会议论文
[1] Shen Junxian, Han Zhang*, Yang Xiang, Xingang Shi, Xinrui Li, Yunxi Shen, Zijian Zhang et al. "Network-centric distributed tracing with DeepFlow: Troubleshooting your microservices in zero code." In Proceedings of the ACM SIGCOMM 2023 Conference, pp. 420-437. 2023.
[2] Zhang Tianyu, Han Zhang*, Yunze Wei, Yahui Li, Xingang Shi, Jilong Wang, and Xia Yin. "ACME++: Secure ACME Client Verification for Web-PKI." In THE WEB CONFERENCE 2025.
[3] Yi Qiao, Han Zhang*, Jilong Wang. "NNetFEC: In-network FEC Encoding Acceleration for Latency-sensitive Multimedia Applications." In Proceedings of the IEEE INFOCOM 2024 Conference, pp. 420-437. 2024
[4] Junxian Shen, Han Zhang*, Yantao Geng, Jiawei Li, Jilong Wang, and Mingwei Xu. 2022, "Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing", In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22). Association for Computing Machinery, New York, NY, USA, 2627–2641
[5] Han Zhang, Xingang Shi*, Xia Yin, Jilong Wang, Zhiliang Wang, Yingya Guo, and Tian Lan. 2021, "Boosting bandwidth availability over inter-DC WAN," In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21). Association for Computing Machinery, New York, NY, USA
[6] Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, and Zhiliang Wang. "More load, more differentiation—A design principle for deadline-aware congestion control." In 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 127-135. IEEE, 2015
[7] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang et al.,"Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation", Network and Distributed System Security Symposium 2022
[8] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, and Xia Yin. 2021, "DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications", In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21). Association for Computing Machinery, New York, NY, USA
[9] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang and Han Zhang, "Centralized Network Utility Maximization with Accelerated Gradient Method," 2022 IEEE 30th International Conference on Network Protocols (ICNP), Lexington, KY, USA, 2022
[10] Weihan Chen, Zhiliang Wang, Han Zhang, Xia Yin, Xingang Shi and Lei Sun, "Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing," IEEE INFOCOM 2020
期刊论文
[1] Yahui Li, Han Zhang*, Jilong Wang, Xingang Shi, Xia Yin, Zhiliang Wang, Jiankun Hu, Congcong Miao, and Jianping Wu. "Proactively Verifying Quantitative Network Policy across Unsafe and Unreliable Environments", IEEE Transactions on Information Forensics and Security.
[2] Heng Yu, Han Zhang*, Junxian Shen, Yantao Geng et al., "Serpens: A High Performance FaaS Platform for Network Functions," in IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 8, pp. 2448-2463, Aug. 2023.
[3] Pei Zhang, Fangzhou He, Han Zhang*, Jiankun Hu et al., "Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2076-2090, 2023.
[4] Yahui Li, Han Zhang*, Jilong Wang, Xia Yin, Xingang Shi, Jianping Wu, "A General Approach to Generate Test Packets With Network Configurations," in IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 4, pp. 1362-1375, April 2023
[5] Yi Qiao, Menghao Zhang, Yu Zhou, Xiao Kong, Han Zhang* et al, "NetEC: Accelerating Erasure Coding Reconstruction With In-Network Aggregation," in IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 10, pp. 2571-2583, 1 Oct. 2022
[6] Han Zhang, Yin Xia, Shi Xingang*, Wang Jilong, Wang Zhiliang, Guo Yingya, Lan Tian, Li Yahui, Zhu Yongqing, Ruan Ke, Geng Haijun. "Achieving High Availability in Inter-DC WAN Traffic Engineering". IEEE/ACM Transactions on Networking, 2022.
[7] Shangbin Han, Qianhong Wu, Han Zhang*, Bo Qin, Jiankun Hu et al., "Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2300-2311, 2021
[8] Han Zhang, Xingang Shi*, Xia Yin, Wang, Zhiliang, Haijun Geng, Yahui Li, Qianhong Wu, "DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs." IEEE/ACM Transactions on Networking, 27(6):2458-2471, 2019
[9] Zhiliang Wang, Han Zhang*, Xingang Shi, Xia Yin, Haijun Geng, Yahui Li, Qianhong Wu. "Efficient Scheduling of Weighted Coflows in Data Centers." IEEE Transactions on Parallel and Distributed Systems 30.9 (2019): 2003-2017
[10] Tianbo Wang, Huacheng Li, Chunhe Xia*, Han Zhang and Pei Zhang, "From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1610-1624, 2023.