Skip to content

Commit 625d9d3

Browse files
authored
Update index.html
1 parent c1e8817 commit 625d9d3

File tree

1 file changed

+5
-52
lines changed

1 file changed

+5
-52
lines changed

index.html

Lines changed: 5 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -68,8 +68,6 @@ <h3 id="news">Research areas</h3>
6868
<li><b>Network Observability</b>: Distributed tracing system<a href="https://dl.acm.org/doi/pdf/10.1145/3603269.3604823">[SIGCOMM'23][SIGCOMM'25]</a>. SSL/TLS Certificate analysis framework<a href="https://dl.acm.org/doi/abs/10.1145/3696410.3714763">[WWW'25]</a>. Configuration verification algorithm<a href="https://ieeexplore.ieee.org/abstract/document/10550010">[TIFS'24]</a>. Malicious container detection system<a href="https://dl.acm.org/doi/pdf/10.1145/3548606.3560629">[CCS'22]</a>.Malicious traffic detection algorithm<a href="https://ieeexplore.ieee.org/document/10049200">[TIFS'22]</a>,<a href="https://ieeexplore.ieee.org/document/10081489">[TIFS'23]</a>,<a href="https://dl.acm.org/doi/pdf/10.1145/3460120.3484589">[CCS'21]</a>,<a href="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f830_paper.pdf">[NDSS'22]</a>. Log analysis framework<a href="https://ieeexplore.ieee.org/document/9330769">[TIFS'21]</a>. APT detection algorithm<a href="https://ieeexplore.ieee.org/document/9899459">[TIFS'23]</a>. Flow measurement algorithm<a href="https://smartinternet.group/wp-content/uploads/2024/01/paper-zhzy-hashflow-tpds.pdf">[TPDS'21][SIGCOMM'25]</a>.
6969
</li>
7070
</div>
71-
72-
7371
<div class="col-md-11" style="hyphens:auto">
7472
<li> <b>Internet Routing</b>: Routing reliability<a href="https://ieeexplore.ieee.org/document/9980572">[ToN'22]</a><a href="https://dl.acm.org/doi/pdf/10.1145/3485983.3494843">[CoNEXT'21]</a>.SDN routing<a href="https://ieeexplore.ieee.org/document/9940402">[ICNP'22]</a><a href="https://ieeexplore.ieee.org/document/9162655">[INFOCOM'20]</a>.Routing protection algorithm<a href="https://www.sciencedirect.com/science/article/pii/S1084804519303613">[JNCA'20]</a>.Hybrid SDN routing[<a href="https://www.sciencedirect.com/science/article/pii/S1084804521001363">JNCA'20</a>].Routing tester<a href="https://ieeexplore.ieee.org/document/10035502">[TIFS'23]</a>.
7573
</li>
@@ -78,8 +76,6 @@ <h3 id="news">Research areas</h3>
7876
<li><b>Network Scheduling</b>: Programmable switch offloading<a href="https://dl.acm.org/doi/pdf/10.1145/3485983.3494843">[INFOCOM'24]</a>,<a href="https://ieeexplore.ieee.org/document/9812868">[TPDS'22]</a>. Serverless function scheduling<a href="https://ieeexplore.ieee.org/document/10089180">[TPDS'23]</a>. Congestion control algorithm<a href="https://ieeexplore.ieee.org/document/7218375">[INFOCOM'15]</a>,<a href="https://ieeexplore.ieee.org/document/8910605">[ToN'20]</a><a href="https://ieeexplore.ieee.org/document/10188700">[IWQoS'23]</a>.Coflow scheduling frawework<a href="https://ieeexplore.ieee.org/document/8668552">[TPDS'19]</a><a href="https://ieeexplore.ieee.org/document/8117586">[ICNP'17]</a>.
7977
</li>
8078
</div>
81-
82-
8379
</div>
8480

8581

@@ -115,58 +111,39 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2025</h3>
115111
</div>
116112
</div>
117113

