Yan Chen
Yan Chen
Verified email at northwestern.edu - Homepage
Title
Cited by
Cited by
Year
Oceanstore: An architecture for global-scale persistent storage
J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ...
ACM SIGOPS Operating Systems Review 34 (5), 190-201, 2000
33242000
Sketch-based change detection: methods, evaluation, and applications
B Krishnamurthy, S Sen, Y Zhang, Y Chen
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, 234-247, 2003
6602003
Detecting and characterizing social spam campaigns
H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010
5982010
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4092013
OSA: An optical switching architecture for data center networks with unprecedented flexibility
K Chen, A Singla, A Singh, K Ramachandran, L Xu, Y Zhang, X Wen, ...
IEEE/ACM Transactions on Networking 22 (2), 498-511, 2013
4032013
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
Z Li, M Sanghi, Y Chen, MY Kao, B Chavez
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-47, 2006
3952006
Droidchameleon: evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
3522013
Dynamic replica placement for scalable content delivery
Y Chen, RH Katz, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 306-318, 2002
2952002
Botnet research survey
Z Zhu, G Lu, Y Chen, ZJ Fu, P Roberts, K Han
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
2782008
An algebraic approach to practical and scalable overlay network monitoring
Y Chen, D Bindel, H Song, RH Katz
Proceedings of the 2004 conference on Applications, technologies …, 2004
2722004
Towards online spam filtering in social networks.
H Gao, Y Chen, K Lee, D Palsetia, AN Choudhary
NDSS 12 (2012), 1-16, 2012
2552012
Security issues in online social networks
H Gao, J Hu, T Huang, J Wang, Y Chen
IEEE Internet Computing 15 (4), 56-63, 2011
2272011
BotGraph: Large Scale Spamming Botnet Detection.
Y Zhao, Y Xie, F Yu, Q Ke, Y Yu, Y Chen, E Gillum
NSDI 9, 321-334, 2009
2132009
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen
NDSS, 2015
1772015
Towards a secure controller platform for openflow applications
X Wen, Y Chen, C Hu, C Shi, Y Wang
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
1762013
Matching with a large vulnerability signature ruleset for high performance network defense
Y Chen, LI Zhichun, G Xia, B Liu
US Patent 8,522,348, 2013
1702013
Catch me if you can: Evaluating android anti-malware against transformation attacks
V Rastogi, Y Chen, X Jiang
IEEE Transactions on Information Forensics and Security 9 (1), 99-108, 2013
1692013
Autocog: Measuring the description-to-permission fidelity in android applications
Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1632014
Reversible sketches for efficient and accurate change detection over network data streams
R Schweller, A Gupta, E Parsons, Y Chen
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 207-212, 2004
1552004
Scalable name lookup in NDN using effective name component encoding
Y Wang, K He, H Dai, W Meng, J Jiang, B Liu, Y Chen
2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012
1532012
The system can't perform the operation now. Try again later.
Articles 1–20