会议论文
[1] Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Haixin Duan. Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains, ACM CCS 2017
[2] Hao Yang, Xiulin Ma, Kun Du, Zhou Li, Haixin Duan*, Xiaodong Su, Guang Liu, Zhifeng Geng, and Jianping Wu. How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy , IEEE Symposium on Security & Privacy, 2017
[3] Jianjun Chen, Jian Jiang, Haixin Duan, Nick Weaver, Tao Wan, Vern Paxson. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations, CCS 2016
[4] Wei Liu, Yueqian Zhang, Zhou Li, Haixin Duan. What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps. The 6th Workshop on Security and Privacy in Smartphones and Mobile Devices(SPSM). 2016
[5] Kun Du, Hao Yang, Zhou Li, Haixin Duan(*), Kehuan Zhang. The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO, Accepted by USENIX Security 2016
[6] Xiaojing Liao,Kan Yuan, Xiaofeng Wang(*), Zhongyu Pei,Hao Yang, Jianjun Chen, Haixin Duan(*), Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah, Seeking Nonsense, Looking for Trouble: Efficient Promotional­ Infection Detection through Semantic Inconsistency Search, IEEE Symposium on Security & Privacy, San Jose, California. May 23-26, 2016
[7] Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan(*), Jinjin Liang, Tao Wan, Kang Li, Vern Paxson, Forwarding-Loop Attacks in Content Delivery Networks, NDSS 2016, Distinguished Paper
[8] Song Li, Haixin Duan(*), Zhiliang Wang, and Xing Li, Route Leaks Identification by Detecting Routing Loops, SecureComm 2015(11th EAI International Conference on Security and Privacy in Communication Networks)
[9] Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan(*), Shuo Chen, Tao Wan, Nicholas Weaver, Cookies lack integrity: real world implications, USENIX Security, 2015.
[10] Jinjin Liang, Jian Jiang, Haixin Duan(*), Kang Li, Tao Wan, Jianping Wu. “When HTTPS Meets CDN: A Case of Authentication in Delegated Service”, IEEE Symposium on Security & Privacy, 2014.
[11] Kun Yang, Lujue Zhou, Yongke Wang, Jianwei Zhuge and Haixin Duan(*). “IntentFuzzer: Detecting Capability Leaks of Android Applications”, AsiaCCS 2014
[12] H. Gao, V. Yegneswaran, Y. Chen, P. Porras, S. Ghosh, J. Jiang, and Haixin Duan, “An empirical reexamination of global DNS behavior”, SIGCOMM, 2013
[13] Jinjin Liang, Jian Jiang, Haixin Duan(*), Kang Li and Jianping Wu, Measuring Query Latency of Top Level DNS Servers, PAM (Passive and Active Measurement conference)2013, Hongkong
[14] Zheng, Ming; Wu, Jianping; Duan, Haixin(*); "Research on the anti-attack design principles of low-latency anonymous communication", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013
[15] J. Jian, L. Jinjin, L. Kang, L. Jun, D. Haixin(*), W. Jianping, Ghost Domain Names: Revoked Yet Still Resolvable, 19th Annual Network & Distributed System Security Symposium (NDSS), 2012
[16] Liu Wu, Duan Haixin(*), Ren Ping; "Cooperation-based trust model and its application in network security management”, Algorithms and Architectures for Parallel Processing(ICA3PP), 2011
[17] Ming Zheng, Haixin Duan(*); Jianping Wu; "Anonymous Communication over Invisible Mix” Rings,Algorithms and Architectures for Parallel Processing(ICA3PP), 2011
[18] Hou, Lei; Duan, Haixin(*); Wu, Jianping; “Scheduling peers based on credit construction period in peer-to-peer networks”, 14th IEEE International Conference on Parallel and Distributed Systems(ICPADS), 2008
