Jiahai Yang

Orcid: 0000-0001-6109-6737

Affiliations:
  • Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China


According to our database1, Jiahai Yang authored at least 163 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System.
IEEE/ACM Trans. Netw., October, 2024

ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content.
IEEE/ACM Trans. Netw., October, 2024

Proactive Telemetry in Large-Scale Multi-Tenant Cloud Overlay Networks.
IEEE/ACM Trans. Netw., August, 2024

CouldPin-Fast: Effient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks.
IEEE Trans. Serv. Comput., 2024

RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning.
IEEE Trans. Inf. Forensics Secur., 2024

IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models.
IEEE Trans. Dependable Secur. Comput., 2024

IPREDS: Efficient Prediction System for Internet-wide Port and Service Scanning.
Proc. ACM Netw., 2024

E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet.
CoRR, 2024

Network anomaly detection via similarity-aware ensemble learning with ADSim.
Comput. Networks, 2024

POSTER: RDMA Network Performance Anomalies Diagnosis with Hawkeye.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

LoRDMA: A New Low-Rate DoS Attack in RDMA Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CP-IoT: A Cross-Platform Monitoring System for Smart Home.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud Networks.
Proceedings of the IEEE INFOCOM 2024, 2024

ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
SmartSBD: Smart shared bottleneck detection for efficient multipath congestion control over heterogeneous networks.
Comput. Networks, December, 2023

AutoIoT: Automatically Updated IoT Device Identification With Semi-Supervised Learning.
IEEE Trans. Mob. Comput., October, 2023

SAV6: A Novel Inter-AS Source Address Validation Protocol for IPv6 Internet.
IEEE Netw., September, 2023

Multi-stage Location for Root-Cause Metrics in Online Service Systems.
Proceedings of the NOMS 2023, 2023

Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild.
Proceedings of the IFIP Networking Conference, 2023

BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

GraphIoT: Accurate IoT Identification based on Heterogeneous Graph.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
DET: Enabling Efficient Probing of IPv6 Active Addresses.
IEEE/ACM Trans. Netw., 2022

Weighted NSFIB Aggregation With Generalized Next Hop of Strict Partial Order.
IEEE Trans. Netw. Serv. Manag., 2022

ByteIoT: A Practical IoT Device Identification System Based on Packet Length Distribution.
IEEE Trans. Netw. Serv. Manag., 2022

IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry.
IEEE Trans. Netw. Serv. Manag., 2022

THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning.
IEEE Trans. Inf. Forensics Secur., 2022

Joint prediction on security event and time interval through deep learning.
Comput. Secur., 2022

<i>EvoIoT</i>: An evolutionary IoT and non-IoT classification model in open environments.
Comput. Networks, 2022

AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Monitoring Smart Home Traffic under Differential Privacy.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

HetGLM: Lateral Movement Detection by Discovering Anomalous Links with Heterogeneous Graph Neural Network.
Proceedings of the IEEE International Performance, 2022

Centralized Network Utility Maximization with Accelerated Gradient Method.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

What Causes Delay Asymmetry: A Large-scale One-way Delay Measurement and Empirical Study.
Proceedings of the IEEE Global Communications Conference, 2022

Both Efficient and Accurate: A Large-scale One-way Delay Measurement Scheme.
Proceedings of the IEEE Global Communications Conference, 2022

Zoonet: a proactive telemetry system for large-scale cloud networks.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers.
Proceedings of the 18th International Conference on Network and Service Management, 2022

PerfTrace: A New Multi-metric Network Performance Monitoring Tool.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud.
IEEE/ACM Trans. Netw., 2021

PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet.
IEEE/ACM Trans. Netw., 2021

Improving the Performance of Online Bitrate Adaptation with Multi-Step Prediction Over Cellular Networks.
IEEE Trans. Mob. Comput., 2021

Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors.
IEEE J. Sel. Areas Commun., 2021

