Yu Jin

Affiliations:
  • AT&T Labs


According to our database1, Yu Jin authored at least 22 papers between 2007 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Secgras: Security Group Analysis as a Cloud Service.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
Greystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Understanding SMS spam in a large cellular network.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Understanding the complexity of 3G UMTS network performance.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Proactive call drop avoidance in UMTS networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks.
ACM Trans. Knowl. Discov. Data, 2012

Characterizing data usage patterns in a large cellular network.
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, 2012

Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis.
Proceedings of the 10th International Conference on Mobile Systems, 2012

2011
Large-scale app-based reporting of customer problems in cellular networks: potential and limitations.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Making sense of customer tickets in cellular networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Inferring applications at the network layer using collective traffic statistics.
Proceedings of the 22nd International Teletraffic Congress, 2010

Frequency Based Chunking for Data De-Duplication.
Proceedings of the MASCOTS 2010, 2010

Tracking Long Duration Flows in Network Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Identifying suspicious activities through DNS failure graph analysis.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Sifting through Network Data to Cull Activity Patterns with HEAPs.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Know Your Enemy, Know Yourself: Block-Level Network Behavior Profiling and Tracking.
Proceedings of the Global Communications Conference, 2010

NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Unveiling core network-wide communication patterns through application traffic activity graph decomposition.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

Identifying High Cardinality Internet Hosts.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2007
Identifying and tracking suspicious activities through IP gray space analysis.
Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, 2007

Identifying dynamic IP address blocks serendipitously through background scanning traffic.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007


  Loading...