Publications
2025
- Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen,
''Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion
Detection", in the Proc. of Network and Distributed System Security Symposium (NDSS), 2025.
2024
- Jiashui Wang, Ziyi Guo, Xinlei Ying, Peng Qian, and Yan Chen, ``SwFuzz:
Structure-Sensitive WebAssembly Fuzzing", in the Proc. of 31st Asia-Pacific Software Engineering
Conference (APSEC), 2024.
- You Li, Kaiyu Hou, Yunqi He, Yan Chen, and Hai Zhou, ``Property Guided Secure
Configuration Space Search'', in the Proc. of 27th Information Security Conference (ISC), 2024
(34/120=28.3%).
- Presentation Slides
- Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen,
Jundong Xie, and Long Liu, ``Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment'',
in the Proc. of International Symposium on Software Testing and Analysis (ISSTA), 2024.
- Qingyang Zeng, Kaiyu Hou, Xue Leng, and Yan Chen, "DirectFaaS: A Clean-Slate Network
Architecture for Efficient Serverless Chain Communications'',
in the Proc. of ACM Web (WWW) Conference, 2024 (20.2%).
- Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, and Yan Chen, "Decoding
the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World
Environments'', in the Proc. of ACM ASIACCS, 2024.
2023
- Xuechao Du, Xiang Pan, Yinzhi Cao, Boyuan He, Gan Fang, Yan Chen, and
Daigang Xu, FlowCog: Context-aware Semantic Extraction and Analysis of Information
Flow Leaks in Android Apps, in the IEEE Transactions on Mobile Computing (TMC), 22(11), pp. 6460-6476, 2023.
- Se-young Yu, Qingyang Zeng, Jim Chen, Yan Chen, and Joe Mambretti, AIDTN: Towards a Real-Time AI Optimized DTN System with NVMeoF, in the Transactions on Parallel and Distributed Systems (TPDS), 34(6), pp. 1731-1742, 2023
- Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen, Ting Wang, and Yuan Fan, APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts, in IEEE Transactions on Dependable and Secure Computing (TDSC), 20(6): 5247-5264, 2023.
- Qingyang Zeng, Mohammad Kavousi, Yinhong Luo, Ling Jin, and Yan Chen, Full-stack vulnerability analysis of the cloud-native platform, in Elsevier Computers & Security, Volume 129, June 2023.
- Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, and Simone Campanoni, EXGEN:
Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities, in IEEE Transactions on Dependable and Secure Computing (TDSC), 20(1): 650-664, 2023.
2022
- Kaiyu Hou, Sen Lin, Yan Chen, and Vinod Yegneswaran, "QFaaS:
Accelerating and Securing Serverless Cloud Networks with QUIC", in the Proc. of ACM
Symposium on Cloud Computing (SoCC), 2022 (38/155=24.5%).
- Zhenyuan Li, Jun Zeng, Yan Chen and Zhenkai Liang, AttacKG:
Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports, in the
Proc. of ACM European Symposium on Research in Computer Security (ESORICS), 2022.
- Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, and Yan Chen,
AFLIoT: Fuzzing on Linux-based IoT Device with Binary-level Instrumentation, in the
Elsevier Journal of Computer and Security, Volume 122, Nov. 2022.
- Xing Li, Xue Leng; and Yan Chen, Securing Serverless Computing: Challenges, Solutions, and Opportunities, in IEEE Network Magazine, October 2022.
- Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, and Xutong Chen, "CONAN: A Practical Real-time APT Detection System with High Accuracy and Efficiency", in IEEE Transactions on Dependable and Secure Computing (TDSC), 19(1): 551-565, 2022.
- Runqing Yang, Xutong Chen, Haitao Xu, Yueqiang Cheng, Chunlin
Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, and
Yan Chen, RATScope:
Recording and Reconstructing Missing RAT Attacks for Forensic
Analysis with Semantics on Windows, in the IEEE
Transactions on Dependable and Secure Computing, 2021.
- Tiantian Zhu, Zhengqiu Weng, Qijie Song, Yuan Chen, Qiang Liu, Yan Chen, Mingqi Lv, and Tieming Chen, “EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment”, in IEEE Transactions on Mobile Computing (TMC), 21(2): 555-572, 2022.
2021
- Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen, Threat
Detection and Investigation with System-level Provenance Graphs: A Survey,
in Elsevier Computers & Security, Volume 106, 2021.
- Mohammad Kavousi, Runqing Yang, Shiqing Ma, and Yan Chen, SemFlow:
Accurate Semantic Identification from Low-Level System Data, in the Proc. of EAI SecureComm, 2021
- Kaiyu Hou, You Li, Yinbo Yu, Yan Chen, Hai Zhou, Discovering Emergency Call Pitfalls for Cellular Networks with Formal Methods, in the Proc. of ACM 19th
International Conference on Mobile Systems, Applications, and Services (MobiSys), 2021
(36/166 = 21.7%)
- Presentation Slides
- Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, and Vinod
Yegneswaran, CLARION: Sound and Clear Provenance Tracking for Microservice
Deployments, in the Proc. of USENIX Security 2021.
- Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, and Jim Hao Chen, Automatic Policy Generation for
Inter-Service Access Control of Microservices, in the Proc. of USENIX Security 2021.
- Tiantian Zhu, Jiayu Wang, Linqi Ruan, Chunlin Xiong, Jinkai Yu, Yaosheng Li,
Yan Chen, Mingqi Lv, Tieming Chen, "General, Efficient, and
Real-Time Data Compaction Strategy for APT Forensic Analysis", in IEEE Transactions on
Information Forensics and Security, Volume 16, April 2021.
- Tiantian Zhu, Lei Fu, Qiang Liu, Zi Lin, Yan Chen, and Tieming
Chen, One Cycle Attack:
Fool Sensor-Based Personal Gait Authentication With Clustering,
in the IEEE Transactions on Information Forensics and
Security, Vol. 16, December 2021, pg. 553-568.
2020
- Runqing Yang,Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen,
``UISCOPE: Accurate,
Instrumentation-free, and Visible Attack Investigation for GUI
Applications", in the Proc. of NDSS 2020.
- Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing
Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, and Xutong Chen, ``CONAN: A Practical Real-time APT
Detection System with High Accuracy and Efficiency", in
the IEEE Transactions on Dependable and Secure Computing,
Feb. 2020 (officially published in Volume: 19, Issue: 1, 2022).
2019
- Xiaochun Wu, Kaiyu Hou, Xue Leng, Xing li, Yinbo Yu, and Bo
Wu, "State of the Art and Research Challenges in the Security
Technologies of Network Function Virtualization", in the Internet
Computing, Dec. 2019.
- Ling Jin, Boyuan He, Guangyao Weng, Haitao Xu, Yan Chen, and
Guanyu Guo, “MAdLens: Investigating
into Android In-App Ad Practice at API Granularity”, in
the IEEE Transactions on Mobile Computing, Nov. 2019.
- Zhenyuan Li,Qi Alfred Chen,Chunlin Xiong,Yan Chen, Tiantian
Zhu, and Hai Yang, Effective and
Light-Weight Deobfuscation and Semantic-Aware Attack Detection
for PowerShell Scripts, in the Proc. of ACM CCS,
2019. (149/933=16%).
- Yinbo Yu, Xing Li, Kai Bu, Yan Chen, and Jianfeng Yang, Falcon:Differential
Fault Localization for SDN Control Plane, in the Journal
of Computer Networks, Volume 162, October 2019.
- Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, and You Li,
A lightweight policy
enforcement system for resource protection and management in
the SDN-based cloud, in the Journal of Computer
Networks, Volume 161, October 2019, Pages 68-81.
- Fan Dang, Zhenhua Li, Ennan Zhai, Qi Alfred Chen, Tianyin Xu,
Yunhao Liu, Yan Chen, Jingyu Yang, Understanding Fileless Attacks
on Linux-based IoT Systems with HoneyCloud, in the Proc.
of the ACM MobiSys, 2019 (40/172=23%).
- Tiantian Zhu, Zhengyang Qu, Haitao Xu, Jingsi Zhang, Zhengyue
Shao, Yan Chen, Sandeep Prabhakar, Jianfeng Yang, RiskCog:
Unobtrusive Real-time User Authentication on Mobile Devices in
the Wild, in the IEEE Transactions on Mobile
Computing, January 2019.
- Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie
Quan, Thinking inside the Box:
Differential Fault Localization for SDN Control Plane, in
the Proc. of IFIP/IEEE International Symposium on Integrated
Network Management (IM) 2019.
- Presentation Slides
2018
- Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang
Zhang, Kang Cheng, Xin Xiao, ``Fault Management in Software-Defined Networking: A
Survey", in the IEEE Communications Surveys and Tutorials, September 2018.
- Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, and Yan Chen, FlowCog:
Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps, in
the Proc. of USENIX Security, 2018 (100/524=19.1%).
- Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, and Ryan Riley,
``Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface", in the IEEE Transactions on Mobile Computing, Vol. 17, NO. X, 2018.
- Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, SDNKeeper: Lightweight Resource Protection and Management System
for SDN-based Cloud, in the Proc. of IEEE/ACM IWQoS, 2018 (26/125=20.8%).
- Boyuan He, Haitao Xu, Ling Jin, Guanyu Guo, Yan Chen,
Guangyao Weng, An Investigation into Android In-App Ad Practice:
Implications for App Developers, in the Proc. of IEEE INFOCOM 2018
(309/1606=19.2%).
-
Presentation Slides
2017
- Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li,
Xiaolin Chen, Jianfeng Yang, Xue Leng, "RuleScope: Inspecting
Forwarding Faults for Software-Defined Networking",
in ACM/IEEE Transaction on Networking (ToN), Volume 25, Issue 4, 2017.
- Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen
Hu, Qunfeng Dong, Yongqiang Liu, "Towards A Scalable, Fault-Tolerant,
High-Performance Optical Data Center Architecture",
in ACM/IEEE Transaction on Networking (ToN), Volume 25, Issue 4, 2017.
- Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyu Zhou, Hongjun Wang,
Ryan Riley, DyDroid: Measuring Dynamic Code Loading and Its Security
Implications in Android Applications, in IEEE DSN 2017 (49/220=22.3%).
-
Presentation Slides
2016
- Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok Choudhary, "Beating the Artificial Chaos: Fighting OSN Spam Using Its Own
Templates", in ACM/IEEE Transaction on Networking (ToN), Volume 24, Issue 6, 2016.
- Shahid Alam, Zhengyang Qu, Ryan Riley, Vaibhav Rastogi, and Yan Chen,
DroidNative : automating and optimizing detection of android native code malware variants, in the Elsevier
Journal of Computers and Security, November 2016.
- Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou, CSPAutoGen: Black-box Enforcement of Content Security, in the
Proc. of ACM CCS, 2016 (137/831=16.5%).
-
Presentation Slides
-
Demo
- Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen and Wangjun Hong,
AppShield: Enabling Multi-entity Access Control Cross
Platforms for Mobile App Management, in the Proc. of Securecomm, Oct.
2016 (32/137=23.3%).
-
Presentation Slides
- Xitao Wen, Bo Yang, Yan Chen, Chengchen Hu, Yi Wang, Bin Liu, Xiaolin Chen, SDNShield: Reconciliating Configurable Application Permissions for SDN App
Markets, in the Proc. of IEEE/IFIP DSN, August 2016 (58/259 = 22.4%)
-
Presentation Slides
- Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu,
RuleTris: Minimizing Rule Update Latency for TCAM-based SDN
Switches, in the Proc. of IEEE ICDCS, June 2016 (68/386 = 17.6%).
-
Presentation Slides
- Won the Best Paper Runner-up Award!
- Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Is Every Flow on The Right Track?: Inspect SDN Forwarding with
RuleScope, in the Proc. of IEEE INFOCOM, 2016 (300/1644=18%).
-
Presentation Slides
-
- Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley, Are These Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces,
in the Proc. of the Network and Distributed System Security Symposium (NDSS), 2016.
-
Presentation Slides
- Featured in ScienceDaily, Sciencecodex, Northwestern
McComick News, air cast on KCSN Latin Alternative.
- Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phil Porras, Shalini
Ghosh, Haixin Duan, "Reexamining DNS From a Global Recursive Resolver Perspective", in
ACM/IEEE Transaction on Networking (ToN), Vol 24, No. 1, pp. 43-57, 2016.
2015
- Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, and
Yan Chen, Uranine: Real-time Privacy Leakage Monitoring without System
Modification for Android, in the Proc. of International Conference on Security
and Privacy in Communication Networks (SECURECOMM), 2015 (30/108=28%).
-
Presentation PowerPoint
- Yinzhi Cao, Xiang Pan, and Yan Chen, SafePay: Protecting against
Credit Card Forgery with Existing Magnetic Card Readers, in the Proc. of the IEEE Conference on Communications and Network Security (CNS), 2015 (48/171=28%).
-
Presentation PowerPoint
- Won the Best Paper Award
- Featured in CCTV-America and over 30 news periodicals, such as: NSF Science360 News, Yahoo! News, ScienceDaily, Tech News Today, Times Today News, and The Economics Times.
View a more extensive list of publications
-
Boyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V.N.
Venkatakrishnan, Runqing Yang and Zhenrui Zhang, Vetting SSL Usage in Applications with
SSLINT,
in the Proc. of IEEE Symposium on Security and Privacy (Oakland),
2015 (55/402=13.7%).
-
Presentation PowerPoint,
Presentation PowerPoint in Chinese
-
Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Qunfeng Dong, WaveCube: A Scalable,
Fault-Tolerant, High-Performance Optical Data Center
Architecture, in the Proc. of IEEE Infocom, 2015
(316/1640=19%).
-
Xiang Pan, Yinzhi Cao, and Yan Chen, I Do Not Know What You
Visited Last
Summer - Protecting users from third-party web tracking with
TrackingFree
browser,
in the Proc. of Internet Society NDSS Symposium, 2015
(50/313 = 15.9%).
-
Presentation PowerPoint
-
Yinzhi Cao, Yanick Fratantonio, Manuel Egele, Antonio Bianchi,
Christopher Kruegel,
Giovanni Vigna, Yan Chen, EdgeMiner: Automatically
Detecting
Implicit Control Flow Transitions through the Android
Framework,
in the Proc. of Internet Society NDSS Symposium, 2015
(50/313 = 15.9%).
- Data and source code can be downloaded here.
2014
-
Yinzhi Cao, Xiang Pan, Yan Chen and Jianwei Zhuge, JShield: Towards Real-time and
Vulnerability-based Detection of Polluted Drive-by Download
Attacks, in the Proc. of Annual
Computer Security Applications Conference (ACSAC), 2014
(19.9%).
-
Presentation PowerPoint
- Adopted by Huawei, the world’s largest telecommunication equipment maker, in their
high-end Web Firewall products.
-
Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee,
Alok Choudhary, Spam
ain't as Diverse as It Seems: Throttling OSN Spam with
Templates Underneath, in the Proc. of
Annual Computer Security Applications Conference (ACSAC), 2014
(19.9%)
-
Presentation PowerPoint
-
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian
Zhu and Zhong Chen,
AutoCog: Measuring the
Description-to-permission Fidelity in Android
Applications, in the Proc. of ACM CCS, 2014
(114/585=19.5%).
-
Presentation
PowerPoint
-
We released AutoCog
App at Google Play.
-
Shihong Zou, Xitao Wen, Kai Chen, Shan Huang, Yan Chen,
Yongqiang Liu, Yong Xia, Chengchen Hu,
"VirtualKnotter: Online virtual machine shuffling for congestion
resolving in virtualized datacenter",
in Journal of Computer Networks, Vol 67, pp. 141-153,
2014.
-
Yinzhi Cao, Yan Shoshitaishviliz, Kevin Borgoltez, Christopher
Kruegelz,
Giovanni Vignaz, and Yan Chen,
Protecting Web-based Single Sign-on
Protocols against Relying Party,
Impersonation Attacks through a Dedicated Bi-directional
Authenticated
Secure Channel,
in the Proc. of the International Symposium on Research in
Attacks,
Intrusions and Defenses (RAID), 2014 (22/113=19.5%).
-
Presentation PowerPoint
-
Yinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen and Guofei Gu,
Abusing Browser Address
Bar for Fun and Profit - An Empirical Investigation of Add-on
Cross Site Scripting Attacks, in
the Proc. of 10th International Conference on Security and
Privacy in Communication Networks
(SecureComm), 2014.
-
Presentation
PowerPoint
-
Xitao Wen, Chunxiao Diao, Xun Zhao, Yan Chen, Erran Li, Bo Yang,
and Kai Bu, Compiling
Minimum Incremental Update for Modular SDN Languages, full
paper with long presentation, in the
Proc. of ACM SIGCOMM HotSDN Workshop, 2014 (16/114 =
15%).
-
Presentation
PowerPoint
-
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang, Catch Me If You
Can: DroidChameleon: Evaluating Android Anti-malware against
Transformation Attacks, in IEEE Transactions on
Information
Forensics & Security, Vol. 9, No. 1, pp.99-108, 2014.
-
Kai Chen, David Choffnes, Rahul Potharaju, Yan Chen, Fabian
Bustamante, Dan Pei, Yao Zhao, Where the Sidewalk Ends:
Extending the
Internet AS Graph Using Traceroutes From P2P Users, in IEEE
Transactions
on Computers (TC), Vol. 63, No. 4, pp. 1021-1036, 2014.
- Chengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen, Yan Chen, and Yu
Cheng, Discount Counting for Fast
Flow Statistics on Flow Size and Flow Volume, in ACM/IEEE
Transaction on Networking
(ToN), Volume 22, Number 3, 2014.
-
Kai Chen, Ankit Singla, Atul Singh, Kishore Ramachandran, Lei
Xu, Yueping Zhang, Xitao Wen, Yan Chen,
OSA: An Optical Switching
Architecture for Data Center Networks with
Unprecedented Flexibility, IEEE/ACM Transactions on
Networking (ToN), Volume 22, Number 2,
April 2014.
2013
- Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phil Porras, Shalini
Ghosh, Jian Jiang,
Haixin Duan, An Empirical
Reexamination of Global DNS
Behavior, in the Proc. of ACM SIGCOMM, 2013
(38/240=15.8%)..
-
Presentation
PowerPoint
- Xitao Wen, Yan Chen, Chengchen Hu, Chao Shi, Yi Wang, Towards A Secure
Controller Platform for OpenFlow Applications, Short
Paper, in the Proc. of ACM SIGCOMM HotSDN
Workshop, 2013((24+16)/84=47.6%).
-
Poster
PowerPoint
-
Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, and Alex
Moshchuk,
Redefining Web Browser
Principals with a Configurable Origin Policy, in the Proc.
of
The IEEE/IFIP International Conference on Dependable Systems
and Network -
Dependable Computing and Communications Symposium (DSN - DCCS),
2013 (21/107=19.6%).
-
Presentation
PowerPoint
- Vaibhav Rastogi, Yan Chen, and Xuxian Jiang, DroidChameleon: Evaluating Android
Anti-malware against
Transformation Attacks, Short Paper, in the Proc. of
the 8th ACM Symposium on Information, Computer and
Communications Security (ASIACCS), 2013
((35+26)/216=28.2%).
-
Presentation
PowerPoint
-
This research was featured in Dark
Reading, Information
Week, The
H, heise
Security, Security
Week, Slashdot,
Help
Net Security, ISS
Source, EFY
Times, Tech
News
Daily, Fudzilla,
VirusFreePhone,
McCormick
Northwestern
News, ScienceDaily,
and
Wall
Street
Journal.
-
Released malware samples to several security companies such
as Lookout, AVG, NQ Mobile, and
McAfee and numerous researchers over the world.
-
Vaibhav Rastogi, Yan Chen, and William Enck,
AppsPlayground: Automatic Security Analysis of Smartphone
Applications,
in the Proc. of
Third ACM Conference on Data and Application Security and
Privcy
(CODASPY), 2013 (24/107=22%).
-
Presentation
PowerPoint, Demo
Video, and System
Release.
2012
-
Yao Zhao, Yinzhi Cao, Yan Chen, Ming Zhang, and Anup Goyal,
Rake: Semantics Assisted
Network-based
Tracing Framework,
in IEEE Transactions on Network and Service Management,
Vol. 9, No. 4, 2012.
-
Huichen Dai, Bin Liu, Yan Chen, and Yi Wang, On Pending Interest Table in
Named Data Networking, in the Proc. of ACM Symposium
on Architectures for
Networking and Communications Systems (ANCS), 2012
(18/64=28%).
-
Presentation PowerPoint
-
Chengchen Hu, Kai Chen, Yan Chen, Gao Xia, Bin Liu, Thanos
Vasilakos, A Measurement
Study on Potential Inter-Domain Routing Diversity, in IEEE
Transactions on
Network and Service Management, Vol. 9, No. 3, pp.
268-278, 2012.
-
Xitao Wen, Kai Chen, Yan Chen, Yongqiang Liu, Yong Xia, and
Chengchen Hu,
VirtualKnotter:
Online Virtual Machine
Shuffling for Congestion Resolving in Virtualized Datacenter,
in the Proc. of IEEE ICDCS, 2012 (71/515=13%).
-
Presentation
PowerPoint
-
Yi Wang, Keqiang He, Huichen Dai, Wei Meng, Junchen Jiang, Bin
Liu, and Yan Chen,
Scalable Name Lookup in NDN
Using Effective Name
Component Encoding,
in the Proc. of IEEE ICDCS, 2012 (71/515=13%).
-
Presentation
PowerPoint
-
Xingyu Ma, Chengchen Hu, Kai Chen, Che Zhang, Hongtao Zhang, Kai
Zheng, Yan Chen, and Xianda
Sun, Error Tolerant
Address Configuration for Data
Center Networks with Malfunctioning Devices,
in the Proc. of IEEE ICDCS, 2012 (71/515=13%).
-
Presentation
PowerPoint
-
Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Xitao Wen, and Yan
Chen, Virtual
Browser: a Virtualized Browser to Sandbox Third-party
JavaScripts with
Enhanced Security, full paper, in the Proc. of ACM
ASIACCS, 2012 (35/159=22%).
-
Presentation
PowerPoint
-
Kai Chen, Ankit Singla, Atul Singh, Kishore Ramachandran, Lei
Xu, Yueping Zhang, Xitao
Wen, and Yan Chen, OSA: An Optical
Switching Architecture for Data Center Networks with
Unprecedented Flexibility, in the Proc. of ACM/USNEIX
NSDI, 2012 (30/169=17.8%).
-
Presentation
PowerPoint
-
Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok
Choudhary,
Towards Online Spam Filtering
in Social Networks, in the Proc. of 19th Network &
Distributed System Security Symposium
(NDSS), 2012 (46/258=17.8%).
-
Presentation
PowerPoint
-
Yinzhi Cao, Vinod Yegneswaran, Phillip Porras and Yan Chen,
PathCutter: Severing the
Self-Propagation Path of XSS JavaScript Worms in Social Web
Networks, in the Proc. of 19th Network &
Distributed System Security Symposium
(NDSS), 2012 (46/258=17.8%).
-
Presentation
PowerPoint
-
Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng,
Yan Chen, Songwu Lu,
Wenfei Wu, DAC: Generic and
Automatic Address Configuration
for Data Center Networks, in ACM/IEEE Transaction on
Networking (ToN), Volume 20,
Number 1, 2012.
2011
-
Chengchen Hu, Bin Liu, Sheng Wang, Jia Tian, Yu Cheng, and Yan
Chen, Adaptive Non-Linear Sampling
Method for Accurate Flow
Size Measurement, IEEE Transactions on Communications,
2011.
-
Kai Chen, Chengchen Hu, Xin Zhang, Kai Zheng, Yan Chen, and
Athanasios V. Vasilakos, Survey
on Routing in Data Centers:
Insights and Future, in IEEE Network magazine -
Special
Issue on Cloud Computing, Volume 25, No. 4, July/August
2011, pp.6-10.
-
Yao Zhao, Yinzhi Cao, Anup Goyal, Yan Chen, and Ming Zhang, Rake: Semantics Assisted
Network-based Tracing Framework, in the Proc. of IEEE/ACM
IWQoS, 2011 (23/80=28.8%).
-
Presentation PowerPoint
-
Zhichun Li, Anup Goyal, Yan Chen, and Vern Paxson, Towards
Situational Awareness of Large-scale Botnet Probing, in
IEEE Transactions on Information Forensics & Security,
Vol. 6, Issue 1, pp. 175-188, 2011.
-
Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang and Yan Chen,
Security Issues in
Online Social Networks, in IEEE Internet Computing, Volume
15, No. 4, July/August, 2011,
pp. 56-63.
-
Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin
Liu, Clint Sbisa,
WebShield: Enabling Various Web
Defense Techniques
without Client Side Modifications, in
the Proc. of 18th Network & Distributed System Security
Symposium (NDSS),
2011 (28/139=20%).
-
Presentation
PowerPoint
2010
-
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and
Ben Y. Zhao, Detecting and
Characterizing Social Spam
Campaigns, in
the Proc. of ACM SIGCOMM IMC 2010 (47/211=22.3%).
-
Presentation
PowerPoint
-
This research was featured in Wall
Street
Journal, MIT
Technology
Review, ACM
Tech
News, and the
McCormick
Magazine.
-
Zhichun Li, Gao Xia, Hongyu Gao, Tang Yi, Yan Chen, Bin Liu,
Junchen Jiang, and Yuezhou Lv,
NetShield: Massive
Semantics-based
Vulnerability Signature Matching for High-speed Networks,
in the Proc. of ACM SIGCOMM 2010 (33/276=12%).
-
Presentation
PowerPoint
-
The prototype and sample vulnerability signatures are
available at www.nshield.org.
-
Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng,
Yan Chen, Songwu Lu, Wenfei Wu,
Generic and Automatic Address
Configuration for Data Center Networks,
in the Proc. of ACM SIGCOMM 2010 (33/276=12%). Selected
as one of
three best papers for fast track to ACM/IEEE ToN.
-
Presentation
PowerPoint
-
Zhichun Li, Yan Gao, and Yan Chen, HiFIND: A high-speed
flow-level intrusion detection approach with DoS resiliency,
Journal of Computer Networks, Volume 54, Issue 8, June 2010.
- Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert
Greenberg, and Yi-Min Wang,
WebProphet: Automating Performance Prediction for Web Services,
in the Proc. of ACM/USENIX NSDI 2010 (29/175=16.6%).
-
Presentation PowerPoint
- Chengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen and Yan Chen, DISCO:
Memory Efficient and Accurate Flow Statistics for Network
Measurement,
in the Proc. of IEEE ICDCS, 2010 (84/585=14.4%).
- Zhichun Li, Anup Goyal, Yan Chen, and Aleksandar Kuzmanovic, Measurement and Diagnosis of
Address Misconfigured P2P Traffic, in the Proc. of IEEE
INFOCOM (main conference), 2010 (276/1575 = 17.5%)
-
Presentation
PowerPoint
- Chengchen Hu, Kai Chen, Yan Chen and Bin Liu, Evaluating Potential Routing
Diversity for
Internet Failure Recovery, in the Proc. of IEEE
INFOCOM (mini conference), 2010 (276+106/1575 = 24.3%)
-
Presentation
PowerPoint
- Lanjia Wang, Zhichun Li, Yan Chen, Zhi (Judy) Fu, and Xing Li,
Thwarting Zero-Day Polymorphic
Worms With Network-Level Length-Based Signature Generation,
in ACM/IEEE Transaction on Networking
(ToN), Volume 18, Issue 1, 2010.
- Guohan Lu, Yan Chen, Stefan Birrer, Fabian E. Bustamante, and
Xing Li,
POPI: A User-level Tool for
Inferring Router Packet Forwarding
Priority, in ACM/IEEE Transaction on Networking (ToN),
Volume 18, Issue 1, 2010.
2009
- Yao Zhao, Yan Chen, and David Bindel, Towards Unbiased End-to-End
Network
Diagnosis,
in ACM/IEEE Transaction on Networking (ToN), Volume 17,
Number 6, Dec. 2009.
- Kai Chen, David R. Choffnes, Rahul Potharaju, Yan Chen, Fabian
E. Bustamante, Dan Pei,
Yao Zhao, Where the Sidewalk
Ends: Extending the Internet AS
Graph Using Traceroutes From P2P Users, in the Proc. of the
Fifth ACM International Conference on emerging Networking
Experiments
and Technologies (CoNEXT), 2009 (29/170=17%).
-
Presentation
PowerPoint
- Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bin Liu, On the Eyeshots of BGP Vantage Points,
IEEE Global Communications Conference (GLOBECOM), November 2009.
- Zhaosheng Zhu, Vinod Yegneswaran, and Yan Chen, Using
Failure Information Analysis to Detect Enterprise Zombies,
full paper, in the Proc. of the International
Conference on Security
and Privacy in Communication Networks (SecureComm),
2009 (19/75 =25.3%).
-
Presentation PowerPoint
- Yao Zhao and Yan Chen, FAD
and SPA: End-to-end Link-level Loss
Rate Inference without Infrastructure, in the Journal
of
Computer Networks, 53(9): 1303-1318, 2009.
- Yao Zhao and Yan Chen, "Algebraic Approaches for Scalable
End-to-End Monitoring and
Diagnosis", invited book chapter for Algorithms
for Next
Generation Network Architecture, Springer,
2009. ISBN: 978-1-84882-764-6.
- Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou and
Zhi (Judy) Fu,
Exception
Triggered DoS Attacks on Wireless Networks, in the Proc.
of
the 39th IEEE/IFIP
International
Conference on Dependable Systems and Networks (DSN-DCCS),
2009
(37/177 = 21%).
-
Presentation PowerPoint
- Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen,
and Eliot
Gillum, BotGraph:
Large
Scale Spamming Botnet Detection, in the Proc. of the 6th USENIX
Symposium on Networked Systems Design and Implementation
(NSDI) 2009 (32/162=20%).
-
Presentation
PowerPoint
- Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, and Jia Wang, Towards Efficient
Large-Scale VPN Monitoring and Diagnosis under Operational
Constraints, IEEE INFOCOM (main
conference),
2009 (282/1435=20%).
A full version can be found in the technique report NWU-EECS-08-06.
-
Presentation PowerPoint
- Zhichun Li, Anup Goyal, Yan Chen, and Vern Paxson, Automating Analysis of Large-Scale
Botnet Probing Events, in the Proc. of ACM
Symposium on Information, Computer and
Communications Security (ASIACCS), 2009
(33/147=22.4%).
-
Presentation
PowerPoint
2008
- Leiwen Deng, Yan Gao, Yan Chen, and Alexsander Kuzmanovic,
Pollution
Attacks and Defenses for Internet
Caching Systems, in Journal of Computer Networks, Volume
52, Issue 5, 2008.
- Yao Zhao, Yan Chen, and Sylvia Ratnasamy,
Load balanced and Efficient
Hierarchical Data-Centric Storage
in Sensor Networks,
in the Proc. of
the fifth IEEE Conference on Sensor, Mesh and Ad Hoc
Communications and Networks (SECON),
2008 (64/300=21.3%).
-
Presentation
PowerPoint
- Yan Chen, Dynamic, Scalable, and
Efficient Content
Replication Techniques, invited book chapter for Content Delivery
Networks: Principles and
Paradigms, Springer, 2008.
- Chengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Cheng, and Yan
Chen, Accurate and Efficient
Traffic Monitoring Using Adaptive Non-linear Sampling Method,
in
the Proc. of IEEE
INFOCOM,
2008
(236/1160=20%).
-
Presentation
PowerPoint
- Zhichun Li, Anup Goyal, and Yan Chen, Honeynet-based
Botnet Scan Traffic Analysis, invited book
chapter for Botnet
Detection:
Countering the Largest Security Threat, Springer, 2008.
2007
-
Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Anup Gupta,
Elliot Pearson, Yin Zhang, Peter Dinda, Ming-Yang Kao, and Gokan
Memik,
Reversible Sketches:
Enabling Monitoring and Analysis over High-speed
Data Streams, in ACM/IEEE Transaction on Networking,
Volume 15, Issue 5, Oct. 2007.
-
Y. Chen, D. Bindel, H. Song, B. Chavez, and R. H. Katz,
An Algebraic Approach for Scalable
Overlay Network Monitoring: Algorithms, Evaluation, and
Applications, in ACM/IEEE Transaction on Networking,
Volume 15, Issue 5, Oct. 2007.
- Zhichun Li, Lanjia Wang, Yan Chen and Zhi Fu,
Network-based and
Attack-resilient Length Signature Generation for Zero-day
Polymorphic Worms, in the Proc. of the 15th IEEE
International
Conference on Network Protocols (ICNP), 2007(32/220=14%).
-
Presentation
PowerPoint
- Ehab Al-Shaer and Yan Chen, Integrated Fault and
Security Management, invited book
chapter for Information
Assurance:
Dependability and Security in Networked Systems,
Morgan Kaufmann Publishers, 2007.
-
Yan Gao, Yao Zhao, Robert Schweller, Shobha Venkataraman, Yan
Chen, Dawn Song, and Ming-Yang
Kao, Detecting Stealthy Spreaders
Using Online
Outdegree Histograms, in the Proc. of the 15th IEEE
International Workshop on Quality of Service (IWQoS), 2007
(17/64=26.6%).
-
Presentation PowerPoint
-
Yao Zhao and Yan Chen,
A
Suite of Schemes for User-level Network Diagnosis
without Infrastructure,
in the Proc. of IEEE
INFOCOM,
2007 (252/1400=18%). Full version is in the tech
report.
-
Presentation
PowerPoint
-
Guohan Lu, Yan Chen, Stefan Birrer, Fabian E. Bustamante, Chi
Yin Cheung and Xing Li,
End-to-end Inference of Router Packet Forwarding Priority,
in the Proc. of IEEE
INFOCOM,
2007 (252/1400=18%). The POPI tool is available here.
-
Presentation
PowerPoint
-
Yao Zhao, Yan Chen, Bo Li, and Qian Zhang,
Hop ID: A Virtual Coordinate based Routing for Sparse Mobile Ad Hoc Networks,
in IEEE Transaction on Mobile Computing, Volume 6, Number 9,
September 2007.
2006
-
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen,
Internet Cache Pollution Attacks and
Countermeasures,
in Proc. of the
14th IEEE International
Conference on Network Protocols (ICNP), Nov. 2006
(33/232=14%).
-
Presentation PowerPoint
-
Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Zhi Fu, and
Hai Zhou,
Automatic Vulnerability Checking of
IEEE 802.16 WiMAX
Protocols through TLA+,
in Proc. of the
Second Workshop on
Secure Network Protocols (NPSec), co-located with
ICNP 2006 (7/21 = 33%).
-
Presentation PowerPoint
-
Yao Zhao, Yan Chen, and David Bindel,
Towards Unbiased End-to-End
Network Diagnosis, in Proc. of
ACM SIGCOMM
2006
(37/340=10%).
-
Presentation
PowerPoint
-
Zhichun Li, Yan Chen, and Aaron Beach,
Towards Scalable and Robust
Distributed Intrusion Alert
Fusion with Good Load Balancing,
in Proc. of ACM
SIGCOMM Workshop on
Large-Scale Attack Defense 2006(11/33=33%).
-
Presentation PowerPoint
-
Y. Gao, Z. Li, and Y. Chen,
A DoS Resilient Flow-level
Intrusion Detection Approach for High-speed
Networks, in the Proc. of IEEE International
Conference on
Distributed Computing Systems (ICDCS), 2006
(75/536=14%).
-
Presentation PowerPoint
-
Y. Zhao, Y. Chen, and D. Bindel,
Towards Deterministic Overlay Diagnosis,
poster paper in
ACM
SIGMETRICS/Performance
2006, (30 full + 17 poster papers out of 217
(14-22%))
-
Z. Li, M. Sanghi, Y. Chen, M. Kao, and B. Chavez,
Hamsa: Fast Signature Generation for Zero-day Polymorphic
Worms with Provable
Attack Resilience, full paper, in Proc. of IEEE
Symposium on Security and
Privacy, 2006 (23/251=9%).
-
Presentation
PowerPoint
-
R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P.
Dinda, M. Kao, and G. Memik,
Reverse Hashing for High-speed Network Monitoring: Algorithms,
Evaluation, and
Applications, Proc. of IEEE INFOCOM,
2006 (252/1400=18%).
-
Presentation
PowerPoint
-
Pin Ren, Yan Gao, Zhichun Li, Yan Chen and Ben Watson,
IDGraphs:
Intrusion Detection and Analysis Using Stream Compositing,
in IEEE Computer Graphics &
Applications, special issue on Visualization for Cyber Security,
Volume 26, Number 2, March/April, 2006.
2005
-
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, and Wenwu Zhu,
Efficient HopID based Routing for Sparse Ad Hoc Networks,
Proc. of the 13th IEEE
International
Conference on Network Protocols (ICNP), Boston, Nov.
2005
(36/212=17%).
-
Presentation
PowerPoint
-
G. Lu, X. Li and Y. Chen, An
End-to-end Approach to Infer
Priority Settings on Routers, Proc. of the 12th
China Education and Research Network Conference (CERNET),
Nov. 2005.
-
Pin Ren, Yan Gao, Zhichun Li, Yan Chen and Ben Watson,
IDGraphs: Intrusion Detection and
Analysis Using
Histographs,
Proc. of the
IEEE Workshop on Visualization
for Computer Security (VizSEC), in conjunction with
Visualization 2005
and InfoVis 2005
conferences, Oct. 2005.
-
Y. Chen, Z. Xu and C. Zhai,
A Scalable Semantic Indexing
Framework for Peer-to-Peer
Information Retrieval,
Proc. of
ACM SIGIR Workshop on Heterogeneous and Distributed
Information Retrieval
, Aug. 2005.
-
Presentation PowerPoint
-
Y. Zhao, Y. Chen, and D. Bindel,
Scalable and Deterministic Overlay Network Diagnosis,
poster in ACM SIGCOMM,
Aug., 2005.
-
Z. Li, Y. Gao, and Y. Chen,
Towards a High-speed Router-based Anomaly/Intrusion Detection
System,
poster in ACM SIGCOMM,
Aug., 2005.
Also, Work in Progress talk
with the same title at USENIX
Security
Symposium, Aug. 2005.
2004
-
R. Schweller, A. Gupta, E. Parsons, and Y. Chen,
Reversible Sketches for Efficient and
Accurate Change
Detection over Network Data Streams,
in ACM
SIGCOMM Internet
Measurement Conference (IMC), 2004 (ps) (39/157=25%).
-
Presentation slides
-
Y. Chen, D. Bindel, H. Song, and R. H. Katz,
An Algebraic Approach to
Practical and Scalable Overlay Network Monitoring,
in Proceedings of ACM SIGCOMM,
2004 (ps) (31/340 =9%).
-
Presentation
slides
-
Source code is available upon request.
2003
-
My Ph.D. thesis Towards a
Scalable, Adaptive and
Network-aware Content Distribution Network, Nov. 2003,
also appear as
Tech Report UCB//CSD-03-1295.
-
Y. Chen, D. Bindel, and R. H. Katz,
Tomography-based Overlay Network Monitoring,
poster in ACM
SIGCOMM, 2003.
Abstract of the poster
in ACM
Computer Communication Review(CCR), 2004.
-
Y. Chen, D. Bindel, and R. H. Katz,
Tomography-based Overlay Network Monitoring,
Proceedings of ACM
SIGCOMM Internet Measurement Conference (IMC), 2003
(ps).
-
Talk slides at HP Lab, ICIR, IMC conference.
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen,
Sketch-based Change Detection: Methods, Evaluation, and
Applications,
Proceedings of ACM
SIGCOMM Internet Measurement Conference (IMC), 2003
(ps).
-
Y. Chen, L. Qiu, W. Chen, L. Nguyen and R. H.
Katz,
Efficient and Adaptive Web Replication using Content
Clustering,
in IEEE
Journal on Selected Areas in Communications (J-SAC), Special
Issue on Internet and WWW Measurement, Mapping, and Modeling,
Aug., 2003.
2002
-
Y. Chen, L. Qiu, W. Chen, L. Nguyen and R. H.
Katz,
Clustering Web Content for Efficient Replication,
Proceeding of the 10th IEEE
International Conference on Network Protocols (ICNP),
Paris, France, Nov. 2002.
-
Presentation PowerPoint
-
Y. Chen, R. H. Katz and J. D. Kubiatowicz,
SCAN: a Dynamic Scalable and Efficient Content Distribution Network,
Proceeding of the First International Conference on
Pervasive Computing, Zurich, Switzerland, Aug. 2002.
-
Presentation PowerPoint
-
B. Raman, S. Agarwal, Y. Chen, M. Caesar, W. Cui, P. Johansson, K. Lai, T. Lavian, S. Machiraju, Z. M. Mao, G. Porter, T. Roscoe, M. Seshadri, J. Shih, K. Sklower, L. Subramanian, T. Suzuki, S. Zhuang, A. D. Joseph, R. H. Katz, and I. Stoica,
The SAHARA Model for Service Composition Across Multiple Providers
(ps file), invited paper,
Proceeding of the First International Conference on
Pervasive Computing (PERVASIVE), Zurich, Switzerland, Aug. 2002.
-
Y. Chen, K. Lim, C. Overton and R. H. Katz,
On the Stability of Network Distance Estimation,
Proceeding of
ACM SIGMETRICS Practical Aspects of Performance Analysis Workshop (PAPA 2002)
selected to be published>
in ACM SIGMETRICS Performance Evaluation Review (PER), September issue, 2002.
-
Y. Chen, C. Overton and R. H. Katz,
Internet Iso-bar: A Scalable Overlay Distance Monitoring System,
in Journal of Computer Resource Management, Computer Measurement Group, Spring Edition, 2002.
-
Y. Chen, R. H. Katz and J. Kubiatowicz,
Dynamic Replica Placement for Scalable Content Delivery,
Proceeding of 1st International Workshop on Peer-to-Peer Systems (IPTPS'02),
Boston, Mar. 2002.
-
Presentation PowerPointShow
2001
2000
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels,
R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao,
OceanStore: An Architecture for Global-Scale Persistent Storage
,
Proceedings of ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Boston, MA, Oct. 2000.
1998
-
Y. Chen, Q.Zhu, A. Kaufman, "Physically-based Animation of Volumetric Objects",
Proceeding of IEEE Computer Animation , 1998, pp. 154-160.
-
Q. Zhu, Y. Chen, A. Kaufman, "Real-time Biomechanically-based Muscle Volume Deformation using FEM",
Journal of Computer Graphics Forum,, 1998, pp. C275-C284.
1996
-
Y. Chen, Z. Pan, J. Shi,
"Analysis of PVM Structure",
Computer Engineering & Application (Chinese)
Apr., 1996
-
Y. Chen, Z. Pan, J. Shi, "Load Balancing and Parallel Ray Tracing on PVM", Journal of Computer Engineering & Application (Chinese), Apr., 1996, pp. 65-69.
-
Z. Pan, Y. Chen, C. Jiang, J. Shi, "PVM-G: Parallel Graphics Design Environment", Journal of Computer (Chinese)., Vol 19, 1996