Publications

Copyright Notice: The materials presented below are for academic use only. Copyright and all rights therein are retained by the authors or by the respective copyright holders.


Selected Publications


Books:

  1. Jiahai Yang, Lin He, Chenglong Li, Cyberspace Mapping: Principles, Techniques and Applications, Beijing: Posts and Telecommunication Press, Sep. 2023.  (in Chinese)
  2. Jiahai Yang, Changqing An, Cybersecurity: Detection and Prevention of DDoS Attacks, Beijing: Posts and Telecommunication Press, Jan. 2019.  (in Chinese)
  3. Jiahai Yang, Jianping Wu, Changqing An, Internet Measurement: Theories and their applications, Beijing: Posts and Telecommunication Press, 2009. in Chinese
  4. Jiahai Yang, Xiankun Ren, Peiyu Wang, Network Management Principles and Implementation Technologies, Beijing: Tsinghua University Press, 2000. in Chinese

 

Journal and Conference papers:

--2024--

  1. Jinlei Lin, Chenglong Li, Wenwen Gong, Linna Fan, Guanglei Song and Jiahai Yang, ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content. IEEE/ACM Transactions on Networking. doi: 10.1109/TNET.2024.3422089

  2. Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al. CloudPin-Fast: Efficient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. Transactions on Services Computing, Vol. 17, No. 3, May/June 2024, pp.850-864

  3. Ying Zhong, Zhiliang Wang, Xingang Shi, Jiahai Yang, Keqin Li. RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. IEEE Transactions on Information Forensics & Security, Vol. 19, 2024, pp. 5895-5910

  4. Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang , Su Wang, Jiahai Yang, Xingang Shi, Xia Yin ,Yang Liu. Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. ACM CCS 2024

  5. Yirui Luo, Chenglong Li, Zhiliang Wang, Jiahai Yang. IPREDS: Efficient prediction system for Internet-wide port and service scanning. Proceedings of the ACM on Networking 2024, Vol. 2, Issue CoNEXT1, Article No.: 2, pp 1–24, https://doi.org/10.1145/3649470 https://dl.acm.org/doi/abs/10.1145/3649470

  6. Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Proactive Telemetry in Large-Scale Multi-tenant Cloud Overlay Networks. IEEE/ACM Transactions on Networking, DOI: 10.1109/TNET.2024.3381786

  7. Wenqi Chen, Zhiliang Wang, Liyuan Chang, Kai Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi. Network anomaly detection via similarity-aware ensemble learning with ADSim. Computer Networks, Vol. 247, June 2024, 110423

  8. Libing Qiao, Enhuan Dong, Huanpu Yin, Haisheng Li, Jiahai Yang. Intelligent Network Device Identification based on Active TCP/IP Stack Probing. IEEE Network, doi: 10.1109/MNET.2024.3374080 (https://ieeexplore.ieee.org/document/10463024)

  9. Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan. CP-IoT: A Cross-Platform Monitoring System for Smart Home. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA.

  10. Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang. LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA

  11. Chenxin Duan, Sainan Li, Hai Lin, Wenqi Chen, Guanglei Song, Chenglong Li, Jiahai Yang, Zhiliang Wang. IoTa: Fine-grained Traffic Monitoring for IoT Devices via Fully Packet-level Models[J]. IEEE Transactions on Dependable and Secure Computing (TDSC) , 2024. DOI 10.1109/TDSC.2023.3340563.

  12. Xin He, Enhuan Dong, Jiahai Yang, Shize Zhang, et al. CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud Networks. IEEE INFOCOM 2024 (IEEE International Conference on Computer Communications), May 20-23, 2024, Vancouver, Canada

  13. Song G, He L, Zhu F, et al. AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System. IEEE/ACM Transactions on Networking (TON) , 2024, DOI: 10.1109/TNET.2024.3406508 (https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10556607&tag=1)

  14. Yufan Chen; Jiahai Yang; Susu Cui; Cong Dong; Bo Jiang; Yuling Liu; Zhigang Lu. Unveiling encrypted traffic types through hierarchical network characteristics. Computers & Security, Volume 138, March 2024, 103645. doi.org/10.1016/j.cose.2023.103645

 

--2023--

  1. Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, et al. Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels, NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA (Distinguished paper award)
  2. Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin. BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA
  3. Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin. Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA
  4. Cong Dong, Jiahai Yang, Song Liu, Zhi Wang, Yuling Liu and Zhigang Lu. C-BEDIM and S-BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. Computers & Security, Volume 130 Issue C. DOI:10.1016/j.cose.2023.103267
  5. Enhuan Dong, Peng Gao, Yuan Yang, Mingwei Xu, Xiaoming Fu, Jiahai Yang. SmartSBD: Smart Shared Bottleneck Detection for Efficient Multipath Congestion Control over Heterogeneous Networks. Computer Networks, Volume 237, Dec. 2023, 110047.
  6. Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang. Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning. IEEE/ACM IWQoS 2023, Orlando, Florida, USA
  7. Linna Fan, Lin He, Xiaoqing Sun, Enhuan Dong, Jiahai Yang, Zhiliang Wang, Jinlei Lin, and Guanglei Song. GraphIoT: Accurate IoT Identification based on Heterogeneous Graph. IEEE/ACM IWQoS 2023, Orlando, Florida, USA
  8. Linna Fan, Lin He, Yichao Wu, Shize Zhang, Zhiliang Wang, Jia Li, Jiahai Yang, Chaocan Xiang and Xiaoqian Ma. AutoIoT: Automatically Updated IoT Identification with Semi-supervised Learning. IEEE Transactions on Mobile Computing, 2023, 22(10), pp. 5769 - 5786 (DOI 10.1109/TMC.2022.3183118)
  9. Lin He, Gang Ren, Ying Liu, Guanglei Song, Jinlong E, Jiahai Yang, Mingwei Xu. SAV6: A Novel Inter-AS Source Address Validation Protocol for IPv6 Internet. IEEE Network Magazine, Sep. 2023, Vol. 37, Issue 5, pp. 64-70, DOI: 10.1109/ MNET.123.2200111

 

--2022--

  1. Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, Xiaowen Quan. DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE/IFIP Transactions on Networking, Vol. 30, No. 4 pp. 1629-1643, Aug. 2022.  DOI: 10.1109/TNET.2022.3145040
  2. Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang. threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning. IEEE Transactions on Information Forensics & Security2022, 17(12): 3972-3987, DOI: 10.1109/TIFS.2022.3208815
  3. Linna Fan, Lin He, Enhuan Dong, Jiahai Yang. EvoIoT: An Evolutionary IoT and Non-IoT Classification Model in Open Environments. Computer Networks Vol. 219, Dec. 2022, 109450. https://doi.org/10.1016/j.comnet.2022.109450
  4. Songyun Wu, Bo Wang, Zhiliang Wang, Shuhan Fan, Jiahai Yang. Joint prediction on security event and time interval through deep learning. Computers & Security, v 117, June 2022
  5. Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai Yang. IntStream: Towards Flexible, Expressive and Scalable Network Telemetry. IEEE Transactions on Network and Service Management, 2022, 19(3): 2854 – 2868.
  6. Qing Li, Yichao Wu, Jingpu Duan, Jiahai Yang, et al. Weighted NSFIB Aggregation with Generalized Next Hop of Strict Partial Order. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 890-904
  7. Chenxin Duan, Hao Gao, Guanglei Song, Jiahai Yang, Zhiliang Wang. ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 1717- 1728
  8. Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, and Yaozhong Liu, Zhongxiang Sun. AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System. 2022 USENIX Annual Technical Conference, Jul. 11–13, 2022, Carlsbad, CA, USA.
  9. Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi, Han Zhang. ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. NDSS 2022, Apr. 24-28, 2022, San Diego, CA, USA
  10. Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Zoonet - A Proactive Telemetry System for Large-Scale Cloud Networks. The 18th International Conference on emerging Networking EXperiments and Technologies (CoNext 2022). Rome, Italy. Dec. 6-9, 2022.
  11. Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Centralized Network Utility Maximization with Accelerated Gradient Method. IEEE ICNP’2022, Oct. 30-Nov. 2, 2022, Lexington, KY, USA

 

--2021--

  1. Shize Zhang, Zhiliang Wang, Jiahai Yang, MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking, the 2021 Annual Computer Security Applications Conference (ACSAC 2021), Dec. 6-10, 2021, Virtual event
  2. Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al, CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks, The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)Oct 25 - 28, 2021Wuhan, China
  3. Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, et al, DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications, ACM Conference on Computer and Communications Security (CCS 2021). Seoul, Korea. November 14-19, 2021
  4. Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Verification of Service Function Chains in the Cloud, IEEE/ACM Transactions on Networking, Vol.29, No.1, Feb. 2021, pp 78-91
  5. Bo Wang, Fengyuan Ren, Jiahai Yang, Chao Zhou, Improving the Performance of Online Bitrate Adaptation with Multi-step Prediction over Cellular Networks, IEEE Transactions on Mobile Computing, vol. 20, no. 1, pp. 174-187, 1 Jan. 2021, doi: 10.1109/TMC.2019.2939124. 
  6. Lin He, Gang Ren, Ying Liu, Jiahai Yang, PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet, IEEE/ACM Transactions on Networking, Vol 29, No. 2, April 2021, pp 695-708
  7. Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, et al, Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors. IEEE Journal on Selected Areas in Communications. 2021, 39(8): 2632-2647.
  8. Lin He, Peng Kuang, Ying Liu, Gang Ren, Jiahai Yang, Towards securing Duplicate Address Detection using P4, Computer Networks, Vol. 198, 24 Oct. 2021, 108323
  9. Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin, A novel workload scheduling framework for intrusion detection system in NFV scenario, Computers and Security, v 106, July 2021 (https://doi.org/10.1016/j.cose.2021.102271)