[19] L. Xing, D. Haixin(*), L. Xing, Identification of P2P traffic based on the content redistribution characteristic, Proc. International Symposium on Communications and Information Technologies (ISCIT), 2007
[20] Lu, Xing; Duan, Haixin(*); Li, Xing; "Identification of P2P traffic based on the content redistribution characteristic”, IEEE International Symposium on Communications and Information Technologies(ISCIT), 2007
[21] W. Lanjia, D. Haixin(*), L. Xing, Port scan behavior diagnosis by clustering, Proceedings of the 7th international conference on Information and Communications Security (ICICS), 2005
[22] Chang-Ji, WANG; Jian-ping, Wu; Hai-Xin, DUAN(*); "Using attribute certificate to design role-based access control”, IEEE Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT), 2003
[23] Haixin, Duan(*); Jianping, Wu; Xing, Li; "Policy based access control framework for large networks”, IEEE International Conference on Networks (ICON), 2000
[24] Duan, Haixin(*); Wu, Jianping; "Security management for large computer networks”, Fifth Asia Pacific Conference on Communications (APCC) 1999
期刊论文
[1] Yi GUO, Haixin DUAN, Liancheng ZHANG, Han QIU, A threat perception method for inter-domain routing system based on weighted similarity. SCIENTIA SINICA Informationis, 2017/3/22
[2] Y Guo, H Duan, J Chen, F Miao. MAF-SAM: An effective method to perceive data plane threats of inter domain routing system. Computer Networks Volume 110 Issue C, December 2016 Pages 133-153
[3] Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Member, IEEE, Phillip Porras, Shalini Ghosh, Haixin Duan, “Reexamining DNS from a Global Recursive Resolver Perspective”, IEEE/ACM TRANSACTIONS ON NETWORKING, Vol. 26, Issue 1, 2016
[4] Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip Porras, Shalini Ghosh, Jian Jiang, Haixin Duan. “An empirical reexamination of global DNS behavior”, ACM SIGCOMM Computer Communication Review(CCR), Vol. 43, Issue 4, 2013
[5] JIANG, Jian; ZHUGE, Jian-Wei; DUAN, Hai-Xin(*); WU, Jian-Ping; "Research on Botnet Mechanisms and Defenses”, Journal of Software, 2012
[6] Jia Zhang, Haixin Duan(*), Wu Liu, Jianping Wu, “Anonymity analysis of P2P anonymous communication systems”. Computer Communications, Vol 34, Issue 3. 2011
[7] Z. Jia, D. Haixin(*), L. Wu, W. Jianping WindTalker: A P2P-Based Low-Latency Anonymous Communication Network, IEICE Transactions on Communications, VOL. E92-B, NO.10, pp. 3183–3194, 2009
[8] Tran, Quang-Anh; Li, Xing; Duan, Haixin; "Efficient performance estimate for one-class support vector machine”, Pattern Recognition Letters, Vol.26, Issue 8,1174-1182,2005
[9] Yang, Jiahai; Duan, Haixin(*); Wu, Jianping; Li, Xing; "Thresholds: workflow oriented network management: a web/java approach”, Journal of Network and Systems Management,Vol.12, Issue 4,p431-439,2004
[10] Yang, Jiahai; Duan, Haixin(*); Wu, Jianping; Li, Xing; Boavida, Fernando; Paik, EK; Cho, H; Choi, Y; Yi, Zhang; Yong, Zhang; "Forthcoming Contributions,Journal of Network and Systems Management”, Vol.12, Issue 3, 2004
[11] Duan, HX; WU, Jianping(*); "An Entity Security Architecture for Computer Networks”, CHINESE JOURNAL OF COMPUTERS-CHINESE EDITION, Vol. 24, Issue 8, p853-859,2001
[12] Duan, Haixin; Yang, Jiahai(*); Wu, Jianping; "Design and implementation of a network management system based on Web and database”, Journal of Software, Vol. 11, Issue 4, pp468-472,2000