default search action
Guanhua Yan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zhan Shu, Guanhua Yan:
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification. IEEE Trans. Dependable Secur. Comput. 21(4): 3165-3182 (2024) - [c63]Zhixin Wen, Guanhua Yan:
HiP4-UPF: Towards High-Performance Comprehensive 5G User Plane Function on P4 Programmable Switches. USENIX ATC 2024: 303-320 - [c62]Harsh Sanjay Pacherkar, Guanhua Yan:
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs. WISEC 2024: 254-264 - 2023
- [c61]Joon-Young Gwak, Priti Prabhakar Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:
Debugging Malware Classification Models Based on Event Logs with Explainable AI. ICDM (Workshops) 2023: 939-948 - 2022
- [j16]Zhan Shu, Guanhua Yan:
IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference. IEEE Internet Things J. 9(22): 22737-22751 (2022) - [c60]Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan:
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs. DSN 2022: 172-184 - [c59]Zhixin Wen, Harsh Sanjay Pacherkar, Guanhua Yan:
VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation. CSET @ USENIX Security Symposium 2022: 19-29 - 2021
- [c58]Jerome Dinal Herath, Ping Yang, Guanhua Yan:
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs. CODASPY 2021: 29-40 - 2020
- [c57]Yunus Kucuk, Guanhua Yan:
Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. CODASPY 2020: 341-352 - [c56]Kaiming Fang, Guanhua Yan:
IoTReplay: Troubleshooting COTS IoT Devices with Record and Replay. SEC 2020: 193-205 - [c55]Kaiming Fang, Guanhua Yan:
Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications. WISEC 2020: 295-305
2010 – 2019
- 2019
- [c54]Jerome Dinal Herath, Changxin Bai, Guanhua Yan, Ping Yang, Shiyong Lu:
RAMP: Real-Time Anomaly Detection in Scientific Workflows. IEEE BigData 2019: 1367-1374 - [c53]Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang, Guanhua Yan, Shiyong Lu:
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. CIC 2019: 81-90 - [c52]Jiaqi Yan, Guanhua Yan, Dong Jin:
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network. DSN 2019: 52-63 - 2018
- [j15]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 15(6): 1068-1082 (2018) - [c51]Zhan Shu, Guanhua Yan:
Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats. MTD@CCS 2018: 69-79 - [c50]Kaiming Fang, Guanhua Yan:
Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning. ESORICS (2) 2018: 20-40 - [c49]Yunus Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan:
BigBing: Privacy-Preserving Cloud-Based Malware Classification Service. PAC 2018: 43-54 - 2017
- [c48]Guanhua Yan:
Improving Efficiency of Link Clustering on Multi-core Machines. ICDCS 2017: 2017-2024 - [c47]Guanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk:
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability. PAC 2017: 164-175 - 2016
- [c46]Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last:
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. ISC 2016: 343-365 - [i2]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. CoRR abs/1603.02714 (2016) - 2015
- [c45]Guanhua Yan:
Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. AsiaCCS 2015: 121-132 - 2014
- [c44]Guanhua Yan, Stephan J. Eidenbenz:
Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs. ICDCS 2014: 154-165 - [c43]Guanhua Yan:
Finding common ground among experts' opinions on data clustering: With applications in malware analysis. ICDE 2014: 15-27 - [c42]Deguang Kong, Guanhua Yan:
Transductive malware label propagation: Find your lineage from your neighbors. INFOCOM 2014: 1411-1419 - 2013
- [j14]Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Comput. Networks 57(2): 540-555 (2013) - [j13]Nam P. Nguyen, Guanhua Yan, My T. Thai:
Analysis of misinformation containment in online social networks. Comput. Networks 57(10): 2133-2146 (2013) - [j12]Milan Bradonjic, Michael Molloy, Guanhua Yan:
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. Internet Math. 9(4): 406-433 (2013) - [j11]Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking. IEEE J. Sel. Areas Commun. 31(9-Supplement): 656-668 (2013) - [j10]Md. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos, Stephan J. Eidenbenz, Mike Fisk:
iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Netw. Appl. 6(1): 46-60 (2013) - [j9]Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distributed Syst. 24(12): 2482-2491 (2013) - [c41]Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
On the impact of social botnets for spam distribution and digital-influence manipulation. CNS 2013: 46-54 - [c40]Guanhua Yan, Nathan Brown, Deguang Kong:
Exploring Discriminatory Features for Automated Malware Classification. DIMVA 2013: 41-61 - [c39]Deguang Kong, Guanhua Yan:
Discriminant malware distance learning on structural information for automated malware classification. KDD 2013: 1357-1365 - [c38]Deguang Kong, Guanhua Yan:
Discriminant malware distance learning on structuralinformation for automated malware classification. SIGMETRICS 2013: 347-348 - [i1]Milan Bradonjic, Michael Molloy, Guanhua Yan:
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. CoRR abs/1310.1942 (2013) - 2012
- [j8]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks. IEEE Trans. Mob. Comput. 11(7): 1086-1101 (2012) - [c37]Guanhua Yan, Ritchie Lee, Alex Kent, David H. Wolpert:
Towards a bayesian network game framework for evaluating DDoS attacks and defense. CCS 2012: 553-566 - [c36]Chrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan:
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels. HICSS 2012: 2431-2440 - [c35]Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Fine-grained private matching for proximity-based mobile social networking. INFOCOM 2012: 1969-1977 - [c34]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Chrome Extensions: Threat Analysis and Countermeasures. NDSS 2012 - [c33]Nam P. Nguyen, Guanhua Yan, My T. Thai, Stephan J. Eidenbenz:
