem in an Object Storage Cloud.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Towards Web-based Delta Synchronization for Cloud Storage Services.
Proceedings of the 16th USENIX Conference on File and Storage Technologies, 2018

2017
An auditing language for preventing correlated failures in the cloud.
Proc. ACM Program. Lang., 2017

Synthesizing configuration file specifications with association rule learning.
Proc. ACM Program. Lang., 2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network.
CoRR, 2017

Accessing google scholar under extreme internet censorship: a legal avenue.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Practical Web-based Delta Synchronization for Cloud Storage Services.
Proceedings of the 9th USENIX Workshop on Hot Topics in Storage and File Systems, 2017

2016
Resisting Tag Spam by Leveraging Implicit User Behaviors.
Proc. VLDB Endow., 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Probabilistic Automated Language Learning for Configuration Files.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

2015
Warding off timing attacks in Deterland.
CoRR, 2015

A Risk-Evaluation Assisted System for Service Selection.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

2014
Heading Off Correlated Failures through Independence-as-a-Service.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
An untold story of redundant clouds: making your service deployment truly reliable.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

2012
iSac: Intimacy Based Access Control for Social Network Sites.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer-to-Peer Netw. Appl., 2011

Towards a Reliable Spam-Proof Tagging System.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

SecGuard: Secure and Practical Integrity Protection Model for Operating Systems.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

2010
SWORDS: Improving Sensor Networks Immunity under Worm Attacks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

DSpam: Defending Against Spam in Tagging Systems via Users' Reliability.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Claper: Recommend classical papers to beginners.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Filtering Spam in Social Tagging System with Dynamic Behavior Analysis.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009


  Loading...