Anonrep: Towards tracking-resistant anonymous reputation E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford 13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016 | 53 | 2016 |
Heading off correlated failures through independence-as-a-service E Zhai, R Chen, DI Wolinsky, B Ford 11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014 | 53 | 2014 |
Claper: Recommend classical papers to beginners Y Wang, E Zhai, J Hu, Z Chen 2010 Seventh International Conference on Fuzzy Systems and Knowledge …, 2010 | 32 | 2010 |
Sorcery: Could we make P2P content sharing systems robust to deceivers? E Zhai, R Chen, Z Cai, L Zhang, EK Luax, H Sun, S Qing, L Tang, Z Cheny 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009 | 31 | 2009 |
An untold story of redundant clouds: Making your service deployment truly reliable E Zhai, R Chen, DI Wolinsky, B Ford Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 1-6, 2013 | 27 | 2013 |
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems TT Chekam, E Zhai, Z Li, Y Cui, K Ren IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 25 | 2016 |
Filtering spam in social tagging system with dynamic behavior analysis B Liu, E Zhai, H Sun, Y Chen, Z Chen 2009 International Conference on Advances in Social Network Analysis and …, 2009 | 25 | 2009 |
isac: Intimacy based access control for social network sites Y Wang, E Zhai, EK Lua, J Hu, Z Chen 2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012 | 22 | 2012 |
Understanding fileless attacks on linux-based iot devices with honeycloud F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 21 | 2019 |
Synthesizing configuration file specifications with association rule learning M Santolucito, E Zhai, R Dhodapkar, A Shim, R Piskac Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-20, 2017 | 21 | 2017 |
Auditing the structural reliability of the clouds E Zhai, DI Wolinsky, H Xiao, H Liu, BF Xueyuan Su Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale …, 2014 | 20 | 2014 |
Spamclean: Towards spam-free tagging systems E Zhai, H Sun, S Qing, Z Chen 2009 International Conference on Computational Science and Engineering 4 …, 2009 | 20 | 2009 |
Deterministically deterring timing attacks in deterland W Wu, B Ford arXiv preprint arXiv:1504.07070, 2015 | 19 | 2015 |
Dspam: Defending against spam in tagging systems via users' reliability Y Wang, E Zhai, C Cao, Y Xie, Z Wang, J Hu, Z Chen 2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010 | 19 | 2010 |
Safely and automatically updating in-network ACL configurations with intent language B Tian, X Zhang, E Zhai, HH Liu, Q Ye, C Wang, X Wu, Z Ji, Y Sang, ... Proceedings of the ACM Special Interest Group on Data Communication, 214-226, 2019 | 18 | 2019 |
Resisting tag spam by leveraging implicit user behaviors E Zhai, Z Li, Z Li, F Wu, G Chen Proceedings of the VLDB Endowment 10 (3), 241-252, 2016 | 18 | 2016 |
Probabilistic automated language learning for configuration files M Santolucito, E Zhai, R Piskac International Conference on Computer Aided Verification, 80-87, 2016 | 18 | 2016 |
VRank: a context-aware approach to vulnerability scoring and ranking in SOA J Jiang, L Ding, E Zhai, T Yu 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 17 | 2012 |
Towards web-based delta synchronization for cloud storage services H Xiao, Z Li, E Zhai, T Xu, Y Li, Y Liu, Q Zhang, Y Liu 16th {USENIX} Conference on File and Storage Technologies ({FAST} 18), 155-168, 2018 | 15 | 2018 |
A risk-evaluation assisted system for service selection E Zhai, L Gu, Y Hai 2015 IEEE International Conference on Web Services, 671-678, 2015 | 15 | 2015 |