Остановите войну!
for scientists:
default search action
Guanhua Yan
- > Home > Persons > Guanhua Yan
Publications
- 2019
- [c52]Jiaqi Yan, Guanhua Yan, Dong Jin:
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network. DSN 2019: 52-63 - 2014
- [c44]Guanhua Yan, Stephan J. Eidenbenz:
Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs. ICDCS 2014: 154-165 - 2013
- [j13]Nam P. Nguyen, Guanhua Yan, My T. Thai:
Analysis of misinformation containment in online social networks. Comput. Networks 57(10): 2133-2146 (2013) - [j12]Milan Bradonjic, Michael Molloy, Guanhua Yan:
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. Internet Math. 9(4): 406-433 (2013) - [j10]Md. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos, Stephan J. Eidenbenz, Mike Fisk:
iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Netw. Appl. 6(1): 46-60 (2013) - [j9]Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distributed Syst. 24(12): 2482-2491 (2013) - [i1]Milan Bradonjic, Michael Molloy, Guanhua Yan:
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. CoRR abs/1310.1942 (2013) - 2012
- [j8]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks. IEEE Trans. Mob. Comput. 11(7): 1086-1101 (2012) - [c37]Guanhua Yan, Ritchie Lee, Alex Kent, David H. Wolpert:
Towards a bayesian network game framework for evaluating DDoS attacks and defense. CCS 2012: 553-566 - [c36]Chrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan:
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels. HICSS 2012: 2431-2440 - [c34]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Chrome Extensions: Threat Analysis and Countermeasures. NDSS 2012 - [c33]Nam P. Nguyen, Guanhua Yan, My T. Thai, Stephan J. Eidenbenz:
Containment of misinformation spread in online social networks. WebSci 2012: 213-222 - 2011
- [j7]Guanhua Yan, Duc T. Ha, Stephan J. Eidenbenz:
AntBot: Anti-pollution peer-to-peer botnets. Comput. Networks 55(8): 1941-1956 (2011) - [c32]Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li:
Malware propagation in online social networks: nature, dynamics, and defense implications. AsiaCCS 2011: 196-206 - [c31]Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz:
Privacy analysis of user association logs in a large-scale wireless LAN. INFOCOM 2011: 31-35 - [c30]Shiva Prasad Kasiviswanathan, Stephan J. Eidenbenz, Guanhua Yan:
Geography-based analysis of the Internet infrastructure. INFOCOM 2011: 131-135 - [c29]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
RatBot: Anti-enumeration Peer-to-Peer Botnets. ISC 2011: 135-151 - [c28]Yuanyuan Zeng, Guanhua Yan, Stephan J. Eidenbenz, Kang G. Shin:
Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IWQoS 2011: 1-9 - [c27]Chrisil Arackaparambil, Guanhua Yan:
Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens. Web Intelligence 2011: 257-264 - [c26]Dong (Kevin) Jin, David M. Nicol, Guanhua Yan:
An event buffer flooding attack in DNP3 controlled SCADA systems. WSC 2011: 2619-2631 - 2010
- [j6]Guanhua Yan, Stephan J. Eidenbenz, Sunil Thulasidasan, Pallab Datta, Venkatesh Ramaswamy:
Criticality analysis of Internet infrastructure. Comput. Networks 54(7): 1169-1182 (2010) - [c25]Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369 - [c24]Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz:
A correlation attack against user mobility privacy in a large-scale WLAN network. S3@MobiCom 2010: 33-36 - [c23]Nandakishore Santhi, Guanhua Yan, Stephan J. Eidenbenz:
CyberSim: Geographic, temporal, and organizational dynamics of malware propagation. WSC 2010: 2876-2887 - 2009
- [j5]Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang:
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. Ad Hoc Networks 7(8): 1489-1500 (2009) - [j4]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE Trans. Mob. Comput. 8(3): 353-368 (2009) - [c22]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Exploitation and threat analysis of open mobile devices. ANCS 2009: 20-29 - [c21]Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo:
On the effectiveness of structural detection and defense against P2P-based botnets. DSN 2009: 297-306 - [c20]Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner:
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. DSN 2009: 317-326 - [c19]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. INFOCOM 2009: 657-665 - [c18]Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. RAID 2009: 202-223 - [c17]Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. RAID 2009: 244-264 - [c16]Guanhua Yan, Stephan J. Eidenbenz, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150 - 2008
- [c15]Bo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao:
Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications. GLOBECOM 2008: 4961-4965 - [c14]Bo Sun, Guanhua Yan, Yang Xiao:
Worm Propagation Dynamics in Wireless Sensor Networks. ICC 2008: 1541-1545 - [c13]Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang:
BotTracer: Execution-Based Bot-Like Malware Detection. ISC 2008: 97-113 - [c12]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. IWQoS 2008: 209-218 - [c11]Guanhua Yan, Stephan J. Eidenbenz:
DDoS Mitigation in Non-cooperative Environments. Networking 2008: 599-611 - [c10]Guanhua Yan, Zhen Xiao, Stephan J. Eidenbenz:
Catching Instant Messaging Worms with Change-Point Detection Techniques. LEET 2008 - 2007
- [c9]Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu:
Bluetooth worm propagation: mobility pattern matters! AsiaCCS 2007: 32-44 - [c8]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms. ICDCS 2007: 42 - 2006
- [j3]David M. Nicol, Guanhua Yan:
High-Performance Simulation of Low-Resolution Network Flows. Simul. 82(1): 21-42 (2006) - [j2]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simul. 82(1): 43-59 (2006) - [c7]Guanhua Yan, Stephan J. Eidenbenz:
Bluetooth Worms: Models, Dynamics, and Defense Implications. ACSAC 2006: 245-256 - [c6]Gabriel Istrate, Anders Hansson, Guanhua Yan:
Packet Reordering Metrics: Some Methodological Considerations. ICNS 2006: 4 - [c5]Guanhua Yan, Stephan J. Eidenbenz:
Sluggish Calendar Queues for Network Simulation. MASCOTS 2006: 127-136 - 2005
- [c4]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128 - [c3]David M. Nicol, Guanhua Yan:
Simulation of Network Traffic at Coarse Timescales. PADS 2005: 141-150 - 2004
- [j1]David M. Nicol, Guanhua Yan:
Discrete event fluid modeling of background TCP traffic. ACM Trans. Model. Comput. Simul. 14(3): 211-250 (2004) - 2003
- [c2]David M. Nicol, Jason Liu, Michael Liljenstam, Guanhua Yan:
Simulation of large scale networks I: simulation of large-scale networks using SSF. WSC 2003: 650-657 - 2000
- [c1]Guanhua Yan, Yuehui Jin, Yulu Ma, Shiduan Cheng, Jian Ma:
An Efficient Method to Simulate Communication Networks. ICC (1) 2000: 192-194
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-14 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint