会议和期刊论文(部分)
[1] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Centralized Network Utility Maximization with Accelerated Gradient Method. IEEE/ACM Transactions on Networking, 2025. DOI: 10.1109/TON.2025.3562283
[2] Hangtian Liu, Lei Zheng, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Yishun Zeng, Zhiyuan Jiang, Jiahai Yang. EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis. The Network and Distributed System Security (NDSS) Symposium 2025, Feb. 24-28, 2025, San Diego, USA.
[3] Hongxu Chen, Guanglei Song, Zhiliang Wang, Jiahai Yang, et al. IPdb: A High-Precision IP Level Industry Categorization of Web Services. The ACM Web Conference 2025, Sydney, Australia, Apr. 28 – May 2, 2025
[4] Enhuan Dong, Jiahai Yang, Zhiliang Wang, Xin He, Jie Fang, Shenao Li, Supei Zhang, Zeyuan Guo, Hui Zhang, Zimu Li, Xiaoming Fu Internet Scan Source Identification: A Survey,IEEE Network. 2025, DOI: 10.1109/MNET.2025.3574126
[5] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Adaptive traffic engineering with segment routing through deep reinforcement learning. Computer Networks 267 (2025) 111356
[6] Jinlei Lin, Chenglong Li, Wenwen Gong, Linna Fan, Guanglei Song and Jiahai Yang, ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content. IEEE/ACM Transactions on Networking. doi: 10.1109/TNET.2024.3422089
[7] Wenjian Zhang, Guanglei Song, Lin He, Jinlei Lin, Songyun Wu, Zhiliang Wang, Chenglong Li, Jiahai Yang, 6Vision: Image-Encoding-based IPv6 Target Generation in Few-seed Scenarios, The 32nd IEEE International Conference on Network Protocols (ICNP 2024), Charleroi, Belgium, Oct. 28-31, 2024
[8] Hongbin Sun, Su Wang, Zhiliang Wang, Zheyu Jiang, Dongqi Han, Jiahai Yang, AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection, Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses(RAID '24), Pages 263–277, Sep. 30–Oct. 02, 2024, Padua, Italy
[9] Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al. CloudPin-Fast: Efficient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. Transactions on Services Computing, Vol. 17, No. 3, May/June 2024, pp.850-864
[10] Ying Zhong, Zhiliang Wang, Xingang Shi, Jiahai Yang, Keqin Li. RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. IEEE Transactions on Information Forensics & Security, Vol. 19, 2024, pp. 5895-5910
[11] Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang. PMap: Reinforcement Learning-Based Internet-Wide Port Scanning. IEEE/ACM Transactions on Networking, Vol. 32, No. 6, Dec. 2024. DOI: 10.1109/TNET.2024.3491314 (https://ieeexplore.ieee.org/document/10758701)
[12] Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang , Su Wang, Jiahai Yang, Xingang Shi, Xia Yin ,Yang Liu. Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. ACM CCS 2024, Oct. 14-18, 2024, Salt Lake City, USA(杰出技术成果奖)
[13] Yirui Luo, Chenglong Li, Zhiliang Wang, Jiahai Yang. IPREDS: Efficient prediction system for Internet-wide port and service scanning. Proceedings of the ACM on Networking, Vol. 2, Issue CoNEXT1, Article No.: 2, pp 1–24,(https://dl.acm.org/doi/abs/10.1145/3649470)
[14] Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Proactive Telemetry in Large-Scale Multi-tenant Cloud Overlay Networks. IEEE/ACM Transactions on Networking, DOI: 10.1109/TNET.2024.3381786
[15] Wenqi Chen, Zhiliang Wang, Liyuan Chang, Kai Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi. Network anomaly detection via similarity-aware ensemble learning with ADSim. Computer Networks, Vol. 247, June 2024, 110423
[16] Libing Qiao, Enhuan Dong, Huanpu Yin, Haisheng Li, Jiahai Yang. Intelligent Network Device Identification based on Active TCP/IP Stack Probing. IEEE Network, doi: 10.1109/MNET.2024.3374080
[17] Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan. CP-IoT: A Cross-Platform Monitoring System for Smart Home. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA.
