Yinglian Xie

Affiliations:
  • Microsoft Research


According to our database1, Yinglian Xie authored at least 40 papers between 2001 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services.
IEEE Trans. Netw. Serv. Manag., 2014

Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Global Authentication in an Untrustworthy World.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Early security classification of skype users via machine learning.
Proceedings of the AISec'13, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
How user behavior is related to social affinity.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Knowing your enemy: understanding and detecting malicious web advertising.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Populated IP addresses: classification and applications.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Heat-seeking honeypots: design and experience.
Proceedings of the 20th International Conference on World Wide Web, 2011

deSEO: Combating Search-Result Poisoning.
Proceedings of the 20th USENIX Security Symposium, 2011

Context-based Online Configuration-Error Detection.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

Optimizing Data Partitioning for Data-Parallel Computing.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

2010
SBotMiner: large scale search bot detection.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

Searching the Searchers with SearchAudit.
Proceedings of the 19th USENIX Security Symposium, 2010

Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

A case for unsupervised-learning-based spam filtering.
Proceedings of the SIGMETRICS 2010, 2010

On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010

How to tell an airport from a home: techniques and applications.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

2009
De-anonymizing the internet using unreliable IDs.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

BotGraph: Large Scale Spamming Botnet Detection.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

2008
Less is More: Sparse Graph Mining with Compact Matrix Decomposition.
Stat. Anal. Data Min., 2008

Spamming botnets: signatures and characteristics.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

2007
How dynamic are IP addresses?
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Less is More: Compact Matrix Decomposition for Large Sparse Graphs.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

End-to-End Web Application Security.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Virtual disk based centralized management for enterprise networks.
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, 2006

Forensic Analysis for Epidemic Attacks in Federated Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

A Multi-Resolution Approach for Worm Detection and Containment.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Protecting Privacy in Key-Value Search Systems.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Worm Origin Identification Using Random Moonwalks.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

2004
Seurat: A Pointillist Approach to Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

2002
Locality in Search Engine Queries and Its Implications for Caching.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

A Secure Distributed Search System.
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002

2001
A Secure, Publisher-Centric Web Caching Infrastructure.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Early measurements of a cluster-based architecture for P2P systems.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, 2001


  Loading...