scispace - formally typeset
Y

Yan Chen

Researcher at Northwestern University

Publications -  521
Citations -  24026

Yan Chen is an academic researcher from Northwestern University. The author has contributed to research in topics: Computer science & Medicine. The author has an hindex of 67, co-authored 415 publications receiving 21798 citations. Previous affiliations of Yan Chen include AT&T Labs & Huawei.

Papers
More filters
Journal ArticleDOI

ANLS: Adaptive Non-Linear Sampling Method for Accurate Flow Size Measurement

TL;DR: The analysis and experiments demonstrate that an adaptive non-linear sampling method (ANLS) can significantly improve the estimation accuracy, and save memory consumption, while maintaining processing overhead comparable to existing methods.
Patent

System and Method for Privacy Leakage Detection and Prevention System without Operating System Modification

TL;DR: In this article, an instrumentation module allows tracking of privacy-sensitive information without modification of a middleware of the operating system and a process virtual machine, without the need to modify the underlying architecture.
Proceedings ArticleDOI

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks

TL;DR: This paper proposes a vulnerability-based approach, namely JShield, which uses novel opcode vulnerability signature, a deterministic finite automaton (DFA) with a variable pool at opcode level, to match drive-by download vulnerabilities.
Journal ArticleDOI

Early Paleozoic tectonic evolution of the Xing-Meng Orogenic Belt: Constraints from detrital zircon geochronology of western Erguna–Xing’an Block, North China

TL;DR: In this paper, detrital zircon U-Pb dating was applied on the Ordovician to Devonian sedimentary strata along the southeast part of the China-Mongolia border.
Journal ArticleDOI

IDGraphs: intrusion detection and analysis using stream compositing

TL;DR: The IDGraphs intrusion detection system detects and analyzes a variety of attacks and anomalies, including port scanning, worm outbreaks, stealthy TCP SYN flooding, and some distributed attacks.