HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ... Computer Networks 169, 107049, 2020 | 136 | 2020 |
Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks P Liu, H Xu, Q Ouyang, R Jiao, Z Chen, S Zhang, J Yang, L Mo, J Zeng, ... 2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020 | 115 | 2020 |
CARDS: A distributed system for detecting coordinated attacks J Yang, P Ning, XS Wang, S Jajodia Information Security for Global Information Infrastructures: IFIP TC11 …, 2000 | 95 | 2000 |
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021 | 83 | 2021 |
CNGI-CERNET2: an IPv6 deployment in China J Wu, JH Wang, J Yang ACM SIGCOMM Computer Communication Review 41 (2), 48-52, 2011 | 72 | 2011 |
Root cause analysis of anomalies of multitier services in public clouds J Weng, JH Wang, J Yang, Y Yang IEEE/ACM Transactions on Networking 26 (4), 1646-1659, 2018 | 70 | 2018 |
{HinDom}: A robust malicious domain detection system based on heterogeneous information network with transductive classification X Sun, M Tong, J Yang, L Xinran, L Heng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 62 | 2019 |
Survey on access control technologies for cloud computing 王于丁, 杨家海, 徐聪, 凌晓, 杨洋 Journal of Software 26 (5), 1129-1150, 2015 | 53 | 2015 |
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 51 | 2021 |
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation Q Li, D Wang, M Xu, J Yang 2011 Proceedings IEEE INFOCOM, 321-325, 2011 | 43 | 2011 |
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022 | 42 | 2022 |
Survey and analysis on the internet traffic model 张宾, 杨家海, 吴建平 Journal of Software 22 (1), 115-131, 2011 | 36 | 2011 |
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks X Sun, Z Wang, J Yang, X Liu Computers & Security 99, 102057, 2020 | 34 | 2020 |
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020 | 34 | 2020 |
Fine-grained cloud resource provisioning for virtual network function H Yu, J Yang, C Fung IEEE Transactions on network and service management 17 (3), 1363-1376, 2020 | 33 | 2020 |
An IoT device identification method based on semi-supervised learning L Fan, S Zhang, Y Wu, Z Wang, C Duan, J Li, J Yang 2020 16th International Conference on Network and Service Management (CNSM), 1-7, 2020 | 30 | 2020 |
PCA-subspace method—Is it good enough for network-wide anomaly detection B Zhang, J Yang, J Wu, D Qin, L Gao 2012 IEEE Network Operations and Management Symposium, 359-367, 2012 | 29 | 2012 |
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments X Ling, Y Yuan, D Wang, J Liu, J Yang Journal of Parallel and Distributed Computing 90, 52-66, 2016 | 27 | 2016 |
Generic and agile service function chain verification on cloud X Zhang, Q Li, J Wu, J Yang 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 1-10, 2017 | 26 | 2017 |
Hgdom: Heterogeneous graph convolutional networks for malicious domain detection X Sun, J Yang, Z Wang, H Liu NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020 | 25 | 2020 |