default search action
Yibo Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j9]Dujuan Gu, Jinhe Su, Yibo Xue, Dongsheng Wang, Jun Li, Ze Luo, Baoping Yan:
Modeling IPv6 adoption from biological evolution. Comput. Commun. 158: 166-177 (2020)
2010 – 2019
- 2019
- [c73]Chao Wang, Changchang Zheng, Xiaodan Lyu, Yibo Xue:
A Hybrid Model for Ride-hailing Service Demand Forecasting. CCIOT 2019: 40-47 - 2018
- [c72]Dongfang Li, Zhaoguo Wang, Yibo Xue:
Fine-grained Android Malware Detection based on Deep Learning. CNS 2018: 1-2 - [c71]Dawei Wang, Shuzhuang Zhang, Yibo Xue, Yingfei Dong:
Identifying Influential Factors of CDN Performance with Large-scale Data Analysis. ICNC 2018: 873-877 - [c70]Weiping Yu, Zhaoguo Wang, Yibo Xue, Lingxu Guo, Liyuan Xu:
A Combined Neural and Genetic Algorithm Model for Data Center Temperature Control. CIMA@ICTAI 2018: 58-69 - [c69]Jun Yang, Nan Zhou, Yifan Li, Xueer Xue, Yingfei Dong, Yibo Xue, Jun Li:
Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusion. INFOCOM Workshops 2018: 1-2 - 2017
- [c68]Jun Yang, Zhaoguo Wang, Fangchun Di, Liyue Chen, Chengqi Yi, Yibo Xue, Jun Li:
Propagator or Influencer?: A Data-driven Approach for Evaluating Emotional Effect in Online Information Diffusion. ASONAM 2017: 836-843 - [c67]Dongfang Li, Zhaoguo Wang, Lixin Li, Zhihua Wang, Yucheng Wang, Yibo Xue:
FgDetector: Fine-Grained Android Malware Detection. DSC 2017: 311-318 - [c66]Dujuan Gu, Yibo Xue, Dongsheng Wang, Ze Luo, Baoping Yan:
Improving IPv6 transition management with IPv6 network virtualization. ICAIT 2017: 95-104 - [c65]Dawei Wang, Qingin He, Liping Qian, Yibo Xue, Yingfei Dong:
Understanding IP address multiplexing with large-scale SSL/TLS flow analysis. ICNC 2017: 541-545 - 2016
- [j8]Zhenlong Yuan, Jie Xu, Yibo Xue, Mihaela van der Schaar:
Bits Learning: User-Adjustable Privacy Versus Accuracy in Internet Traffic Classification. IEEE Commun. Lett. 20(4): 704-707 (2016) - [j7]Zhaoguo Wang, Chenglong Li, Zhenlong Yuan, Yi Guan, Yibo Xue:
DroidChain: A novel Android malware detection method based on behavior chains. Pervasive Mob. Comput. 32: 3-14 (2016) - [c64]Min Li, Linfeng Luo, Lin Miao, Yibo Xue, Zhiyun Zhao, Zhenyu Wang:
FriendRank: A personalized approach for tweets ranking in social networks. ASONAM 2016: 896-900 - [c63]Linfeng Luo, Min Li, Qing Wang, Yibo Xue, Chunyang Liu, Zhenyu Wang:
Spiral of silence in social networks: A data-driven approach. ASONAM 2016: 980-984 - [c62]Zhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue, Yingfei Dong:
ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. ICCCN 2016: 1-9 - 2015
- [c61]Yuanyuan Bao, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Implementation of Chaotic Analysis on Retweet Time Series. ASONAM 2015: 1225-1231 - [c60]Zhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue:
DroidChain: A novel malware detection method for Android based on behavior chain. CNS 2015: 727-728 - [c59]Yuanyuan Bao, Wenting Huang, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Effective deployment of monitoring points on social networks. ICNC 2015: 62-66 - [c58]Zhenlong Yuan, Yibo Xue, Mihaela van der Schaar:
BitMiner: Bits Mining in Internet Traffic Classification. SIGCOMM 2015: 93-94 - [c57]Yiyang Shao, Yihang Luo, Xiaohe Hu, Yibo Xue, Yang Xiang, Kevin Yin:
FLAX: A Flexible Architecture for Large Scale Cloud Fabric. SmartCity 2015: 1151-1154 - [p1]Yuanyuan Bao, Chengqi Yi, Yibo Xue, Yingfei Dong:
Precise Modeling Rumor Propagation and Control Strategy on Social Networks. Applications of Social Media and Social Network Analysis 2015: 77-102 - 2014
- [j6]Baohua Yang, Jeffrey Fong, Weirong Jiang, Yibo Xue, Jun Li:
Practical Multituple Packet Classification Using Dynamic Discrete Bit Selection. IEEE Trans. Computers 63(2): 424-434 (2014) - [c56]Chengqi Yi, Yuanyuan Bao, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Cascading failures of social networks under attacks. ASONAM 2014: 679-686 - [c55]Yiyang Shao, Luoshi Zhang, Xiaoxian Chen, Yibo Xue:
Towards time-varying classification based on traffic pattern. CNS 2014: 512-513 - [c54]Zhenlong Yuan, Cuilan Du, Xiaoxian Chen, Dawei Wang, Yibo Xue:
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures. ICNC 2014: 1-5 - [c53]Chengqi Yi, Yuanyuan Bao, Siqi Sun, Yibo Xue:
A novel method for information propagation model perceiving. ICNC 2014: 6-10 - [c52]Yuanyuan Bao, Yan Niu, Chengqi Yi, Yibo Xue:
Effective immunization strategy for rumor propagation based on maximum spanning tree. ICNC 2014: 11-15 - [c51]Dawei Wang, Luoshi Zhang, Zhenlong Yuan, Yibo Xue, Yingfei Dong:
Characterizing Application Behaviors for classifying P2P traffic. ICNC 2014: 21-25 - [c50]Yiyang Shao, Baohua Yang, Jingjie Jiang, Yibo Xue, Jun Li:
Emilie: Enhance the power of traffic identification. ICNC 2014: 31-35 - [c49]Xiaoxian Chen, Zhenlong Yuan, Yibo Xue:
PBC: A novel method for identifying QQ traffic. ICNC 2014: 787-791 - [c48]Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang, Yibo Xue:
Droid-Sec: deep learning in android malware detection. SIGCOMM 2014: 371-372 - 2013
- [j5]Yibo Xue, Luoshi Zhang, Dawei Wang:
Traffic Classification: Issues and Challenges. J. Commun. 8(4): 240-248 (2013) - [c47]Zhenlong Yuan, Yibo Xue, Wei Xia:
PPI: Towards precise page identification for encrypted Web-browsing traffic. ANCS 2013: 109-110 - [c46]Chongmin Li, Dongsheng Wang, Haixia Wang, Guohong Li, Yibo Xue:
Data Access Type Aware Replacement Policy for Cache Clustering Organization of Chip Multiprocessors. APPT 2013: 254-268 - [c45]Yuanyuan Bao, Chengqi Yi, Yibo Xue, Yingfei Dong:
A new rumor propagation model and control strategy on social networks. ASONAM 2013: 1472-1473 - [c44]Zhenlong Yuan, Yibo Xue, Yingfei Dong:
Harvesting unique characteristics in packet sequences for effective application classification. CNS 2013: 341-349 - [c43]Zhenlong Yuan, Baohua Yang, Xiaoqi Ren, Yibo Xue:
TFD: A multi-pattern matching algorithm for large-scale URL filtering. ICNC 2013: 359-363 - [c42]Yibo Xue, Dawei Wang, Luoshi Zhang:
Traffic classification: Issues and challenges. ICNC 2013: 545-549 - [c41]Yang Gao, Yibo Xue, Jun Li:
Utilization-Aware Allocation for Multi-Tenant Datacenters. ICDCS Workshops 2013: 82-87 - 2012
- [c40]Chongmin Li, Dongsheng Wang, Haixia Wang, Yibo Xue, Jian Li:
Proximity-Aware cache Replication. ASP-DAC 2012: 481-486 - [c39]Jinglei Wang, Dongsheng Wang, Haixia Wang, Yibo Xue:
Dynamic reusability-based replication with network address mapping in CMPs. ASP-DAC 2012: 487-492 - [c38]Dawei Wang, Longtao He, Yibo Xue, Yingfei Dong:
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time. CCIS 2012: 646-650 - [c37]Luoshi Zhang, Dawei Wang, Yibo Xue:
BCBPI: A noval behavior chain based protocol identification method. CCIS 2012: 651-656 - [c36]Chenglong Li, Yibo Xue, Longtao He, Lidong Wang:
TMT: A new Tunable Mechanism of Tor based on the path length. CCIS 2012: 661-665 - [c35]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
Relay recommendation system (RRS) and selective anonymity for tor. GLOBECOM 2012: 833-838 - [c34]Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li:
LiveSec: Towards Effective Security Management in Large-Scale Production Networks. ICDCS Workshops 2012: 451-460 - 2011
- [j4]Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue, Jun Li:
OpenGate: Towards an open network services gateway. Comput. Commun. 34(2): 200-208 (2011) - [j3]Dawei Wang, Yibo Xue, Yingfei Dong:
Anomaly Detection Using Neighborhood Negative Selection. Intell. Autom. Soft Comput. 17(5): 595-605 (2011) - [c33]Chongmin Li, Haixia Wang, Yibo Xue, Dongsheng Wang, Jian Li:
Scalable Proximity-Aware Cache Replication in Chip Multiprocessors. PACT 2011: 191-192 - [c32]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
"Super nodes" in Tor: existence and security implication. ACSAC 2011: 217-226 - [c31]Baohua Yang, Guangdong Hou, Lingyun Ruan, Yibo Xue, Jun Li:
SMILER: Towards Practical Online Traffic Classification. ANCS 2011: 178-188 - [c30]Chongmin Li, Dongsheng Wang, Yibo Xue, Haixia Wang, Xi Zhang:
Enhanced Adaptive Insertion Policy for Shared Caches. APPT 2011: 16-30 - [c29]Dawei Wang, Yibo Xue, Yingfei Dong:
Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores. GLOBECOM 2011: 1-6 - [c28]Jinglei Wang, Dongsheng Wang, Haixia Wang, Yibo Xue:
High performance cache block replication using re-reference probability in CMPs. HiPC 2011: 1-10 - [c27]Kai Wang, Yaxuan Qi, Yibo Xue, Jun Li:
Reorganized and Compact DFA for Efficient Regular Expression Matching. ICC 2011: 1-5 - [c26]Yaxuan Qi, Kai Wang, Jeffrey Fong, Yibo Xue, Jun Li, Weirong Jiang, Viktor K. Prasanna:
FEACAN: Front-end acceleration for content-aware network processing. INFOCOM 2011: 2114-2122 - [i1]Fei He, Fan Xiang, Yibo Xue, Jun Li:
Towards High-Performance Network Application Identification With Aggregate-Flow Cache. CoRR abs/1105.5684 (2011) - 2010
- [j2]Songliu Guo, Hai-Xia Wang, Yibo Xue, Chong-Min Li, Dong-Sheng Wang:
Hierarchical Cache Directory for CMP. J. Comput. Sci. Technol. 25(2): 246-256 (2010) - [j1]Jinglei Wang, Yibo Xue, Hai-Xia Wang, Chong-Min Li, Dong-Sheng Wang:
CCNoC: Cache-Coherent Network on Chip for Chip Multiprocessors. J. Comput. Sci. Technol. 25(2): 257-266 (2010) - [c25]Baohua Yang, Guodong Li, Yaxuan Qi, Yibo Xue, Jun Li:
DFC: Towards Effective Feedback Flow Management for Datacenters. GCC 2010: 98-103 - [c24]Fei He, Yaxuan Qi, Yibo Xue, Jun Li:
YACA: Yet Another Cluster-Based Architecture for Network Intrusion Prevention. GLOBECOM 2010: 1-5 - [c23]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic. GLOBECOM 2010: 1-5 - [c22]Yaxuan Qi, Zongwei Zhou, Yiyao Wu, Yibo Xue, Jun Li:
Towards High-Performance Pattern Matching on Multi-Core Network Processing Platforms. GLOBECOM 2010: 1-5 - [c21]Guanglu Sun, Yibo Xue, Yingfei Dong, Dongsheng Wang, Chenglong Li:
An Novel Hybrid Method for Effectively Classifying Encrypted Traffic. GLOBECOM 2010: 1-5 - [c20]Chongmin Li, Haixia Wang, Yibo Xue, Xi Zhang, Dongsheng Wang:
Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP. NAS 2010: 367-376
2000 – 2009
- 2009
- [c19]Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue, Jun Li:
OASis: towards extensible open-architecture services platforms. ANCS 2009: 66-67 - [c18]Fei He, Yaxuan Qi, Yibo Xue, Jun Li:
SANS: a scalable architecture for network intrusion prevention with stateful frontend. ANCS 2009: 181-182 - [c17]Jinglei Wang, Dongsheng Wang, Yibo Xue, Haixia Wang:
An Efficient Lightweight Shared Cache Design for Chip Multiprocessors. APPT 2009: 28-40 - [c16]Xi Zhang, Dongsheng Wang, Yibo Xue, Haixia Wang, Jinglei Wang:
A Novel Cache Organization for Tiled Chip Multiprocessor. APPT 2009: 41-53 - [c15]Guanglu Sun, Yibo Xue, Zhiming Xu, Fei Lang:
Chinese Chunking Based on Coarse-Grained Part-of-Speech Features. IALP 2009: 226-229 - [c14]Xiang Wang, Yaxuan Qi, Baohua Yang, Yibo Xue, Jun Li:
Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor. ICPADS 2009: 220-227 - [c13]Chuanyi Liu, Yibo Xue, Dapeng Ju, Dongsheng Wang:
A Novel Optimization Method to Improve De-duplication Storage System Performance. ICPADS 2009: 228-235 - [c12]Baohua Yang, Xiang Wang, Yibo Xue, Jun Li:
DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network. ICPADS 2009: 260-267 - [c11]Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Jun Li:
Packet Classification Algorithms: From Theory to Practice. INFOCOM 2009: 648-656 - [c10]Jinglei Wang, Yibo Xue, Haixia Wang, Dongsheng Wang:
Network caching for Chip Multiprocessors. IPCCC 2009: 341-348 - 2008
- [c9]Wei Zhang, Yibo Xue, Dongsheng Wang, Tian Song:
A multiple simple regular expression matching architecture and coprocessor for deep packet inspection. ACSAC 2008: 1-8 - [c8]Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo Xue, Jun Li:
Towards effective network algorithms on multi-core network processors. ANCS 2008: 125-126 - [c7]Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, Jun Li:
Fast Path Session Creation on Network Processors. ICDCS 2008: 573-580 - [c6]Tian Song, Wei Zhang, Dongsheng Wang, Yibo Xue:
A Memory Efficient Multiple Pattern Matching Architecture for Network Security. INFOCOM 2008: 166-170 - 2007
- [c5]Tian Song, Dongsheng Wang, Meizhi Hu, Yibo Xue:
n-Cube Model for Cluster Computing and Its Evaluation. APPT 2007: 340-351 - [c4]Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li:
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. ICICS 2007: 201-215 - [c3]Zhiming Zhang, Weirong Jiang, Yibo Xue:
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. ICN 2007: 28 - 2006
- [c2]Jianming Yu, Quan Huang, Yibo Xue:
Optimizing multi-thread string matching for network processor based intrusion management system. Communication, Network, and Information Security 2006: 199-204 - [c1]Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang:
PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. DASC 2006: 308-314
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint