期刊论文
[1] Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet: Towards Predictable Performance Two-layer Bandwidth Allocation in Cloud Datacenter, Elsevier Journal of Parallel and Distributed Computing (accepted)
[2] Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, et al, Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Transactions on Networking, 24(3):1448-1461, 2016.
[3 ]Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu, Optimal Construction of Virtual Networks for Cloud-based MapReduce Workflows, Elsevier Computer Networks, 112(2017): 194-207, http://dx.doi.org/10.1016/j.comnet.2016.11.001
[4] Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang, Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and Experiments, Elsevier Journal of Parallel and Distributed Computing, Vol. 90-91, No. 4, pp52-66
[5] Fuliang Li, Jiahai Yang, Xingwei Wang, et al, Characteristics analysis at prefix granularity: A case study in an IPv6 network, Journal of Network and Computer Applications, Vol. 70, No. 7, pp. 156–170, Jul. 2016 (doi:10.1016/j.jnca.2016.02.022
[6] Jiahai Yang, Mingwei Xu, Hui Wang, Wenlong Chen, Yuan Yang, Qingzhou Dong, Yang Wang, IER: ID-ELoc-RLoc Based Architecture for Next Generation Internet, Chinese Journal of Electronics,Dec. 2014, Vol. 31, No. 6, pp 519-536, Date: 20 Jan 2015
[7] Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Towards Centralized and Semi-automatic VLAN Management. International Journal of Network Management, v 25, n 1, p 52-73, January 1, 2015
[8] Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang, Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability, Computer Communications, v 67, p 11-22, August 1, 2015
[9] Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang, Solving Multicast Problem in Cloud Networks Using Overlay Routing,Computer Communications, v 70, p 1-14, October 1, 2015
[10] Fuliang Li, Changqing An, Jiahai Yang, Xingwei Wang, Jianping Wu, Linchuan Xu, Xin Xu, Data Mapping Principles and Algorithms for Self-configurable Systems, China Communications , 12(10): 169-181
[11] Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, A Study of Traffic from the Perspective of a Large Pure IPv6 ISP, Computer Communications, 2014, 37:40-52, Jan. 2014
[12] Fuliang Li, Jiahai Yang, Huijing Zhang, Jianping Wu, Configuration Analysis and Recommendation: Case Studies in IPv6 Networks, Computer Communications, 2014, 53:37-51, Nov. 2014
[13] Fu Chen, Jiahai Yang, Shaobin Zhan, MulCNeT: Network management cloud, International Journal of Grid and Distributed Computing, v 7, n 2, p 139-150, 2014
[14] Donghong Qin, Jiahai Yang, Hui Wang, Experimental Study on Diversity and Novelty of Interdomain Paths, Chinese Journal of Electronics, 2013 Vol. 22 (CJE-1): 160-166
[15] M. Xu,M. Hou, D. Wang, J. Yang, An efficient critical protection scheme for intra-domain routing using link characteristics, Computer Networks, v 57, n 1, p 117-133, January 16, 2013
[16] Bin Zhang, Jiahai Yang, Jianping Wu, et al. MBST: Detecting Packet-level Traffic Anomalies by Feature Stability, The Oxford Computer Journal, v 56, n 10, p 1176-1188, Oct. 2013
[17] Zhang B, Yang JH, Wu JP et al, Diagnosing Traffic Anomalies Using a Two-phase Model, Journal of Computer Science and Technology, 27(2): 313-327, Mar. 2012
[18] Jessie Hui Wang, Changqing An, Jiahai Yang, A study of traffic, user behavior and pricing policies in a large campus network, Elsevier Computer Communications, v 34, n 16, p 1922-1931, October 1, 2011
[19] Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2: an IPv6 Deployment in China, ACM SIGCOMM Computer Communication Review, Vol. 41, No. 2, April 2011: 48-52
[20] Hui Wang, Jiahai Yang, Chungang Wang, Key Strategies in P2P Systems and ISPs' P2P Traffic Management: A Survey, Springer Journal Peer-to-Peer Networking and Applications, v 4, n 4, p 410-419, December 2011
[21] Jiahai Yang, Hui Zhang, Jinxiang Zhang, et al. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. Journal of Computer Science and Technology, 2009, 24(3): 482-494, May 2009
[22] 杨洋, 杨家海, 温浩森,等. 基于时隙传输的数据中心网络路由算法设计. 软件学报(已录用)(EI源刊.)
[23] 杨洋,杨家海,秦董洪,王于丁,凌晓,DraLCD:一种新的数据中心流量工程方法,电子学报,2017,45 (5): 1261-1267
[24] 王于丁,杨家海. DACPCC:一种包含访问权限的云计算数据访问控制方案. 电子学报,2018年1月(EI源刊.)
[25] 杨洋,杨家海,秦董红, 一种数据中心网络多路径路由算法研究,清华大学学报(自然科学版),v 56, n 3, p 262-268, March 1, 2016
[26] 文坤,杨家海,程凤娟等,骨干网络中RoQ攻击的监测、定位和识别,计算机研究与发展,2015, 52(4): 813-822
[27] 王于丁,杨家海,徐聪,凌晓,杨洋,云计算访问控制技术研究综述. 软件学报, 2015, 26(5): 1129-1150
[28] 杨洋,杨家海,王会等,IP网络时延敏感型业务流自适应负载均衡算法,通信学报,2015,36(3): 2015082-1 – 2015082-11
[29] 杨家海,焦亮,秦董洪等,基于BGP路由表的域间路径特性实验研究,清华大学学报(自然科学版),2015, 55(11): 1190-1196
[30] 李福亮, 杨家海, 吴建平, 安常青, 姜宁:互联网自动配置研究, 软件学报, 2014, 25(1): 118-134, 2014年1月.
[31] 文坤,杨家海,张宾,低速率拒绝服务攻击研究与最新进展综述,软件学报, 2014, 25(3): 591-605, 2014年3月
[32] 杨芫,徐明伟,杨家海等,SAMS:一种新型身份/位置分离方案,计算机学报,2014, 37(2): 394-406, 2014年2月
[33] 秦董洪,杨家海,杨洋,张辉,UMIR系统设计与实现,通信学报,2013,34(Z2):27-35,2013年9月
[34] 杨家海,姜宁,安常青,李福亮,基于形式化描述的交换机网络自动配置策略的设计与实现,清华大学学报(自然科学版),2012年,52(8):1041-1048
[35] 崔来中,吴建平,江勇,杨家海,一种非结构化P2P流媒体系统拓扑构建算法,清华大学学报(自然科学版),2011, 51(12):1819-1823
[36] 杨家海,郭玺,张辉,基于多层次和多粒度的混合布局可视化算法及其应用,清华大学学报(自然科学版),2011, 51(12):1765-1770,1776
[37] 陈福,杨家海,杨杨等,网络服务行为的进程代数验证方法研究及其应用,计算机学报,2011, 34(9):1660-1668
[38] 张宾,杨家海,吴建平, Internet流量模型分析与评述, 软件学报,2011,22(1):115-131
[39] 朱应武, 杨家海, 张金祥,基于流量信息结构的异常检测研究,软件学报,2010,21(10):2573-2583
[40] 王若曈,张辉,杨家海,黄桂奋,P2P网络管理系统信息模型的设计与实现,通信学报,2010,31(1): 85-91
[41] 黄桂奋,杨家海,张辉,王若曈,支持跨域协作的P2P网络管理系统设计与实现,清华大学学报(自然科学版), 2010,50(4):547-550
[42] 周苗,杨家海,基于滑动地址序列的IPv6网络拓扑发现引擎,清华大学学报(自然科学版),2009,49(8): 1241-1244
[43] 鲁文斌,杨家海,刘洪波,基于节点连接模式的P2P节点识别算法,清华大学学报(自然科学版),2009,49(7): 1029-1033
[44] 周 苗, 杨家海, 刘洪波, 吴建平,Internet网络拓扑建模,软件学报,2009,20(1):109-123
学术会议论文
[1] Ziyu Wang, Jiahai Yang, Shize Zhang, et al. Robust Regression for Anomaly Detection. IEEE International Conference on Communications, 21-25 May 2017, Paris, France
[2] Weng Jian Ping, Wang Hui, Yang Jiahai and Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. International Workshop on Quality of Service. (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRú, SPAIN
[3] Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang. GAS: Generic and Agile Service Function Chain Verification on Cloud, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRú, SPAIN
[4] Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang, Tetris: Optimizing Cloud Resource Usage Unbalance with Elastic VM, IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS 2016), Jun. 20-21, 2016, Beijing, China
[5] Chen Fu, Lin Chuang, Yang Jiahai, Xue Yuemei, A Study on Online Social Networks Theme Semantic Computing Model, 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun. 27-Jul. 2, 2016, pp. 244-251, doi:10.1109/ICWS.2016.39
[6] Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016
[7] Xiao Ling, Jiahai Yang, Ye Wang, et al, Fast Community Detection in Large Weighted Networks Using GraphX on Cloud, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016
[8] Ziyu Wang, Jiahai Yang, Shize Zhang, et al, Automatic Model Selection for Anomaly Detection, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 Aug. 2016
[9] Hui Yu, Jiahai Yang, Cong Xu, et al, SpongeNet: Towards Bandwidth Guarantees of Cloud Datacenter with Two-phase VM Placement, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016
[10] Ziyu Wang, Jiahai Yang, Chenxi Li, et al, Towards online anomaly detection by combining multiple detection methods and Storm, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016
[11] Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang, Cluster Scheduler on Heterogeneous Cloud, IEEE HPCC 2015, Aug. 24-26, 2015, New York, USA
[12] Chenxi Li, Jiahai Yang, Ziyu Wang, et al, A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows, IEEE GLOBECOM 2015, Dec. 5-10, 2015, San Diego, CA, USA
[13] Cong Xu, Jiahai Yang, Di Fu, Hui Zhang, Towards Optimal Collaboration of Policies in the Two-phase Scheduling of Cloud Tasks”, in 11th IFIP International Conference on Network and Parallel Computing (NPC) , Sep. 18-20, 2014, Ilan, Taiwan, v 8707 LNCS, p 306-320
