Yan Chen
Orcid: 0000-0003-4103-1498Affiliations:
- Northwestern University, Department of Electrical Engineering and Computer Science, Evanston, IL, USA
- Zhejiang University, College of Computer Science and Technology, China
- University of California at Berkeley, CA, USA (PhD 2003)
According to our database1,
Yan Chen
authored at least 155 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports.
CoRR, 2024
CoRR, 2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024
DirectFaaS: A Clean-Slate Network Architecture for Efficient Serverless Chain Communications.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps.
IEEE Trans. Mob. Comput., November, 2023
IEEE Trans. Parallel Distributed Syst., June, 2023
Comput. Secur., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2023
2022
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment.
IEEE Trans. Mob. Comput., 2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts.
Frontiers Inf. Technol. Electron. Eng., 2022
Comput. Secur., 2022
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022
2021
IEEE Trans. Mob. Comput., 2021
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
Comput. Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
2020
IEEE Trans. Mob. Comput., 2020
State of the Art and Research Challenges in the Security Technologies of Network Function Virtualization.
IEEE Internet Comput., 2020
CoRR, 2020
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
IEEE Commun. Surv. Tutorials, 2019
Comput. Networks, 2019
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Comput. Networks, 2019
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface.
IEEE Trans. Mob. Comput., 2018
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.
Proceedings of the 27th USENIX Security Symposium, 2018
SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE/ACM Trans. Netw., 2017
Toward A Scalable, Fault-Tolerant, High-Performance Optical Data Center Architecture.
IEEE/ACM Trans. Netw., 2017
DroidNative: Automating and optimizing detection of Android native code malware variants.
Comput. Secur., 2017
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
IEEE/ACM Trans. Netw., 2016
IEEE/ACM Trans. Netw., 2016
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android.
Proceedings of the Security and Privacy in Communication Networks, 2015
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IEEE/ACM Trans. Netw., 2014
OSA: An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility.
IEEE/ACM Trans. Netw., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users.
IEEE Trans. Computers, 2014
VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter.
Comput. Networks, 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IEEE Trans. Netw. Serv. Manag., 2013
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE/ACM Trans. Netw., 2012
IEEE Trans. Netw. Serv. Manag., 2012
IEEE Trans. Commun., 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
VirtualKnotter: Online Virtual Machine Shuffling for Congestion Resolving in Virtualized Datacenter.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Algorithms for Next Generation Networks, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010
IEEE/ACM Trans. Netw., 2010
Comput. Networks, 2010
NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Comput. Networks, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
IEEE/ACM Trans. Netw., 2007
Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications.
IEEE/ACM Trans. Netw., 2007
IEEE Trans. Mob. Comput., 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007
2006
IEEE Computer Graphics and Applications, 2006
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005
2004
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Reversible sketches for efficient and accurate change detection over network data streams.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
2003
IEEE J. Sel. Areas Commun., 2003
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003
2002
SIGMETRICS Perform. Evaluation Rev., 2002
Proceedings of the Pervasive Computing, 2002
Proceedings of the Pervasive Computing, 2002
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000
1998
Comput. Graph. Forum, 1998
Proceedings of the Computer Animation 1998, 1998