 

--2020--

  1. Guanglei Song, Lin He, Zhiliang Wang, Jiahai Yang, Tao Jin, Jieling Liu, Guo Li. Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space. IWQoS 2020. June 15-17, 2020. 1-10. 
  2. Xiaoqing Sun, Jiahai Yang, Zhiliang Wang, Heng Liu. HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection. IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), April 20-24, 2020, Budapest, Hungary. (EI: 20202608868693)
  3. Linna Fan, Shize Zhang, Yichao Wu, Zhiliang Wang, Chenxin Duan, Jia Li and Jiahai Yang. An IoT Device Identification Method based on Semi-supervised Learning. 16th International Conference on Network and Service Management (CNSM 2020). 2-6 Nov. 2020. Virtual Conference.
  4. Xiaoqing Sun, Zhiliang Wang, Jiahai Yang, Xinran Liu. Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks. Computers & Security. 2020, 99: 102057.
  5. Ying Zhong, Wenqi Chen, Zhiliang Wang, Yifan Chen, Kai Wang, Yahui Li, Xia Yin, Xingang Shi, Jiahai Yang, and Keqin Li. HELAD: A Novel Network Anomaly Detection Model Based on Heterogeneous Ensemble Learning. Computer Networks. 2020, 169: 107049. 
  6. Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Yingya Guo, Haijun Geng, Jiahai Yang. Traffic Engineering in Partially Deployed Segment Routing over IPv6 Network with Deep Reinforcement Learning. IEEE/ACM Transactions on Networking. 2020, 28(4): 1573-1586. 
  7. Hui Yu, Jiahai Yang, Carol Fung, Fine-grained Cloud Resource Provisioning for Virtual Network Function, IEEE Transactions on Network and Service Management v 17, n 3, p 1363-1376, Sep. 2020 
  8. Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Verification of Service Function Chains in the Cloud, IEEE/ACM Transactions on Networking, 2020, doi: 10.1109/TNET.2020.3028846 

--2019--

  1. Yang Yang, Min Cao, Jiahai Yang, et al, SSRC: source rate control algorithm for delay-sensitive flow in data center networkJournal on Communications201940(7): 14-26 (in Chinese)
  2. Xiaoqing Sun, Mingkai Tong, Jiahai Yang, et al, HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification, The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Sep. 23-25, 2019, Beijing, China 
  3. Cong Xu, Boyan Tu, Guoping Li, Tingqiu Yuan, Jiahai Yang, Dual Channel Adaptive Congestion Control for Datacenters, INFOCOM Workshop DCPerf 2019: Big Data and Cloud Performance, 29 Apr.-2 May 2019, Paris, France
  4. Hui Yu, Jiahai Yang, Hui Wang, Hui Zhang. Towards Predictable Performance via Two-layer Bandwidth Allocation in Cloud Datacenter, Elsevier Journal of Parallel and Distributed Computing, Vol. 126, April 2019: 34-47
  5. Guo Li, Lin He, Guanglei Song, Zhiliang Wang, Jiahai Yang, Zimu Li, Survey on IPv6 address scanning technology based on seed sourcesTelecommunication Science2019, 12pp24-37 (in Chinese)

--2018--

  1. Yuding WangJiahai Yang. DACPCC:A Data Access Control Scheme with Access Permission for Cloud Computing [J]. Acta Electronica Sinica, 2018, 46(1): 236-244 (in Chinese).
  2. Yang Yang, Jiahai Yang, Haosen Wen. Routing Algorithm Design Based on Timeslot of Transmission for Data Centers[J]. Journal of Software, 2018, 29(8): 2485-2500 (in Chinese).http://www.jos.org.cn/1000-9825/5543.htm 
  3. Xiaoli Zhang, Jiahai Yang, Xiaoqing Sun, Jianping Wu. Survey of Geo-Distributed Cloud Research Progress[J]. Journal of Software, 2018, 29(7): 2116-2132 (in Chinese). http://www.jos.org.cn/1000-9825/5555.htm.
  4. Jianping Weng, Hui Wang, Jiahai Yang, Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. IEEE/ACM Transactions on Networking, Vol. 26, No. 4, pp. 1646-1659, Aug. 2018
  5. Hui Yu, Jiahai Yang, Carol Fung. Elastic Network Service Chain with Fine-grained Vertical Scaling. IEEE Globecom 2018, 9-13 Dec. 2018, Abu Dhabi, UAE

