Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Guanhua Yan
@inproceedings{DBLP:conf/icdm/GwakWWYSS023, author = {Joon{-}Young Gwak and Priti Prabhakar Wakodikar and Meng Wang and Guanhua Yan and Xiaokui Shu and Scott D. Stoller and Ping Yang}, editor = {Jihe Wang and Yi He and Thang N. Dinh and Christan Grant and Meikang Qiu and Witold Pedrycz}, title = {Debugging Malware Classification Models Based on Event Logs with Explainable {AI}}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops, Shanghai, China, December 4, 2023}, pages = {939--948}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDMW60847.2023.00125}, doi = {10.1109/ICDMW60847.2023.00125}, timestamp = {Tue, 13 Feb 2024 13:22:54 +0100}, biburl = {https://dblp.org/rec/conf/icdm/GwakWWYSS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShuY22, author = {Zhan Shu and Guanhua Yan}, title = {IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {22}, pages = {22737--22751}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3182589}, doi = {10.1109/JIOT.2022.3182589}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShuY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HerathWYY22, author = {Jerome Dinal Herath and Priti Prabhakar Wakodikar and Ping Yang and Guanhua Yan}, title = {CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {172--184}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00028}, doi = {10.1109/DSN53405.2022.00028}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/HerathWYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WenPY22, author = {Zhixin Wen and Harsh Sanjay Pacherkar and Guanhua Yan}, title = {{VET5G:} {A} Virtual End-to-End Testbed for 5G Network Security Experimentation}, booktitle = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual Event, 8 August 2022}, pages = {19--29}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3546096.3546111}, doi = {10.1145/3546096.3546111}, timestamp = {Tue, 18 Oct 2022 12:47:08 +0200}, biburl = {https://dblp.org/rec/conf/uss/WenPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HerathYY21, author = {Jerome Dinal Herath and Ping Yang and Guanhua Yan}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {29--40}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447833}, doi = {10.1145/3422337.3447833}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HerathYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KucukY20, author = {Yunus Kucuk and Guanhua Yan}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {341--352}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375741}, doi = {10.1145/3374664.3375741}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/KucukY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeesec/FangY20, author = {Kaiming Fang and Guanhua Yan}, title = {IoTReplay: Troubleshooting {COTS} IoT Devices with Record and Replay}, booktitle = {5th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2020, San Jose, CA, USA, November 12-14, 2020}, pages = {193--205}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SEC50012.2020.00033}, doi = {10.1109/SEC50012.2020.00033}, timestamp = {Tue, 02 Mar 2021 09:16:51 +0100}, biburl = {https://dblp.org/rec/conf/ieeesec/FangY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FangY20, author = {Kaiming Fang and Guanhua Yan}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications}, booktitle = {WiSec '20: 13th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, July 8-10, 2020}, pages = {295--305}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395351.3399347}, doi = {10.1145/3395351.3399347}, timestamp = {Tue, 29 Dec 2020 18:27:47 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FangY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HerathBYYL19, author = {Jerome Dinal Herath and Changxin Bai and Guanhua Yan and Ping Yang and Shiyong Lu}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {{RAMP:} Real-Time Anomaly Detection in Scientific Workflows}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {1367--1374}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9005653}, doi = {10.1109/BIGDATA47090.2019.9005653}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/HerathBYYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/FernandoKHMMBYY19, author = {Dinuni K. Fernando and Siddharth Kulshrestha and Jerome Dinal Herath and Nitin Mahadik and Yanzhe Ma and Changxin Bai and Ping Yang and Guanhua Yan and Shiyong Lu}, title = {SciBlock: {A} Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {81--90}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00019}, doi = {10.1109/CIC48465.2019.00019}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/FernandoKHMMBYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/YanYJ19, author = {Jiaqi Yan and Guanhua Yan and Dong Jin}, title = {Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {52--63}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00020}, doi = {10.1109/DSN.2019.00020}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsn/YanYJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZZY18, author = {Jinxue Zhang and Rui Zhang and Yanchao Zhang and Guanhua Yan}, title = {The Rise of Social Botnets: Attacks and Countermeasures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1068--1082}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2641441}, doi = {10.1109/TDSC.2016.2641441}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuY18, author = {Zhan Shu and Guanhua Yan}, editor = {Massimiliano Albanese and Dijiang Huang}, title = {Ensuring Deception Consistency for {FTP} Services Hardened against Advanced Persistent Threats}, booktitle = {Proceedings of the 5th {ACM} Workshop on Moving Target Defense, {CCS} 2018, Toronto, ON, Canada, October 15, 2018}, pages = {69--79}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3268966.3268971}, doi = {10.1145/3268966.3268971}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShuY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FangY18, author = {Kaiming Fang and Guanhua Yan}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {20--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_2}, doi = {10.1007/978-3-319-98989-1\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/KucukPSY18, author = {Yunus Kucuk and Nikhil Patil and Zhan Shu and Guanhua Yan}, title = {BigBing: Privacy-Preserving Cloud-Based Malware Classification Service}, booktitle = {2018 {IEEE} Symposium on Privacy-Aware Computing, {PAC} 2018, Washington, DC, USA, September 26-28, 2018}, pages = {43--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PAC.2018.00011}, doi = {10.1109/PAC.2018.00011}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/pac/KucukPSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Yan17, author = {Guanhua Yan}, editor = {Kisung Lee and Ling Liu}, title = {Improving Efficiency of Link Clustering on Multi-core Machines}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2017--2024}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.126}, doi = {10.1109/ICDCS.2017.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Yan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/YanLSK17, author = {Guanhua Yan and Junchen Lu and Zhan Shu and Yunus Kucuk}, title = {ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {164--175}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.10}, doi = {10.1109/PAC.2017.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/YanLSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YanKSL16, author = {Guanhua Yan and Yunus Kucuk and Max Slocum and David C. Last}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {343--365}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_21}, doi = {10.1007/978-3-319-45871-7\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/YanKSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangZZY16, author = {Jinxue Zhang and Rui Zhang and Yanchao Zhang and Guanhua Yan}, title = {The Rise of Social Botnets: Attacks and Countermeasures}, journal = {CoRR}, volume = {abs/1603.02714}, year = {2016}, url = {http://arxiv.org/abs/1603.02714}, eprinttype = {arXiv}, eprint = {1603.02714}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangZZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yan15, author = {Guanhua Yan}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {121--132}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714578}, doi = {10.1145/2714576.2714578}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Yan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YanE14, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs}, booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems, {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014}, pages = {154--165}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCS.2014.24}, doi = {10.1109/ICDCS.2014.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YanE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Yan14, author = {Guanhua Yan}, editor = {Isabel F. Cruz and Elena Ferrari and Yufei Tao and Elisa Bertino and Goce Trajcevski}, title = {Finding common ground among experts' opinions on data clustering: With applications in malware analysis}, booktitle = {{IEEE} 30th International Conference on Data Engineering, Chicago, {ICDE} 2014, IL, USA, March 31 - April 4, 2014}, pages = {15--27}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDE.2014.6816636}, doi = {10.1109/ICDE.2014.6816636}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/Yan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KongY14, author = {Deguang Kong and Guanhua Yan}, title = {Transductive malware label propagation: Find your lineage from your neighbors}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {1411--1419}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848075}, doi = {10.1109/INFOCOM.2014.6848075}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KongY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Yan13, author = {Guanhua Yan}, title = {Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {540--555}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.016}, doi = {10.1016/J.COMNET.2012.07.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Yan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NguyenYT13, author = {Nam P. Nguyen and Guanhua Yan and My T. Thai}, title = {Analysis of misinformation containment in online social networks}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2133--2146}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.002}, doi = {10.1016/J.COMNET.2013.04.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NguyenYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/BradonjicMY13, author = {Milan Bradonjic and Michael Molloy and Guanhua Yan}, title = {Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments}, journal = {Internet Math.}, volume = {9}, number = {4}, pages = {406--433}, year = {2013}, url = {https://doi.org/10.1080/15427951.2013.798600}, doi = {10.1080/15427951.2013.798600}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/im/BradonjicMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhangZZSY13, author = {Rui Zhang and Jinxue Zhang and Yanchao Zhang and Jinyuan Sun and Guanhua Yan}, title = {Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {9-Supplement}, pages = {656--668}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.SUP.0513057}, doi = {10.1109/JSAC.2013.SUP.0513057}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZhangZZSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/RahmanYMFEF13, author = {Md. Sazzadur Rahman and Guanhua Yan and Harsha V. Madhyastha and Michalis Faloutsos and Stephan J. Eidenbenz and Mike Fisk}, title = {iDispatcher: {A} unified platform for secure planet-scale information dissemination}, journal = {Peer-to-Peer Netw. Appl.}, volume = {6}, number = {1}, pages = {46--60}, year = {2013}, url = {https://doi.org/10.1007/s12083-012-0128-8}, doi = {10.1007/S12083-012-0128-8}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/RahmanYMFEF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/XuZTLY013, author = {Fengyuan Xu and Xiaojun Zhu and Chiu C. Tan and Qun Li and Guanhua Yan and Jie Wu}, title = {SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {12}, pages = {2482--2491}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2013.10}, doi = {10.1109/TPDS.2013.10}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/XuZTLY013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Zhang0ZY13, author = {Jinxue Zhang and Rui Zhang and Yanchao Zhang and Guanhua Yan}, title = {On the impact of social botnets for spam distribution and digital-influence manipulation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {46--54}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682691}, doi = {10.1109/CNS.2013.6682691}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/Zhang0ZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/YanBK13, author = {Guanhua Yan and Nathan Brown and Deguang Kong}, editor = {Konrad Rieck and Patrick Stewin and Jean{-}Pierre Seifert}, title = {Exploring Discriminatory Features for Automated Malware Classification}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, {DIMVA} 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7967}, pages = {41--61}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39235-1\_3}, doi = {10.1007/978-3-642-39235-1\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/YanBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/KongY13, author = {Deguang Kong and Guanhua Yan}, editor = {Inderjit S. Dhillon and Yehuda Koren and Rayid Ghani and Ted E. Senator and Paul Bradley and Rajesh Parekh and Jingrui He and Robert L. Grossman and Ramasamy Uthurusamy}, title = {Discriminant malware distance learning on structural information for automated malware classification}, booktitle = {The 19th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, {KDD} 2013, Chicago, IL, USA, August 11-14, 2013}, pages = {1357--1365}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487575.2488219}, doi = {10.1145/2487575.2488219}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/KongY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/KongY13, author = {Deguang Kong and Guanhua Yan}, editor = {Mor Harchol{-}Balter and John R. Douceur and Jun Xu}, title = {Discriminant malware distance learning on structuralinformation for automated malware classification}, booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21, 2013}, pages = {347--348}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465529.2465531}, doi = {10.1145/2465529.2465531}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/KongY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BradonjicMY13, author = {Milan Bradonjic and Michael Molloy and Guanhua Yan}, title = {Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments}, journal = {CoRR}, volume = {abs/1310.1942}, year = {2013}, url = {http://arxiv.org/abs/1310.1942}, eprinttype = {arXiv}, eprint = {1310.1942}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/BradonjicMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PelechrinisYEK12, author = {Konstantinos Pelechrinis and Guanhua Yan and Stephan J. Eidenbenz and Srikanth V. Krishnamurthy}, title = {Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {7}, pages = {1086--1101}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.131}, doi = {10.1109/TMC.2011.131}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/PelechrinisYEK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanLKW12, author = {Guanhua Yan and Ritchie Lee and Alex Kent and David H. Wolpert}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Towards a bayesian network game framework for evaluating DDoS attacks and defense}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {553--566}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382255}, doi = {10.1145/2382196.2382255}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YanLKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ArackaparambilYBC12, author = {Chrisil Arackaparambil and Guanhua Yan and Sergey Bratus and Alper Caglayan}, title = {On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {2431--2440}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.456}, doi = {10.1109/HICSS.2012.456}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ArackaparambilYBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangZSY12, author = {Rui Zhang and Yanchao Zhang and Jinyuan Sun and Guanhua Yan}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Fine-grained private matching for proximity-based mobile social networking}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {1969--1977}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195574}, doi = {10.1109/INFCOM.2012.6195574}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangZSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuZYC12, author = {Lei Liu and Xinwen Zhang and Guanhua Yan and Songqing Chen}, title = {Chrome Extensions: Threat Analysis and Countermeasures}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/chrome-extensions-threat-analysis-and-countermeasures}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiuZYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/NguyenYTE12, author = {Nam P. Nguyen and Guanhua Yan and My T. Thai and Stephan J. Eidenbenz}, editor = {Noshir S. Contractor and Brian Uzzi and Michael W. Macy and Wolfgang Nejdl}, title = {Containment of misinformation spread in online social networks}, booktitle = {Web Science 2012, WebSci '12, Evanston, IL, {USA} - June 22 - 24, 2012}, pages = {213--222}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2380718.2380746}, doi = {10.1145/2380718.2380746}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/NguyenYTE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YanHE11, author = {Guanhua Yan and Duc T. Ha and Stephan J. Eidenbenz}, title = {AntBot: Anti-pollution peer-to-peer botnets}, journal = {Comput. Networks}, volume = {55}, number = {8}, pages = {1941--1956}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.02.006}, doi = {10.1016/J.COMNET.2011.02.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YanHE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanCEL11, author = {Guanhua Yan and Guanling Chen and Stephan J. Eidenbenz and Nan Li}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Malware propagation in online social networks: nature, dynamics, and defense implications}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {196--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966939}, doi = {10.1145/1966913.1966939}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YanCEL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TanYYK11, author = {Keren Tan and Guanhua Yan and Jihwang Yeo and David Kotz}, title = {Privacy analysis of user association logs in a large-scale wireless {LAN}}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {31--35}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935168}, doi = {10.1109/INFCOM.2011.5935168}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/TanYYK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KasiviswanathanEY11, author = {Shiva Prasad Kasiviswanathan and Stephan J. Eidenbenz and Guanhua Yan}, title = {Geography-based analysis of the Internet infrastructure}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {131--135}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934915}, doi = {10.1109/INFCOM.2011.5934915}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/KasiviswanathanEY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YanCE11, author = {Guanhua Yan and Songqing Chen and Stephan J. Eidenbenz}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {RatBot: Anti-enumeration Peer-to-Peer Botnets}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {135--151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_10}, doi = {10.1007/978-3-642-24861-0\_10}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/YanCE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZengYES11, author = {Yuanyuan Zeng and Guanhua Yan and Stephan J. Eidenbenz and Kang G. Shin}, title = {Measuring the effectiveness of infrastructure-level detection of large-scale botnets}, booktitle = {19th International Workshop on Quality of Service, IWQoS 2011, San Jose, California, USA, 6-7 June 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWQOS.2011.5931312}, doi = {10.1109/IWQOS.2011.5931312}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZengYES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/ArackaparambilY11, author = {Chrisil Arackaparambil and Guanhua Yan}, editor = {Olivier Boissier and Boualem Benatallah and Mike P. Papazoglou and Zbigniew W. Ras and Mohand{-}Said Hacid}, title = {Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens}, booktitle = {Proceedings of the 2011 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2011, Campus Scientifique de la Doua, Lyon, France, August 22-27, 2011}, pages = {257--264}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WI-IAT.2011.86}, doi = {10.1109/WI-IAT.2011.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/webi/ArackaparambilY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/JinNY11, author = {Dong (Kevin) Jin and David M. Nicol and Guanhua Yan}, editor = {S. Jain and Roy R. Creasey Jr. and Jan Himmelspach and K. Preston White and Michael C. Fu}, title = {An event buffer flooding attack in {DNP3} controlled {SCADA} systems}, booktitle = {Winter Simulation Conference 2011, WSC'11, Phoenix, AZ, USA, December 11-14, 2011}, pages = {2619--2631}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/WSC.2011.6147969}, doi = {10.1109/WSC.2011.6147969}, timestamp = {Thu, 10 Jun 2021 22:18:04 +0200}, biburl = {https://dblp.org/rec/conf/wsc/JinNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YanETDR10, author = {Guanhua Yan and Stephan J. Eidenbenz and Sunil Thulasidasan and Pallab Datta and Venkatesh Ramaswamy}, title = {Criticality analysis of Internet infrastructure}, journal = {Comput. Networks}, volume = {54}, number = {7}, pages = {1169--1182}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.11.002}, doi = {10.1016/J.COMNET.2009.11.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YanETDR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuTLYW10, author = {Fengyuan Xu and Chiu C. Tan and Qun Li and Guanhua Yan and Jie Wu}, title = {Designing a Practical Access Point Association Protocol}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1361--1369}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461909}, doi = {10.1109/INFCOM.2010.5461909}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuTLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/TanYYK10, author = {Keren Tan and Guanhua Yan and Jihwang Yeo and David Kotz}, editor = {Nitin Vajdya and Emiliano Miluzzo and Nikodin Ristanovic}, title = {A correlation attack against user mobility privacy in a large-scale {WLAN} network}, booktitle = {Proceedings of the 2010 {ACM} workshop on Wireless of the students, by the students, for the students, S3@MOBICOM 2010, Chicago, IL, USA, September 20-24, 2010}, pages = {33--36}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1860039.1860050}, doi = {10.1145/1860039.1860050}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/TanYYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/SanthiYE10, author = {Nandakishore Santhi and Guanhua Yan and Stephan J. Eidenbenz}, title = {CyberSim: Geographic, temporal, and organizational dynamics of malware propagation}, booktitle = {Proceedings of the 2010 Winter Simulation Conference, {WSC} 2010, Baltimore, Maryland, USA, 5-8 December 2010}, pages = {2876--2887}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WSC.2010.5678982}, doi = {10.1109/WSC.2010.5678982}, timestamp = {Thu, 10 Jun 2021 22:20:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/SanthiYE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SunYXY09, author = {Bo Sun and Guanhua Yan and Yang Xiao and T. Andrew Yang}, title = {Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1489--1500}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.003}, doi = {10.1016/J.ADHOC.2009.04.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/SunYXY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/YanE09, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {8}, number = {3}, pages = {353--368}, year = {2009}, url = {https://doi.org/10.1109/TMC.2008.129}, doi = {10.1109/TMC.2008.129}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/YanE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/LiuZYC09, author = {Lei Liu and Xinwen Zhang and Guanhua Yan and Songqing Chen}, editor = {Peter Z. Onufryk and K. K. Ramakrishnan and Patrick Crowley and John Wroclawski}, title = {Exploitation and threat analysis of open mobile devices}, booktitle = {Proceedings of the 2009 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2009, Princeton, New Jersey, USA, October 19-20, 2009}, pages = {20--29}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1882486.1882493}, doi = {10.1145/1882486.1882493}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ancs/LiuZYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HaYEN09, author = {Duc T. Ha and Guanhua Yan and Stephan J. Eidenbenz and Hung Q. Ngo}, title = {On the effectiveness of structural detection and defense against P2P-based botnets}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {297--306}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270322}, doi = {10.1109/DSN.2009.5270322}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HaYEN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/YanCEH09, author = {Guanhua Yan and Leticia Cuellar and Stephan J. Eidenbenz and Nicolas W. Hengartner}, title = {Blue-Watchdog: Detecting Bluetooth worm propagation in public areas}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {317--326}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270319}, doi = {10.1109/DSN.2009.5270319}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/YanCEH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PelechrinisYEK09, author = {Konstantinos Pelechrinis and Guanhua Yan and Stephan J. Eidenbenz and Srikanth V. Krishnamurthy}, title = {Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {657--665}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5061973}, doi = {10.1109/INFCOM.2009.5061973}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PelechrinisYEK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YanEG09, author = {Guanhua Yan and Stephan J. Eidenbenz and Emanuele Galli}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {SMS-Watchdog: Profiling Social Behaviors of {SMS} Users for Anomaly Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {202--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_11}, doi = {10.1007/978-3-642-04342-0\_11}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YanEG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiuYZC09, author = {Lei Liu and Guanhua Yan and Xinwen Zhang and Songqing Chen}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {VirusMeter: Preventing Your Cellphone from Spies}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {244--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_13}, doi = {10.1007/978-3-642-04342-0\_13}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiuYZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/YanES09, author = {Guanhua Yan and Stephan J. Eidenbenz and Bo Sun}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Mobi-watchdog: you can steal, but you can't run!}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {139--150}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514295}, doi = {10.1145/1514274.1514295}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/YanES09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SunSYX08, author = {Bo Sun and Dibesh Shrestha and Guanhua Yan and Yang Xiao}, title = {Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {4961--4965}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.949}, doi = {10.1109/GLOCOM.2008.ECP.949}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/SunSYX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SunYX08, author = {Bo Sun and Guanhua Yan and Yang Xiao}, title = {Worm Propagation Dynamics in Wireless Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {1541--1545}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.298}, doi = {10.1109/ICC.2008.298}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/SunYX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiuCYZ08, author = {Lei Liu and Songqing Chen and Guanhua Yan and Zhao Zhang}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {BotTracer: Execution-Based Bot-Like Malware Detection}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {97--113}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_7}, doi = {10.1007/978-3-540-85886-7\_7}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiuCYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/YanCE08, author = {Guanhua Yan and Songqing Chen and Stephan J. Eidenbenz}, editor = {Hans van den Berg and Gunnar Karlsson}, title = {Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls}, booktitle = {16th International Workshop on Quality of Service, IWQoS 2008, University of Twente, Enskede, The Netherlands, 2-4 June 2008}, pages = {209--218}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IWQOS.2008.30}, doi = {10.1109/IWQOS.2008.30}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/YanCE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/YanE08, author = {Guanhua Yan and Stephan J. Eidenbenz}, editor = {Amitabha Das and Hung Keng Pung and Francis Bu{-}Sung Lee and Lawrence Wai{-}Choong Wong}, title = {DDoS Mitigation in Non-cooperative Environments}, booktitle = {{NETWORKING} 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International {IFIP-TC6} Networking Conference, Singapore, May 5-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4982}, pages = {599--611}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79549-0\_52}, doi = {10.1007/978-3-540-79549-0\_52}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/YanE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/YanXE08, author = {Guanhua Yan and Zhen Xiao and Stephan J. Eidenbenz}, editor = {Fabian Monrose}, title = {Catching Instant Messaging Worms with Change-Point Detection Techniques}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/yan/yan.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/YanXE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanFCHEV07, author = {Guanhua Yan and Hector D. Flores and Leticia Cuellar and Nicolas W. Hengartner and Stephan J. Eidenbenz and Vincent Q. Vu}, editor = {Feng Bao and Steven Miller}, title = {Bluetooth worm propagation: mobility pattern matters!}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {32--44}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229294}, doi = {10.1145/1229285.1229294}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YanFCHEV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/YanE07, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Modeling Propagation Dynamics of Bluetooth Worms}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {42}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.121}, doi = {10.1109/ICDCS.2007.121}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/YanE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/NicolY06, author = {David M. Nicol and Guanhua Yan}, title = {High-Performance Simulation of Low-Resolution Network Flows}, journal = {Simul.}, volume = {82}, number = {1}, pages = {21--42}, year = {2006}, url = {https://doi.org/10.1177/0037549706066093}, doi = {10.1177/0037549706066093}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/NicolY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/LiljenstamLNYYG06, author = {Michael Liljenstam and Jason Liu and David M. Nicol and Yougu Yuan and Guanhua Yan and Chris Grier}, title = {{RINSE:} The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)}, journal = {Simul.}, volume = {82}, number = {1}, pages = {43--59}, year = {2006}, url = {https://doi.org/10.1177/0037549706065544}, doi = {10.1177/0037549706065544}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/LiljenstamLNYYG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YanE06, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Bluetooth Worms: Models, Dynamics, and Defense Implications}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {245--256}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.18}, doi = {10.1109/ACSAC.2006.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YanE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icns/IstrateHY06, author = {Gabriel Istrate and Anders Hansson and Guanhua Yan}, title = {Packet Reordering Metrics: Some Methodological Considerations}, booktitle = {2006 International Conference on Networking and Services {(ICNS} 2006), 16-21 July 2006, Silicon Valley, California, {USA}}, pages = {4}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICNS.2006.80}, doi = {10.1109/ICNS.2006.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icns/IstrateHY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/YanE06, author = {Guanhua Yan and Stephan J. Eidenbenz}, title = {Sluggish Calendar Queues for Network Simulation}, booktitle = {14th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2006), 11-14 September 2006, Monterey, California, {USA}}, pages = {127--136}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MASCOTS.2006.46}, doi = {10.1109/MASCOTS.2006.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/YanE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Yan05, author = {Guanhua Yan}, title = {Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models}, school = {Dartmouth College, {USA}}, year = {2005}, url = {https://digitalcommons.dartmouth.edu/dissertations/13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/us/Yan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/LiljenstamLNYYG05, author = {Michael Liljenstam and Jason Liu and David M. Nicol and Yougu Yuan and Guanhua Yan and Chris Grier}, title = {{RINSE:} The Real-Time Immersive Network Simulation Environment for Network Security Exercises}, booktitle = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055, Monterey, CA, USA, June 1-3, 2005}, pages = {119--128}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PADS.2005.23}, doi = {10.1109/PADS.2005.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pads/LiljenstamLNYYG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/NicolY05, author = {David M. Nicol and Guanhua Yan}, title = {Simulation of Network Traffic at Coarse Timescales}, booktitle = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055, Monterey, CA, USA, June 1-3, 2005}, pages = {141--150}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PADS.2005.30}, doi = {10.1109/PADS.2005.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pads/NicolY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomacs/NicolY04, author = {David M. Nicol and Guanhua Yan}, title = {Discrete event fluid modeling of background {TCP} traffic}, journal = {{ACM} Trans. Model. Comput. Simul.}, volume = {14}, number = {3}, pages = {211--250}, year = {2004}, url = {https://doi.org/10.1145/1010621.1010622}, doi = {10.1145/1010621.1010622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomacs/NicolY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/NicolLLG03, author = {David M. Nicol and Jason Liu and Michael Liljenstam and Guanhua Yan}, editor = {Stephen E. Chick and Paul J. Sanchez and David M. Ferrin and Douglas J. Morrice}, title = {Simulation of large scale networks {I:} simulation of large-scale networks using {SSF}}, booktitle = {Proceedings of the 35th Winter Simulation Conference: Driving Innovation, New Orleans, Louisiana, USA, December 7-10, 2003}, pages = {650--657}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/WSC.2003.1261480}, doi = {10.1109/WSC.2003.1261480}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/NicolLLG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YanJMCM00, author = {Guanhua Yan and Yuehui Jin and Yulu Ma and Shiduan Cheng and Jian Ma}, title = {An Efficient Method to Simulate Communication Networks}, booktitle = {2000 {IEEE} International Conference on Communications: Global Convergence Through Communications, {ICC} 2000, New Orleans, LA, USA, June 18-22, 2000}, pages = {192--194}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICC.2000.853090}, doi = {10.1109/ICC.2000.853090}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/YanJMCM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.