118-
119-
120-
121-
122-
<h4 style="text-align: left; color: blue; font-weight: bold">2024</h3>
123-
114+
115+
<h4 style="text-align: left; color: blue; font-weight: bold">2024</h3>
124116
<div class="row" style="font-size:12pt;">
125117
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[1] Yi Qiao, <b>Han Zhang*</b>, Jilong Wang. "NNetFEC: In-network FEC Encoding Acceleration for Latency-sensitive Multimedia Applications." In Proceedings of the IEEE INFOCOM 2024 Conference, pp. 420-437. 2024.
126118
[<a href="https://dl.acm.org/doi/pdf/10.1145/3603269.3604823">PDF</a>]
127119
</div>
128-
129120
<div class="col-md-11" style="margin-bottom: 1.0em; text-align: justify">[2] Xinzhe Liu, Yahui Li*, <b>Han Zhang</b>, Xia Yin, Xingang Shi, Zhiliang Wang, Gang Ren, and Jiangyuan Yao. "Poster: Scalable and Interpretable Multilayer Overlay Network Checking via Ensemble Verification. In Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos (ACM SIGCOMM Posters and Demos '24)."
130121
[<a href="https://dl.acm.org/doi/abs/10.1145/3672202.3673722">PDF</a>]
131122
</div>
132123
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[3] Yahui Li, <b>Han Zhang*</b> Jilong Wang, Xingang Shi, Xia Yin, Zhiliang Wang,
133124
Jiankun Hu, Congcong Miao, and Jianping Wu. "Proactively Verifying Quantitative Network Policy across Unsafe and Unreliable Environments", IEEE Transactions on Information Forensics and Security.
134125
[<a href="https://ieeexplore.ieee.org/abstract/document/10550010">PDF</a>]
135126
</div>
136-
137127
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[4] Weihan Chen, Zhiliang Wang*, <b>Han Zhang</b>, Xia Yin, Xingang Shi,
138128
"Cost-efficient flow migration for SFC dynamical scheduling in geo-distributed clouds", Computer Networks
139129
Volume 249, July 2024.
140130
[<a href="https://www.sciencedirect.com/science/article/pii/S1389128624003281">PDF</a>]
141131
</div>
142-
143-
144-
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[5] He Jun, Yahui Li*, <b>Han Zhang*</b>, Changqing An, and Jilong Wang. "ROV-GD: Improving the Measurement of ROV Deployment Using Graph Difference." In 2024 IEEE Symposium on Computers and Communications (ISCC), pp. 1-7. IEEE, 2024.
145-
132+
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[5] He Jun, Yahui Li*, <b>Han Zhang*</b>, Changqing An, and Jilong Wang. "ROV-GD: Improving the Measurement of ROV Deployment Using Graph Difference." In 2024 IEEE Symposium on Computers and Communications (ISCC), pp. 1-7. IEEE, 2024.
146133
[<a href="https://www.sciencedirect.com/science/article/pii/S1389128624003281">PDF</a>]
147134
</div>
148-
149-
150135
<div class="col-md-11" style="margin-bottom: 1.0em;text-align: justify">[6] Kunling, H., L. Fenghua, Jessie Hui Wang, <b>Han Zhang</b>, and Yiren Zhao. "AB-TCAD: An Access Behavior-Based Two-Stage Compromised Account Detection Framework." In 2024 IFIP Networking Conference (IFIP Networking), pp. 104-112. IEEE, 2024
151-
152136
[<a href="https://www.sciencedirect.com/science/article/pii/S1389128624003281">PDF</a>]
153-
</div>
154-
155-
156-
157-
137+
</div>
158138
</div>
159139

160-
161140
<h4 style="text-align: left; color: blue; font-weight: bold">2023</h3>
162-
163141
<div class="row" style="font-size:12pt;">
164142
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[1] Shen Junxian, <b>Han Zhang*</b>, Yang Xiang, Xingang Shi, Xinrui Li, Yunxi Shen,
165143
Zijian Zhang et al. "Network-centric distributed tracing with DeepFlow: Troubleshooting your
166144
microservices in zero code." In Proceedings of the ACM SIGCOMM 2023 Conference, pp. 420-437. 2023.
167145
[<a href="https://dl.acm.org/doi/pdf/10.1145/3603269.3604823">PDF</a>]
168146
</div>
169-
170147
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[2] Ming Wang, Yahui Li, <b>Han Zhang</b>, Anlun Hong, Jun He and Jilong Wang, "Knocking
171148
Cells: Latency-Based Identification of IPv6 Cellular Addresses on the Internet," 2023 IEEE Symposium on
172149
Computers and Communications (ISCC), Gammarth, Tunisia, 2023.
@@ -177,7 +154,6 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2023</h3>
177154
Web Services (ICWS), Chicago, IL, USA, 2023.
178155
[<a href="https://ieeexplore.ieee.org/document/10248271">PDF</a>]
179156
</div>
180-
181157
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[4] Yantao Geng, <b>Han Zhang*</b>, Jilong Wang, "Delay Based Congestion Control for
182158
Cross-Datacenter Networks," 2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS),
183159
Orlando, FL, USA, 2023.
@@ -194,8 +170,6 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2023</h3>
194170
Italy, 2023.
195171
[<a href="https://ieeexplore.ieee.org/document/10279258">PDF</a>]
196172
</div>
197-
198-
199173
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[8] Heng Yu, <b>Han Zhang*</b>, Junxian Shen, Yantao Geng et al., "Serpens: A High
200174
Performance FaaS Platform for Network Functions," in IEEE Transactions on Parallel and Distributed
201175
Systems, vol. 34, no. 8, pp. 2448-2463, Aug. 2023.
@@ -217,15 +191,12 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2023</h3>
217191
[<a href="https://ieeexplore.ieee.org/document/10035502">PDF</a>]
218192
</div>
219193
</div>
220-
221194
<h4 style="text-align: left; color: blue; font-weight: bold">2022</h3>
222195
<div class="row" style="font-size:12pt;">
223-
224196
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[1] Yi Qiao, Menghao Zhang, Yu Zhou, Xiao Kong, <b>Han Zhang*</b> et al, "NetEC: Accelerating Erasure Coding Reconstruction With In-Network Aggregation,"
225197
in IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 10, pp. 2571-2583, 1 Oct. 2022
226198
[<a href="https://ieeexplore.ieee.org/document/9812868">PDF</a>]
227199
</div>
228-
229200
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[2] Su Wang, Zhiliang Wang*, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, <b>Han Zhang</b>
230201
et al., "THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph
231202
Learning," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3972-3987, 2022.
@@ -237,46 +208,38 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2022</h3>
237208
Engineering". IEEE/ACM Transactions on Networking, 2022.
238209
[<a href="https://ieeexplore.ieee.org/document/9980572">PDF</a>]
239210
</div>
240-
241211
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[4] Zongyi Zhao, Xingang Shi*, Zhiliang Wang, Qi Li, <b>Han Zhang</b> and Xia Yin,
242212
"Efficient and Accurate Flow Record Collection With HashFlow," in IEEE Transactions on Parallel and
243213
Distributed Systems, vol. 33, no. 5, pp. 1069-1083, 1 May 2022.
244214
[<a href="https://smartinternet.group/wp-content/uploads/2024/01/paper-zhzy-hashflow-tpds.pdf">PDF</a>]
245215
</div>
246-
247216
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[5] Shangbin Han, Qianhong Wu, <b>Han Zhang</b>, Bo Qin, Jiangyuan Yao, Willy Susilo,
248217
"Autoperman: Automatic Network Traffic Anomaly Detection with Ensemble Learning". In: Sun, X.,
249218
Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022.
250219
[<a href="https://link.springer.com/chapter/10.1007/978-3-031-06761-7_49">PDF</a>]
251-
</div>
252-
220+
</div>
253221
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[6] Junxian Shen, <b>Han Zhang*</b>, Yantao Geng, Jiawei Li, Jilong Wang, and Mingwei Xu.
254222
2022, "Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing", In
255223
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22).
256224
Association for Computing Machinery, New York, NY, USA, 2627–2641.
257225
[<a href="https://dl.acm.org/doi/pdf/10.1145/3548606.3560629">PDF</a>]
258226
</div>
259-
260227
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[7] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, <b>Han Zhang</b>,
261228
Zhihua Wang et al.,"Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and
262229
Adaptation", Network and Distributed System Security Symposium 2022.
263230
[<a href="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f830_paper.pdf">PDF</a>]
264231
</div>
265-
266-
267232
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[8] Heng Yu, Junxain Shen, <b>Han Zhang*</b>, Jilong Wang, Congcong Miao and Mingwei Xu,
268233
"Scorpius: Proactive Code Preparation to Accelerate Function Startup," 2022 IEEE/ACM 30th International
269234
Symposium on Quality of Service (IWQoS), Oslo, Norway, 2022.
270235
[<a href="https://ieeexplore.ieee.org/document/9812868">PDF</a>]
271236
</div>
272-
273237
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[9] Yongkang Chen, Ming Zhang*, Jin Li, Xiaohui Kuang, Xurong Zhang and <b>Han Zhang</b>,
274238
"Dynamic and Diverse Transformations for Defending Against Adversarial Examples," 2022 IEEE
275239
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
276240
Wuhan, China, 2022.
277241
[<a href="https://ieeexplore.ieee.org/document/10063418">PDF</a>]
278242
</div>
279-
280243
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[10] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang and <b>Han Zhang</b>,
281244
"Centralized Network Utility Maximization with Accelerated Gradient Method," 2022 IEEE 30th
282245
International Conference on Network Protocols (ICNP), Lexington, KY, USA, 2022.
@@ -289,9 +252,6 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2022</h3>
289252
[<a href="https://ieeexplore.ieee.org/document/9900159">PDF</a>]
290253
</div>
291254
</div>
292-
293-
294-
295255
<h4 style="text-align: left; color: blue; font-weight: bold">2021</h3>
296256
<div class="row" style="font-size:12pt;">
297257

