Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks P Liu, H Xu, Q Ouyang, R Jiao, Z Chen, S Zhang, J Yang, L Mo, J Zeng, ... 2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020 | 178 | 2020 |
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ... Computer Networks 169, 107049, 2020 | 161 | 2020 |
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021 | 127 | 2021 |
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 98 | 2021 |
CARDS: A distributed system for detecting coordinated attacks J Yang, P Ning, XS Wang, S Jajodia Information Security for Global Information Infrastructures: IFIP TC11 …, 2000 | 97 | 2000 |
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022 | 89 | 2022 |
Root cause analysis of anomalies of multitier services in public clouds J Weng, JH Wang, J Yang, Y Yang IEEE/ACM Transactions on Networking 26 (4), 1646-1659, 2018 | 83 | 2018 |
CNGI-CERNET2: an IPv6 deployment in China J Wu, JH Wang, J Yang ACM SIGCOMM Computer Communication Review 41 (2), 48-52, 2011 | 76 | 2011 |
{HinDom}: A robust malicious domain detection system based on heterogeneous information network with transductive classification X Sun, M Tong, J Yang, L Xinran, L Heng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 74 | 2019 |
Survey on access control technologies for cloud computing 王于丁, 杨家海, 徐聪, 凌晓, 杨洋 Journal of Software 26 (5), 1129-1150, 2015 | 54 | 2015 |
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. D Han, Z Wang, W Chen, K Wang, R Yu, S Wang, H Zhang, Z Wang, M Jin, ... NDSS, 2023 | 53 | 2023 |
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks X Sun, Z Wang, J Yang, X Liu Computers & Security 99, 102057, 2020 | 50 | 2020 |
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020 | 47 | 2020 |
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation Q Li, D Wang, M Xu, J Yang 2011 Proceedings IEEE INFOCOM, 321-325, 2011 | 42 | 2011 |
An iot device identification method based on semi-supervised learning L Fan, S Zhang, Y Wu, Z Wang, C Duan, J Li, J Yang 2020 16th International Conference on Network and Service Management (CNSM), 1-7, 2020 | 40 | 2020 |
Survey and analysis on the internet traffic model 张宾, 杨家海, 吴建平 Journal of Software 22 (1), 115-131, 2011 | 39 | 2011 |
Fine-grained cloud resource provisioning for virtual network function H Yu, J Yang, C Fung IEEE Transactions on network and service management 17 (3), 1363-1376, 2020 | 38 | 2020 |
Practical traffic-space adversarial attacks on learning-based nidss D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin arXiv preprint arXiv:2005.07519, 2020 | 33 | 2020 |
Det: Enabling efficient probing of ipv6 active addresses G Song, J Yang, Z Wang, L He, J Lin, L Pan, C Duan, X Quan IEEE/ACM Transactions on Networking 30 (4), 1629-1643, 2022 | 32 | 2022 |
PCA-subspace method—Is it good enough for network-wide anomaly detection B Zhang, J Yang, J Wu, D Qin, L Gao 2012 IEEE Network Operations and Management Symposium, 359-367, 2012 | 32 | 2012 |