Yan Chen

According to our database1, Yan Chen authored at least 119 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild.
IEEE Trans. Mob. Comput., 2020

2019
Fault Management in Software-Defined Networking: A Survey.
IEEE Communications Surveys and Tutorials, 2019

Falcon: Differential fault localization for SDN control plane.
Comput. Networks, 2019

A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Comput. Networks, 2019

AOMO: An AI-aided Optimizer for Microservices Orchestration.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

2018
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface.
IEEE Trans. Mob. Comput., 2018

FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.
Proceedings of the 27th USENIX Security Symposium, 2018

SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

2017
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

Toward A Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture.
IEEE/ACM Trans. Netw., 2017

DroidNative: Automating and optimizing detection of Android native code malware variants.
Comput. Secur., 2017

DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

Reexamining DNS From a Global Recursive Resolver Perspective.
IEEE/ACM Trans. Netw., 2016

DroidNative: Semantic-Based Detection of Android Native Code Malware.
CoRR, 2016

AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Proceedings of the Security and Privacy in Communication Networks, 2016

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

HogMap: Using SDNs to Incentivize Collaborative Security Monitoring.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Vetting SSL Usage in Applications with SSLINT.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android.
Proceedings of the Security and Privacy in Communication Networks, 2015

I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

SafePay: Protecting against credit card forgery with existing magnetic card readers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Discount Counting for Fast Flow Statistics on Flow Size and Flow Volume.
IEEE/ACM Trans. Netw., 2014

OSA: An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility.
IEEE/ACM Trans. Netw., 2014

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks.
IEEE Trans. Information Forensics and Security, 2014

Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users.
IEEE Trans. Computers, 2014

VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter.
Comput. Networks, 2014

Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Rake: Semantics Assisted Network-Based Tracing Framework.
IEEE Trans. Network and Service Management, 2013

Towards a secure controller platform for openflow applications.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

An empirical reexamination of global DNS behavior.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

De-obfuscation and Detection of Malicious PDF Files with High Accuracy.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Redefining web browser principals with a Configurable Origin Policy.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

AppsPlayground: automatic security analysis of smartphone applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

DroidChameleon: evaluating Android anti-malware against transformation attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
DAC: Generic and Automatic Address Configuration for Data Center Networks.
IEEE/ACM Trans. Netw., 2012

A Measurement Study on Potential Inter-Domain Routing Diversity.
IEEE Trans. Network and Service Management, 2012

ANLS: Adaptive Non-Linear Sampling Method for Accurate Flow Size Measurement.
IEEE Trans. Communications, 2012

OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Towards Online Spam Filtering in Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Scalable Name Lookup in NDN Using Effective Name Component Encoding.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

On pending interest table in named data networking.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Trans. Information Forensics and Security, 2011

Survey on routing in data centers: insights and future directions.
IEEE Network, 2011

Security Issues in Online Social Networks.
IEEE Internet Computing, 2011

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Poster: CUD: crowdsourcing for URL spam detection.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: online spam filtering in social networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: a path-cutting approach to blocking XSS worms in social web networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Algebraic Approaches for Scalable End-to-End Monitoring and Diagnosis.
Proceedings of the Algorithms for Next Generation Networks, 2010

Employing Honeynets For Network Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010

POPI: a user-level tool for inferring router packet forwarding priority.
IEEE/ACM Trans. Netw., 2010

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency.
Comput. Networks, 2010

NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Generic and automatic address configuration for data center networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

WebProphet: Automating Performance Prediction for Web Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Measurement and Diagnosis of Address Misconfigured P2P Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Evaluating Potential Routing Diversity for Internet Failure Recovery.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

DISCO: Memory Efficient and Accurate Flow Statistics for Network Measurement.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Towards unbiased end-to-end network diagnosis.
IEEE/ACM Trans. Netw., 2009

FAD and SPA: End-to-end link-level loss rate inference without infrastructure.
Comput. Networks, 2009

Using Failure Information Analysis to Detect Enterprise Zombies.
Proceedings of the Security and Privacy in Communication Networks, 2009

BotGraph: Large Scale Spamming Botnet Detection.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

On the Eyeshots of BGP Vantage Points.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Exception triggered DoS attacks on wireless networks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Automating analysis of large-scale botnet probing events.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Honeynet-based Botnet Scan Traffic Analysis.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

Pollution attacks and defenses for Internet caching systems.
Comput. Networks, 2008

Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Botnet Research Survey.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Reversible sketches: enabling monitoring and analysis over high-speed data streams.
IEEE/ACM Trans. Netw., 2007

Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications.
IEEE/ACM Trans. Netw., 2007

Hop ID: A Virtual Coordinate-Based Routing for Sparse Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Detecting Stealthy Spreaders Using Online Outdegree Histograms.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

A Suite of Schemes for User-Level Network Diagnosis without Infrastructure.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

End-to-End Inference of Router Packet Forwarding Priority.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing.
IEEE Computer Graphics and Applications, 2006

Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards deterministic network diagnosis.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Internet Cache Pollution Attacks and Countermeasures.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
IDGraphs: Intrusion Detection and Analysis Using Histographs.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

Efficient Hop ID based Routing for Sparse Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
An algebraic approach to practical and scalable overlay network monitoring.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Reversible sketches for efficient and accurate change detection over network data streams.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Efficient and adaptive Web replication using content clustering.
IEEE Journal on Selected Areas in Communications, 2003

Sketch-based change detection: methods, evaluation, and applications.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

Tomography-based overlay network monitoring.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

2002
On the stability of network distance estimation.
SIGMETRICS Performance Evaluation Review, 2002


SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network.
Proceedings of the Pervasive Computing, 2002

Dynamic Replica Placement for Scalable Content Delivery.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Clustering Web Content for Efficient Replication.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
Quantifying Network Denial of Service: A Location Service Case Study.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
OceanStore: An Architecture for Global-Scale Persistent Storage.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000

1998
Real-time Biomechanically-based Muscle Volume Deformation using FEM.
Comput. Graph. Forum, 1998

Physically-based Animation of Volumetric Objects.
Proceedings of the Computer Animation 1998, 1998


  Loading...