• Publications
  • 网络运行与管理技术研究室
  • 中文版
  • 返回

Publications

Copyright Notice: The materials presented below are for academic use only. Copyright and all rights therein are retained by the authors or by the respective copyright holders.

Selected Publications

Books:

[1] Jiahai Yang, Changqing An, Cybersecurity: Detection and Prevention of DDoS Attacks, Beijing: Higher Education Press, Nov. 2017 (in Chinese, to be appeared)

[2] Jiahai Yang, Jianping Wu, Changqing An, Internet Measurement: Theories and their applications, Beijing: Posts and Telecommunication Press, 2009. in Chinese

[3]  Jiahai Yang, Xiankun Ren, Peiyu Wang, Network Management Principles and Implementation Technologies, Beijing: Tsinghua University Press, 2000. in Chinese

Journal and Conference papers:

--2017—

[1] Yang Yang, Jiahai Yang, Donghong Qin, et al, DraLCD: Another Traffic Engineering Method for Data Center Networks, ACTA Electronica Sinica, 2017, 45 (5): 1261-1267  (in Chinese) (download)

[2]  Yuding Wang, Jiahai Yang, DACPCC: Data Access Control including Permission for Cloud Computing, ACTA Electronica Sinica,to be appeared(in Chinese)

[3]  Ziyu Wang, Jiahai Yang, Shize Zhang, et al. Robust Regression for Anomaly Detection. IEEE International Conference on Communications, 21-25 May 2017, Paris, France (download)

[4]  Weng Jian Ping, Wang Hui, Yang Jiahai and Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. International Workshop on Quality of Service. (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN

[5] Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang. GAS: Generic and Agile Service Function Chain Verification on Cloud, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN

--2016—

[6]  Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, et al, Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Transactions on Networking, 24(3):1448-1461, 2016. (download)

[7]  Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu, Optimal Construction of Virtual Networks for Cloud-based MapReduce Workflows, Elsevier Computer Networks, 112(2017): 194-207,  http://dx.doi.org/10.1016/j.comnet.2016.11.001 (download)

[8]  Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang, Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and Experiments, Elsevier Journal of Parallel and Distributed Computing, Vol. 90-91, No. 4, pp52-66 (download)

[9]  Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang, Tetris: Optimizing Cloud Resource Usage Unbalance with Elastic VM, IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS 2016), Jun. 20-21, 2016, Beijing, China (download)

[10] Chen Fu, Lin Chuang, Yang Jiahai, Xue Yuemei, A Study on Online Social Networks Theme Semantic Computing Model, 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun. 27-Jul. 2, 2016, pp. 244-251, doi:10.1109/ICWS.2016.39

[11] Fuliang Li, Jiahai Yang, Xingwei Wang, et al, Characteristics analysis at prefix granularity: A case study in an IPv6 network, Journal of Network and Computer Applications, Vol. 70, No. 7, pp. 156–170, Jul. 2016 (doi:10.1016/j.jnca.2016.02.022 (download)

[12] Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016. (download)

[13] Xiao Ling, Jiahai Yang, Ye Wang, et al, Fast Community Detection in Large Weighted Networks Using GraphX on Cloud, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016. (download)

[14] Ziyu Wang, Jiahai Yang, Shize Zhang, et al, Automatic Model Selection for Anomaly Detection, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 Aug. 2016. (download)

[15] Hui Yu, Jiahai Yang, Cong Xu, et al, SpongeNet: Towards Bandwidth Guarantees of Cloud Datacenter with Two-phase VM Placement, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016. (download)

[16] Ziyu Wang, Jiahai Yang, Chenxi Li, et al, Towards online anomaly detection by combining multiple detection methods and Storm, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016. (download)

[17] Yang Yang, Jiahai Yang, Donghong Qin, Multipath routing algorithm for data center networks, Journal of Tsinghua University (Science and Technology), v 56, n 3, p 262-268 (in Chinese) (download)

--2015—

[18] Jiahai Yang, Mingwei Xu, Hui Wang, Wenlong Chen, Yuan Yang, Qingzhou Dong, Yang Wang, IER: ID-ELoc-RLoc Based Architecture for Next Generation Internet, Chinese Journal of ElectronicsDec. 2014, Vol. 31, No. 6, pp 519-536, Date: 20 Jan 2015(download)

[19] Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Towards Centralized and Semi-automatic VLAN Management. International Journal of Network Management v 25, n 1, p 52-73, January 1, 2015(download)

