BibTeX records: Guanhua Yan

download as .bib file

@inproceedings{DBLP:conf/icdm/GwakWWYSS023,
  author       = {Joon{-}Young Gwak and
                  Priti Prabhakar Wakodikar and
                  Meng Wang and
                  Guanhua Yan and
                  Xiaokui Shu and
                  Scott D. Stoller and
                  Ping Yang},
  editor       = {Jihe Wang and
                  Yi He and
                  Thang N. Dinh and
                  Christan Grant and
                  Meikang Qiu and
                  Witold Pedrycz},
  title        = {Debugging Malware Classification Models Based on Event Logs with Explainable
                  {AI}},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
                  Shanghai, China, December 4, 2023},
  pages        = {939--948},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDMW60847.2023.00125},
  doi          = {10.1109/ICDMW60847.2023.00125},
  timestamp    = {Tue, 13 Feb 2024 13:22:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/GwakWWYSS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShuY22,
  author       = {Zhan Shu and
                  Guanhua Yan},
  title        = {IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols
                  Guided by Finite State Machine Inference},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {22},
  pages        = {22737--22751},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3182589},
  doi          = {10.1109/JIOT.2022.3182589},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShuY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HerathWYY22,
  author       = {Jerome Dinal Herath and
                  Priti Prabhakar Wakodikar and
                  Ping Yang and
                  Guanhua Yan},
  title        = {CFGExplainer: Explaining Graph Neural Network-Based Malware Classification
                  from Control Flow Graphs},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {172--184},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00028},
  doi          = {10.1109/DSN53405.2022.00028},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/HerathWYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WenPY22,
  author       = {Zhixin Wen and
                  Harsh Sanjay Pacherkar and
                  Guanhua Yan},
  title        = {{VET5G:} {A} Virtual End-to-End Testbed for 5G Network Security Experimentation},
  booktitle    = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual
                  Event, 8 August 2022},
  pages        = {19--29},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3546096.3546111},
  doi          = {10.1145/3546096.3546111},
  timestamp    = {Tue, 18 Oct 2022 12:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WenPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HerathYY21,
  author       = {Jerome Dinal Herath and
                  Ping Yang and
                  Guanhua Yan},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection
                  from Distributed System Logs},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447833},
  doi          = {10.1145/3422337.3447833},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HerathYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KucukY20,
  author       = {Yunus Kucuk and
                  Guanhua Yan},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Deceiving Portable Executable Malware Classifiers into Targeted Misclassification
                  with Practical Adversarial Examples},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {341--352},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375741},
  doi          = {10.1145/3374664.3375741},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/KucukY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeesec/FangY20,
  author       = {Kaiming Fang and
                  Guanhua Yan},
  title        = {IoTReplay: Troubleshooting {COTS} IoT Devices with Record and Replay},
  booktitle    = {5th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2020, San Jose,
                  CA, USA, November 12-14, 2020},
  pages        = {193--205},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SEC50012.2020.00033},
  doi          = {10.1109/SEC50012.2020.00033},
  timestamp    = {Tue, 02 Mar 2021 09:16:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeesec/FangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FangY20,
  author       = {Kaiming Fang and
                  Guanhua Yan},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Paging storm attacks against 4G/LTE networks from regional Android
                  botnets: rationale, practicality, and implications},
  booktitle    = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Linz, Austria, July 8-10, 2020},
  pages        = {295--305},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395351.3399347},
  doi          = {10.1145/3395351.3399347},
  timestamp    = {Tue, 29 Dec 2020 18:27:47 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HerathBYYL19,
  author       = {Jerome Dinal Herath and
                  Changxin Bai and
                  Guanhua Yan and
                  Ping Yang and
                  Shiyong Lu},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {{RAMP:} Real-Time Anomaly Detection in Scientific Workflows},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {1367--1374},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9005653},
  doi          = {10.1109/BIGDATA47090.2019.9005653},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HerathBYYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/FernandoKHMMBYY19,
  author       = {Dinuni K. Fernando and
                  Siddharth Kulshrestha and
                  Jerome Dinal Herath and
                  Nitin Mahadik and
                  Yanzhe Ma and
                  Changxin Bai and
                  Ping Yang and
                  Guanhua Yan and
                  Shiyong Lu},
  title        = {SciBlock: {A} Blockchain-Based Tamper-Proof Non-Repudiable Storage
                  for Scientific Workflow Provenance},
  booktitle    = {5th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019},
  pages        = {81--90},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIC48465.2019.00019},
  doi          = {10.1109/CIC48465.2019.00019},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/FernandoKHMMBYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/YanYJ19,
  author       = {Jiaqi Yan and
                  Guanhua Yan and
                  Dong Jin},
  title        = {Classifying Malware Represented as Control Flow Graphs using Deep
                  Graph Convolutional Neural Network},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {52--63},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00020},
  doi          = {10.1109/DSN.2019.00020},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/YanYJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZZY18,
  author       = {Jinxue Zhang and
                  Rui Zhang and
                  Yanchao Zhang and
                  Guanhua Yan},
  title        = {The Rise of Social Botnets: Attacks and Countermeasures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {1068--1082},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2641441},
  doi          = {10.1109/TDSC.2016.2641441},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShuY18,
  author       = {Zhan Shu and
                  Guanhua Yan},
  editor       = {Massimiliano Albanese and
                  Dijiang Huang},
  title        = {Ensuring Deception Consistency for {FTP} Services Hardened against
                  Advanced Persistent Threats},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Moving Target Defense, {CCS}
                  2018, Toronto, ON, Canada, October 15, 2018},
  pages        = {69--79},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3268966.3268971},
  doi          = {10.1145/3268966.3268971},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShuY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FangY18,
  author       = {Kaiming Fang and
                  Guanhua Yan},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices
                  Guided by Reinforcement Learning},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {20--40},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_2},
  doi          = {10.1007/978-3-319-98989-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/KucukPSY18,
  author       = {Yunus Kucuk and
                  Nikhil Patil and
                  Zhan Shu and
                  Guanhua Yan},
  title        = {BigBing: Privacy-Preserving Cloud-Based Malware Classification Service},
  booktitle    = {2018 {IEEE} Symposium on Privacy-Aware Computing, {PAC} 2018, Washington,
                  DC, USA, September 26-28, 2018},
  pages        = {43--54},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PAC.2018.00011},
  doi          = {10.1109/PAC.2018.00011},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pac/KucukPSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Yan17,
  author       = {Guanhua Yan},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Improving Efficiency of Link Clustering on Multi-core Machines},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2017--2024},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.126},
  doi          = {10.1109/ICDCS.2017.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Yan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/YanLSK17,
  author       = {Guanhua Yan and
                  Junchen Lu and
                  Zhan Shu and
                  Yunus Kucuk},
  title        = {ExploitMeter: Combining Fuzzing with Machine Learning for Automated
                  Evaluation of Software Exploitability},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {164--175},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.10},
  doi          = {10.1109/PAC.2017.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/YanLSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YanKSL16,
  author       = {Guanhua Yan and
                  Yunus Kucuk and
                  Max Slocum and
                  David C. Last},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {A Bayesian Cogntive Approach to Quantifying Software Exploitability
                  Based on Reachability Testing},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {343--365},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_21},
  doi          = {10.1007/978-3-319-45871-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YanKSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangZZY16,
  author       = {Jinxue Zhang and
                  Rui Zhang and
                  Yanchao Zhang and
                  Guanhua Yan},
  title        = {The Rise of Social Botnets: Attacks and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1603.02714},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.02714},
  eprinttype    = {arXiv},
  eprint       = {1603.02714},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangZZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yan15,
  author       = {Guanhua Yan},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for
                  Automated Malware Classification},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {121--132},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714578},
  doi          = {10.1145/2714576.2714578},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Yan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YanE14,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection
                  in Dynamic Graphs},
  booktitle    = {{IEEE} 34th International Conference on Distributed Computing Systems,
                  {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages        = {154--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCS.2014.24},
  doi          = {10.1109/ICDCS.2014.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/YanE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Yan14,
  author       = {Guanhua Yan},
  editor       = {Isabel F. Cruz and
                  Elena Ferrari and
                  Yufei Tao and
                  Elisa Bertino and
                  Goce Trajcevski},
  title        = {Finding common ground among experts' opinions on data clustering:
                  With applications in malware analysis},
  booktitle    = {{IEEE} 30th International Conference on Data Engineering, Chicago,
                  {ICDE} 2014, IL, USA, March 31 - April 4, 2014},
  pages        = {15--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDE.2014.6816636},
  doi          = {10.1109/ICDE.2014.6816636},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/Yan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KongY14,
  author       = {Deguang Kong and
                  Guanhua Yan},
  title        = {Transductive malware label propagation: Find your lineage from your
                  neighbors},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {1411--1419},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848075},
  doi          = {10.1109/INFOCOM.2014.6848075},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KongY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Yan13,
  author       = {Guanhua Yan},
  title        = {Peri-Watchdog: Hunting for hidden botnets in the periphery of online
                  social networks},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {2},
  pages        = {540--555},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.07.016},
  doi          = {10.1016/J.COMNET.2012.07.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Yan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NguyenYT13,
  author       = {Nam P. Nguyen and
                  Guanhua Yan and
                  My T. Thai},
  title        = {Analysis of misinformation containment in online social networks},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {10},
  pages        = {2133--2146},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.04.002},
  doi          = {10.1016/J.COMNET.2013.04.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NguyenYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/im/BradonjicMY13,
  author       = {Milan Bradonjic and
                  Michael Molloy and
                  Guanhua Yan},
  title        = {Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms,
                  and Experiments},
  journal      = {Internet Math.},
  volume       = {9},
  number       = {4},
  pages        = {406--433},
  year         = {2013},
  url          = {https://doi.org/10.1080/15427951.2013.798600},
  doi          = {10.1080/15427951.2013.798600},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/im/BradonjicMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhangZZSY13,
  author       = {Rui Zhang and
                  Jinxue Zhang and
                  Yanchao Zhang and
                  Jinyuan Sun and
                  Guanhua Yan},
  title        = {Privacy-Preserving Profile Matching for Proximity-Based Mobile Social
                  Networking},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {9-Supplement},
  pages        = {656--668},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.SUP.0513057},
  doi          = {10.1109/JSAC.2013.SUP.0513057},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhangZZSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/RahmanYMFEF13,
  author       = {Md. Sazzadur Rahman and
                  Guanhua Yan and
                  Harsha V. Madhyastha and
                  Michalis Faloutsos and
                  Stephan J. Eidenbenz and
                  Mike Fisk},
  title        = {iDispatcher: {A} unified platform for secure planet-scale information
                  dissemination},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {6},
  number       = {1},
  pages        = {46--60},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12083-012-0128-8},
  doi          = {10.1007/S12083-012-0128-8},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/RahmanYMFEF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XuZTLY013,
  author       = {Fengyuan Xu and
                  Xiaojun Zhu and
                  Chiu C. Tan and
                  Qun Li and
                  Guanhua Yan and
                  Jie Wu},
  title        = {SmartAssoc: Decentralized Access Point Selection Algorithm to Improve
                  Throughput},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {12},
  pages        = {2482--2491},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2013.10},
  doi          = {10.1109/TPDS.2013.10},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XuZTLY013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Zhang0ZY13,
  author       = {Jinxue Zhang and
                  Rui Zhang and
                  Yanchao Zhang and
                  Guanhua Yan},
  title        = {On the impact of social botnets for spam distribution and digital-influence
                  manipulation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682691},
  doi          = {10.1109/CNS.2013.6682691},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Zhang0ZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/YanBK13,
  author       = {Guanhua Yan and
                  Nathan Brown and
                  Deguang Kong},
  editor       = {Konrad Rieck and
                  Patrick Stewin and
                  Jean{-}Pierre Seifert},
  title        = {Exploring Discriminatory Features for Automated Malware Classification},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July
                  18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7967},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39235-1\_3},
  doi          = {10.1007/978-3-642-39235-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/YanBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/KongY13,
  author       = {Deguang Kong and
                  Guanhua Yan},
  editor       = {Inderjit S. Dhillon and
                  Yehuda Koren and
                  Rayid Ghani and
                  Ted E. Senator and
                  Paul Bradley and
                  Rajesh Parekh and
                  Jingrui He and
                  Robert L. Grossman and
                  Ramasamy Uthurusamy},
  title        = {Discriminant malware distance learning on structural information for
                  automated malware classification},
  booktitle    = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013},
  pages        = {1357--1365},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487575.2488219},
  doi          = {10.1145/2487575.2488219},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/KongY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/KongY13,
  author       = {Deguang Kong and
                  Guanhua Yan},
  editor       = {Mor Harchol{-}Balter and
                  John R. Douceur and
                  Jun Xu},
  title        = {Discriminant malware distance learning on structuralinformation for
                  automated malware classification},
  booktitle    = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
                  of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
                  2013},
  pages        = {347--348},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2465529.2465531},
  doi          = {10.1145/2465529.2465531},
  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/KongY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BradonjicMY13,
  author       = {Milan Bradonjic and
                  Michael Molloy and
                  Guanhua Yan},
  title        = {Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms,
                  and Experiments},
  journal      = {CoRR},
  volume       = {abs/1310.1942},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.1942},
  eprinttype    = {arXiv},
  eprint       = {1310.1942},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BradonjicMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PelechrinisYEK12,
  author       = {Konstantinos Pelechrinis and
                  Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Srikanth V. Krishnamurthy},
  title        = {Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {11},
  number       = {7},
  pages        = {1086--1101},
  year         = {2012},
  url          = {https://doi.org/10.1109/TMC.2011.131},
  doi          = {10.1109/TMC.2011.131},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/PelechrinisYEK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanLKW12,
  author       = {Guanhua Yan and
                  Ritchie Lee and
                  Alex Kent and
                  David H. Wolpert},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Towards a bayesian network game framework for evaluating DDoS attacks
                  and defense},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {553--566},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382255},
  doi          = {10.1145/2382196.2382255},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YanLKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ArackaparambilYBC12,
  author       = {Chrisil Arackaparambil and
                  Guanhua Yan and
                  Sergey Bratus and
                  Alper Caglayan},
  title        = {On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP
                  Covert Channels},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {2431--2440},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.456},
  doi          = {10.1109/HICSS.2012.456},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ArackaparambilYBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangZSY12,
  author       = {Rui Zhang and
                  Yanchao Zhang and
                  Jinyuan Sun and
                  Guanhua Yan},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Fine-grained private matching for proximity-based mobile social networking},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {1969--1977},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195574},
  doi          = {10.1109/INFCOM.2012.6195574},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangZSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuZYC12,
  author       = {Lei Liu and
                  Xinwen Zhang and
                  Guanhua Yan and
                  Songqing Chen},
  title        = {Chrome Extensions: Threat Analysis and Countermeasures},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/chrome-extensions-threat-analysis-and-countermeasures},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuZYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/NguyenYTE12,
  author       = {Nam P. Nguyen and
                  Guanhua Yan and
                  My T. Thai and
                  Stephan J. Eidenbenz},
  editor       = {Noshir S. Contractor and
                  Brian Uzzi and
                  Michael W. Macy and
                  Wolfgang Nejdl},
  title        = {Containment of misinformation spread in online social networks},
  booktitle    = {Web Science 2012, WebSci '12, Evanston, IL, {USA} - June 22 - 24,
                  2012},
  pages        = {213--222},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2380718.2380746},
  doi          = {10.1145/2380718.2380746},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/NguyenYTE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YanHE11,
  author       = {Guanhua Yan and
                  Duc T. Ha and
                  Stephan J. Eidenbenz},
  title        = {AntBot: Anti-pollution peer-to-peer botnets},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {8},
  pages        = {1941--1956},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.02.006},
  doi          = {10.1016/J.COMNET.2011.02.006},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YanHE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanCEL11,
  author       = {Guanhua Yan and
                  Guanling Chen and
                  Stephan J. Eidenbenz and
                  Nan Li},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Malware propagation in online social networks: nature, dynamics, and
                  defense implications},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {196--206},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966939},
  doi          = {10.1145/1966913.1966939},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YanCEL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TanYYK11,
  author       = {Keren Tan and
                  Guanhua Yan and
                  Jihwang Yeo and
                  David Kotz},
  title        = {Privacy analysis of user association logs in a large-scale wireless
                  {LAN}},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {31--35},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935168},
  doi          = {10.1109/INFCOM.2011.5935168},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/TanYYK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KasiviswanathanEY11,
  author       = {Shiva Prasad Kasiviswanathan and
                  Stephan J. Eidenbenz and
                  Guanhua Yan},
  title        = {Geography-based analysis of the Internet infrastructure},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {131--135},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934915},
  doi          = {10.1109/INFCOM.2011.5934915},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KasiviswanathanEY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YanCE11,
  author       = {Guanhua Yan and
                  Songqing Chen and
                  Stephan J. Eidenbenz},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {RatBot: Anti-enumeration Peer-to-Peer Botnets},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {135--151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_10},
  doi          = {10.1007/978-3-642-24861-0\_10},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/YanCE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZengYES11,
  author       = {Yuanyuan Zeng and
                  Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Kang G. Shin},
  title        = {Measuring the effectiveness of infrastructure-level detection of large-scale
                  botnets},
  booktitle    = {19th International Workshop on Quality of Service, IWQoS 2011, San
                  Jose, California, USA, 6-7 June 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWQOS.2011.5931312},
  doi          = {10.1109/IWQOS.2011.5931312},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZengYES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/ArackaparambilY11,
  author       = {Chrisil Arackaparambil and
                  Guanhua Yan},
  editor       = {Olivier Boissier and
                  Boualem Benatallah and
                  Mike P. Papazoglou and
                  Zbigniew W. Ras and
                  Mohand{-}Said Hacid},
  title        = {Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional
                  Lens},
  booktitle    = {Proceedings of the 2011 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence, {WI} 2011, Campus Scientifique de la Doua, Lyon,
                  France, August 22-27, 2011},
  pages        = {257--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WI-IAT.2011.86},
  doi          = {10.1109/WI-IAT.2011.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/ArackaparambilY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/JinNY11,
  author       = {Dong (Kevin) Jin and
                  David M. Nicol and
                  Guanhua Yan},
  editor       = {S. Jain and
                  Roy R. Creasey Jr. and
                  Jan Himmelspach and
                  K. Preston White and
                  Michael C. Fu},
  title        = {An event buffer flooding attack in {DNP3} controlled {SCADA} systems},
  booktitle    = {Winter Simulation Conference 2011, WSC'11, Phoenix, AZ, USA, December
                  11-14, 2011},
  pages        = {2619--2631},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/WSC.2011.6147969},
  doi          = {10.1109/WSC.2011.6147969},
  timestamp    = {Thu, 10 Jun 2021 22:18:04 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/JinNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YanETDR10,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Sunil Thulasidasan and
                  Pallab Datta and
                  Venkatesh Ramaswamy},
  title        = {Criticality analysis of Internet infrastructure},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {7},
  pages        = {1169--1182},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2009.11.002},
  doi          = {10.1016/J.COMNET.2009.11.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YanETDR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuTLYW10,
  author       = {Fengyuan Xu and
                  Chiu C. Tan and
                  Qun Li and