A novel workload scheduling framework for intrusion detection system in NFV scenario.
Comput. Secur., 2021

Towards securing Duplicate Address Detection using P4.
Comput. Networks, 2021

Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

STRAD: Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

PINBALL: Universal and Robust Signature Extraction for Smart Home Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble Learning.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Unsupervised IoT Fingerprinting Method via Variational Auto-encoder and K-means.
Proceedings of the ICC 2021, 2021

Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats.
Proceedings of the ICC 2021, 2021

Slider: Towards Precise, Robust and Updatable Sketch-based DDoS Flooding Attack Detection.
Proceedings of the IEEE Global Communications Conference, 2021

Traffic Engineering with Segment Routing Considering Probabilistic Failures.
Proceedings of the 17th International Conference on Network and Service Management, 2021

IntStream: An Intent-driven Streaming Network Telemetry Framework.
Proceedings of the 17th International Conference on Network and Service Management, 2021

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning.
IEEE/ACM Trans. Netw., 2020

Fine-Grained Cloud Resource Provisioning for Virtual Network Function.
IEEE Trans. Netw. Serv. Manag., 2020

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs.
CoRR, 2020

Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks.
Comput. Secur., 2020

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning.
Comput. Networks, 2020

Far from classification algorithm: dive into the preprocessing stage in DGA detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection.
Proceedings of the NOMS 2020, 2020

Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Domain-Embeddings Based DGA Detection with Incremental Training Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

An IoT Device Identification Method based on Semi-supervised Learning.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Towards predictable performance via two-layer bandwidth allocation in cloud datacenter.
J. Parallel Distributed Comput., 2019

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification.
CoRR, 2019

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

D3N: DGA Detection with Deep-Learning Through NXDomain.
Proceedings of the Knowledge Science, Engineering and Management, 2019

ALEAP: Attention-based LSTM with Event Embedding for Attack Projection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Measurement and Analysis of Adult Websites in IPv6 Networks.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
Root Cause Analysis of Anomalies of Multitier Services in Public Clouds.
IEEE/ACM Trans. Netw., 2018

ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Elastic Network Service Chain with Fine-Grained Vertical Scaling.
Proceedings of the IEEE Global Communications Conference, 2018

2017
一种层次式远程数据持有检测方法 (Hierarchical Remote Data Possession Checking Method).
计算机科学, 2017

Optimising the deployment of virtual machine image replicas in cloud storage clusters.
Int. J. High Perform. Comput. Netw., 2017

Optimal construction of virtual networks for Cloud-based MapReduce workflows.
Comput. Networks, 2017

Generic and agile service function chain verification on cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Robust regression for anomaly detection.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers.
IEEE/ACM Trans. Netw., 2016

Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments.
J. Parallel Distributed Comput., 2016

Characteristics analysis at prefix granularity: A case study in an IPv6 network.
J. Netw. Comput. Appl., 2016

Automatic Model Selection for Anomaly Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placement.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Towards online anomaly detection by combining multiple detection methods and Storm.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Tetris: Optimizing cloud resource usage unbalance with elastic VM.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Load-aware hybrid scheduling in large compute clusters.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs.
Proceedings of the 2016 International Conference on Information Networking, 2016

Packet delay, loss and reordering in IPv6 world: A case study.
Proceedings of the 2016 International Conference on Computing, 2016

SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud Datacenter.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Fast Community Detection in Large Weighted Networks Using GraphX in the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Towards centralized and semi-automatic VLAN management.
Int. J. Netw. Manag., 2015

Solving multicast problem in cloud networks using overlay routing.
Comput. Commun., 2015

Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability.
Comput. Commun., 2015

MuLTI: Multiple location tags inference for users in social networks.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Investigating the prefix-level characteristics: A case study in an IPv6 network.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Cluster Scheduler on Heterogeneous Cloud.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

MOE-A framework integrating network performance monitoring, optimization and evaluation.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Configuration analysis and recommendation: Case studies in IPv6 networks.
Comput. Commun., 2014

