default search action
Yinglian Xie
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j2]Yuezhi Zhou, Yaoxue Zhang, Yinglian Xie, Hui Zhang, Laurence T. Yang, Geyong Min:
TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services. IEEE Trans. Netw. Serv. Manag. 11(1): 46-59 (2014) - [c38]Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - 2013
- [c37]Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi:
Early security classification of skype users via machine learning. AISec 2013: 35-44 - [c36]Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:
SocialWatch: detection of online service abuse via large-scale social graphs. AsiaCCS 2013: 143-148 - [c35]Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - [c34]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013 - [c33]Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. IEEE Symposium on Security and Privacy 2013: 112-126 - 2012
- [c32]Chi-Yao Hong, Fang Yu, Yinglian Xie:
Populated IP addresses: classification and applications. CCS 2012: 329-340 - [c31]Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao:
Innocent by association: early recognition of legitimate users. CCS 2012: 353-364 - [c30]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie:
Collaborative TCP sequence number inference attack: how to crack sequence number under a second. CCS 2012: 593-604 - [c29]Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Knowing your enemy: understanding and detecting malicious web advertising. CCS 2012: 674-686 - [c28]Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS 2012 - [c27]Rina Panigrahy, Marc Najork, Yinglian Xie:
How user behavior is related to social affinity. WSDM 2012: 713-722 - 2011
- [c26]Qifa Ke, Vijayan Prabhakaran, Yinglian Xie, Yuan Yu, Jingyue Wu, Junfeng Yang:
Optimizing Data Partitioning for Data-Parallel Computing. HotOS 2011 - [c25]Yinglian Xie, Rina Panigrahy, Junfeng Yang, Chad Verbowski, Arunvijay Kumar:
Context-based Online Configuration-Error Detection. USENIX ATC 2011 - [c24]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
deSEO: Combating Search-Result Poisoning. USENIX Security Symposium 2011 - [c23]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
Heat-seeking honeypots: design and experience. WWW 2011: 207-216 - 2010
- [c22]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c21]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
On Network-level Clusters for Spam Detection. NDSS 2010 - [c20]Feng Qian, Abhinav Pathak, Yu Charlie Hu, Zhuoqing Morley Mao, Yinglian Xie:
A case for unsupervised-learning-based spam filtering. SIGMETRICS 2010: 367-368 - [c19]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. IEEE Symposium on Security and Privacy 2010: 207-222 - [c18]John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:
Searching the Searchers with SearchAudit. USENIX Security Symposium 2010: 127-142 - [c17]Fang Yu, Yinglian Xie, Qifa Ke:
SBotMiner: large scale search bot detection. WSDM 2010: 421-430
2000 – 2009
- 2009
- [c16]Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, Eliot Gillum:
BotGraph: Large Scale Spamming Botnet Detection. NSDI 2009: 321-334 - [c15]Yinglian Xie, Fang Yu, Martín Abadi:
De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 - 2008
- [j1]Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Faloutsos:
Less is More: Sparse Graph Mining with Compact Matrix Decomposition. Stat. Anal. Data Min. 1(1): 6-22 (2008) - [c14]Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov:
Spamming botnets: signatures and characteristics. SIGCOMM 2008: 171-182 - 2007
- [c13]Úlfar Erlingsson, V. Benjamin Livshits, Yinglian Xie:
End-to-End Web Application Security. HotOS 2007 - [c12]Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Faloutsos:
Less is More: Compact Matrix Decomposition for Large Sparse Graphs. SDM 2007: 366-377 - [c11]Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber:
How dynamic are IP addresses? SIGCOMM 2007: 301-312 - 2006
- [c10]Yinglian Xie, Michael K. Reiter, David R. O'Hallaron:
Protecting Privacy in Key-Value Search Systems. ACSAC 2006: 493-504 - [c9]Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang:
A Multi-Resolution Approach for Worm Detection and Containment. DSN 2006: 189-198 - [c8]Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Zhang:
Forensic Analysis for Epidemic Attacks in Federated Networks. ICNP 2006: 43-53 - [c7]Yuezhi Zhou, Yaoxue Zhang, Yinglian Xie:
Virtual disk based centralized management for enterprise networks. INM@SIGCOMM 2006: 23-28 - 2005
- [c6]Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang:
Worm Origin Identification Using Random Moonwalks. S&P 2005: 242-256 - 2004
- [c5]Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang:
Seurat: A Pointillist Approach to Anomaly Detection. RAID 2004: 238-257 - 2002
- [c4]Yinglian Xie, David R. O'Hallaron, Michael K. Reiter:
A Secure Distributed Search System. HPDC 2002: 321- - [c3]Yinglian Xie, David R. O'Hallaron:
Locality in Search Engine Queries and Its Implications for Caching. INFOCOM 2002: 1238-1247 - 2001
- [c2]Balachander Krishnamurthy, Jia Wang, Yinglian Xie:
Early measurements of a cluster-based architecture for P2P systems. Internet Measurement Workshop 2001: 105-109 - [c1]Andy Myers, John Chuang, Urs Hengartner, Yinglian Xie, Weiqiang Zhuang, Hui Zhang:
A Secure, Publisher-Centric Web Caching Infrastructure. INFOCOM 2001: 1235-1243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint