近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Hongzhang Yang, Zongzhao Li, Huiyuan Qiang, Zhongliang Li, Yaofeng Tu, and Yahui Yang. ZTE-Predictor: Disk Failure Prediction System Based on LSTM[C].The 50th IEEE International Conference on Dependable Systems and Networks. València, Spain. June 29, 2020.
Hongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li. ADF2T: an Active Disk Failure Forecasting and Tolerance Software[C]. The 31st IEEE International Symposium on Software Reliability Engineering. Coimbra, Portugal. Oct 12 - 15, 2020.
Hongzhang Yang, Yahui Yang, Yaofeng Tu, etc. uSendfile: A User-space Sendfile Verb based on RDMA and Flash[C]. The 2019 IEEE International Conference on Cloud Computing (IEEE CLOUD 2019), Milan, Italy, 2019: 465-469
Hongzhang Yang, Yahui Yang, Yaofeng Tu. S3R5: A Snapshot Storage System based on ROW with Rapid Rollback, Recovery and Read-write[C]. The 21th IEEE International Conference on High Performance and Communications (IEEE HPCC 2019), Zhangjiajie, China, 2019: 2111-2118
Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen,. PTAD: Provable and Traceable Assured Deletion in Cloud Storage. IEEE Symposium on Computers and communications(ISCC2019). Barcelona, Spain. June 2019.
Hongzhang Yang, Yahui Yang, Yaofeng Tu, Ping Wang. uSendfile: A user-space sendfile verb based on flash and RDMA. IEEE 12th International conference on cloud computing(CLOUD2019). MILAN, ITALY. JULY, 2019: 465-469
Hongzhang Yang, Yahui Yang, Yaofeng Tu. S3R5: A snapshot storage system baaed on ROW with rapid rollback,recovery, and Read-write[C]. IEEE International conference on high performance computing and communication(HPCC2019). Zhangjiajie, China. Augest, 2019: 2111-2118
Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu: Memory Cache Attacks on Alluxio Impede High Performance Computing. 16th IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA 2018): 407-414, Melbourne, Australia, December 11-13, 2018
Tong Hui, Yahui Yang*, Qingni Shen, Zhonghai Wu, "Towards real-time privacy preservation: A streaming location anonymous method based on distributed framework," The 17th IEEE International Conference on Communications (ICC 2018), May 20-24, 2018 Kansas City, US
Wenjun Qian, Qingni Shen*, Yizhe Yang, Yahui Yang, Zhonghai Wu. Statically Defend Network Consumption against Acker Failure Vulnerability in Storm[C], the 19th International Conference on Information and Communications Security (ICICS 2017), December 6-8, 2017, Beijing, China.
Ziyao Zhu, Qingni Shen*, Yahui Yang, Zhonghai Wu. MCS: Memory Constraint Strategy for Unified Memory Manager in Spark[C], The 23rd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2017), 15-17 December 2017, Shenzhen, China
Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu*. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, 9th EAI International Conference on Digital Forensics & Cyber Crime(ICDF2C2017),October 9-11 2017, Prague, Czech Republic, pp: 221-227.
Yazhen Tian, Qingni Shen*, Ziyao Zhu, Yahui Yang, Zhonghai Wu. Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming, IEEE Symposium on Computers and Communications(ISCC 2018), 25-28 June 2018 – Natal, Brazil.
Shengjun Zhang, Hang Zhou, Yahui Yang*, Zhonghai Wu. A Joint Bloom Filter and Cross-encoding for Data Verification and Recovery in Cloud, The 22nd IEEE Symposium on Computers and Communications (ISCC 2017), July 3-6, 2017, Crete, Greece.
Limin Li, Yahui Yang*, Zhonghai Wu. IEEE: FMR-PDP: Flexible Multiple-Replica Provable Data Possession in Cloud Storage, The 22nd IEEE Symposium on Computers and Communications (ISCC 2017), July 3-6, 2017, Heraklion, Crete, Greece.
