default search action
Fang Yu 0002
Person information
- affiliation: Microsoft Research, Mountain View, CA, USA
- affiliation (PhD): University of California, Berkeley, Department of Electrical Engineering and Computer Science, CA, USA
Other persons with the same name
- Fang Yu — disambiguation page
- Fang Yu 0001 — National Chengchi University, Department of Management Information Systems, Taipei City, Taiwan (and 2 more)
- Fang Yu 0003 — Shanghai Maritime University, Institute of Logistics Science & Engineering, China (and 2 more)
- Fang Yu 0004 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (and 1 more)
- Fang Yu 0005 — Arizona State University, Edson College of Nursing and Health Innovation, Phoenix, AZ, USA (and 2 more)
Other persons with a similar name
- Yu-Fang Chen 0001 — Academia Sinica, Institute of Information Science, Taipei, Taiwan (and 2 more)
- Yu-Fang Chung
- Yu Fang — disambiguation page
- Yu-Hui Fang
- Yue Fang
- Yu Fang 0001 — Peking University, School of Earth and Space Sciences, Beijng, China
- Fangyu Liu (aka: Fang-Yu Liu) — disambiguation page
- Fang-Yi Yu — George Mason University, Fairfax, VA, USA (and 1 more)
- Hong-Fang Yu (aka: Hongfang Yu)
- Huifang Yu 0001 (aka: Hui-fang Yu 0001) — Xi'an University of Posts and Telecommunications, School of Communication and Information Engineering, School of Cyberspace Security, China (and 2 more)
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [c27]Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi:
Early security classification of skype users via machine learning. AISec 2013: 35-44 - [c26]Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:
SocialWatch: detection of online service abuse via large-scale social graphs. AsiaCCS 2013: 143-148 - [c25]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013 - [c24]Zhou Li, Sumayah A. Alrwais, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures. IEEE Symposium on Security and Privacy 2013: 112-126 - 2012
- [c23]Chi-Yao Hong, Fang Yu, Yinglian Xie:
Populated IP addresses: classification and applications. CCS 2012: 329-340 - [c22]Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao:
Innocent by association: early recognition of legitimate users. CCS 2012: 353-364 - [c21]Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Knowing your enemy: understanding and detecting malicious web advertising. CCS 2012: 674-686 - [c20]Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS 2012 - 2011
- [c19]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
deSEO: Combating Search-Result Poisoning. USENIX Security Symposium 2011 - [c18]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
Heat-seeking honeypots: design and experience. WWW 2011: 207-216 - 2010
- [c17]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c16]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
On Network-level Clusters for Spam Detection. NDSS 2010 - [c15]Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. IEEE Symposium on Security and Privacy 2010: 207-222 - [c14]John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:
Searching the Searchers with SearchAudit. USENIX Security Symposium 2010: 127-142 - [c13]Fang Yu, Yinglian Xie, Qifa Ke:
SBotMiner: large scale search bot detection. WSDM 2010: 421-430 - [p1]Fang Yu, Yanlei Diao, Randy H. Katz, T. V. Lakshman:
Fast Packet Pattern-Matching Algorithms. Algorithms for Next Generation Networks 2010: 219-238
2000 – 2009
- 2009
- [c12]Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, Eliot Gillum:
BotGraph: Large Scale Spamming Botnet Detection. NSDI 2009: 321-334 - [c11]Yinglian Xie, Fang Yu, Martín Abadi:
De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 - 2008
- [c10]John D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang:
A practical reconfigurable hardware accelerator for Boolean satisfiability solvers. DAC 2008: 780-785 - [c9]John D. Davis, Zhangxi Tan, Fang Yu, Lintao Zhang:
Designing an Efficient Hardware Implication Accelerator for SAT Solving. SAT 2008: 48-62 - [c8]Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov:
Spamming botnets: signatures and characteristics. SIGCOMM 2008: 171-182 - 2007
- [c7]Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moisés Goldszmidt, Ted Wobber:
How dynamic are IP addresses? SIGCOMM 2007: 301-312 - 2006
- [j4]Fang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz:
Efficient Multimatch Packet Classification for Network Security Applications. IEEE J. Sel. Areas Commun. 24(10): 1805-1816 (2006) - [c6]Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, Randy H. Katz:
Fast and memory-efficient regular expression matching for deep packet inspection. ANCS 2006: 93-102 - [c5]Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan S. Turner:
Algorithms to accelerate multiple regular expressions matching for deep packet inspection. SIGCOMM 2006: 339-350 - 2005
- [j3]Fang Yu, Randy H. Katz, T. V. Lakshman:
Efficient Multimatch Packet Classification and Lookup with TCAM. IEEE Micro 25(1): 50-59 (2005) - [c4]Fang Yu, T. V. Lakshman, Martin Austin Motoyama, Randy H. Katz:
SSA: a power and memory efficient scheme to multi-match packet classification. ANCS 2005: 105-113 - 2004
- [c3]Fang Yu, Randy H. Katz:
Efficient multi-match packet classification with TCAM. Hot Interconnects 2004: 28-34 - 2003
- [j2]Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu:
Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. Mob. Networks Appl. 8(4): 427-442 (2003) - [j1]Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang:
QoS-adaptive proxy caching for multimedia streaming over the Internet. IEEE Trans. Circuits Syst. Video Technol. 13(3): 257-269 (2003) - 2002
- [c2]Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Scott Shenker:
GHT: a geographic hash table for data-centric storage. WSNA 2002: 78-87 - 2001
- [c1]Fang Yu, Qian Zhang, Wenwu Zhu, Ya-Qin Zhang:
Network-Adaptive Cache Management Schemes for Mixed Media. IEEE Pacific Rim Conference on Multimedia 2001: 685-692
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint