Yulai Xie
Citado por
Citado por
Design and evaluation of oasis: An active storage framework based on t10 osd standard
Y Xie, KK Muniswamy-Reddy, D Feng, DDE Long, Y Kang, Z Niu, Z Tan
2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST), 1-12, 2011
A Hybrid Approach for Efficient Provenance Storage
Y Xie, KK Muniswamy-Reddy, D Feng, Y Li, DDE Long, Z Tan, L Chen
The 21st ACM International Conference on Information and Knowledge …, 2012
Evaluation of a hybrid approach for efficient provenance storage
Y Xie, KK Muniswamy-Reddy, D Feng, Y Li, DDE Long
ACM Transactions on Storage (TOS) 9 (4), 1-29, 2013
Compressing Provenance Graphs.
Y Xie, KK Muniswamy-Reddy, DDE Long, A Amer, D Feng, Z Tan
TaPP, 2011
Unifying intrusion detection and forensic analysis via provenance awareness
Y Xie, D Feng, Z Tan, J Zhou
Future Generation Computer Systems 61, 26-36, 2016
Oasis: An active storage framework for object storage platform
Y Xie, D Feng, Y Li, DDE Long
Future Generation Computer Systems 56, 746-758, 2016
A docker container anomaly monitoring system based on optimized isolation forest
Z Zou, Y Xie, K Huang, G Xu, D Feng, D Long
IEEE Transactions on Cloud Computing, 2019
Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments
Y Xie, D Feng, Y Hu, Y Li, S Sample, D Long
IEEE Transactions on Dependable and Secure Computing 17 (6), 1283-1296, 2018
Method for managing object-based storage system
D Feng, L Pang, Y Xie, F Wang, Z Niu, K Zhou, J Wang, Y Yue, X Tu, S He, ...
US Patent 8,645,460, 2014
Efficient provenance management via clustering and hybrid storage in big data environments
D Hu, D Feng, Y Xie, G Xu, X Gu, D Long
IEEE Transactions on Big Data 6 (4), 792-803, 2019
Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead
Y Xie, D Feng, X Liao, L Qin
Digital Investigation 26, 19-28, 2018
Design and evaluation of a provenance-based rebuild framework
Y Xie, D Feng, Z Tan, J Zhou
IEEE transactions on magnetics 49 (6), 2805-2811, 2013
Real-time prediction of docker container resource load based on a hybrid model of ARIMA and triple exponential smoothing
Y Xie, M Jin, Z Zou, G Xu, D Feng, W Liu, D Long
IEEE Transactions on Cloud Computing, 2020
An In-Depth Analysis of TCP and RDMA Performance on Modern Server Platform
Y Wan, D Feng, F Wang, L Ming, Y Xie
2012 IEEE Seventh International Conference on Networking, Architecture, and …, 2012
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing
P Zhou, Y Xie, B Niu, L Pu, Z Xu, H Jiang, H Huang
IEEE Transactions on Network Science and Engineering 8 (1), 419-433, 2020
P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases
Y Xie, Y Wu, D Feng, D Long
IEEE Transactions on Dependable and Secure Computing, 2019
Experiences building a provenance-based reconstruction system
Y Xie, D Feng, Z Tan, L Chen, J Zhou
2012 Digest APMRC, 1-6, 2012
Trustworthy and Context-Aware Distributed Online Learning with Autoscaling for Content Caching in Collaborative Mobile Edge Computing
P Zhou, S Gong, Z Xu, L Chen, Y Xie, C Jiang, X Ding
IEEE Transactions on Cognitive Communications and Networking, 2021
A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach
Z Xue, P Zhou, Z Xu, X Wang, Y Xie, X Ding, S Wen
IEEE Internet of Things Journal 8 (11), 9122-9138, 2021
Context-aware Biaffine Localizing Network for Temporal Sentence Grounding
D Liu, X Qu, J Dong, P Zhou, Y Cheng, W Wei, Z Xu, Y Xie
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20