Oceanstore: An architecture for global-scale persistent storage J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ... ACM SIGOPS Operating Systems Review 34 (5), 190-201, 2000 | 3639 | 2000 |
Sketch-based change detection: Methods, evaluation, and applications B Krishnamurthy, S Sen, Y Zhang, Y Chen Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, 234-247, 2003 | 807 | 2003 |
Detecting and characterizing social spam campaigns H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010 | 751 | 2010 |
OSA: An optical switching architecture for data center networks with unprecedented flexibility K Chen, A Singla, A Singh, K Ramachandran, L Xu, Y Zhang, X Wen, ... IEEE/ACM Transactions on networking 22 (2), 498-511, 2013 | 590 | 2013 |
Droidchameleon: evaluating android anti-malware against transformation attacks V Rastogi, Y Chen, X Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 503 | 2013 |
Appsplayground: automatic security analysis of smartphone applications V Rastogi, Y Chen, W Enck Proceedings of the third ACM conference on Data and application security and …, 2013 | 498 | 2013 |
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience Z Li, M Sanghi, Y Chen, MY Kao, B Chavez 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-47, 2006 | 441 | 2006 |
Towards online spam filtering in social networks. H Gao, Y Chen, K Lee, D Palsetia, AN Choudhary NDSS 12 (2012), 1-16, 2012 | 349 | 2012 |
Dynamic replica placement for scalable content delivery Y Chen, RH Katz, JD Kubiatowicz Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002 | 331 | 2002 |
Botnet research survey Z Zhu, G Lu, Y Chen, ZJ Fu, P Roberts, K Han 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 326 | 2008 |
An algebraic approach to practical and scalable overlay network monitoring Y Chen, D Bindel, H Song, RH Katz Proceedings of the 2004 conference on Applications, technologies …, 2004 | 307 | 2004 |
Autocog: Measuring the description-to-permission fidelity in android applications Z Qu, V Rastogi, X Zhang, Y Chen, T Zhu, Z Chen Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 292 | 2014 |
Security issues in online social networks H Gao, J Hu, T Huang, J Wang, Y Chen IEEE Internet Computing 15 (4), 56-63, 2011 | 274 | 2011 |
Catch me if you can: Evaluating android anti-malware against transformation attacks V Rastogi, Y Chen, X Jiang IEEE Transactions on Information Forensics and Security 9 (1), 99-108, 2013 | 269 | 2013 |
Matching with a large vulnerability signature ruleset for high performance network defense Y Chen, LI Zhichun, G Xia, B Liu US Patent 8,522,348, 2013 | 266 | 2013 |
Botgraph: large scale spamming botnet detection. Y Zhao, Y Xie, F Yu, Q Ke, Y Yu, Y Chen, E Gillum NSDI 9, 321-334, 2009 | 264 | 2009 |
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. Y Cao, Y Fratantonio, A Bianchi, M Egele, C Kruegel, G Vigna, Y Chen NDSS, 2015 | 246 | 2015 |
Towards a secure controller platform for openflow applications X Wen, Y Chen, C Hu, C Shi, Y Wang Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013 | 244 | 2013 |
Reversible sketches for efficient and accurate change detection over network data streams R Schweller, A Gupta, E Parsons, Y Chen Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 207-212, 2004 | 218 | 2004 |
Scalable name lookup in NDN using effective name component encoding Y Wang, K He, H Dai, W Meng, J Jiang, B Liu, Y Chen 2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012 | 190 | 2012 |