Guanhua Yan Coauthor index pubzone.org

Facets and more with CompleteSearch

Listing of the DBLP Bibliography Server - FAQ
Other views (modern): by type - by year
Other mirrors: Trier I - Trier II


Ask others: ACM DL/Guide - CiteSeerx - CSB - MetaPress - Google - Bing - Yahoo
DBLP keys2016
i2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan: The Rise of Social Botnets: Attacks and Countermeasures. CoRR abs/1603.02714 (2016)
c46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Yunus Kucuk, Max Slocum, David C. Last: A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. ISC 2016: 343-365
2015
c45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan: Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. ASIACCS 2015: 121-132
2014
c44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs. ICDCS 2014: 154-165
c43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan: Finding common ground among experts' opinions on data clustering: With applications in malware analysis. ICDE 2014: 15-27
c42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDeguang Kong, Guanhua Yan: Transductive malware label propagation: Find your lineage from your neighbors. INFOCOM 2014: 1411-1419
2013
j14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan: Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Computer Networks 57(2): 540-555 (2013)
j13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNam P. Nguyen, Guanhua Yan, My T. Thai: Analysis of misinformation containment in online social networks. Computer Networks 57(10): 2133-2146 (2013)
i1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMilan Bradonjic, Michael Molloy, Guanhua Yan: Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. CoRR abs/1310.1942 (2013)
j12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMilan Bradonjic, Michael Molloy, Guanhua Yan: Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. Internet Mathematics 9(4): 406-433 (2013)
j11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan: Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking. IEEE Journal on Selected Areas in Communications 31(9-Supplement): 656-668 (2013)
j10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMd. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos, Stephan Eidenbenz, Mike Fisk: iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Networking and Applications 6(1): 46-60 (2013)
j9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFengyuan Xu, Xiaojun Zhu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu: SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distrib. Syst. 24(12): 2482-2491 (2013)
c41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan: On the impact of social botnets for spam distribution and digital-influence manipulation. CNS 2013: 46-54
c40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Nathan Brown, Deguang Kong: Exploring Discriminatory Features for Automated Malware Classification. DIMVA 2013: 41-61
c39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDeguang Kong, Guanhua Yan: Discriminant malware distance learning on structural information for automated malware classification. KDD 2013: 1357-1365
c38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDeguang Kong, Guanhua Yan: Discriminant malware distance learning on structuralinformation for automated malware classification. SIGMETRICS 2013: 347-348
2012
j8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKonstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy: Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks. IEEE Trans. Mob. Comput. 11(7): 1086-1101 (2012)
c37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Ritchie Lee, Alex Kent, David H. Wolpert: Towards a bayesian network game framework for evaluating DDoS attacks and defense. ACM Conference on Computer and Communications Security 2012: 553-566
c36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan: On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels. HICSS 2012: 2431-2440
c35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan: Fine-grained private matching for proximity-based mobile social networking. INFOCOM 2012: 1969-1977
c34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen: Chrome Extensions: Threat Analysis and Countermeasures. NDSS 2012
c33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNam P. Nguyen, Guanhua Yan, My T. Thai, Stephan Eidenbenz: Containment of misinformation spread in online social networks. WebSci 2012: 213-222
2011
j7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Duc T. Ha, Stephan Eidenbenz: AntBot: Anti-pollution peer-to-peer botnets. Computer Networks 55(8): 1941-1956 (2011)
c32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Guanling Chen, Stephan Eidenbenz, Nan Li: Malware propagation in online social networks: nature, dynamics, and defense implications. ASIACCS 2011: 196-206
c31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeren Tan, Guanhua Yan, Jihwang Yeo, David Kotz: Privacy analysis of user association logs in a large-scale wireless LAN. INFOCOM 2011: 31-35
c30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShiva Prasad Kasiviswanathan, Stephan Eidenbenz, Guanhua Yan: Geography-based analysis of the Internet infrastructure. INFOCOM 2011: 131-135
c29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Songqing Chen, Stephan Eidenbenz: RatBot: Anti-enumeration Peer-to-Peer Botnets. ISC 2011: 135-151
c28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYuanyuan Zeng, Guanhua Yan, Stephan Eidenbenz, Kang G. Shin: Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IWQoS 2011: 1-9
c27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChrisil Arackaparambil, Guanhua Yan: Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens. Web Intelligence 2011: 257-264
c26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDong (Kevin) Jin, David M. Nicol, Guanhua Yan: An event buffer flooding attack in DNP3 controlled SCADA systems. Winter Simulation Conference 2011: 2619-2631
2010
j6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz, Sunil Thulasidasan, Pallab Datta, Venkatesh Ramaswamy: Criticality analysis of Internet infrastructure. Computer Networks 54(7): 1169-1182 (2010)
c25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu: Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369
c24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKeren Tan, Guanhua Yan, Jihwang Yeo, David Kotz: A correlation attack against user mobility privacy in a large-scale WLAN network. S3@MobiCom 2010: 33-36
c23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNandakishore Santhi, Guanhua Yan, Stephan Eidenbenz: CyberSim: Geographic, temporal, and organizational dynamics of malware propagation. Winter Simulation Conference 2010: 2876-2887
2009
j5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang: Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. Ad Hoc Networks 7(8): 1489-1500 (2009)
j4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE Trans. Mob. Comput. 8(3): 353-368 (2009)
c22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen: Exploitation and threat analysis of open mobile devices. ANCS 2009: 20-29
c21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDuc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q. Ngo: On the effectiveness of structural detection and defense against P2P-based botnets. DSN 2009: 297-306
c20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Nicolas W. Hengartner: Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. DSN 2009: 317-326
c19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKonstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy: Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. INFOCOM 2009: 657-665
c18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz, Emanuele Galli: SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. RAID 2009: 202-223
c17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen: VirusMeter: Preventing Your Cellphone from Spies. RAID 2009: 244-264
c16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz, Bo Sun: Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150
2008
c15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao: Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications. GLOBECOM 2008: 4961-4965
c14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBo Sun, Guanhua Yan, Yang Xiao: Worm Propagation Dynamics in Wireless Sensor Networks. ICC 2008: 1541-1545
c13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang: BotTracer: Execution-Based Bot-Like Malware Detection. ISC 2008: 97-113
c12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Songqing Chen, Stephan Eidenbenz: Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. IWQoS 2008: 209-218
c11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: DDoS Mitigation in Non-cooperative Environments. Networking 2008: 599-611
c10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Zhen Xiao, Stephan Eidenbenz: Catching Instant Messaging Worms with Change-Point Detection Techniques. LEET 2008
2007
c9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan Eidenbenz, Vincent Vu: Bluetooth worm propagation: mobility pattern matters! ASIACCS 2007: 32-44
c8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: Modeling Propagation Dynamics of Bluetooth Worms. ICDCS 2007: 42
2006
j3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid M. Nicol, Guanhua Yan: High-Performance Simulation of Low-Resolution Network Flows. Simulation 82(1): 21-42 (2006)
j2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier: RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simulation 82(1): 43-59 (2006)
c7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: Bluetooth Worms: Models, Dynamics, and Defense Implications. ACSAC 2006: 245-256
c6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGabriel Istrate, Anders Hansson, Guanhua Yan: Packet Reordering Metrics: Some Methodological Considerations. ICNS 2006: 4
c5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Stephan Eidenbenz: Sluggish Calendar Queues for Network Simulation. MASCOTS 2006: 127-136
2005
c4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier: RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128
c3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid M. Nicol, Guanhua Yan: Simulation of Network Traffic at Coarse Timescales. PADS 2005: 141-150
2004
j1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid M. Nicol, Guanhua Yan: Discrete event fluid modeling of background TCP traffic. ACM Trans. Model. Comput. Simul. 14(3): 211-250 (2004)
2003
c2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid M. Nicol, Jason Liu, Michael Liljenstam, Guanhua Yan: Simulation of large scale networks I: simulation of large-scale networks using SSF. Winter Simulation Conference 2003: 650-657
2000
c1no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGuanhua Yan, Yuehui Jin, Yulu Ma, Shiduan Cheng, Jian Ma: An Efficient Method to Simulate Communication Networks. ICC (1) 2000: 192-194

Coauthor Index

1Chrisil Arackaparambil[c36] [c27]
2Milan Bradonjic[i1] [j12]
3Sergey Bratus[c36]
4Nathan Brown[c40]
5Alper Caglayan[c36]
6Guanling Chen[c32]
7Songqing Chen[c34] [c29] [c22] [c17] [c13] [c12]
8Shiduan Cheng[c1]
9Leticia Cuellar[c20] [c9]
10Pallab Datta[j6]
11Stephan Eidenbenz[c44] [j10] [j8] [c33] [j7] [c32] [c30] [c29] [c28] [j6] [c23] [j4] [c21] [c20] [c19] [c18] [c16] [c12] [c11] [c10] [c9] [c8] [c7] [c5]
12Michalis Faloutsos[j10]
13Mike Fisk[j10]
14Hector D. Flores[c9]
15Emanuele Galli[c18]
16Chris Grier[j2] [c4]
17Duc T. Ha[j7] [c21]
18Anders Hansson[c6]
19Nicolas W. Hengartner[c20] [c9]
20Gabriel Istrate[c6]
21Dong (Kevin) Jin[c26]
22Yuehui Jin[c1]
23Shiva Prasad Kasiviswanathan[c30]
24Alex Kent[c37]
25Deguang Kong[c42] [c40] [c39] [c38]
26David Kotz[c31] [c24]
27Srikanth V. Krishnamurthy[j8] [c19]
28Yunus Kucuk[c46]
29David C. Last[c46]
30Ritchie Lee[c37]
31Nan Li[c32]
32Qun Li[j9] [c25]
33Michael Liljenstam[j2] [c4] [c2]
34Jason Liu[j2] [c4] [c2]
35Lei Liu[c34] [c22] [c17] [c13]
36Jian Ma[c1]
37Yulu Ma[c1]
38Harsha V. Madhyastha[j10]
39Michael Molloy[i1] [j12]
40Hung Q. Ngo 0001[c21]
41Nam P. Nguyen[j13] [c33]
42David M. Nicol[c26] [j3] [j2] [c4] [c3] [j1] [c2]
43Konstantinos Pelechrinis[j8] [c19]
44Md. Sazzadur Rahman[j10]
45Venkatesh Ramaswamy[j6]
46Nandakishore Santhi[c23]
47Kang G. Shin[c28]
48Dibesh Shrestha[c15]
49Max Slocum[c46]
50Bo Sun[j5] [c16] [c15] [c14]
51Jinyuan Sun[j11] [c35]
52Chiu Chiang Tan[j9] [c25]
53Keren Tan[c31] [c24]
54My T. Thai[j13] [c33]
55Sunil Thulasidasan[j6]
56Vincent Vu[c9]
57David H. Wolpert[c37]
58Jie Wu 0001[j9] [c25]
59Yang Xiao[j5] [c15] [c14]
60Zhen Xiao[c10]
61Fengyuan Xu[j9] [c25]
62T. Andrew Yang[j5]
63Jihwang Yeo[c31] [c24]
64Yougu Yuan[j2] [c4]
65Yuanyuan Zeng[c28]
66Jinxue Zhang[i2] [j11] [c41]
67Rui Zhang 0007[i2] [j11] [c41] [c35]
68Xinwen Zhang[c34] [c22] [c17]
69Yanchao Zhang[i2] [j11] [c41] [c35]
70Zhao Zhang[c13]
71Xiaojun Zhu 0001[j9]

 

Last update 2017-06-17 01:08 CEST by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page