[18] Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang. LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA
[19] Chenxin Duan, Sainan Li, Hai Lin, Wenqi Chen, Guanglei Song, Chenglong Li, Jiahai Yang, Zhiliang Wang. IoTa: Fine-grained Traffic Monitoring for IoT Devices via Fully Packet-level Models[J]. IEEE Transactions on Dependable and Secure Computing (TDSC) , 2023. DOI 10.1109/TDSC.2023.3340563.
[20] Yufan Chen; Jiahai Yang; Susu Cui; Cong Dong; Bo Jiang; Yuling Liu; Zhigang Lu. Unveiling encrypted traffic types through hierarchical network characteristics. Computers & Security, Volume 138, March 2024, 103645. doi.org/10.1016/j.cose.2023.103645
[21] Xin He, Enhuan Dong, Jiahai Yang, Shize Zhang, et al. CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud Networks. IEEE INFOCOM 2024 (IEEE International Conference on Computer Communications), May 20-23, 2024, Vancouver, Canada
[22] 宋光磊, 张文健, 林金磊, 韩东岐, 王之梁, 张辉, 杨家海. 6EDL:高效的大规模活跃IPv6地址探测系统. 计算机学报,2024, 47(8): 1949-1969
[23] 樊琳娜, 李城龙, 吴毅超, 段晨鑫, 王之梁, 林海, 杨家海. 物联网设备识别及异常检测研究综述. 软件学报, 2024, 35(1): 288–308. http://www.jos.org.cn/1000-9825/6818.htm
[24] Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu. Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels, NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA (杰出论文奖)
[25] Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin. BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA
[26] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin. Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA
[27] Cong Dong, Jiahai Yang, Song Liu, Zhi Wang, Yuling Liu and Zhigang Lu. C-BEDIM and S-BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. Computers & Security, Volume 130 Issue C. DOI:10.1016/j.cose.2023.103267
[28] Enhuan Dong, Peng Gao, Yuan Yang, Mingwei Xu, Xiaoming Fu, Jiahai Yang. SmartSBD: Smart Shared Bottleneck Detection for Efficient Multipath Congestion Control over Heterogeneous Networks. Computer Networks, Volume 237, Dec. 2023, 110047.
[29] Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang. Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning. IEEE/ACM IWQoS 2023, Orlando, Florida, USA
[30] Linna Fan, Lin He, Xiaoqing Sun, Enhuan Dong, Jiahai Yang, Zhiliang Wang, Jinlei Lin, and Guanglei Song. GraphIoT: Accurate IoT Identification based on Heterogeneous Graph. IEEE/ACM IWQoS 2023, Orlando, Florida, USA
[31] Song G, He L, Zhu F, et al. AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System. IEEE/ACM Transactions on Networking (TON), 2024, DOI: 10.1109/TNET.2024.3406508
[32] Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, Xiaowen Quan. DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE/IFIP Transactions on Networking, Vol. 30, No. 4,pp. 1629-1643, Aug. 2022. DOI: 10.1109/TNET.2022.3145040
[33] Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang. threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning. IEEE Transactions on Information Forensics & Security,2022, 17(12): 3972-3987, DOI: 10.1109/TIFS.2022.3208815
[34] Linna Fan, Lin He, Yichao Wu, Shize Zhang, Zhiliang Wang, Jia Li, Jiahai Yang, Chaocan Xiang and Xiaoqian Ma. AutoIoT: Automatically Updated IoT Identification with Semi-supervised Learning. IEEE Transactions on Mobile Computing, 2023, 22(10), pp. 5769 - 5786 (DOI 10.1109/TMC.2022.3183118)
[35] Linna Fan, Lin He, Enhuan Dong, Jiahai Yang. EvoIoT: An Evolutionary IoT and Non-IoT Classification Model in Open Environments. Computer Networks Vol. 219, Dec. 2022, 109450. https://doi.org/10.1016/j.comnet.2022.109450
[36] Songyun Wu, Bo Wang, Zhiliang Wang, Shuhan Fan, Jiahai Yang. Joint prediction on security event and time interval through deep learning. Computers & Security, v 117, June 2022
[37] Lin He, Gang Ren, Ying Liu, Guanglei Song, Jinlong E, Jiahai Yang, Mingwei Xu. SAV6: A Novel Inter-AS Source Address Validation Protocol for IPv6 Internet. IEEE Network, Sep. 2023, Vol. 37, Issue 5, pp. 64-70, DOI: 10.1109/ MNET.123.2200111
[38] Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai Yang. IntStream: Towards Flexible, Expressive and Scalable Network Telemetry. IEEE Transactions on Network and Service Management, 2022, 19(3): 2854 – 2868.
[39] Qing Li, Yichao Wu, Jingpu Duan, Jiahai Yang, et al. Weighted NSFIB Aggregation with Generalized Next Hop of Strict Partial Order. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 890-904
[40] Chenxin Duan, Hao Gao, Guanglei Song, Jiahai Yang, Zhiliang Wang. ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 1717- 1728
[41] Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, and Yaozhong Liu, Zhongxiang Sun. AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System. 2022 USENIX Annual Technical Conference, Jul. 11–13, 2022, Carlsbad, CA, USA.
[42] Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi, Han Zhang. ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. NDSS 2022, Apr. 24-28, 2022, San Diego, CA, USA
[43] Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Zoonet - A Proactive Telemetry System for Large-Scale Cloud Networks. The 18th International Conference on emerging Networking EXperiments and Technologies (CoNext 2022). Rome, Italy. Dec. 6-9, 2022.
[44] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Centralized Network Utility Maximization with Accelerated Gradient Method. IEEE ICNP’2022, Oct. 30-Nov. 2, 2022, Lexington, KY, USA
[45] Shize Zhang, Zhiliang Wang, Jiahai Yang, MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking, the 2021 Annual Computer Security Applications Conference (ACSAC 2021), Dec. 6-10, 2021
[46] Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al, CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks, The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021),Oct 25 - 28, 2021
[47] Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, et al, DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications, ACM Conference on Computer and Communications Security (CCS 2021). Seoul, Korea. Nov. 14-19, 2021
[48] Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Verification of Service Function Chains in the Cloud, IEEE/ACM Transactions on Networking, Vol.29, No.1, Feb. 2021, pp 78-91
[49] Lin He, Gang Ren, Ying Liu, Jiahai Yang, PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet, IEEE/ACM Transactions on Networking, Vol 29, No. 2, April 2021, pp 695-708
[50] Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, et al, Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors. IEEE Journal on Selected Areas in Communications (JSAC). 2021, 39(8): 2632-2647.
[51] Lin He, Peng Kuang, Ying Liu, Gang Ren, Jiahai Yang, Towards securing Duplicate Address Detection using P4, Computer Networks, Vol. 198, 24 Oct. 2021, 108323
[52] Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin, A novel workload scheduling framework for intrusion detection system in NFV scenario, Computers and Security, v 106, July 2021 (https://doi.org/10.1016/j.cose.2021.102271)
2. 教材和专著
[1] 杨家海,何林,李城龙,网络空间测绘—原理、技术与应用,人民邮电出版社,2023年8月
[2] 杨家海,安常青,网络空间安全—拒绝服务攻击检测与防御,高等教育出版社,2019年1月,北京
[3] 杨家海,吴建平,安常青,互联网络测量理论与应用,人民邮电出版社,2009年10月,北京
[4] 杨家海,任宪坤,王佩瑜,网络管理原理与实现技术,清华大学出版社,2000年10月,北京