--2017--

  1. Yang Yang, Jiahai Yang, Donghong Qin, et al, DraLCD: Another Traffic Engineering Method for Data Center Networks, ACTA Electronica Sinica, 2017, 45 (5): 1261-1267  (in Chinese)
  2. Ziyu Wang, Jiahai Yang, Shize Zhang, et al. Robust Regression for Anomaly Detection. IEEE International Conference on Communications, 21-25 May 2017, Paris, France 
  3. Weng Jian Ping, Wang Hui, Yang Jiahai and Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. International Workshop on Quality of Service. (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN
  4. Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang. GAS: Generic and Agile Service Function Chain Verification on Cloud, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN

--2016--

  1. Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, et al, Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Transactions on Networking, 24(3):1448-1461, 2016.
  2. Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu, Optimal Construction of Virtual Networks for Cloud-based MapReduce Workflows, Elsevier Computer Networks, 112(2017): 194-207,  http://dx.doi.org/10.1016/j.comnet.2016.11.001
  3. Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang, Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and Experiments, Elsevier Journal of Parallel and Distributed Computing, Vol. 90-91, No. 4, pp52-66
  4. Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang, Tetris: Optimizing Cloud Resource Usage Unbalance with Elastic VM, IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS 2016), Jun. 20-21, 2016, Beijing, China
  5. Chen Fu, Lin Chuang, Yang Jiahai, Xue Yuemei, A Study on Online Social Networks Theme Semantic Computing Model, 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun. 27-Jul. 2, 2016, pp. 244-251, doi:10.1109/ICWS.2016.39
  6. Fuliang Li, Jiahai Yang, Xingwei Wang, et al, Characteristics analysis at prefix granularity: A case study in an IPv6 network, Journal of Network and Computer Applications, Vol. 70, No. 7, pp. 156–170, Jul. 2016 (doi:10.1016/j.jnca.2016.02.022
  7. Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016. 
  8. Xiao Ling, Jiahai Yang, Ye Wang, et al, Fast Community Detection in Large Weighted Networks Using GraphX on Cloud, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016.
  9. Ziyu Wang, Jiahai Yang, Shize Zhang, et al, Automatic Model Selection for Anomaly Detection, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 Aug. 2016. 
  10. Hui Yu, Jiahai Yang, Cong Xu, et al, SpongeNet: Towards Bandwidth Guarantees of Cloud Datacenter with Two-phase VM Placement, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016. 
  11. Ziyu Wang, Jiahai Yang, Chenxi Li, et al, Towards online anomaly detection by combining multiple detection methods and Storm, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016. 
  12. Yang Yang, Jiahai Yang, Donghong Qin, Multipath routing algorithm for data center networks, Journal of Tsinghua University (Science and Technology), v 56, n 3, p 262-268 (in Chinese) 

--2015--

  1. Jiahai Yang, Mingwei Xu, Hui Wang, Wenlong Chen, Yuan Yang, Qingzhou Dong, Yang Wang, IER: ID-ELoc-RLoc Based Architecture for Next Generation Internet, Chinese Journal of ElectronicsDec. 2014, Vol. 31, No. 6, pp 519-536, Date: 20 Jan 2015
  2. Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Towards Centralized and Semi-automatic VLAN Management. International Journal of Network Management v 25, n 1, p 52-73, January 1, 2015
  3. Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang, Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability, Computer Communications, v 67, p 11-22, August 1, 2015
  4. Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang, Solving Multicast Problem in Cloud Networks Using Overlay RoutingComputer Communications, v 70, p 1-14, October 1, 2015
  5. Fuliang Li, Changqing An, Jiahai Yang, Xingwei Wang, Jianping Wu, Linchuan Xu, Xin Xu, Data Mapping Principles and Algorithms for Self-configurable Systems, China  Communications , 12(10): 169-181. 
  6. Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang, Cluster Scheduler on Heterogeneous Cloud, IEEE HPCC 2015, Aug. 24-26, 2015, New York, USA. 
  7. Chenxi Li, Jiahai Yang, Ziyu Wang, et al, A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows, IEEE GLOBECOM 2015, Dec. 5-10, 2015, San Diego, CA, USA. 
  8. Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network, Journal of Computer Research and Development, 2015, 52(4): 813-822. (in Chinese) 
  9. Yuding Wang, Jiahai Yang, Cong Xu, et al, Survey on Access Control Technologies for Cloud Computing, Journal of Software, 2015, 26(5): 1129-1150 (in Chinese) 
  10. Yang Yang, Jiahai Yang, Hui Wang, et al, Towards load adaptive routing based on link critical degree for delay-sensitive traffic in IP networks, Journal of Communications, 2015,36(3): 2015082-1 – 2015082-11(in Chinese)
  11. Jiahai Yang, Liang Jiao, Donghong Qin, Experimental study of BGP routing-table-based inter-domain path characteristics, Journal of Tsinghua University (Science and Technology), 2015, 55(11): 1190-1196 (in Chinese)

 

--2014—

  1. Cong Xu, Jiahai Yang, Di Fu, Hui Zhang, Towards Optimal Collaboration of Policies in the Two-phase Scheduling of Cloud Tasks”, in 11th IFIP International Conference on Network and Parallel Computing (NPC) , Sep. 18-20, 2014, Ilan, Taiwan, v 8707 LNCS, p 306-320.
  2. Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang, Optimizing the topologies of virtual networks for cloud-based big data processing, in16th IEEE International Conference on High Performance Computing and Communications (HPCC), Aug. 20-22, 2014, Paris, France.
  3. Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE, 10th International Conference on Security and Privacy in Communication Networks (SecureCom), Sep. 24-26, 2014, Beijing, China.
  4. Ziyu Wang, Jiahai Yang, Fuliang Li, An On-line Anomaly Detection Method Based on A New Stationary Metric----Entropy-Ratio, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), Sep. 24-26, 2014, Beijing, China.
  5. Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, 23rd International Conference on Computer Communication and Networks (ICCCN), Aug. 4-7, 2014, Shanghai, China
  6. Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Bin Liu. Towards Zero-Time Wake-Up of Line Cards in Power-Aware Routers. INFOCOM, Toronto, Canada, IEEE, 2014, pp.190-198.
  7. Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, A Study of Traffic from the Perspective of a Large Pure IPv6 ISP, Computer Communications, 2014, 37:40-52, Jan. 2014
  8. Fuliang Li, Jiahai Yang, Huijing Zhang, Jianping Wu, Configuration Analysis and Recommendation: Case Studies in IPv6 Networks, Computer Communications, 2014, 53:37-51, Nov. 2014
  9. Zejia Chen, Jiahai Yang, Hui Wang, A Cascading Framework for Uncovering Spammers in Social Networks, IFIP Networking 2014, June 2-4, 2014, Trondheim, Norway
  10. Miao Li, Hui Wang, Jiahai Yang, et al, A Value Based Framework for Provider Selection of Regional ISPs, IFIP/IEEE NOMS 2014, May 4-9, 2014, Krakow, Poland
  11. Fu Chen, Jiahai Yang, Shaobin Zhan, MulCNeT: Network management cloud, International Journal of Grid and Distributed Computing, v 7, n 2, p 139-150, 2014
  12. Fuliang Li, Jiahai Yang, Jianping Wu, et al, Research on Internet Automatic Configuration, Journal of Software, 2014, 25(1): 118-134. (in Chinese)
  13. Kun Wen, Jiahai Yang, Bin Zhang, Survey on Research and Recent Progress of Low-Rate Denial of Service Attacks, Journal of Software, 2014,  25(3): 591-605  (in Chinese)
  14. Yuan Yang, Mingwei Xu, Jiahai Yang, et al, SAMS: A Novel ID-Locator Separation SchemeChinese Journal of Computers, 2014, 37(2): 394-406 (in Chinese),

--2013—

  1. Donghong Qin, Jiahai Yang, Hui Wang, Experimental Study on Diversity and Novelty of Interdomain Paths, Chinese Journal of Electronics, 2013 Vol. 22 (CJE-1): 160-166
  2. M. XuM. Hou, D. Wang, J. Yang, An efficient critical protection scheme for intra-domain routing using link characteristics, Computer Networks, v 57, n 1, p 117-133, January 16, 2013
  3. Fuliang Li, Jiahai Yang, Jianping Wu, et al, CSS-VM: A Centralized and Semi-automatic System for VLAN Management, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM), Ghent, Belgium, May 2013
  4. Miao Li, Jiahai Yang, Chenxi Li, et al, IPv6 Network Topology Discovery Method Based on Novel Graph Mapping Algorithms, 18th IEEE Symposium on Computers and Communications(ISCC), Split, Croatia, Jul. 2013
  5. Bin Zhang, Jiahai Yang, Jianping Wu, et al. MBST: Detecting Packet-level Traffic Anomalies by Feature Stability, The Oxford Computer Journal, v 56, n 10, p 1176-1188, Oct. 2013
  6. Cong Xu, Jiahai Yang, Xiao Ling, et al, Architecture Design for Management as a Service Cloud, IEEE/IFIP IM 2013
  7. Donghong Qin, Jiahai Yang, Yang Yang, Hui Zhang, UMIR: Design and Implementation of a Multipath Routing System, Journal of Communications2013,34Z2):27-35, Sep. 2013 (in Chinese)

--2012--

  1. Zhang B, Yang JH, Wu JP et al, Diagnosing Traffic Anomalies Using a Two-phase Model, Journal of Computer Science and Technology, 27(2): 313-327, Mar. 2012
  2. Bin Zhang, Jiahai Yang, Jianping Wu, et al, PCA-subspace Method Is it Good Enough for Network-wide Anomaly Detection, IEEE/IFIP NOMS 2012, Maui, Hawaii, April 15-21, 2012
  3. Lei Gao, Jiahai Yang, Hui Zhang, et al, Whats Going On in Chinese IPv6 World, IEEE/IFIP NOMS 2012, short paper, Maui, Hawaii, April 15-21, 2012
  4. Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang, Separating Identifier from Locator with Extended DNS, IEEE International Conference on Communications 2012 (ICC 2012), June 10-15, 2012, Ottawa, Canada.
  5. Miao Li, Hui Wang, Jiahai Yang, Flattening and Preferential Attachment in the Internet Evolution, APNOMS 2012Sep. 25-27, 2012, Seoul, Korea
  6. Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia ChenUnravel the Characteristics and Development of Current IPv6 Network, 37th Annual IEEE Conference on Local Computer Networks, Clearwater, Florida, 2012
  7. Jiahai Yang, Ning Jiang, Changqing An, Fuliang Li, A formal approach to the design and implementation of configuration strategy automation for switch network, Journal of Tsinghua University (Science and Technology), 2012, 52(8): 1041-1048 (in Chinese)

--2011--

  1. Bin Zhang, Jiahai Yang, Jianping Wu, et al, MCST: Anomaly Detection Using Feature Stability for Packet-level Traffic, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan
  2. Lei Gao, Jiahai Yang, Hui Zhang, et al. FlowInfra: A Fault-resilient Scalable Infrastructure for Network-wide Flow Level Measurement, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan
  3. Fuliang Li, Changqing An, Jiahai Yang, et al. Investigating the Efficiency of Fine Granularity Source Address Validation in IPv6 Networks, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan
  4. Changqing An, Hui Wang, Jiahai Yang, MIB design and application for source address validation improvement protocol, 16th IEEE Symposium on Computers and Communications, ISCC'11, 2011: 677-680
  5. Jessie Hui Wang, Changqing An, Jiahai Yang, A study of traffic, user behavior and pricing policies in a large campus network, Elsevier Computer Communications (2011) , v 34, n 16, p 1922-1931, October 1, 2011 
  6. Bin Zhang, Jiahai Yang, Jianping Wu, An Efficient Parallel TCAM Scheme for the Forwarding Engine of the Next-generation Router, IFIP/IEEE Intl Symp. on Integrated Network Management, May 23-28, 2011, Dublin, Ireland, pp.454-461
  7. Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2: an IPv6 Deployment in China, ACM SIGCOMM Computer Communication Review, Vol. 41, No. 2, April 2011: 48-52 
  8. Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang, On the Scalability of Router Forwarding Tables: Nexthop-Selectable FIB Aggregation, IEEE INFOCOM2011 (The 30th IEEE Intl Conf. on Computer Communications: mini-conference) , 10-15 Apr. 2011: 321-325
  9. Hui Wang, Jiahai Yang, Chungang Wang, Key Strategies in P2P Systems and ISPs' P2P Traffic Management: A Survey, Springer Journal (SCI-indexed) Peer-to-Peer Networking and Applications, Jan. 2011, pp1-10
  10. Bin Zhang, Jiahai Yang, Jianping Wu, Survey and Analysis on the Internet Traffic Model, Journal of Software2011,22(1):115-131(in Chinese)
  11. Jiahai Yang, Xi Guo, Hui Zhang, The visualization algorithm based on multi-level and multi-granular hybrid layout and its applications, Journal of Tsinghua University (Science and Technology), 2011, 51(12): 1765-1770,1776 (in Chinese)
  12. Laizhong Cui, Jianping Wu, Yong Jiang, Jiahai Yang, A topology formation algorithm for unstructured P2P streaming systems, Journal of Tsinghua University (Science and Technology), 2011, 5112):1819-1823 (in Chinese)
  13. Fu Chen, Jiahai Yang, Yang Yang, et al, A Study on Network Service Behavior Verification with Process Algebra and Its Application,Chinese Journal of Computers2011, 349):1660-1668 (in Chinese)

--2010--

  1. Bin Zhang, Jiahai Yang, Jianping WuQi Li, Efficient Searching with Parallel TCAM Chips, The 35th IEEE Conference on Local Computer Networks, LCN 2010, 11-14 Oct. 2010, Denver, Colorado, U.S.A.
  2. Lei Gao, Jiahai Yang, Hui Wang, Hui Zhang, A measure of growth of user community in OSNs, IEEE 18th International Workshop on Quality of Service, IWQoS 2010, Jun. 2010, Beijing, China
  3. Bin Zhang, Jianping Wu, QI Li, Jiahai Yang, Efficient parallel searching with TCAMs, IEEE 18th International Workshop on Quality of Service, IWQoS 2010, Jun. 2010, Beijing, China
  4. Yingwu Zhu, Jiahai Yang, Jinxiang Zhang, Anomaly Detection Based on Traffic Information Structure, Journal of Software, 201021(10): 2573-2583 (in Chinese) 
  5. Ruotong Wang, Hui Zhang, Jiahai Yang, et al, Research on Network Management Information Modeling based on Semantic Web Service, Journal of Communications, 2010, 31(1)85-91 (in Chinese) 
  6. Guifen Huang, Jiahai Yang, Hui Zhang, et al, Design and implementation of a P2P based network management system across multiple administrative domains, Journal of Tsinghua University (Science and Technology), 201050(4): 547-550 (in Chinese)

--2009--

  1. Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang, Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing, The 29th IEEE Intl Conference on Distributed Computing Systems (ICDCS 2009), June 22-26, 2009, Montreal, Quebec, Canada
  2. Jiahai Yang, Hui Zhang, Jinxiang Zhang, et al. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. Journal of Computer Science and Technology, 2009, 24(3): 482-494, May 2009
  3. Guanqun Zhang, Hui Wang, Jiahai Yang, Understanding Web Hosting Utility of Chinese ISPs, APNOMS2009, Kim Y, Hong CS (Eds.): 12th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2009, LNCS5787: 11-20 
  4. Jianping He, Jiahai Yang, Changqing An, et al. BPR: a Bit-level Packet Recovery in Wireless Sensor Networks. ACM SAC09 (The 24th Annual ACM Symposium on Applied Computing), Mar. 2009, Honolulu, Hawaii, USA, pp59-65
  5. Miao Zhou, Jiahai Yang, An IPv6 topology discovery engine based on sequence of sliding addresses, Journal of Tsinghua University (Science and Technology), 2009, 49(8): 1241-1244 (in Chinese)
  6. Miao Zhou, Jiahai Yang, Hongbo Liu, et al, Modeling the Complex Internet Topology, Journal of Software, 200920(1):109-123 (in Chinese)
  7. Wenbin Lu, Jiahai Yang, Hongbo Liu, Identification of P2P peers based on connection pattern, Journal of Tsinghua University (Science and Technology), 200949(7): 1029-1033 (in Chinese) 

--2008--

  1. Jianping He, Jiahai Yang, Changqing An, et al. Analysis on MAC Layer Retransmission Scheme in Wireless Networks. ACM Workshop on Mobiwac08, Oct. 2008, Vancouver. Canada.
  2. Jianping He, Jiahai Yang, Changqing An, et al. A Study of Collisions in Wireless Network Coding System. IFIP/IEEE Wireless Days 2008.
  3. Jianping He, Jiahai Yang, Changqing An, et al. Transmission Power Selection for Ad hoc Networks. ACM WICON08 (Wireless Internet Conference), Nov. 2008, Maui, Hawaii, USA.
  4. Jingjing Zhou, Jiahai Yang, Yang Yang, Guanqun Zhang, Traffic Matrix Estimation Using Square Root Filtering/Smoothing Algorithm. Ma Y, Choi D, Shingo A (Eds.): 11th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2008, LNCS 5297: 519-522.
  5. Shaojun Huang, Changqing An, Hui Wang, and Jiahai Yang, Understanding IPv6 Usage: Communities and Behaviors. Ma Y, Choi D, Shingo A (Eds.): 11th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2008, LNCS 5297: 256-265.
  6. Jingjing Zhou, Jiahai Yang, Yang Yang, et al, Traffic Matrix Estimation Based on Square Root Kalman Filtering Algorithm, International Journal of Network Management, 2008, 18(6): 539-551 (Nov. 2008)
  7. Fu Chen, Jiahai Yang, Yang Yang, New Algorithms on IP Network Topology Discovery and its Implement, Acta Electronica Sinica, 2008, 36(8): 1620-1625 (in Chinese)
  8. Fu Chen, Jiahai Yang, Yang Yang, Topology Discovery Service Research in Grid Environments, The 7th World Congress on Intelligent Control and Automation (WCICA08), Chongqing, China, Jun, 2008
  9. Jiahai Yang, Jilong Wang, Xun Zhang, Role-Based Integrated Configuration Management: Modeling and Implementation, Journal of Tsinghua University (Science and Technology), 2008, 48(10) (in Chinese)

--2007--

  1. Yunqi Li, Jiahai Yang, Changqing Anet al, Finding Hierarchical Heavy Hitters in Network Measurement System, The 22nd Annual ACM Symposium on Applied Computing, Mar. 12-15, 2007: 232-236
  2. Wei She, Jiahai Yang, Jianping Wu, Dynamic real-time inter-domain routing monitor based on routing interactions, Journal of Tsinghua University (Science and Technology), 200747(1): 119-122 (in Chinese)
  3. Kuangyi Zeng, Jiahai Yang, Towards the optimization of access control list, Journal of Software, 2007, 18(4): 978-986 (in Chinese)
  4. Jingjing Zhou, Jiahai Yang, Yang Yang, et al, Research on traffic matrix estimation, Journal of Software, 2007, 18(11): 2669-2682 (in Chinese)
  5. Jilong Wang, Miaohui Zhang, Jiahai Yang, Internet Management Network. Shingo Ata, Choong Seon Hong (Eds.): 10th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2007, LNCS 4773: 599-602
  6. Hongbo Liu, Jiahai Yang, Jiaxin Wang, et al, A Link-Based Rank of Postings in Newsgroup. Petra Perner (Ed.): 5th International Conference on Machine Learning and Data Mining in Pattern Recognition (MLDM), 2007, LNCS 4571: 392-403
  7. Changqing An, Shijing Kong, Jiahai Yang, Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007): 695-700

--2006--

  1. Jun Zhang, Jiahai Yang, Wei She, et al, A New Conceptual Distributed Network Measurement Architecture Based on Web Service, 14th IEEE International Conference on Networks (ICON2006), Sep. 13-15, 2006, Singaporepp477-483 (EI Source)
  2. Wei She, Jiahai Yang, Jianping Wu, Passive Inter-Domain Routing Monitor Based on Routing Interaction, IEEE International Conference on Computer and Information Technology (CIT 2006), Sep. 19-22, 2006, Seoul, Korea
  3. Changqing An, Jiahai Yang. Network Traffic Capture and Storage for IPv6 Network. International Conference on Communication Technology, 2006, GuiLinpp13-16
  4. Fang Meng, Changqing An, Jiahai Yang. Implementing a Secure AAA System in IPv6 Network. International Conference on Communication Technology, 2006, GuiLin: pp172-175
  5. Jinxiang Zhang, Jiahai Yang, Jianping Wu. A Novel Algorithm of Retrieving MIB Information Based on NGI, IEEE International Conference on Communication Technology, 2006. IEEE Computer Society: pp254-257
  6. Jun Zhang, Jiahai Yang, Jilong Wang, TopN sort algorithm based on multiple filtering, Journal of Tsinghua University (Science and Technology), 2006, 46(4): 604-608 (in Chinese)
  7. Fang Meng, Changqing An, Jiahai Yang, Design and implementation of AAA system based on IPv6, Journal on Communications, 200627(11): 126-129+133 (in Chinese)
  8. Changqing An, Jiahai Yang. A Flow Exporting System Building on Network Processor. Proceedings of the Forth IASTED International Conference on Communications, Internet, and Information Technology. November 29-December 1, 2006, St. Thomas, US Virgin Islands. ISBN:0-88986-613-9. pp212-217

From 1997 to 2005

  1. Jun Zhang, Jiahai Yang, Changqing An, and Jilong Wang, Traffic Measurement and Analysis of TUNET, CW2005, Nov. 22-25, 2005, Singaporepp330-334
  2. Jiahai Yang, Haixin Duan, Jianping Wu, et al, Workflow Oriented Network ManagementA Web/Java Approach, Journal of Network and Systems Management, Vol. 12, No. 4 (Dec. 2004): 431-438
  3. Jiahai Yang, Jianping Wu, Internet traffic measurement based on non-stationary traffic train model, Acta Electronica Sinica, 2004, 32(5): 727-730 (in Chinese)
  4. Jiahai Yang, Jianping Wu, Hong Zhu, CORBA approach to distributed network management, Journal of Tsinghua University (Science and Technology), 2004, 44(1): 138-141 (in Chinese)
  5. C. Liu, S. V. Wiel, J. Yang, A Nonstationary Traffic Train Model for Fine Scale Inference from Coarse Scale Counts, IEEE Journal on Selected Areas in Communications, 2003, 21(6): 895-907
  6. Jiahai Yang, Peng Ning, Sean X. Wang, Sushil Jajodia, CARDS: A Distributed System for Detecting Coordinated Attacks, in Information Security For Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security, Aug. 2000: 171-180
  7. Jiahai Yang, Xing Li, Jianping Wu, Design and implementation of a Web/Java-based network management system, Journal of Tsinghua University (Science and Technology), 200040(5): 118-121 (in Chinese)
  8. Haixin Duan, Jiahai Yang, Jianping Wu, Design and implementation of a network management system based on Web and database, Journal of Software, 2000 , 11(4)468-473 (in Chinese)
  9. Jiahai Yang, Peiyu Wang Jianping Wu, A Scalable, Web-based Architecture for Hierarchical Network Management, IEEE GLOBECOM99, Dec. 1999: 1882-1888
  10. Jiahai Yang, Jianping Wu, Yue You, A Web-Based, Event-driven Network Management Architecture, 4th Asian-Pacific Conference on Communications, Oct. 1999: 1214-1221
  11. Jiahai Yang, Jianping Wu, Yue You, Web-based Network Management: A Case Study with CERNET Management, 1999 Asian-Pacific Network Operation and Management Symposium, Korea, Sep. 1999: 333-344
  12. Jiahai Yang, Jianping Wu, Design and implementation of an RPC-based fault-tolerant accounting management system, Journal of Software, 1999, 10 (6)595-599 (in Chinese)
  13. Jiahai Yang, Jianping Wu, Zhonghui Li, Design and implementation of a Web-based Distributed Network Monitoring System, Journal of Software, 1999, 10(4)421-425(in Chinese)