NOTE: PLEASE EMAIL ME IF YOU WANT ANY COPY OF THESE PAPERS BUT CAN'T FIND IT ONLINE AT OTHER PLACES.
[DBLP]
2013
* Deguang Kong and Guanhua Yan. Discriminant Malware Distance Learning on Structural Information for Automated Malware Classification, Proceedings of the 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'13). (Accepted)
* Milan Bradonjic, Michael Molloy, and Guanhua Yan, Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments, Internet Mathematics. (Accepted)
* Guanhua Yan, Nathan Brown, and Deguang Kong, Exploring Discriminatory Features for Automated Malware Classification, Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'13). (Accepted)
* Deguang Kong and Guanhua Yan. Poster: Discriminant Malware Distance Learning on Structural Information for Automated Malware Classification, ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS'13). (Accepted)
* Nam P. Nguyen, Guanhua Yan, and My T. Thai. Analysis of misinformation containment in online social networks, Elsevier Computer Networks, Special Edition on Towards a Science of Cyber Security (COMNET). (Accepted)
* Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan. Privacy-preserving profile matching for proximity-based mobile social networking. IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Emerging Technologies. (Accepted)
* Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Transactions on Parallel and Distributed Systems (TPDS). (Accepted)
* Md Sazzadur Rahman, Guanhua Yan, Harsha Madhyastha, Michalis Faloutsos, Stephan Eidenbenz, and Mike Fisk. iDispatcher: A Unified Platform for Secure Planet-Scale Information Dissemination, Springer Journal of Peer-to-Peer Networking and Applications (PPNA), 6(1), March 2013.
* Guanhua Yan. Peri-Watchdog: Hunting for Hidden Botnets in the Periphery of Online Social Networks, Elsevier Computer Networks (COMNET), Special Edition on Botnet Activity: Analysis, Detection and Shutdown, 57(2), February 2013.
2012
* Guanhua Yan, Ritchie Lee, Alex Kent, and David Wolpert. Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense, Proceedings of the 19th ACM Computer and Communications Security Conference (CCS'12), October 2012.
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, and Srikanth Krishnamurthy. Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks, IEEE Transactions on Mobile Computing (TMC), 11(7), July 2012.
* Nam P. Nguyen, Guanhua Yan, My T. Thai, and Stephan Eidenbenz. Containment of Misinformation Spread in Online Social Networks, Proceedings of the 4th ACM Web Science (WebSci'12), June 2012.
* Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan. Fine-grained private matching for proximity-based mobile social networking, Proceedings of the 31st IEEE International Conference on Computer Communication (INFOCOM'12), March 2012.
* Lei Liu, Xinwen Zhang, Guanhua Yan, and Songqing Chen. Chrome Extensions: Threat Analysis and Countermeasures, Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS'2012), February, 2012.
* Chrisil Arackaparambil, Guanhua Yan, Sergey Bratus, and Alper Caglayan. On Tuning the Knobs of Distribution-based Methods for Detecting VoIP Covert Channels, Proceedings of Hawaii International Conference on System Sciences (HICSS-45), January 2012.
2011
* Dong Jin, David M. Nicol, and Guanhua Yan. An Event Buffer Flooding Attack against DNP3-Controlled SCADA Systems, Proceedings of the 2011 Winter Simulation Conference (WSC'11), December 2011.
* Guanhua Yan, Songqing Chen, and Stephan Eidenbenz. RatBot: Anti-Enumeration Peer-to-Peer Botnets, Proceedings of the 14th Information Security Conference (ISC'11), October 2011.
* Chrisil Arackaparambil and Guanhua Yan. Wiki-watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens, Proceedings of IEEE/WIC/ACM Web Intelligence (WI'11), August 2011.
* Yuanyuan Zeng, Guanhua Yan, Stephan Eidenbenz, and Kang G. Shin. Measuring the Effectiveness of Infrastructure-Level Detection of Large-Scale Botnets, Proceedings of 19th ACM/IEEE International Workshop on Quality of Service (IWQoS'11), June 2011.
* Guanhua Yan, Duc T. Ha, and Stephan Eidenbenz. AntBot: Anti-Pollution Peer-to-Peer Botnet, Elsevier Computer Networks (COMNET), 55(8), June 2011.
* Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz. Privacy analysis of user association logs in a large-scale wireless LAN, Proceedings of the 30th IEEE Conference on Computer Communications (INFOCOM'11), Mini Conference, April 2011.
* Shiva Kasiviswanathan, Stephan Eidenbenz, and Guanhua Yan. Geography-Based Analysis of the Internet Infrastructure, Proceedings of the 30th IEEE Conference on Computer Communications (INFOCOM'11), Mini Conference, April 2011.
* Guanhua Yan, Guanling Chen, Stephan Eidenbenz, and Nan Li. Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'11), March 2011.
2010
* Nandakishore Santhi, Guanhua Yan, and Stephan Eidenbenz. CyberSim: Geographic, Temporal, and Organizational Dynamics of Malware Propagation, Proceedings of the 2010 Winter Simulation Conference (WSC'10), December 2010.
* Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz. A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network, Proceedings of the 2010 ACM MobiCom Workshop on Wireless of the Students, by the Students, for the Students (S3'10), September 2010.
* Lei Liu, Xinwen Zhang, Guanhua Yan, and Songqing Chen. sePlugin: Towards Transparently Secure Plugins in Your Internet Explorers, Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS'10 -- industrial track), June 2010.
* Guanhua Yan, Stephan Eidenbenz, Sunil Thulasidasan, Pallab Datta, and Venkatesh Ramaswamy. Criticality Analysis of Internet Infrastructure, Elsevier Computer Networks (COMNET), 54(7), May 2010.
* Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. Designing a Better Access Point Association Protocol, Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM'10), March, 2010.
2009
* Bo Sun, Guanhua Yan, Yang Xiao, and T. Andrew Yang. Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, Vol. 7 No. 8, Privacy and Security in Wireless Sensor and Ad Hoc Networks, November 2009.
* Lei Liu, Xinwen Zhang, Guanhua Yan, and Songqing Chen. Exploitation and threat analysis of open mobile devices, Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS'09), October 2009.
* Guanhua Yan, Stephan Eidenbenz, and Emanuele Galli. SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Lei Liu, Guanhua Yan, Xinwen Zhang, and Songqing Chen. VirusMeter: Preventing Your Cellphone from Spies, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, and Nicolas Hengartner. Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Areas, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, and Hung Q. Ngo. On the Effectiveness of Structural Detection and Defense against P2P-based Botnets, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, and Srikanth Krishnamurthy. Detecting Selfish Exploitation of Carrier Sensing in 802.11 WLANs, Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM'09), April 2009.
* Guanhua Yan, Stephan Eidenbenz, and Bo Sun. Mobi-Watchodog: You Can Steal, But You Can't Run!, Proceedings of the Second ACM Conference on Wireless Network Security (WiSec'09), March 2009.
* Guanhua Yan and Stephan Eidenbenz. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version), IEEE Transactions on Mobile Computing (TMC), March 2009.
2008
* Bo Sun, Dibesh Shrestha, Guanhua Yan, and Yang Xiao. Self-propagate Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications, Proceedings of IEEE Global Communications Conference (Globecom'08), December 2008.
* Lei Liu, Songqing Chen, Guanhua Yan, and Zhao Zhang. BotTracer: Execution-Based Bot-Like Malware Detection, Proceedings of the 11th international conference on Information Security (ISC'08), September 2008.
* Guanhua Yan, Songqing Chen, and Stephan Eidenbenz. Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls, Proceedings of the 16th International Workshop on Quality of Service (IWQoS'08), June 2008.
* Bo Sun, Guanhua Yan, and Yang Xiao. Worm Propagation Dynamics in Wireless Sensor Networks, Proceedings of IEEE International Conference on Communications (ICC'08), May 2008.
* Guanhua Yan and Stephan Eidenbenz. DDoS Mitigation in Non-Cooperative Environments, Proceedings of IFIP Networking (Networking'08), May 2008.
* Guanhua Yan, Zhen Xiao, and Stephan Eidenbenz. Catching instant messaging worms with change-point detection techniques, Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), April 2008.
2007
* Guanhua Yan and Stephan Eidenbenz. Modeling Propagation Dynamics of Bluetooth Worms, Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS'07), June 2007.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Hector D. Flores, Nicolas Hengartner, and Vincent Vu. Bluetooth worm propagation: mobility pattern matters!, Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS'07), March 2007.
2006
* Guanhua Yan and Stephan Eidenbenz. Bluetooth Worms: Models, Dynamics, and Defense Implications, Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC'06), December 2006.
* Guanhua Yan and Stephan Eidenbenz. Sluggish Calendar Queues for Network Simulation, Proceedings of the 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'06), September 2006.
* Gabriel Istrate, Anders Hansson, and Guanhua Yan. Packet Reordering Metrics: Some Methodological Considerations, Proceedings of the International conference on Networking and Services (ICNS'06), July 2006. (Best Paper Award)
* David M. Nicol and Guanhua Yan. High-Performance Simulation of Low-Resolution Network Flows, Simulation: Transactions of the Society for Modeling and Simulation International, 82(1), January 2006.
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, and Chris Grier. RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version), Simulation: Transactions of the Society for Modeling and Simulation International, 82(1), January 2006.
2005
* David M. Nicol and Guanhua Yan. Simulation of Network Traffic at Coarse Timescales, Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05), June 2005. (Best paper award)
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, and Chris Grier. RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises, Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05), June 2005.
2004
* David M. Nicol and Guanhua Yan. Discrete event fluid modeling of background TCP traffic, ACM Transactions on Modeling and Computer Simulation (TOMACS), 14(3), July 2004.
2003
* David M. Nicol, Jason Liu, Michael Liljenstam, and Guanhua Yan. Simulation of large-scale networks using SSF, Proceedings of the 35th conference on Winter Simulation (WSC'03), December 2003.