Yan Chen
Yan Chen
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Oceanstore: An architecture for global-scale persistent storage
J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ...
ACM SIGOPS Operating Systems Review 34 (5), 190-201, 2000
Sketch-based change detection: Methods, evaluation, and applications
B Krishnamurthy, S Sen, Y Zhang, Y Chen
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, 234-247, 2003
Detecting and characterizing social spam campaigns
H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010
OSA: An optical switching architecture for data center networks with unprecedented flexibility
K Chen, A Singla, A Singh, K Ramachandran, L Xu, Y Zhang, X Wen, ...
IEEE/ACM Transactions on networking 22 (2), 498-511, 2013
Droidchameleon: evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Appsplayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
Z Li, M Sanghi, Y Chen, MY Kao, B Chavez
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-47, 2006
Towards online spam filtering in social networks.
H Gao, Y Chen, K Lee, D Palsetia, AN Choudhary
NDSS 12 (2012), 1-16, 2012
Dynamic replica placement for scalable content delivery
Y Chen, RH Katz, JD Kubiatowicz
Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002
Botnet research survey
Z Zhu, G Lu, Y Chen, ZJ Fu, P Roberts, K Han
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
An algebraic approach to practical and scalable overlay network monitoring
Y Chen, D Bindel, H Song, RH Katz
Proceedings of the 2004 conference on Applications, technologies …, 2004
Autocog: Measuring the description-to-permission fidelity in android applications
Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Security issues in online social networks
H Gao, J Hu, T Huang, J Wang, Y Chen
IEEE Internet Computing 15 (4), 56-63, 2011
Catch me if you can: Evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
IEEE Transactions on Information Forensics and Security 9 (1), 99-108, 2013
Botgraph: large scale spamming botnet detection.
Y Zhao, Y Xie, F Yu, Q Ke, Y Yu, Y Chen, E Gillum
NSDI 9, 321-334, 2009
Matching with a large vulnerability signature ruleset for high performance network defense
Y Chen, LI Zhichun, G Xia, B Liu
US Patent 8,522,348, 2013
Towards a secure controller platform for openflow applications
X Wen, Y Chen, C Hu, C Shi, Y Wang
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
Reversible sketches for efficient and accurate change detection over network data streams
R Schweller, A Gupta, E Parsons, Y Chen
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 207-212, 2004
Scalable name lookup in NDN using effective name component encoding
Y Wang, K He, H Dai, W Meng, J Jiang, B Liu, Y Chen
2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20