Yang Luo, Tian Puyang, Xiaoning Suny, Qingni Shen, Yahui Yang, Anbang Ruanz, Zhonghai Wu. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. The 24th IEEE International conference on web Services(ICWS 2017), June 25-30, 2017, Hawaii, US.
Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS’15). Springer LNCY: 312-31.
Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015). Springer LNCS: 429-435
Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy.
Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). Roman, Italy. Accepted.
Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai, POSTER: Ciphertext- policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts. Proceedings of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15). Springer International Publishing.
Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu: User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. COMPSAC Workshops 2015: 104-109
Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenmin Lao, Dandan Wang, Min Long. SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2012), Fukuoka, Japan, March 26-29, 2012
Yahui Yang, Dianbo Jiang , Min Xia, Using Improved GHSOM for Intrusion Detection, Journal of Information Assurance and Security, Volume 5, Issue 3, 2010:232-239
Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing. A Way of Key Management in Cloud Storage Based on Trusted Computing. In Proceedings of the 8th IFIP International Conference on Network and Parallel Computing (IFIP NPC2011), pp: 135-145, Changsha, China. 2011.10
Qingni Shen, Xin Yang, Xi Yu, Yahui Yang, Zhonghai Wu. Towards Data Isolation and Collaboration in Storage Cloud. The 2011 IEEE Asia-Pacific Services Computing Conference (APSCC2011), pp: 139-146. December 12-15, 2011, Jeju, Korea.
Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang. SecDM: Securing Data Migration between Cloud Storage Systems. In Proceedings of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011), pp: 636-641. December 12-14, Sydney, Australia
Zhen Li, Yahui Yang, Wei Liang, Guangcheng Tan, Probabilistic Fading Counting:An efficient identification method for finding heavy hitters. The 2010 International Conference on Computer Application and System Modeling(ICCASM 2010), October 22-24.
Zhen Li, Yahui Yang, An Adaptive Method for identifying Heavy Hitters Combining Sampling and Data Streaming Counting, 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE 2010). August 20-22, 2010.
Yahui Yang, Xiao Han, Min Xia, An improved ART 2-A Model for Mixed Numeric and Categorical Data, International Conference on Information Engineering and Computer Science(ICIECS2009), 19-20 December, 2009: 86-89
Yahui Yang, Yunfei Chen, Min Xia, An Automated Mechanism of Security Test on Network Protocols, The Fifth International Conference on Information Assurance and Security (IAS-2009), August 18-20, 2009:503-506.
Dianbo Jiang, Yahui Yang, Min Xia, Research on Intrusion Detection Based on an Improved SOM Neural Network, The Fifth International Conference on Information Assurance and Security (IAS-2009), 2009:400-403
Yahui Yang, Chunfang Huang, Zhijing Qin, A Network Misuse Detection Mechanism Based on Traffic log, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 526-529.
Yahui Yang,Yujie Wu,Min Xia,Zhijing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
Yahui Yang,Yujie Wu,Zhjing Qin, A RFID Network Planning Method based on Genetic Algorithm, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009),25-26 April, 2009: 534-537.
Ke Xu, Yahui Yang, Tao Chen,Improving BitTorrent Network’s Performance via Deploying Helpers,The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008),December 17-20,2008: 507-512.
Yahui Yang, Wenjian Miao, Qingni Shen, Optimization of BT Downloading Algorithm for Video Broadcast, International Symposium on Computer Network and Multimedia Technology(CNMT2009), 18-20 December, 2009:169-172.
Keming Du, Yahui Yang, Policy-Based Time Slot Assignment Algorithm in a MANET, International Conference on Anti-counterfeiting, Security, and Identification in Communication(ICASID 2009), August 20-22, 2009.
