Yan Chen
Yan Chen
Email verificata su northwestern.edu - Home page
TitoloCitata daAnno
Oceanstore: An architecture for global-scale persistent storage
J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ...
ACM SIGARCH Computer Architecture News 28 (5), 190-201, 2000
Sketch-based change detection: methods, evaluation, and applications
B Krishnamurthy, S Sen, Y Zhang, Y Chen
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, 234-247, 2003
Detecting and characterizing social spam campaigns
H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
Z Li, M Sanghi, Y Chen, MY Kao, B Chavez
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-47, 2006
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
OSA: An optical switching architecture for data center networks with unprecedented flexibility
K Chen, A Singla, A Singh, K Ramachandran, L Xu, Y Zhang, X Wen, ...
IEEE/ACM Transactions on Networking 22 (2), 498-511, 2013
Droidchameleon: evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Dynamic replica placement for scalable content delivery
Y Chen, RH Katz, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 306-318, 2002
An algebraic approach to practical and scalable overlay network monitoring
Y Chen, D Bindel, H Song, RH Katz
ACM SIGCOMM Computer Communication Review 34 (4), 55-66, 2004
Botnet research survey
Z Zhu, G Lu, Y Chen, ZJ Fu, P Roberts, K Han
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
Towards Online Spam Filtering in Social Networks.
H Gao, Y Chen, K Lee, D Palsetia, AN Choudhary
NDSS 12 (2012), 1-16, 2012
BotGraph: Large Scale Spamming Botnet Detection.
Y Zhao, Y Xie, F Yu, Q Ke, Y Yu, Y Chen, E Gillum
NSDI 9, 321-334, 2009
Security issues in online social networks
H Gao, J Hu, T Huang, J Wang, Y Chen
IEEE Internet Computing 15 (4), 56-63, 2011
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
Matching with a large vulnerability signature ruleset for high performance network defense
Y Chen, LI Zhichun, G Xia, B Liu
US Patent 8,522,348, 2013
Towards a secure controller platform for openflow applications
X Wen, Y Chen, C Hu, C Shi, Y Wang
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
Where the Sidewalk Ends: Extending theInternet AS Graph Using Traceroutesfrom P2P Users
K Chen, DR Choffnes, R Potharaju, Y Chen, FE Bustamante, D Pei, ...
IEEE Transactions on Computers 63 (4), 1021-1036, 2013
Catch me if you can: Evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
IEEE Transactions on Information Forensics and Security 9 (1), 99-108, 2013
Autocog: Measuring the description-to-permission fidelity in android applications
Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
The SAHARA model for service composition across multiple providers
B Raman, S Agarwal, Y Chen, M Caesar, W Cui, P Johansson, K Lai, ...
International Conference on Pervasive Computing, 1-14, 2002
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20