Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection Y Liu, L Zhang, Y Guan 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 85 | 2010 |
Identifying high-cardinality hosts from network-wide traffic measurements Y Liu, W Chen, Y Guan IEEE Transactions on Dependable and Secure Computing 13 (5), 547-558, 2015 | 54 | 2015 |
Cardinality change-based early detection of large-scale cyber-attacks W Chen, Y Liu, Y Guan 2013 Proceedings IEEE INFOCOM, 1788-1796, 2013 | 45 | 2013 |
Dynamic properties of epidemic spreading on finite size complex networks L Ying, L Yang, S Xiu-Ming, R Yong, J Jian, Q Ben Chinese Physics 14, 2153, 2005 | 44 | 2005 |
A fast sketch for aggregate queries over high-speed network traffic Y Liu, W Chen, Y Guan 2012 Proceedings IEEE INFOCOM, 2741-2745, 2012 | 37 | 2012 |
A distributed data streaming algorithm for network-wide traffic anomaly detection Y Liu, L Zhang, Y Guan ACM SIGMETRICS Performance Evaluation Review 37 (2), 81-82, 2009 | 25 | 2009 |
Near-optimal approximate membership query over time-decaying windows Y Liu, W Chen, Y Guan 2013 Proceedings IEEE INFOCOM, 1447-1455, 2013 | 23 | 2013 |
Self-determined mechanisms in complex networks Y Liu, J Yuan, X Shan, Y Ren, Z Ma Physica A: Statistical Mechanics and its Applications 387 (8-9), 2145-2154, 2008 | 9 | 2008 |
Data Streaming Algorithms for Rapid Cyber Attack Detection Y Liu Iowa State University, 2013 | 3 | 2013 |
Monitoring Traffic Activity Graphs with low-rank matrix approximation Y Liu, W Chen, Y Guan 37th Annual IEEE Conference on Local Computer Networks, 59-67, 2012 | 2 | 2012 |
Approximate membership query over time-decaying windows for event stream processing Y Liu, W Chen, Y Guan Proceedings of the 6th ACM International Conference on Distributed Event …, 2012 | 1 | 2012 |
Sketch-based network-wide traffic anomaly detection Y Liu, L Zhang, Y Guan Technical Report, ECpE Department, Iowa State University (http://home. eng …, 2009 | 1 | 2009 |
Complex network model of user-share behaviors in P2P applications [J] S Xiu-ming, LIU Yang, L ZHANG, W Lei, REN Yong, Y Jian, W Yao-xi Application Research of Computers 6, 2008 | | 2008 |
A Streaming Algorithm for Online Payload-based Network Anomaly Detection B Lahiri, Y Liu, S Tirthapura, Y Guan | | |
Facial Movement Based Person Authentication P Xie, Y Liu, Y Guan | | |