Chen Shen, Bin Wang, Yahui Yang, Exploiting Text Content in Image Search by Semi-supervised Learning Techniques. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
Chen Shen, Jun Jiao, Yahui Yang , Bin Wang, Multi-Instance Multi-Label Learning For Automatic Tag Recommendation. 2009 IEEE International Conference on Systems, Man, and Cybernetics. October 11-14, 2009. Hyatt Regency Riverwalk, San Antonio, Texas, USA.
杨洪章, 杨雅辉, 屠要峰, 孙广宇, 吴中海. 基于“采集—预测—迁移—反馈”机制的主动容错技术[J]. 计算机研究与发展, 2020, 57(2): 306-317.
杨洪章,杨雅辉,孙广宇. 北京大学学报(自然科学版). 已录用.
杨雅辉, 黄海珍, 沈晴霓, 吴中海,张英:基于增量式GHSOM神经网络模型的入侵检测研究.计算机学报,2014,37(05):1216-1224.
杨雅辉, 杜克明: 全网异常流量簇的检测与确定机制,计算机研究与发展,2009,46(11):1847-1853.
杨雅辉, 钮振瑛: 徐恪: P2P流媒体系统服务器部署的优化设计, 计算机研究与发展,2010.7: 1219-1224.
杨雅辉: 网络流量异常检测及分析的研究,计算机科学, 2008,35(5):108-112.
杨雅辉:IP网络性能指标体系的研究,通信学报,2002,23(11): 1-7.
杨雅辉,姜电波, 沈晴霓,夏敏:基于改进的GHSOM的入侵检测研究,通信学报,2011,32(1):121-126.
李臻 ,杨雅辉, 谢高岗,覃光成:一种基于数据流计数技术的概率衰落大业务流识别方法,计算机研究与发展,2011, 48(6)
刘白璐,杨雅辉,沈晴霓,张英:网络入侵早期检测方法研究与实现,计算机工程,2013, 39(7): 1-6.
肖三,杨雅辉,沈晴霓:基于微簇的在线网络异常检测方法,计算机工程与应用, 2013,49 (06):90-94.
沈晴霓, 杨雅辉,禹熹,张力哲,陈钟. 一种面向多租户云存储平台的访问控制策略.小型微型计算机系统, 2011,32(11): 2223-2229 (中国计算机大会CNCC 2011录用的优秀论文)
沈晴霓、张力哲、吴中海、杨雅辉. 一种基于动态域划分的MapReduce安全冗余调度策略, 通信学报. 2014,35(1):34-46.
刘白璐,杨雅辉,沈晴霓,杨雅辉:一种基于遗传算法的入侵早期特征选择方法. 小型微型计算机系统,已录用,中国互联网学术会议ICoC 2013
张英, 杨雅辉, 田浩然, 张威, 董晶晶:基于遗传算法的网络资源配置优化,计算机科学, 2012, 05期, pp 36-39.
靖红芳,王斌,杨雅辉: 基于类别分布的特征选择框架,计算机研究与发展,2009,46(9):1586-1593.
夏敏,吴中海,杨雅辉: 基于双缓冲区的发送速率控制方法,计算机工程,2010,36(5):119-121
苗文健, 杨雅辉: 面向视频播放的BT协议下载算法的改进, 计算机工程与应用,2010,46(18):68-70.
李臻,杨雅辉,张广兴: 大业务流测量采样算法研究综述,计算机应用研究,2011,28(1).
杨雅辉,王行刚:一种面向对象的被管网络资源的管理、维护模型,计算机学报,1999.8.
杨雅辉,王行刚:一种面向对象的自主网络管理模型, 通信学报,1999,4.
杨雅辉,王行刚:基于分布式对象技术的层次化网络管理结构,计算机工程与应用,2000,4.
杨雅辉,王行刚:OSI-TMN-INTERNET—三种标准化网络管理的比较研究,数据通信,2000,6.
杨雅辉: 机器学习在Web智能代理中的应用, 清华大学学报,1998,7增刊.