[14] Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang, Optimizing the topologies of virtual networks for cloud-based big data processing, in16th IEEE International Conference on High Performance Computing and Communications (HPCC), Aug. 20-22, 2014, Paris, France
[15] Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE, 10th International Conference on Security and Privacy in Communication Networks (SecureCom), Sep. 24-26, 2014, Beijing, China
[16] Ziyu Wang, Jiahai Yang, Fuliang Li, An On-line Anomaly Detection Method Based on A New Stationary Metric----Entropy-Ratio, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), Sep. 24-26, 2014, Beijing, China
[17] Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, 23rd International Conference on Computer Communication and Networks (ICCCN), Aug. 4-7, 2014, Shanghai, China
[18] Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Bin Liu. Towards Zero-Time Wake-Up of Line Cards in Power-Aware Routers. INFOCOM, Toronto, Canada, IEEE, 2014, pp.190-198
[19] Zejia Chen, Jiahai Yang, Hui Wang, A Cascading Framework for Uncovering Spammers in Social Networks, IFIP Networking 2014, June 2-4, 2014, Trondheim, Norway
[20] Miao Li, Hui Wang, Jiahai Yang, et al, A Value Based Framework for Provider Selection of Regional ISPs, IFIP/IEEE NOMS 2014, May 4-9, 2014, Krakow, Poland
[21] Fuliang Li, Jiahai Yang, Jianping Wu, et al, CSS-VM: A Centralized and Semi-automatic System for VLAN Management, IEEE/IFIP IM 2013
[22] Cong Xu, Jiahai Yang, Xiao Ling, et al, Architecture Design for Management as a Service Cloud, IEEE/IFIP IM 2013
[23] Bin Zhang, Jiahai Yang, Jianping Wu, et al, PCA-subspace Method— Is it Good Enough for Network-wide Anomaly Detection, IEEE/IFIP NOMS 2012, Maui, Hawaii, April 15-21, 2012
[24] Lei Gao, Jiahai Yang, Hui Zhang, et al, What’s Going On in Chinese IPv6 World, IEEE/IFIP NOMS 2012, short paper, Maui, Hawaii, April 15-21, 2012
[25] Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang, Separating Identifier from Locator with Extended DNS, IEEE International Conference on Communications 2012 (ICC 2012), June 10-15, 2012, Ottawa, Canada
[26] Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen,Unravel the Characteristics and Development of Current IPv6 Network,37th Annual IEEE Conference on Local Computer Networks,Clearwater, Florida, 2012
[27] Bin Zhang, Jiahai Yang, Jianping Wu, An Efficient Parallel TCAM Scheme for the Forwarding Engine of the Next-generation Router, IFIP/IEEE Int’l Symp. on Integrated Network Management, May 23-28, 2011, Dublin, Ireland, pp.454-461
[28] Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang, On the Scalability of Router Forwarding Tables: Nexthop-Selectable FIB Aggregation, IEEE INFOCOM’2011 (The 30th IEEE Int’l Conf. on Computer Communications: mini-conference) , 10-15 Apr. 2011: 321-325
[29] Bin Zhang, Jiahai Yang, Jianping Wu,Qi Li, Efficient Searching with Parallel TCAM Chips, The 35th IEEE Conference on Local Computer Networks, LCN 2010, 11-14 Oct. 2010, Denver, Colorado, U.S.A
[30] Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang, Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing, The 29th IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2009), 2009:68-75
[31] Jianping He, Jiahai Yang, Changqing An, et al. BPR: a Bit-level Packet Recovery in Wireless Sensor Networks. ACM SAC’09 (The 24th Annual ACM Symposium on Applied Computing), Mar. 2009, Honolulu, Hawaii, USA
教材和专著
[1] 杨家海,任宪坤,王佩瑜,网络管理原理与实现技术,清华大学出版社,2000年,北京
[2] 杨家海,吴建平,安常青,互联网络测量理论与应用,人民邮电出版社,2009年10月,北京
[3] 杨家海,安常青,网络空间安全—拒绝服务攻击检测与防御,高等教育出版社,2018年9月(预计出版时间),北京