                  Guanhua Yan and
                  Jie Wu},
  title        = {Designing a Practical Access Point Association Protocol},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {1361--1369},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5461909},
  doi          = {10.1109/INFCOM.2010.5461909},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XuTLYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/TanYYK10,
  author       = {Keren Tan and
                  Guanhua Yan and
                  Jihwang Yeo and
                  David Kotz},
  editor       = {Nitin Vajdya and
                  Emiliano Miluzzo and
                  Nikodin Ristanovic},
  title        = {A correlation attack against user mobility privacy in a large-scale
                  {WLAN} network},
  booktitle    = {Proceedings of the 2010 {ACM} workshop on Wireless of the students,
                  by the students, for the students, S3@MOBICOM 2010, Chicago, IL, USA,
                  September 20-24, 2010},
  pages        = {33--36},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1860039.1860050},
  doi          = {10.1145/1860039.1860050},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/TanYYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/SanthiYE10,
  author       = {Nandakishore Santhi and
                  Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {CyberSim: Geographic, temporal, and organizational dynamics of malware
                  propagation},
  booktitle    = {Proceedings of the 2010 Winter Simulation Conference, {WSC} 2010,
                  Baltimore, Maryland, USA, 5-8 December 2010},
  pages        = {2876--2887},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WSC.2010.5678982},
  doi          = {10.1109/WSC.2010.5678982},
  timestamp    = {Thu, 10 Jun 2021 22:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/SanthiYE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SunYXY09,
  author       = {Bo Sun and
                  Guanhua Yan and
                  Yang Xiao and
                  T. Andrew Yang},
  title        = {Self-propagating mal-packets in wireless sensor networks: Dynamics
                  and defense implications},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1489--1500},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.003},
  doi          = {10.1016/J.ADHOC.2009.04.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/SunYXY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/YanE09,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {353--368},
  year         = {2009},
  url          = {https://doi.org/10.1109/TMC.2008.129},
  doi          = {10.1109/TMC.2008.129},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/YanE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/LiuZYC09,
  author       = {Lei Liu and
                  Xinwen Zhang and
                  Guanhua Yan and
                  Songqing Chen},
  editor       = {Peter Z. Onufryk and
                  K. K. Ramakrishnan and
                  Patrick Crowley and
                  John Wroclawski},
  title        = {Exploitation and threat analysis of open mobile devices},
  booktitle    = {Proceedings of the 2009 {ACM/IEEE} Symposium on Architecture for Networking
                  and Communications Systems, {ANCS} 2009, Princeton, New Jersey, USA,
                  October 19-20, 2009},
  pages        = {20--29},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1882486.1882493},
  doi          = {10.1145/1882486.1882493},
  timestamp    = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ancs/LiuZYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HaYEN09,
  author       = {Duc T. Ha and
                  Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Hung Q. Ngo},
  title        = {On the effectiveness of structural detection and defense against P2P-based
                  botnets},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {297--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270322},
  doi          = {10.1109/DSN.2009.5270322},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HaYEN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/YanCEH09,
  author       = {Guanhua Yan and
                  Leticia Cuellar and
                  Stephan J. Eidenbenz and
                  Nicolas W. Hengartner},
  title        = {Blue-Watchdog: Detecting Bluetooth worm propagation in public areas},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {317--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270319},
  doi          = {10.1109/DSN.2009.5270319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/YanCEH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PelechrinisYEK09,
  author       = {Konstantinos Pelechrinis and
                  Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Srikanth V. Krishnamurthy},
  title        = {Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {657--665},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5061973},
  doi          = {10.1109/INFCOM.2009.5061973},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PelechrinisYEK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YanEG09,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Emanuele Galli},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {SMS-Watchdog: Profiling Social Behaviors of {SMS} Users for Anomaly
                  Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {202--223},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_11},
  doi          = {10.1007/978-3-642-04342-0\_11},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YanEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiuYZC09,
  author       = {Lei Liu and
                  Guanhua Yan and
                  Xinwen Zhang and
