自2009年以来的部分论文列表:

[1]杨洋,杨家海,秦董洪,王于丁,凌晓,DraLCD:一种新的数据中心流量工程方法,电子学报,2017,45 (5): 1261-1267

[2]王于丁,杨家海,DACPCC:一种包含访问权限的云计算数据访问控制方案,电子学报(已录用,2016-12-09录用)

[3]Ziyu Wang, Jiahai Yang, Shize Zhang, et al. Robust Regression for Anomaly Detection. IEEE International Conference on Communications, 21-25 May 2017, Paris, France

[4]Weng Jian Ping, Wang Hui, Yang Jiahai and Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. International Workshop on Quality of Service. (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN

[5]Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang. GAS: Generic and Agile Service Function Chain Verification on Cloud, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRÚ, SPAIN

[6]Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, et al, Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Transactions on Networking, 24(3):1448-1461, 2016.

[7]Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu, Optimal Construction of Virtual Networks for Cloud-based MapReduce Workflows, Elsevier Computer Networks, 112(2017): 194-207, http://dx.doi.org/10.1016/j.comnet.2016.11.001

[8]Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang, Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and Experiments, Elsevier Journal of Parallel and Distributed Computing, Vol. 90-91, No. 4, pp52-66

[9]Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang, Tetris: Optimizing Cloud Resource Usage Unbalance with Elastic VM, IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS 2016), Jun. 20-21, 2016, Beijing, China

[10]Chen Fu, Lin Chuang, Yang Jiahai, Xue Yuemei, A Study on Online Social Networks Theme Semantic Computing Model, 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun. 27-Jul. 2, 2016, pp. 244-251, doi:10.1109/ICWS.2016.39

[11]Fuliang Li, Jiahai Yang, Xingwei Wang, et al, Characteristics analysis at prefix granularity: A case study in an IPv6 network, Journal of Network and Computer Applications, Vol. 70, No. 7, pp. 156–170, Jul. 2016 (doi:10.1016/j.jnca.2016.02.022

[12]Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016.

[13]Xiao Ling, Jiahai Yang, Ye Wang, et al, Fast Community Detection in Large Weighted Networks Using GraphX on Cloud, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016.

[14]Ziyu Wang, Jiahai Yang, Shize Zhang, et al, Automatic Model Selection for Anomaly Detection, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 Aug. 2016.

[15]Hui Yu, Jiahai Yang, Cong Xu, et al, SpongeNet: Towards Bandwidth Guarantees of Cloud Datacenter with Two-phase VM Placement, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr.    2016.

[16]Ziyu Wang, Jiahai Yang, Chenxi Li, et al, Towards online anomaly detection by combining multiple detection methods and Storm, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016.

[17]杨洋,杨家海,秦董红, 一种数据中心网络多路径路由算法研究,清华大学学报(自然科学版),v 56, n 3, p 262-268, March 1, 2016

[18]Jiahai Yang, Mingwei Xu, Hui Wang, Wenlong Chen, Yuan Yang, Qingzhou Dong, Yang Wang, IER: ID-ELoc-RLoc Based Architecture for Next Generation Internet, Chinese Journal of Electronics,Dec. 2014, Vol. 31, No. 6, pp 519-536, Date: 20 Jan 2015

[19]Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Towards Centralized and Semi-automatic VLAN Management. International Journal of Network Management, v 25, n 1, p 52-73, January 1, 2015

[20]Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang, Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability, Computer Communications, v 67, p 11-22, August 1, 2015

[21]Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang, Solving Multicast Problem in Cloud Networks Using Overlay Routing,Computer Communications, v 70, p 1-14, October 1, 2015

[22]Fuliang Li, Changqing An, Jiahai Yang, Xingwei Wang, Jianping Wu, Linchuan Xu, Xin Xu, Data Mapping Principles and Algorithms for Self-configurable Systems, China  Communications , 12(10): 169-181.

[23]Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang, Cluster Scheduler on Heterogeneous Cloud, IEEE HPCC 2015, Aug. 24-26, 2015, New York, USA.

[24]Chenxi Li,Jiahai Yang, Ziyu Wang, et al, A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows, IEEE GLOBECOM 2015, Dec. 5-10, 2015, San Diego, CA, USA.

[25]文坤,杨家海,程凤娟等,骨干网络中RoQ攻击的监测、定位和识别,计算机研究与发展,2015, 52(4): 813-822

[26]王于丁,杨家海,徐聪,凌晓,杨洋,云计算访问控制技术研究综述. 软件学报, 2015, 26(5): 1129-1150

[27]杨洋,杨家海,王会等,IP网络时延敏感型业务流自适应负载均衡算法,通信学报,2015,36(3): 2015082-1 – 2015082-11

[28]杨家海,焦亮,秦董洪等,基于BGP路由表的域间路径特性实验研究,清华大学学报(自然科学版),2015, 55(11): 1190-1196

[29]Cong Xu, Jiahai Yang, Di Fu, Hui Zhang, Towards Optimal Collaboration of Policies in the Two-phase Scheduling of Cloud Tasks”, in 11th IFIP International Conference on Network and Parallel Computing (NPC) , Sep. 18-20, 2014, Ilan, Taiwan, v 8707 LNCS, p 306-320.

[30]Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang, Optimizing the topologies of virtual networks for cloud-based big data processing, in16th IEEE International Conference on High Performance Computing and Communications (HPCC), Aug. 20-22, 2014, Paris, France.

[31]Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE, 10th International Conference on Security and Privacy in Communication Networks (SecureCom), Sep. 24-26, 2014, Beijing, China.

[32]Ziyu Wang, Jiahai Yang, Fuliang Li, An On-line Anomaly Detection Method Based on A New Stationary Metric----Entropy-Ratio, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), Sep. 24-26, 2014, Beijing, China.

[33]Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, 23rd International Conference on Computer Communication and Networks (ICCCN), Aug. 4-7, 2014, Shanghai, China

[34]Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Bin Liu. Towards Zero-Time Wake-Up of Line Cards in Power-Aware Routers. INFOCOM, Toronto, Canada, IEEE, 2014, pp.190-198.

[35]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, A Study of Traffic from the Perspective of a Large Pure IPv6 ISP, Computer Communications, 2014, 37:40-52, Jan. 2014

[36]Fuliang Li, Jiahai Yang, Huijing Zhang, Jianping Wu, Configuration Analysis and Recommendation: Case Studies in IPv6 Networks, Computer Communications, 2014, 53:37-51, Nov. 2014

[37]Zejia Chen, Jiahai Yang, Hui Wang, A Cascading Framework for Uncovering Spammers in Social Networks, IFIP Networking 2014, June 2-4, 2014, Trondheim, Norway

[38]Miao Li, Hui Wang, Jiahai Yang, et al, A Value Based Framework for Provider Selection of Regional ISPs, IFIP/IEEE NOMS 2014, May 4-9, 2014, Krakow, Poland

[39]Fu Chen, Jiahai Yang, Shaobin Zhan, MulCNeT: Network management cloud, International Journal of Grid and Distributed Computing, v 7, n 2, p 139-150, 2014

[40]李福亮, 杨家海, 吴建平, 安常青, 姜宁:互联网自动配置研究, 软件学报, 2014, 25(1): 118-134, 2014年1月.

[41]文坤,杨家海,张宾,低速率拒绝服务攻击研究与最新进展综述,软件学报, 2014,  25(3): 591-605, 2014年3月

[42]杨芫,徐明伟,杨家海等,SAMS:一种新型身份/位置分离方案,计算机学报,2014, 37(2): 394-406, 2014年2月

[43]Donghong Qin, Jiahai Yang, Hui Wang, Experimental Study on Diversity and Novelty of Interdomain Paths, Chinese Journal of Electronics, 2013 Vol. 22 (CJE-1): 160-166

[44]M. Xu,M. Hou, D. Wang, J. Yang, An efficient critical protection scheme for intra-domain routing using link characteristics, Computer Networks, v 57, n 1, p 117-133, January 16, 2013

[45]Bin Zhang, Jiahai Yang, Jianping Wu, et al. MBST: Detecting Packet-level Traffic Anomalies by Feature Stability, The Oxford Computer Journal, v 56, n 10, p 1176-1188, Oct. 2013

[46]Fuliang Li, Jiahai Yang, Jianping Wu, et al, CSS-VM: A Centralized and Semi-automatic System for VLAN Management, IEEE/IFIP IM 2013

[47]Cong Xu, Jiahai Yang, Xiao Ling, et al, Architecture Design for Management as a Service Cloud, IEEE/IFIP IM 2013

[48]秦董洪,杨家海,杨洋,张辉,UMIR系统设计与实现,通信学报,2013,34(Z2):27-35,2013年9月

[49]Zhang B, Yang JH, Wu JP et al, Diagnosing Traffic Anomalies Using a Two-phase Model, Journal of Computer Science and Technology, 27(2): 313-327, Mar. 2012

[50]Bin Zhang, Jiahai Yang, Jianping Wu, et al, PCA-subspace Method— Is it Good Enough for Network-wide Anomaly Detection,IEEE/IFIP NOMS 2012, Maui, Hawaii, April 15-21, 2012

[51]Lei Gao, Jiahai Yang, Hui Zhang, et al, What’s Going On in Chinese IPv6 World, IEEE/IFIP NOMS 2012, short paper, Maui, Hawaii, April 15-21, 2012

[52]Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang, Separating Identifier from Locator with Extended DNS, IEEE International Conference on Communications 2012 (ICC 2012), June 10-15, 2012, Ottawa, Canada.

[53]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen,Unravel the Characteristics and Development of Current IPv6 Network,37th Annual IEEE Conference on Local Computer Networks,Clearwater, Florida, 2012

[54]杨家海,姜宁,安常青,李福亮,基于形式化描述的交换机网络自动配置策略的设计与实现,清华大学学报(自然科学版),2012年,52(8):1041-1048

[55]崔来中,吴建平,江勇,杨家海,一种非结构化P2P流媒体系统拓扑构建算法,清华大学学报(自然科学版),2011, 51(12):1819-1823

(A topology formation algorithm for unstructured P2P streaming systems)

[56]杨家海,郭玺,张辉,基于多层次和多粒度的混合布局可视化算法及其应用,清华大学学报(自然科学版),2011, 51(12):1765-1770,1776

(The visualization algorithm based on multi-level and multi-granular hybrid layout and its applications)

[57]Jessie Hui Wang, Changqing An, Jiahai Yang, A study of traffic, user behavior and pricing policies in a large campus network, Elsevier Computer Communications, v 34, n 16, p 1922-1931, October 1, 2011

[58]Bin Zhang, Jiahai Yang, Jianping Wu, An Efficient Parallel TCAM Scheme for the Forwarding Engine of the Next-generation Router, IFIP/IEEE Int’l Symp. on Integrated Network Management, May 23-28, 2011, Dublin, Ireland, pp.454-461

[59]Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2: an IPv6 Deployment in China, ACM SIGCOMM Computer Communication Review, Vol. 41, No. 2, April 2011: 48-52

[60]Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang, On the Scalability of Router Forwarding Tables: Nexthop-Selectable FIB Aggregation, IEEE INFOCOM’2011 (The 30th IEEE Int’l Conf. on Computer Communications: mini-conference) , 10-15 Apr. 2011:  321-325

[61]Hui Wang, Jiahai Yang, Chungang Wang, Key Strategies in P2P Systems and ISPs' P2P Traffic Management: A Survey, Springer Journal Peer-to-Peer Networking and Applications, v 4, n 4, p 410-419, December 2011

[62]陈福,杨家海,杨杨等,网络服务行为的进程代数验证方法研究及其应用,计算机学报,2011, 34(9):1660-1668

[63]张宾,杨家海,吴建平, Internet流量模型分析与评述, 软件学报,2011,22(1):115-131

[64]Bin Zhang, Jiahai Yang, Jianping Wu,Qi Li, Efficient Searching with Parallel TCAM Chips, The 35th IEEE Conference on Local Computer Networks, LCN 2010, 11-14 Oct. 2010, Denver, Colorado, U.S.A.

[65]朱应武, 杨家海, 张金祥,基于流量信息结构的异常检测研究,软件学报,2010,21(10):2573-2583

[66]王若曈,张辉,杨家海,黄桂奋,P2P网络管理系统信息模型的设计与实现,通信学报,2010,31(1): 85-91

[67]黄桂奋,杨家海,张辉,王若曈,支持跨域协作的P2P网络管理系统设计与实现,清华大学学报(自然科学版), 2010,50(4):547-550

[68]Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang, Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing, The 29th IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2009), 2009:68-75

[69]Jiahai Yang, Hui Zhang, Jinxiang Zhang, et al. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. Journal of Computer Science and Technology, 2009, 24(3): 482-494, May 2009.

[70]周苗,杨家海,基于滑动地址序列的IPv6网络拓扑发现引擎,清华大学学报(自然科学版),2009,49(8): 1241-1244

[71]鲁文斌,杨家海,刘洪波,基于节点连接模式的P2P节点识别算法,清华大学学报(自然科学版),2009,49(7): 1029-1033

[72]周 苗, 杨家海, 刘洪波, 吴建平,Internet网络拓扑建模,软件学报,2009,20(1):109-123

[73]Jianping He, Jiahai Yang, Changqing An, et al. BPR: a Bit-level Packet Recovery in Wireless Sensor Networks. ACM SAC’09 (The 24th Annual ACM Symposium on Applied Computing), Mar. 2009, Honolulu, Hawaii, USA.

马海峰,杨家海,计算机应用,杨家海相关推荐

  1. 天天拍车运营主体公司董事发生变更:邹钧退出,邵海峰接任

    近日,二手车拍卖平台天天拍车的运营主体上海谨务汽车技术咨询有限公司发生工商变更.其中,邹钧不再担任该公司董事一职,由邵海峰接任.据了解,邵海峰为汽车之家总裁,而邹钧则为汽车之家前CFO. 今年早些时间 ...

  2. 刚刚,百度宣布王海峰升任CTO

    作者 | 夕颜.一一 出品 | AI科技大本营(ID:rgznai100) 导读:5 月 31 日,百度宣布,百度原高级副总裁王海峰升任百度 CTO,成为百度在组织大变革中一批"敢打硬仗&q ...

  3. 刚刚,百度宣布王海峰升任 CTO

    5 月 31 日,百度宣布,百度原高级副总裁王海峰升任百度 CTO,成为百度在组织大变革中一批"敢打硬仗"的代表人物得到晋升的典型.在百度人事动荡之秋,王海峰走马上任,不知是否可以 ...

  4. 王海峰李飞飞杨睿刚等入选最新IEEE Fellow,名单中华人学者占1/4

    梦晨 萧箫 发自 凹非寺 量子位 报道 | 公众号 QbitAI 2022年IEEE Fellow新晋名单,正式公布! 在今年上榜名单中,我们能看见不少熟悉的AI大牛身影: 百度首席技术官王海峰.清华 ...

  5. 安华金和技术副总裁杨海峰:金融行业数据实时共享场景下的动态脱敏技术

    在信息化大潮愈演愈烈的当下,数据和信息不啻为一种"新型资本",尤其对于数据资产量巨大,操作复杂程度高.系统性能要求高的金融领域来说,数据资产发挥着越来越突出的价值,和传统资本具有的 ...

  6. 汽车之家联席总裁邵海峰

    雷递网 乐天 6月22日报道 汽车之家日前宣布,联席总裁邵海峰因个人其他 原因已离任本公司联席总裁.邵海峰与公司并无意见分歧. 汽车之家董事会主席兼首席执行官龙泉说:"我谨代表汽车之家,对邵 ...

  7. 中科院陆汝钤获吴文俊人工智能最高成就奖,百度王海峰获吴文俊人工智能杰出贡献奖...

    来源:AI 科技评论 12 月 9 日上午,被誉为「中国智能科学技术最高奖」的吴文俊人工智能科学技术奖在苏州举行颁奖典礼.本届吴文俊人工智能奖共对 70 项人工智能成果授奖,包括吴文俊人工智能最高成就 ...

  8. AI、量子计算引爆硬科技创新,雷鸣、王海峰、施尧耘等北大120周年论道信科最前沿...

    北大建校120周年之际,信息科学领域的校友回母校开启了一场高峰论坛. 这次活动主办方为北大信息科学技术学院和北大科技创新校友会,北京大学信息科学技术学院院长.中国科学院院士黄如,北京大学科技创新校友会 ...

  9. 哈工大百年校庆!为国防航天而生,高文王海峰刘挺等AI大牛都是校友

    贾浩楠 发自 凹非寺 量子位 报道 | 公众号 QbitAI "规格严格,功夫到家." 秉持上述校训,6月7日,哈尔滨工业大学,迎来百年校庆. 作为国内理工科名校,哈工大诞生于风雨 ...

  10. 黄铁军、沈向洋、王海峰入选,中国工程院21年院士增选有效候选人名单公布...

    来源 :中国工程院 编辑:AI科技评论 经中国工程院主席团审议,确定2021年院士增选有效候选人577位,根据<中国工程院院士增选工作实施办法>,现予公布. 中国工程院  2021年4月2 ...

最新文章

  1. C#开发微信门户及应用(10)--在管理系统中同步微信用户分组信息
  2. 【Linux】 任务调度/计划 cron
  3. linux fedora35 zsh oh-my-zsh 的配置与使用
  4. 深入理解 JVM Class文件格式(四)
  5. 将可见的电子签名添加到PDF
  6. 休眠自动提交命令强制MySQL在过多的磁盘I / O中运行
  7. oracle只读事物,oracle的只读事务
  8. C# WinForm开发系列 - 开篇
  9. 如何通过索引从列表中删除元素?
  10. mysql 主从特性_mysql 5.6 新特性 主从推延
  11. 使用读写锁实现同步数据访问
  12. php结合nginx,mysql
  13. 华为终端云服务赋能“智能座舱”,打造出行场景的“超级终端”
  14. Android自定义View实战:影院在线选座
  15. 阿里巴巴早期发展简史
  16. 调用企业微信接口发送微信消息
  17. bzoj 4568 [Scoi2016]幸运数字
  18. 45.更新一下scrapy爬取工商信息爬虫代码
  19. 浅谈TPM设备管理系统、推行要素和目的
  20. 关于赴日IT软件开发

热门文章

  1. win7 修复计算机无法进入系统,win7系统下启动修复无法正常进入系统的解决方法...
  2. sql 开发html,uap开发sql
  3. Jungle Roads丛林道路(最小生成树PrimKruskal算法)
  4. php中电话号码输入框,php中固定电话号码和手机号码正则表达式验证
  5. MRS IoTDB时序数据库的总体架构设计与实现
  6. 马云谈教师惩戒权:没有惩戒,就如让老师开一辆没刹车的汽车
  7. Python 60 天 + 450 题,倾情奉献
  8. “燕云十六将”之Jerry葛涵涛
  9. 西汉姆VS利物浦,铁锤『拳』出击,打回原『菱』形
  10. 漫谈一条SQL语句的一生