Yibo Xue

According to our database1, Yibo Xue authored at least 83 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Modeling IPv6 adoption from biological evolution.
Comput. Commun., 2020

2019
A Hybrid Model for Ride-hailing Service Demand Forecasting.
Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things, 2019

2018
Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusion.
Proceedings of the IEEE INFOCOM 2018, 2018

A Combined Neural and Genetic Algorithm Model for Data Center Temperature Control.
Proceedings of the 8th International Workshop on Combinations of Intelligent Methods and Applications co-located with 30th International Conference on Artificial Intelligence Tools (ICTAI 2018), 2018

Identifying Influential Factors of CDN Performance with Large-scale Data Analysis.
Proceedings of the 2018 International Conference on Computing, 2018

Fine-grained Android Malware Detection based on Deep Learning.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Understanding IP address multiplexing with large-scale SSL/TLS flow analysis.
Proceedings of the 2017 International Conference on Computing, 2017

Improving IPv6 transition management with IPv6 network virtualization.
Proceedings of the 9th International Conference on Advanced Infocomm Technology, 2017

FgDetector: Fine-Grained Android Malware Detection.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Propagator or Influencer?: A Data-driven Approach for Evaluating Emotional Effect in Online Information Diffusion.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
DroidChain: A novel Android malware detection method based on behavior chains.
Pervasive Mob. Comput., 2016

Bits Learning: User-Adjustable Privacy Versus Accuracy in Internet Traffic Classification.
IEEE Commun. Lett., 2016

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Spiral of silence in social networks: A data-driven approach.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

FriendRank: A personalized approach for tweets ranking in social networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Precise Modeling Rumor Propagation and Control Strategy on Social Networks.
Proceedings of the Applications of Social Media and Social Network Analysis, 2015

FLAX: A Flexible Architecture for Large Scale Cloud Fabric.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

BitMiner: Bits Mining in Internet Traffic Classification.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Effective deployment of monitoring points on social networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

DroidChain: A novel malware detection method for Android based on behavior chain.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Implementation of Chaotic Analysis on Retweet Time Series.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Practical Multituple Packet Classification Using Dynamic Discrete Bit Selection.
IEEE Trans. Computers, 2014

Droid-Sec: deep learning in android malware detection.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A novel method for information propagation model perceiving.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Characterizing Application Behaviors for classifying P2P traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Emilie: Enhance the power of traffic identification.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

PBC: A novel method for identifying QQ traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Effective immunization strategy for rumor propagation based on maximum spanning tree.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Towards time-varying classification based on traffic pattern.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Cascading failures of social networks under attacks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Traffic Classification: Issues and Challenges.
J. Commun., 2013

Utilization-Aware Allocation for Multi-Tenant Datacenters.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

TFD: A multi-pattern matching algorithm for large-scale URL filtering.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Harvesting unique characteristics in packet sequences for effective application classification.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A new rumor propagation model and control strategy on social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Data Access Type Aware Replacement Policy for Cache Clustering Organization of Chip Multiprocessors.
Proceedings of the Advanced Parallel Processing Technologies, 2013

PPI: Towards precise page identification for encrypted Web-browsing traffic.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
LiveSec: Towards Effective Security Management in Large-Scale Production Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Relay recommendation system (RRS) and selective anonymity for tor.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

BCBPI: A noval behavior chain based protocol identification method.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

TMT: A new Tunable Mechanism of Tor based on the path length.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Dynamic reusability-based replication with network address mapping in CMPs.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

Proximity-Aware cache Replication.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

2011
Anomaly Detection Using Neighborhood Negative Selection.
Intell. Autom. Soft Comput., 2011

Towards High-Performance Network Application Identification With Aggregate-Flow Cache
CoRR, 2011

OpenGate: Towards an open network services gateway.
Comput. Commun., 2011

FEACAN: Front-end acceleration for content-aware network processing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Reorganized and Compact DFA for Efficient Regular Expression Matching.
Proceedings of IEEE International Conference on Communications, 2011

High performance cache block replication using re-reference probability in CMPs.
Proceedings of the 18th International Conference on High Performance Computing, 2011

Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores.
Proceedings of the Global Communications Conference, 2011

Enhanced Adaptive Insertion Policy for Shared Caches.
Proceedings of the Advanced Parallel Processing Technologies - 9th International Symposium, 2011

SMILER: Towards Practical Online Traffic Classification.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011

"Super nodes" in Tor: existence and security implication.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Scalable Proximity-Aware Cache Replication in Chip Multiprocessors.
Proceedings of the 2011 International Conference on Parallel Architectures and Compilation Techniques, 2011

2010
CCNoC: Cache-Coherent Network on Chip for Chip Multiprocessors.
J. Comput. Sci. Technol., 2010

Hierarchical Cache Directory for CMP.
J. Comput. Sci. Technol., 2010

Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

An Novel Hybrid Method for Effectively Classifying Encrypted Traffic.
Proceedings of the Global Communications Conference, 2010

Towards High-Performance Pattern Matching on Multi-Core Network Processing Platforms.
Proceedings of the Global Communications Conference, 2010

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic.
Proceedings of the Global Communications Conference, 2010

YACA: Yet Another Cluster-Based Architecture for Network Intrusion Prevention.
Proceedings of the Global Communications Conference, 2010

DFC: Towards Effective Feedback Flow Management for Datacenters.
Proceedings of the GCC 2010, 2010

2009
Network caching for Chip Multiprocessors.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Packet Classification Algorithms: From Theory to Practice.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Novel Optimization Method to Improve De-duplication Storage System Performance.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Chinese Chunking Based on Coarse-Grained Part-of-Speech Features.
Proceedings of the 2009 International Conference on Asian Language Processing, 2009

A Novel Cache Organization for Tiled Chip Multiprocessor.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

An Efficient Lightweight Shared Cache Design for Chip Multiprocessors.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

OASis: towards extensible open-architecture services platforms.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

SANS: a scalable architecture for network intrusion prevention with stateful frontend.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
A Memory Efficient Multiple Pattern Matching Architecture for Network Security.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Fast Path Session Creation on Network Processors.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Towards effective network algorithms on multi-core network processors.
Proceedings of the 2008 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2008

A multiple simple regular expression matching architecture and coprocessor for deep packet inspection.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008

2007
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

n-Cube Model for Cluster Computing and Its Evaluation.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

2006
PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Optimizing multi-thread string matching for network processor based intrusion management system.
Proceedings of the Third IASTED International Conference on Communication, 2006


  Loading...