                  Songqing Chen},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {VirusMeter: Preventing Your Cellphone from Spies},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_13},
  doi          = {10.1007/978-3-642-04342-0\_13},
  timestamp    = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiuYZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/YanES09,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Bo Sun},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Mobi-watchdog: you can steal, but you can't run!},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {139--150},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514295},
  doi          = {10.1145/1514274.1514295},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/YanES09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SunSYX08,
  author       = {Bo Sun and
                  Dibesh Shrestha and
                  Guanhua Yan and
                  Yang Xiao},
  title        = {Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and
                  Defense Implications},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {4961--4965},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.949},
  doi          = {10.1109/GLOCOM.2008.ECP.949},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/SunSYX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SunYX08,
  author       = {Bo Sun and
                  Guanhua Yan and
                  Yang Xiao},
  title        = {Worm Propagation Dynamics in Wireless Sensor Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {1541--1545},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.298},
  doi          = {10.1109/ICC.2008.298},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/SunYX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiuCYZ08,
  author       = {Lei Liu and
                  Songqing Chen and
                  Guanhua Yan and
                  Zhao Zhang},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {BotTracer: Execution-Based Bot-Like Malware Detection},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {97--113},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_7},
  doi          = {10.1007/978-3-540-85886-7\_7},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiuCYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/YanCE08,
  author       = {Guanhua Yan and
                  Songqing Chen and
                  Stephan J. Eidenbenz},
  editor       = {Hans van den Berg and
                  Gunnar Karlsson},
  title        = {Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls},
  booktitle    = {16th International Workshop on Quality of Service, IWQoS 2008, University
                  of Twente, Enskede, The Netherlands, 2-4 June 2008},
  pages        = {209--218},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IWQOS.2008.30},
  doi          = {10.1109/IWQOS.2008.30},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/YanCE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/YanE08,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  editor       = {Amitabha Das and
                  Hung Keng Pung and
                  Francis Bu{-}Sung Lee and
                  Lawrence Wai{-}Choong Wong},
  title        = {DDoS Mitigation in Non-cooperative Environments},
  booktitle    = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet , 7th International {IFIP-TC6} Networking
                  Conference, Singapore, May 5-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4982},
  pages        = {599--611},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79549-0\_52},
  doi          = {10.1007/978-3-540-79549-0\_52},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/YanE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/YanXE08,
  author       = {Guanhua Yan and
                  Zhen Xiao and
                  Stephan J. Eidenbenz},
  editor       = {Fabian Monrose},
  title        = {Catching Instant Messaging Worms with Change-Point Detection Techniques},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/yan/yan.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/YanXE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YanFCHEV07,
  author       = {Guanhua Yan and
                  Hector D. Flores and
                  Leticia Cuellar and
                  Nicolas W. Hengartner and
                  Stephan J. Eidenbenz and
                  Vincent Q. Vu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Bluetooth worm propagation: mobility pattern matters!},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {32--44},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229294},
  doi          = {10.1145/1229285.1229294},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YanFCHEV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/YanE07,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Modeling Propagation Dynamics of Bluetooth Worms},
  booktitle    = {27th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {42},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCS.2007.121},
  doi          = {10.1109/ICDCS.2007.121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/YanE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/NicolY06,
  author       = {David M. Nicol and
                  Guanhua Yan},
  title        = {High-Performance Simulation of Low-Resolution Network Flows},
  journal      = {Simul.},
  volume       = {82},
  number       = {1},
  pages        = {21--42},
  year         = {2006},
  url          = {https://doi.org/10.1177/0037549706066093},
  doi          = {10.1177/0037549706066093},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/NicolY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/LiljenstamLNYYG06,
  author       = {Michael Liljenstam and
                  Jason Liu and
                  David M. Nicol and
                  Yougu Yuan and
                  Guanhua Yan and
                  Chris Grier},
  title        = {{RINSE:} The Real-Time Immersive Network Simulation Environment for
                  Network Security Exercises (Extended Version)},
  journal      = {Simul.},
  volume       = {82},
  number       = {1},
  pages        = {43--59},
  year         = {2006},
  url          = {https://doi.org/10.1177/0037549706065544},
  doi          = {10.1177/0037549706065544},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/LiljenstamLNYYG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YanE06,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Bluetooth Worms: Models, Dynamics, and Defense Implications},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {245--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.18},
  doi          = {10.1109/ACSAC.2006.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YanE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icns/IstrateHY06,
  author       = {Gabriel Istrate and
                  Anders Hansson and
                  Guanhua Yan},
  title        = {Packet Reordering Metrics: Some Methodological Considerations},
  booktitle    = {2006 International Conference on Networking and Services {(ICNS} 2006),
                  16-21 July 2006, Silicon Valley, California, {USA}},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICNS.2006.80},
  doi          = {10.1109/ICNS.2006.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icns/IstrateHY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/YanE06,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz},
  title        = {Sluggish Calendar Queues for Network Simulation},
  booktitle    = {14th International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2006), 11-14
                  September 2006, Monterey, California, {USA}},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MASCOTS.2006.46},
  doi          = {10.1109/MASCOTS.2006.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/YanE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Yan05,
  author       = {Guanhua Yan},
  title        = {Improving Large-Scale Network Traffic Simulation with Multi-Resolution
                  Models},
  school       = {Dartmouth College, {USA}},
  year         = {2005},
  url          = {https://digitalcommons.dartmouth.edu/dissertations/13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/us/Yan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/LiljenstamLNYYG05,
  author       = {Michael Liljenstam and
                  Jason Liu and
                  David M. Nicol and
                  Yougu Yuan and
                  Guanhua Yan and
                  Chris Grier},
  title        = {{RINSE:} The Real-Time Immersive Network Simulation Environment for
                  Network Security Exercises},
  booktitle    = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055,
                  Monterey, CA, USA, June 1-3, 2005},
  pages        = {119--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PADS.2005.23},
  doi          = {10.1109/PADS.2005.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pads/LiljenstamLNYYG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/NicolY05,
  author       = {David M. Nicol and
                  Guanhua Yan},
  title        = {Simulation of Network Traffic at Coarse Timescales},
  booktitle    = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055,
                  Monterey, CA, USA, June 1-3, 2005},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PADS.2005.30},
  doi          = {10.1109/PADS.2005.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pads/NicolY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomacs/NicolY04,
  author       = {David M. Nicol and
                  Guanhua Yan},
  title        = {Discrete event fluid modeling of background {TCP} traffic},
  journal      = {{ACM} Trans. Model. Comput. Simul.},
  volume       = {14},
  number       = {3},
  pages        = {211--250},
  year         = {2004},
  url          = {https://doi.org/10.1145/1010621.1010622},
  doi          = {10.1145/1010621.1010622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomacs/NicolY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/NicolLLG03,
  author       = {David M. Nicol and
                  Jason Liu and
                  Michael Liljenstam and
                  Guanhua Yan},
  editor       = {Stephen E. Chick and
                  Paul J. Sanchez and
                  David M. Ferrin and
                  Douglas J. Morrice},
  title        = {Simulation of large scale networks {I:} simulation of large-scale
                  networks using {SSF}},
  booktitle    = {Proceedings of the 35th Winter Simulation Conference: Driving Innovation,
                  New Orleans, Louisiana, USA, December 7-10, 2003},
  pages        = {650--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/WSC.2003.1261480},
  doi          = {10.1109/WSC.2003.1261480},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/NicolLLG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YanJMCM00,
  author       = {Guanhua Yan and
                  Yuehui Jin and
                  Yulu Ma and
                  Shiduan Cheng and
                  Jian Ma},
  title        = {An Efficient Method to Simulate Communication Networks},
  booktitle    = {2000 {IEEE} International Conference on Communications: Global Convergence
                  Through Communications, {ICC} 2000, New Orleans, LA, USA, June 18-22,
                  2000},
  pages        = {192--194},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICC.2000.853090},
  doi          = {10.1109/ICC.2000.853090},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YanJMCM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics