Swift: a fast dynamic packet filter

Haining Wang , Zhenyu Wu , Mengjun Xie
networked systems design and implementation 279 -292

32
2008
Energy attack on server systems

Haining Wang , Zhenyu Wu , Mengjun Xie
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies 8 -8

10
2011
SUPOR: precise and scalable sensitive user input detection for android apps

Jianjun Huang , Zhichun Li , Xusheng Xiao , Zhenyu Wu
usenix security symposium 977 -992

69
2015
Whispers in the hyper-space: high-speed covert channel attacks in the cloud

Haining Wang , Zhang Xu , Zhenyu Wu
usenix security symposium 9 -9

187
2012
NetDEO: automating network design, evolution, and optimization

Zhenyu Wu , Yueping Zhang , Vishal Singh , Guofei Jiang
international workshop on quality of service 30

2
2012
A measurement study on co-residence threat inside the cloud

Zhang Xu , Haining Wang , Zhenyu Wu ,
usenix security symposium 929 -944

60
2015
Scalable Data Stream Management System for Monitoring System Activities

Xusheng Xiao , Fengyuan Xu , Guofei Jiang , Zhenyu Wu

2016
INTRUSION DETECTION USING EFFICIENT SYSTEM DEPENDENCY ANALYSIS

Zhenyu Wu , LI Zhichun , Jungwhan Rhee , Fengyuan Xu

2
2017
High Fidelity Data Reduction for System Dependency Analysis

Zhenyu Wu , LI Zhichun , Jungwhan Rhee , Fengyuan Xu

1
2017
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection

Xusheng Xiao , Ding Li , Prateek Mittal , Chung Hwan Kim
usenix security symposium 639 -656

84
2018
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs

Kun Sun , Haining Wang , Junghwan Rhee , Kangkook Jee
conference on data and application security and privacy 161 -172

2021
Automating Cloud Network Optimization and Evolution

Zhenyu Wu , Yueping Zhang , Vishal Singh , Guofei Jiang
IEEE Journal on Selected Areas in Communications 31 ( 12) 2620 -2631

6
2013
The effect of groove structure on performance of pneumatic spliced joint

Zhenyu Wu , Binghai Chen , Zhong Xiang , Xudong Hu
Journal of The Textile Institute 109 ( 7) 903 -913

2018
Discover and Tame Long-running Idling Processes in Enterprise Systems

Jun Wang , Zhiyun Qian , Zhichun Li , Zhenyu Wu
computer and communications security 543 -554

2
2015
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis

Yutao Tang , Ding Li , Zhichun Li , Mu Zhang
computer and communications security 1324 -1337

16
2018
Humans and bots in internet chat: measurement, analysis, and automated classification

Steven Gianvecchio , Mengjun Xie , Zhenyu Wu , Haining Wang
IEEE ACM Transactions on Networking 19 ( 5) 1557 -1571

72
2011
Design and implementation of a fast dynamic packet filter

Zhenyu Wu , Mengjun Xie , Haining Wang
IEEE ACM Transactions on Networking 19 ( 5) 1405 -1419

5
2011
High Fidelity Data Reduction for Big Data Security Dependency Analyses

Zhang Xu , Zhenyu Wu , Zhichun Li , Kangkook Jee
computer and communications security 504 -516

122
2016
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting

Kangjie Lu , Zhichun Li , Vasileios P. Kemerlis , Zhenyu Wu
network and distributed system security symposium

61
2015
Towards a Timely Causality Analysis for Enterprise Security.

Prateek Mittal , Yushan Liu , Mu Zhang , Ding Li
network and distributed system security symposium

130
2018