Follow
Jiahai Yang
Jiahai Yang
Tsinghua University
Verified email at cernet.edu.cn
Title
Cited by
Cited by
Year
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning
Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ...
Computer Networks 169, 107049, 2020
1352020
Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks
P Liu, H Xu, Q Ouyang, R Jiao, Z Chen, S Zhang, J Yang, L Mo, J Zeng, ...
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
1142020
CARDS: A distributed system for detecting coordinated attacks
J Yang, P Ning, XS Wang, S Jajodia
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
952000
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021
832021
CNGI-CERNET2: an IPv6 deployment in China
J Wu, JH Wang, J Yang
ACM SIGCOMM Computer Communication Review 41 (2), 48-52, 2011
722011
Root cause analysis of anomalies of multitier services in public clouds
J Weng, JH Wang, J Yang, Y Yang
IEEE/ACM Transactions on Networking 26 (4), 1646-1659, 2018
702018
{HinDom}: A robust malicious domain detection system based on heterogeneous information network with transductive classification
X Sun, M Tong, J Yang, L Xinran, L Heng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
622019
Survey on access control technologies for cloud computing
王于丁, 杨家海, 徐聪, 凌晓, 杨洋
Journal of Software 26 (5), 1129-1150, 2015
532015
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications
D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
512021
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation
Q Li, D Wang, M Xu, J Yang
2011 Proceedings IEEE INFOCOM, 321-325, 2011
432011
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning
S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang
IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022
412022
Survey and analysis on the internet traffic model
张宾, 杨家海, 吴建平
Journal of Software 22 (1), 115-131, 2011
362011
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
X Sun, Z Wang, J Yang, X Liu
Computers & Security 99, 102057, 2020
342020
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning
Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang
IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020
342020
Fine-grained cloud resource provisioning for virtual network function
H Yu, J Yang, C Fung
IEEE Transactions on network and service management 17 (3), 1363-1376, 2020
332020
An IoT device identification method based on semi-supervised learning
L Fan, S Zhang, Y Wu, Z Wang, C Duan, J Li, J Yang
2020 16th International Conference on Network and Service Management (CNSM), 1-7, 2020
302020
PCA-subspace method—Is it good enough for network-wide anomaly detection
B Zhang, J Yang, J Wu, D Qin, L Gao
2012 IEEE Network Operations and Management Symposium, 359-367, 2012
292012
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments
X Ling, Y Yuan, D Wang, J Liu, J Yang
Journal of Parallel and Distributed Computing 90, 52-66, 2016
272016
Generic and agile service function chain verification on cloud
X Zhang, Q Li, J Wu, J Yang
2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 1-10, 2017
262017
Hgdom: Heterogeneous graph convolutional networks for malicious domain detection
X Sun, J Yang, Z Wang, H Liu
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020
252020
The system can't perform the operation now. Try again later.
Articles 1–20