[20] Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang, Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability, Computer Communications, v 67, p 11-22, August 1, 2015 (download)

[21] Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang, Solving Multicast Problem in Cloud Networks Using Overlay RoutingComputer Communications, v 70, p 1-14, October 1, 2015(download)

[22] Fuliang Li, Changqing An, Jiahai Yang, Xingwei Wang, Jianping Wu, Linchuan Xu, Xin Xu, Data Mapping Principles and Algorithms for Self-configurable Systems, China  Communications , 12(10): 169-181. (download)

[23] Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang, Cluster Scheduler on Heterogeneous Cloud, IEEE HPCC 2015, Aug. 24-26, 2015, New York, USA. (download)

[24] Chenxi Li, Jiahai Yang, Ziyu Wang, et al, A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows, IEEE GLOBECOM 2015, Dec. 5-10, 2015, San Diego, CA, USA. (download)

[25] Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, MIL-RoQ: Monitoring, Identifying and Locating the RoQ Attack in Backbone Network, Journal of Computer Research and Development, 2015, 52(4): 813-822. (in Chinese) (download)

[26] Yuding Wang, Jiahai Yang, Cong Xu, et al, Survey on Access Control Technologies for Cloud Computing, Journal of Software, 2015, 26(5): 1129-1150 (in Chinese) (download)

[27] Yang Yang, Jiahai Yang, Hui Wang, et al, Towards load adaptive routing based on link critical degree for delay-sensitive traffic in IP networks, Journal of Communications, 2015,36(3): 2015082-1 – 2015082-11(in Chinese) (download)

[28] Jiahai Yang, Liang Jiao, Donghong Qin, Experimental study of BGP routing-table-based inter-domain path characteristics, Journal of Tsinghua University (Science and Technology), 2015, 55(11): 1190-1196 (in Chinese) (download)

--2014—

[29] Cong Xu, Jiahai Yang, Di Fu, Hui Zhang, Towards Optimal Collaboration of Policies in the Two-phase Scheduling of Cloud Tasks”, in 11th IFIP International Conference on Network and Parallel Computing (NPC) , Sep. 18-20, 2014, Ilan, Taiwan, v 8707 LNCS, p 306-320.

[30] Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang, Optimizing the topologies of virtual networks for cloud-based big data processing, in16th IEEE International Conference on High Performance Computing and Communications (HPCC), Aug. 20-22, 2014, Paris, France.

[31] Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE, 10th International Conference on Security and Privacy in Communication Networks (SecureCom), Sep. 24-26, 2014, Beijing, China.

[32] Ziyu Wang, Jiahai Yang, Fuliang Li, An On-line Anomaly Detection Method Based on A New Stationary Metric----Entropy-Ratio, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), Sep. 24-26, 2014, Beijing, China.

[33] Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, 23rd International Conference on Computer Communication and Networks (ICCCN), Aug. 4-7, 2014, Shanghai, China

[34] Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Bin Liu. Towards Zero-Time Wake-Up of Line Cards in Power-Aware Routers. INFOCOM, Toronto, Canada, IEEE, 2014, pp.190-198.

[35] Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, A Study of Traffic from the Perspective of a Large Pure IPv6 ISP, Computer Communications, 2014, 37:40-52, Jan. 2014

[36] Fuliang Li, Jiahai Yang, Huijing Zhang, Jianping Wu, Configuration Analysis and Recommendation: Case Studies in IPv6 Networks, Computer Communications, 2014, 53:37-51, Nov. 2014

[37] Zejia Chen, Jiahai Yang, Hui Wang, A Cascading Framework for Uncovering Spammers in Social Networks, IFIP Networking 2014, June 2-4, 2014, Trondheim, Norway

[38] Miao Li, Hui Wang, Jiahai Yang, et al, A Value Based Framework for Provider Selection of Regional ISPs, IFIP/IEEE NOMS 2014, May 4-9, 2014, Krakow, Poland

[39] Fu Chen, Jiahai Yang, Shaobin Zhan, MulCNeT: Network management cloud, International Journal of Grid and Distributed Computing, v 7, n 2, p 139-150, 2014

[40] Fuliang Li, Jiahai Yang, Jianping Wu, et al, Research on Internet Automatic Configuration, Journal of Software, 2014, 25(1): 118-134. (in Chinese)

[41] Kun Wen, Jiahai Yang, Bin Zhang, Survey on Research and Recent Progress of Low-Rate Denial of Service Attacks, Journal of Software, 2014,  25(3): 591-605  (in Chinese)

[42] Yuan Yang, Mingwei Xu, Jiahai Yang, et al, SAMS: A Novel ID-Locator Separation SchemeChinese Journal of Computers, 2014, 37(2): 394-406 (in Chinese),

--2013—

[43] Donghong Qin, Jiahai Yang, Hui Wang, Experimental Study on Diversity and Novelty of Interdomain Paths, Chinese Journal of Electronics, 2013 Vol. 22 (CJE-1): 160-166

[44] M. XuM. Hou, D. Wang, J. Yang, An efficient critical protection scheme for intra-domain routing using link characteristics, Computer Networks, v 57, n 1, p 117-133, January 16, 2013

[45] Fuliang Li, Jiahai Yang, Jianping Wu, et al, CSS-VM: A Centralized and Semi-automatic System for VLAN Management, Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM), Ghent, Belgium, May 2013

[46] Miao Li, Jiahai Yang, Chenxi Li, et al, IPv6 Network Topology Discovery Method Based on Novel Graph Mapping Algorithms, 18th IEEE Symposium on Computers and Communications(ISCC), Split, Croatia, Jul. 2013

[47] Bin Zhang, Jiahai Yang, Jianping Wu, et al. MBST: Detecting Packet-level Traffic Anomalies by Feature Stability, The Oxford Computer Journal, v 56, n 10, p 1176-1188, Oct. 2013

[48] Cong Xu, Jiahai Yang, Xiao Ling, et al, Architecture Design for Management as a Service Cloud, IEEE/IFIP IM 2013

[49] Donghong Qin, Jiahai Yang, Yang Yang, Hui Zhang, UMIR: Design and Implementation of a Multipath Routing System, Journal of Communications2013,34Z2):27-35, Sep. 2013 (in Chinese)

--2012--

[50] Zhang B, Yang JH, Wu JP et al, Diagnosing Traffic Anomalies Using a Two-phase Model, Journal of Computer Science and Technology, 27(2): 313-327, Mar. 2012

[51] Bin Zhang, Jiahai Yang, Jianping Wu, et al, PCA-subspace Method Is it Good Enough for Network-wide Anomaly Detection, IEEE/IFIP NOMS 2012, Maui, Hawaii, April 15-21, 2012

[52] Lei Gao, Jiahai Yang, Hui Zhang, et al, Whats Going On in Chinese IPv6 World, IEEE/IFIP NOMS 2012, short paper, Maui, Hawaii, April 15-21, 2012

[53] Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang, Separating Identifier from Locator with Extended DNS, IEEE International Conference on Communications 2012 (ICC 2012), June 10-15, 2012, Ottawa, Canada.

[54] Miao Li, Hui Wang, Jiahai Yang, Flattening and Preferential Attachment in the Internet Evolution, APNOMS 2012Sep. 25-27, 2012, Seoul, Korea

[55] Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia ChenUnravel the Characteristics and Development of Current IPv6 Network, 37th Annual IEEE Conference on Local Computer Networks, Clearwater, Florida, 2012

[56] Jiahai Yang, Ning Jiang, Changqing An, Fuliang Li, A formal approach to the design and implementation of configuration strategy automation for switch network, Journal of Tsinghua University (Science and Technology), 2012, 52(8): 1041-1048 (in Chinese)

--2011--

[57] Bin Zhang, Jiahai Yang, Jianping Wu, et al, MCST: Anomaly Detection Using Feature Stability for Packet-level Traffic, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan

[58] Lei Gao, Jiahai Yang, Hui Zhang, et al. FlowInfra: A Fault-resilient Scalable Infrastructure for Network-wide Flow Level Measurement, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan

[59] Fuliang Li, Changqing An, Jiahai Yang, et al. Investigating the Efficiency of Fine Granularity Source Address Validation in IPv6 Networks, APNOMS 2011Sep. 21-23, 2011, Taipei, Taiwan

[60] Changqing An, Hui Wang, Jiahai Yang, MIB design and application for source address validation improvement protocol, 16th IEEE Symposium on Computers and Communications, ISCC'11, 2011: 677-680

[61] Jessie Hui Wang, Changqing An, Jiahai Yang, A study of traffic, user behavior and pricing policies in a large campus network, Elsevier Computer Communications (2011) , v 34, n 16, p 1922-1931, October 1, 2011 (download)

[62] Bin Zhang, Jiahai Yang, Jianping Wu, An Efficient Parallel TCAM Scheme for the Forwarding Engine of the Next-generation Router, IFIP/IEEE Intl Symp. on Integrated Network Management, May 23-28, 2011, Dublin, Ireland, pp.454-461 (download)

[63] Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2: an IPv6 Deployment in China, ACM SIGCOMM Computer Communication Review, Vol. 41, No. 2, April 2011: 48-52 (download)

[64] Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang, On the Scalability of Router Forwarding Tables: Nexthop-Selectable FIB Aggregation, IEEE INFOCOM2011 (The 30th IEEE Intl Conf. on Computer Communications: mini-conference) , 10-15 Apr. 2011: 321-325 (download)

[65] Hui Wang, Jiahai Yang, Chungang Wang, Key Strategies in P2P Systems and ISPs' P2P Traffic Management: A Survey, Springer Journal (SCI-indexed) Peer-to-Peer Networking and Applications, Jan. 2011, pp1-10 (download)

[66] Bin Zhang, Jiahai Yang, Jianping Wu, Survey and Analysis on the Internet Traffic Model, Journal of Software2011,22(1):115-131 (download) (in Chinese)

[67] Jiahai Yang, Xi Guo, Hui Zhang, The visualization algorithm based on multi-level and multi-granular hybrid layout and its applications, Journal of Tsinghua University (Science and Technology), 2011, 51(12): 1765-1770,1776 (in Chinese)

[68] Laizhong Cui, Jianping Wu, Yong Jiang, Jiahai Yang, A topology formation algorithm for unstructured P2P streaming systems, Journal of Tsinghua University (Science and Technology), 2011, 5112):1819-1823 (in Chinese)

[69] Fu Chen, Jiahai Yang, Yang Yang, et al, A Study on Network Service Behavior Verification with Process Algebra and Its Application,Chinese Journal of Computers2011, 349):1660-1668 (in Chinese)

--2010--

[70] Bin Zhang, Jiahai Yang, Jianping WuQi Li, Efficient Searching with Parallel TCAM Chips, The 35th IEEE Conference on Local Computer Networks, LCN 2010, 11-14 Oct. 2010, Denver, Colorado, U.S.A.

[71] Lei Gao, Jiahai Yang, Hui Wang, Hui Zhang, A measure of growth of user community in OSNs, IEEE 18th International Workshop on Quality of Service, IWQoS 2010, Jun. 2010, Beijing, China

[72] Bin Zhang, Jianping Wu, QI Li, Jiahai Yang, Efficient parallel searching with TCAMs, IEEE 18th International Workshop on Quality of Service, IWQoS 2010, Jun. 2010, Beijing, China

[73] Yingwu Zhu, Jiahai Yang, Jinxiang Zhang, Anomaly Detection Based on Traffic Information Structure, Journal of Software, 201021(10): 2573-2583 (in Chinese)  (download)

[74] Ruotong Wang, Hui Zhang, Jiahai Yang, et al, Research on Network Management Information Modeling based on Semantic Web Service, Journal of Communications, 2010, 31(1)85-91 (in Chinese) (download)

[75] Guifen Huang, Jiahai Yang, Hui Zhang, et al, Design and implementation of a P2P based network management system across multiple administrative domains, Journal of Tsinghua University (Science and Technology), 201050(4): 547-550 (in Chinese)

--2009--

[76] Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang, Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing, The 29th IEEE Intl Conference on Distributed Computing Systems (ICDCS 2009), June 22-26, 2009, Montreal, Quebec, Canada (download)

[77] Jiahai Yang, Hui Zhang, Jinxiang Zhang, et al. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. Journal of Computer Science and Technology, 2009, 24(3): 482-494, May 2009 (download)

[78] Guanqun Zhang, Hui Wang, Jiahai Yang, Understanding Web Hosting Utility of Chinese ISPs, APNOMS2009, Kim Y, Hong CS (Eds.): 12th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2009, LNCS5787: 11-20 (download)

[79] Jianping He, Jiahai Yang, Changqing An, et al. BPR: a Bit-level Packet Recovery in Wireless Sensor Networks. ACM SAC09 (The 24th Annual ACM Symposium on Applied Computing), Mar. 2009, Honolulu, Hawaii, USA, pp59-65 (download)

[80] Miao Zhou, Jiahai Yang, An IPv6 topology discovery engine based on sequence of sliding addresses, Journal of Tsinghua University (Science and Technology), 2009, 49(8): 1241-1244 (in Chinese) (download)

[81] Miao Zhou, Jiahai Yang, Hongbo Liu, et al, Modeling the Complex Internet Topology, Journal of Software, 200920(1):109-123 (in Chinese) (download)

[82] Wenbin Lu, Jiahai Yang, Hongbo Liu, Identification of P2P peers based on connection pattern, Journal of Tsinghua University (Science and Technology), 200949(7): 1029-1033 (in Chinese) (download)

--2008--

[83]  Jianping He, Jiahai Yang, Changqing An, et al. Analysis on MAC Layer Retransmission Scheme in Wireless Networks. ACM Workshop on Mobiwac08, Oct. 2008, Vancouver. Canada.

[84]  Jianping He, Jiahai Yang, Changqing An, et al. A Study of Collisions in Wireless Network Coding System. IFIP/IEEE Wireless Days 2008.

[85]  Jianping He, Jiahai Yang, Changqing An, et al. Transmission Power Selection for Ad hoc Networks. ACM WICON08 (Wireless Internet Conference), Nov. 2008, Maui, Hawaii, USA .

[86]  Jingjing Zhou, Jiahai Yang, Yang Yang, Guanqun Zhang, Traffic Matrix Estimation Using Square Root Filtering/Smoothing Algorithm. Ma Y, Choi D, Shingo A (Eds.): 11th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2008, LNCS 5297: 519-522.

[87]  Shaojun Huang, Changqing An, Hui Wang, and Jiahai Yang, Understanding IPv6 Usage: Communities and Behaviors. Ma Y, Choi D, Shingo A (Eds.): 11th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2008, LNCS 5297: 256-265.

[88]  Jingjing Zhou, Jiahai Yang, Yang Yang, et al, Traffic Matrix Estimation Based on Square Root Kalman Filtering Algorithm, International Journal of Network Management, 2008, 18(6): 539-551 (Nov. 2008)

[89]  Fu Chen, Jiahai Yang, Yang Yang, New Algorithms on IP Network Topology Discovery and its Implement, Acta Electronica Sinica, 2008, 36(8): 1620-1625 (in Chinese)

[90]  Fu Chen, Jiahai Yang, Yang Yang, Topology Discovery Service Research in Grid Environments, The 7th World Congress on Intelligent Control and Automation (WCICA08), Chongqing, China, Jun, 2008

[91]  Jiahai Yang, Jilong Wang, Xun Zhang, Role-Based Integrated Configuration Management: Modeling and Implementation, Journal of Tsinghua University (Science and Technology), 2008, 48(10) (in Chinese)

--2007--

[92]  Yunqi Li, Jiahai Yang, Changqing Anet al, Finding Hierarchical Heavy Hitters in Network Measurement System, The 22nd Annual ACM Symposium on Applied Computing, Mar. 12-15, 2007: 232-236

[93]  Wei She, Jiahai Yang, Jianping Wu, Dynamic real-time inter-domain routing monitor based on routing interactions, Journal of Tsinghua University (Science and Technology), 200747(1): 119-122 (in Chinese)

[94]  Kuangyi Zeng, Jiahai Yang, Towards the optimization of access control list, Journal of Software, 2007, 18(4): 978-986 (in Chinese)

[95]  Jingjing Zhou, Jiahai Yang, Yang Yang, et al, Research on traffic matrix estimation, Journal of Software, 2007, 18(11): 2669-2682 (in Chinese)

[96]  Jilong Wang, Miaohui Zhang, Jiahai Yang, Internet Management Network. Shingo Ata, Choong Seon Hong (Eds.): 10th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2007, LNCS 4773: 599-602

[97]  Hongbo Liu, Jiahai Yang, Jiaxin Wang, et al, A Link-Based Rank of Postings in Newsgroup. Petra Perner (Ed.): 5th International Conference on Machine Learning and Data Mining in Pattern Recognition (MLDM), 2007, LNCS 4571: 392-403

[98]  Changqing An, Shijing Kong, Jiahai Yang, Adaptive Packet Dropping: An Algorithm for Fair Bandwidth Sharing, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007): 695-700

--2006--

[99]  Jun Zhang, Jiahai Yang, Wei She, et al, A New Conceptual Distributed Network Measurement Architecture Based on Web Service, 14th IEEE International Conference on Networks (ICON2006), Sep. 13-15, 2006, Singaporepp477-483 (EI Source)

[100] Wei She, Jiahai Yang, Jianping Wu, Passive Inter-Domain Routing Monitor Based on Routing Interaction, IEEE International Conference on Computer and Information Technology (CIT 2006), Sep. 19-22, 2006, Seoul, Korea

[101] Changqing An, Jiahai Yang. Network Traffic Capture and Storage for IPv6 Network. International Conference on Communication Technology, 2006, GuiLinpp13-16

[102] Fang Meng, Changqing An, Jiahai Yang. Implementing a Secure AAA System in IPv6 Network. International Conference on Communication Technology, 2006, GuiLin: pp172-175

[103] Jinxiang Zhang, Jiahai Yang, Jianping Wu. A Novel Algorithm of Retrieving MIB Information Based on NGI, IEEE International Conference on Communication Technology, 2006. IEEE Computer Society: pp254-257

[104] Jun Zhang, Jiahai Yang, Jilong Wang, TopN sort algorithm based on multiple filtering, Journal of Tsinghua University (Science and Technology), 2006, 46(4): 604-608 (in Chinese)

[105] Fang Meng, Changqing An, Jiahai Yang, Design and implementation of AAA system based on IPv6, Journal on Communications, 200627(11): 126-129+133 (in Chinese)

[106] Changqing An, Jiahai Yang. A Flow Exporting System Building on Network Processor. Proceedings of the Forth IASTED International Conference on Communications, Internet, and Information Technology. November 29-December 1, 2006, St. Thomas, US Virgin Islands. ISBN:0-88986-613-9. pp212-217

From 1997 to 2005

[107] Jun Zhang, Jiahai Yang, Changqing An, and Jilong Wang, Traffic Measurement and Analysis of TUNET, CW2005, Nov. 22-25, 2005, Singaporepp330-334

[108] Jiahai Yang, Haixin Duan, Jianping Wu, et al, Workflow Oriented Network ManagementA Web/Java Approach, Journal of Network and Systems Management, Vol. 12, No. 4 (Dec. 2004): 431-438

[109] Jiahai Yang, Jianping Wu, Internet traffic measurement based on non-stationary traffic train model, Acta Electronica Sinica, 2004, 32(5): 727-730 (in Chinese)

[110] Jiahai Yang, Jianping Wu, Hong Zhu, CORBA approach to distributed network management, Journal of Tsinghua University (Science and Technology), 2004, 44(1): 138-141 (in Chinese)

[111] C. Liu, S. V. Wiel, J. Yang, A Nonstationary Traffic Train Model for Fine Scale Inference from Coarse Scale Counts, IEEE Journal on Selected Areas in Communications, 2003, 21(6): 895-907

[112] Jiahai Yang, Peng Ning, Sean X. Wang, Sushil Jajodia, CARDS: A Distributed System for Detecting Coordinated Attacks, in Information Security For Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security, Aug. 2000: 171-180

[113] Jiahai Yang, Xing Li, Jianping Wu, Design and implementation of a Web/Java-based network management system, Journal of Tsinghua University (Science and Technology), 200040(5): 118-121 (in Chinese)

[114] Haixin Duan, Jiahai Yang, Jianping Wu, Design and implementation of a network management system based on Web and database, Journal of Software, 2000 , 11(4)468-473 (in Chinese)

[115] Jiahai Yang, Peiyu Wang Jianping Wu, A Scalable, Web-based Architecture for Hierarchical Network Management, IEEE GLOBECOM99, Dec. 1999: 1882-1888

[116] Jiahai Yang, Jianping Wu, Yue You, A Web-Based, Event-driven Network Management Architecture, 4th Asian-Pacific Conference on Communications, Oct. 1999: 1214-1221

[117] Jiahai Yang, Jianping Wu, Yue You, Web-based Network Management: A Case Study with CERNET Management, 1999 Asian-Pacific Network Operation and Management Symposium, Korea, Sep. 1999: 333-344

[118] Jiahai Yang, Jianping Wu, Design and implementation of an RPC-based fault-tolerant accounting management system, Journal of Software, 1999, 10 (6)595-599 (in Chinese)

[119] Jiahai Yang, Jianping Wu, Zhonghui Li, Design and implementation of a Web-based Distributed Network Monitoring System, Journal of Software, 1999, 10(4)421-425(in Chinese)