Containment of misinformation spread in online social networks. WebSci 2012: 213-222 - 2011
- [j7]Guanhua Yan, Duc T. Ha, Stephan J. Eidenbenz:
AntBot: Anti-pollution peer-to-peer botnets. Comput. Networks 55(8): 1941-1956 (2011) - [c32]Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li:
Malware propagation in online social networks: nature, dynamics, and defense implications. AsiaCCS 2011: 196-206 - [c31]Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz:
Privacy analysis of user association logs in a large-scale wireless LAN. INFOCOM 2011: 31-35 - [c30]Shiva Prasad Kasiviswanathan, Stephan J. Eidenbenz, Guanhua Yan:
Geography-based analysis of the Internet infrastructure. INFOCOM 2011: 131-135 - [c29]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
RatBot: Anti-enumeration Peer-to-Peer Botnets. ISC 2011: 135-151 - [c28]Yuanyuan Zeng, Guanhua Yan, Stephan J. Eidenbenz, Kang G. Shin:
Measuring the effectiveness of infrastructure-level detection of large-scale botnets. IWQoS 2011: 1-9 - [c27]Chrisil Arackaparambil, Guanhua Yan:
Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens. Web Intelligence 2011: 257-264 - [c26]Dong (Kevin) Jin, David M. Nicol, Guanhua Yan:
An event buffer flooding attack in DNP3 controlled SCADA systems. WSC 2011: 2619-2631 - 2010
- [j6]Guanhua Yan, Stephan J. Eidenbenz, Sunil Thulasidasan, Pallab Datta, Venkatesh Ramaswamy:
Criticality analysis of Internet infrastructure. Comput. Networks 54(7): 1169-1182 (2010) - [c25]Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369 - [c24]Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz:
A correlation attack against user mobility privacy in a large-scale WLAN network. S3@MobiCom 2010: 33-36 - [c23]Nandakishore Santhi, Guanhua Yan, Stephan J. Eidenbenz:
CyberSim: Geographic, temporal, and organizational dynamics of malware propagation. WSC 2010: 2876-2887
2000 – 2009
- 2009
- [j5]Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang:
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. Ad Hoc Networks 7(8): 1489-1500 (2009) - [j4]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE Trans. Mob. Comput. 8(3): 353-368 (2009) - [c22]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Exploitation and threat analysis of open mobile devices. ANCS 2009: 20-29 - [c21]Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo:
On the effectiveness of structural detection and defense against P2P-based botnets. DSN 2009: 297-306 - [c20]Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner:
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. DSN 2009: 317-326 - [c19]Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz, Srikanth V. Krishnamurthy:
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. INFOCOM 2009: 657-665 - [c18]Guanhua Yan, Stephan J. Eidenbenz, Emanuele Galli:
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. RAID 2009: 202-223 - [c17]Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. RAID 2009: 244-264 - [c16]Guanhua Yan, Stephan J. Eidenbenz, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150 - 2008
- [c15]Bo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao:
Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications. GLOBECOM 2008: 4961-4965 - [c14]Bo Sun, Guanhua Yan, Yang Xiao:
Worm Propagation Dynamics in Wireless Sensor Networks. ICC 2008: 1541-1545 - [c13]Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang:
BotTracer: Execution-Based Bot-Like Malware Detection. ISC 2008: 97-113 - [c12]Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz:
Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. IWQoS 2008: 209-218 - [c11]Guanhua Yan, Stephan J. Eidenbenz:
DDoS Mitigation in Non-cooperative Environments. Networking 2008: 599-611 - [c10]Guanhua Yan, Zhen Xiao, Stephan J. Eidenbenz:
Catching Instant Messaging Worms with Change-Point Detection Techniques. LEET 2008 - 2007
- [c9]Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu:
Bluetooth worm propagation: mobility pattern matters! AsiaCCS 2007: 32-44 - [c8]Guanhua Yan, Stephan J. Eidenbenz:
Modeling Propagation Dynamics of Bluetooth Worms. ICDCS 2007: 42 - 2006
- [j3]David M. Nicol, Guanhua Yan:
High-Performance Simulation of Low-Resolution Network Flows. Simul. 82(1): 21-42 (2006) - [j2]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version). Simul. 82(1): 43-59 (2006) - [c7]Guanhua Yan, Stephan J. Eidenbenz:
Bluetooth Worms: Models, Dynamics, and Defense Implications. ACSAC 2006: 245-256 - [c6]Gabriel Istrate, Anders Hansson, Guanhua Yan:
Packet Reordering Metrics: Some Methodological Considerations. ICNS 2006: 4 - [c5]Guanhua Yan, Stephan J. Eidenbenz:
Sluggish Calendar Queues for Network Simulation. MASCOTS 2006: 127-136 - 2005
- [b1]Guanhua Yan:
Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models. Dartmouth College, USA, 2005 - [c4]Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier:
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises. PADS 2005: 119-128 - [c3]David M. Nicol, Guanhua Yan:
Simulation of Network Traffic at Coarse Timescales. PADS 2005: 141-150 - 2004
- [j1]David M. Nicol, Guanhua Yan:
Discrete event fluid modeling of background TCP traffic. ACM Trans. Model. Comput. Simul. 14(3): 211-250 (2004) - 2003
- [c2]David M. Nicol, Jason Liu, Michael Liljenstam, Guanhua Yan:
Simulation of large scale networks I: simulation of large-scale networks using SSF. WSC 2003: 650-657 - 2000
- [c1]Guanhua Yan, Yuehui Jin, Yulu Ma, Shiduan Cheng, Jian Ma:
An Efficient Method to Simulate Communication Networks. ICC (1) 2000: 192-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint