Ennan Zhai

According to our database1, Ennan Zhai authored at least 48 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting.
IEEE/ACM Trans. Netw., 2020

PriFi: Low-Latency Anonymity for Organizational Networks.
Proc. Priv. Enhancing Technol., 2020

Automated repair by example for firewalls.
Formal Methods Syst. Des., 2020

IEEE Access Special Section Editorial: Security and Privacy for Cloud and IoT.
IEEE Access, 2020

Accuracy, Scalability, Coverage: A Practical Configuration Verifier on a Global WAN.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

Lyra: A Cross-Platform Language and Compiler for Data Plane Programming on Heterogeneous ASICs.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

Check before You Change: Preventing Correlated Failures in Service Updates.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2019

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones.
IEEE Trans. Mob. Comput., 2019

Safely and automatically updating in-network ACL configurations with intent language.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Understanding and Detecting Overlay-based Android Malware at Market Scales.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Demo: Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
On the Synchronization Bottleneck of OpenStack Swift-Like Cloud Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2018

Statically Verifying Continuous Integration Configurations.
CoRR, 2018

Minimizing the Cask Effect of Multi-Source Content Delivery.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

H2Cloud: Maintaining the Whole Filesystem in an Object Storage Cloud.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Towards Web-based Delta Synchronization for Cloud Storage Services.
Proceedings of the 16th USENIX Conference on File and Storage Technologies, 2018

2017
An auditing language for preventing correlated failures in the cloud.
Proc. ACM Program. Lang., 2017

Synthesizing configuration file specifications with association rule learning.
Proc. ACM Program. Lang., 2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network.
CoRR, 2017

Accessing google scholar under extreme internet censorship: a legal avenue.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Practical Web-based Delta Synchronization for Cloud Storage Services.
Proceedings of the 9th USENIX Workshop on Hot Topics in Storage and File Systems, 2017

2016
Resisting Tag Spam by Leveraging Implicit User Behaviors.
Proc. VLDB Endow., 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Probabilistic Automated Language Learning for Configuration Files.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

2015
Warding off timing attacks in Deterland.
CoRR, 2015

A Risk-Evaluation Assisted System for Service Selection.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

2014
Heading Off Correlated Failures through Independence-as-a-Service.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

2013
An untold story of redundant clouds: making your service deployment truly reliable.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

2012
iSac: Intimacy Based Access Control for Social Network Sites.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer Peer Netw. Appl., 2011

Towards a Reliable Spam-Proof Tagging System.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

SecGuard: Secure and Practical Integrity Protection Model for Operating Systems.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

2010
SWORDS: Improving Sensor Networks Immunity under Worm Attacks.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

DSpam: Defending Against Spam in Tagging Systems via Users' Reliability.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Claper: Recommend classical papers to beginners.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Filtering Spam in Social Tagging System with Dynamic Behavior Analysis.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009


  Loading...