フォロー
Jiahai Yang
Jiahai Yang
Tsinghua University
確認したメール アドレス: cernet.edu.cn
タイトル
引用先
引用先
Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks
P Liu, H Xu, Q Ouyang, R Jiao, Z Chen, S Zhang, J Yang, L Mo, J Zeng, ...
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
1782020
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning
Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ...
Computer Networks 169, 107049, 2020
1612020
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021
1272021
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications
D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
982021
CARDS: A distributed system for detecting coordinated attacks
J Yang, P Ning, XS Wang, S Jajodia
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
972000
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning
S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang
IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022
892022
Root cause analysis of anomalies of multitier services in public clouds
J Weng, JH Wang, J Yang, Y Yang
IEEE/ACM Transactions on Networking 26 (4), 1646-1659, 2018
832018
CNGI-CERNET2: an IPv6 deployment in China
J Wu, JH Wang, J Yang
ACM SIGCOMM Computer Communication Review 41 (2), 48-52, 2011
762011
{HinDom}: A robust malicious domain detection system based on heterogeneous information network with transductive classification
X Sun, M Tong, J Yang, L Xinran, L Heng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
742019
Survey on access control technologies for cloud computing
王于丁, 杨家海, 徐聪, 凌晓, 杨洋
Journal of Software 26 (5), 1129-1150, 2015
542015
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
D Han, Z Wang, W Chen, K Wang, R Yu, S Wang, H Zhang, Z Wang, M Jin, ...
NDSS, 2023
532023
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
X Sun, Z Wang, J Yang, X Liu
Computers & Security 99, 102057, 2020
502020
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning
Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang
IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020
472020
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation
Q Li, D Wang, M Xu, J Yang
2011 Proceedings IEEE INFOCOM, 321-325, 2011
422011
An iot device identification method based on semi-supervised learning
L Fan, S Zhang, Y Wu, Z Wang, C Duan, J Li, J Yang
2020 16th International Conference on Network and Service Management (CNSM), 1-7, 2020
402020
Survey and analysis on the internet traffic model
张宾, 杨家海, 吴建平
Journal of Software 22 (1), 115-131, 2011
392011
Fine-grained cloud resource provisioning for virtual network function
H Yu, J Yang, C Fung
IEEE Transactions on network and service management 17 (3), 1363-1376, 2020
382020
Practical traffic-space adversarial attacks on learning-based nidss
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
arXiv preprint arXiv:2005.07519, 2020
332020
Det: Enabling efficient probing of ipv6 active addresses
G Song, J Yang, Z Wang, L He, J Lin, L Pan, C Duan, X Quan
IEEE/ACM Transactions on Networking 30 (4), 1629-1643, 2022
322022
PCA-subspace method—Is it good enough for network-wide anomaly detection
B Zhang, J Yang, J Wu, D Qin, L Gao
2012 IEEE Network Operations and Management Symposium, 359-367, 2012
322012
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20