Artikel dengan mandat akses publik - Yan ChenPelajari lebih lanjut
Tersedia di suatu tempat: 38
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
Mandat: National Natural Science Foundation of China
Understanding fileless attacks on linux-based iot devices with honeycloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Mandat: National Natural Science Foundation of China
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Mandat: US National Science Foundation, National Natural Science Foundation of China
Threat detection and investigation with system-level provenance graphs: A survey
Z Li, QA Chen, R Yang, Y Chen, W Ruan
Computers & Security 106, 102282, 2021
Mandat: National Natural Science Foundation of China
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture
K Chen, X Wen, X Ma, Y Chen, Y Xia, C Hu, Q Dong
2015 IEEE Conference on Computer Communications (INFOCOM), 1903-1911, 2015
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
V Rastogi, R Shao, Y Chen, X Pan, S Zou, RD Riley
NDSS, 2016
Mandat: US National Science Foundation, National Natural Science Foundation of China
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Mandat: US National Science Foundation, National Natural Science Foundation of China
Vetting SSL usage in applications with SSLINT
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, R Yang, Z Zhang
2015 IEEE Symposium on Security and Privacy, 519-534, 2015
Mandat: National Natural Science Foundation of China
Cspautogen: Black-box enforcement of content security policy upon real-world websites
X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Mandat: US National Science Foundation, National Natural Science Foundation of China
Reexamining DNS from a global recursive resolver perspective
H Gao, V Yegneswaran, J Jiang, Y Chen, P Porras, S Ghosh, H Duan
IEEE/ACM Transactions on Networking 24 (1), 43-57, 2014
Mandat: National Natural Science Foundation of China
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
R Yang, S Ma, H Xu, X Zhang, Y Chen
NDSS, 2020
Mandat: US National Science Foundation, US Department of Defense, National Natural …
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
Mandat: US Department of Energy
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts
Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandat: National Natural Science Foundation of China
Sdnshield: Reconciliating configurable application permissions for sdn app markets
X Wen, B Yang, Y Chen, C Hu, Y Wang, B Liu, X Chen
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
Mandat: US National Science Foundation, National Natural Science Foundation of China
{FlowCog}: Context-aware semantics extraction and analysis of information flow leaks in android apps
X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen
27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018
Mandat: US National Science Foundation, US Department of Defense
DyDroid: Measuring dynamic code loading and its security implications in Android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Mandat: US National Science Foundation, US Department of Defense
General, efficient, and real-time data compaction strategy for apt forensic analysis
T Zhu, J Wang, L Ruan, C Xiong, J Yu, Y Li, Y Chen, M Lv, T Chen
IEEE Transactions on Information Forensics and Security 16, 3312-3325, 2021
Mandat: National Natural Science Foundation of China
One cycle attack: Fool sensor-based personal gait authentication with clustering
T Zhu, L Fu, Q Liu, Z Lin, Y Chen, T Chen
IEEE Transactions on Information Forensics and Security 16, 553-568, 2020
Mandat: National Natural Science Foundation of China
Jshield: towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Mandat: National Natural Science Foundation of China
Towards automated inter-service authorization for microservice applications
X Li, Y Chen, Z Lin
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 3-5, 2019
Mandat: National Natural Science Foundation of China
Informasi terbitan dan pendanaan ditentukan secara otomatis oleh program komputer