|
Search the dblp DataBase
Yinglian Xie:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang
A Multi-Resolution Approach forWorm Detection and Containment. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:189-198 [Conf]
- Yinglian Xie, David R. O'Hallaron, Michael K. Reiter
A Secure Distributed Search System. [Citation Graph (0, 0)][DBLP] HPDC, 2002, pp:321-0 [Conf]
- Balachander Krishnamurthy, Jia Wang, Yinglian Xie
Early measurements of a cluster-based architecture for P2P systems. [Citation Graph (0, 0)][DBLP] Internet Measurement Workshop, 2001, pp:105-109 [Conf]
- Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang
A Secure, Publisher-Centric Web Caching Infrastructure. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:1235-1243 [Conf]
- Yinglian Xie, David R. O'Hallaron
Locality in Search Engine Queries and Its Implications for Caching. [Citation Graph (0, 0)][DBLP] INFOCOM, 2002, pp:- [Conf]
- Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang
Seurat: A Pointillist Approach to Anomaly Detection. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:238-257 [Conf]
- Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang
Worm Origin Identification Using Random Moonwalks. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:242-256 [Conf]
- Yinglian Xie, Michael K. Reiter, David R. O'Hallaron
Protecting Privacy in Key-Value Search Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:493-504 [Conf]
- Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Faloutsos
Less is More: Compact Matrix Decomposition for Large Sparse Graphs. [Citation Graph (0, 0)][DBLP] SDM, 2007, pp:- [Conf]
- Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber
How dynamic are IP addresses? [Citation Graph (0, 0)][DBLP] SIGCOMM, 2007, pp:301-312 [Conf]
End-to-End Web Application Security. [Citation Graph (, )][DBLP]
Forensic Analysis for Epidemic Attacks in Federated Networks. [Citation Graph (, )][DBLP]
BotGraph: Large Scale Spamming Botnet Detection. [Citation Graph (, )][DBLP]
De-anonymizing the internet using unreliable IDs. [Citation Graph (, )][DBLP]
Spamming botnets: signatures and characteristics. [Citation Graph (, )][DBLP]
A case for unsupervised-learning-based spam filtering. [Citation Graph (, )][DBLP]
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. [Citation Graph (, )][DBLP]
SBotMiner: large scale search bot detection. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|