A study of traffic from the perspective of a large pure IPv6 ISP.
Comput. Commun., 2014

An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A New Anomaly Detection Method Based on IGTE and IGFE.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards Optimal Collaboration of Policies in the Two-Phase Scheduling of Cloud Tasks.
Proceedings of the Network and Parallel Computing, 2014

A value based framework for provider selection of regional ISPs.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A cascading framework for uncovering spammers in social networks.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

Towards zero-time wakeup of line cards in power-aware routers.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Optimizing the Topologies of Virtual Networks for Cloud-Based Big Data Processing.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

An on-line anomaly detection method based on LMS algorithm.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

Evolution of network configurations: High-level analysis of an operational IP backbone network.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
An efficient critical protection scheme for intra-domain routing using link characteristics.
Comput. Networks, 2013

MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability.
Comput. J., 2013

IPv6 network topology discovery method based on novel graph mapping algorithms.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

CSS-VM: A centralized and semi-automatic system for VLAN management.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Diagnosing Traffic Anomalies Using a Two-Phase Model.
J. Comput. Sci. Technol., 2012

PCA-subspace method - Is it good enough for network-wide anomaly detection.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

What's going on in Chinese IPv6 world.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Unravel the characteristics and development of current IPv6 network.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Multipath interdomain routing via deviation from primary path.
Proceedings of the 2012 International Conference on Information Networking, 2012

Separating identifier from locator with extended DNS.
Proceedings of IEEE International Conference on Communications, 2012

Flattening and preferential attachment in the internet evolution.
Proceedings of the 14th Asia-Pacific Network Operations and Management Symposium, 2012

AMIR: Another Multipath Interdomain Routing.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management.
Peer-to-Peer Netw. Appl., 2011

A study of traffic, user behavior and pricing policies in a large campus network.
Comput. Commun., 2011

CNGI-CERNET2: an IPv6 deployment in China.
Comput. Commun. Rev., 2011

MIB design and application for source address validation improvement protocol.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An efficient parallel TCAM scheme for the forwarding engine of the next-generation router.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

MCST: Anomaly detection using feature stability for packet-level traffic.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

Investigating the efficiency of fine granularity source address validation in IPv6 networks.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

Adaptive tuning of operation parameters for automatically learned filter table.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

FlowInfra: A fault-resilient scalable infrastructure for network-wide flow level measurement.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
Efficient searching with parallel TCAM chips.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Efficient parallel searching with TCAMs.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A measure of growth of user community in OSNs.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2009
Towards Next Generation Internet Management: CNGI-CERNET2 Experiences.
J. Comput. Sci. Technol., 2009

BPR: a bit-level packet recovery in wireless sensor networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Understanding Web Hosting Utility of Chinese ISPs.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Traffic matrix estimation based on a square root Kalman filtering algorithm.
Int. J. Netw. Manag., 2008

Transmission power selection for ad hoc networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

A study of collisions in wireless network coding system.
Proceedings of the 1st IFIP Wireless Days, 2008

Analysis on MAC layer retransmission scheme in wireless networks.
Proceedings of the Sixth ACM International Workshop on Mobility Management & Wireless Access, 2008

A Novel Management Information Retrieval Algorithm Based on NGI.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Traffic Matrix Estimation Using Square Root Filtering/Smoothing Algorithm.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Understanding IPv6 Usage: Communities and Behaviors.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Finding hierarchical heavy hitters in network measurement system.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Internet Management Network.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Passive Inter-Domain Routing Monitor Based on Routing Interaction.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Traffic Measurement and Analysis of TUNET.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2004
Workflow Oriented Network Management - A Web/Java Approach.
J. Netw. Syst. Manag., 2004

2003
A nonstationary traffic train model for fine scale inference from coarse scale counts.
IEEE J. Sel. Areas Commun., 2003

2000
CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...