@@ -334,8 +294,6 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2021</h3>
334294
[<a href="https://www.techscience.com/cmc/v66n2/40670/html">PDF</a>]
335295
</div>
336296
</div>
337-
338-
339297
<h4 style="text-align: left; color: blue; font-weight: bold">2020</h3>
340298
<div class="row" style="font-size:12pt;">
341299
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[1]Weihan Chen, Zhiliang Wang, <b>Han Zhang</b>, Xia Yin, Xingang Shi and Lei Sun,
@@ -344,26 +302,21 @@ <h4 style="text-align: left; color: blue; font-weight: bold">2020</h3>
344302
Canada, 2020.
345303
[<a href="https://ieeexplore.ieee.org/document/9162655">PDF</a>]
346304
</div>
347-
348305
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[2]Yahui Li, Zhiliang Wang*, Xia Yin, Xingang Shi, Jianping Wu, Fangdan Ye, Jiangyuan
349306
Yao, <b>Han Zhang</b>, "Assisting reachability verification of network configurations updates with NUV", Computer Networks
350307
Volume 177, 4 August 2020.
351308
[<a href="https://www.sciencedirect.com/science/article/pii/S1389128619314458">PDF</a>]
352309
</div>
353-
354-
355310
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[3]Haijun Geng, <b>Han Zhang</b>, Xingang Shi*, Zhiliang Wang, Xia Yin, "Efficient
356311
computation of loop-free alternates", Journal of Network and Computer Applications, Volume 151, 1
357312
February 2020.
358313
[<a href="https://www.sciencedirect.com/science/article/pii/S1084804519303613">PDF</a>]
359314
</div>
360-
361315
<div class="col-md-11 "style="margin-bottom: 1.0em;text-align: justify">[4]Haijun Geng, <b>Han Zhang</b>, Xingang Shi* et al., "A hybrid link protection scheme
362316
for ensuring network service availability in link-state routing networks," in Journal of Communications
363317
and Networks, vol. 22, no. 1, pp. 46-60, Feb. 2020
364318
[<a href="https://ieeexplore.ieee.org/abstract/document/9042897">PDF</a>]
365319
</div>
366-
367320
</div>
368321

369322

0 commit comments

Comments
 (0)