Yulai Xie
Affiliations: | 2013 | Computer Science | Huazhong University of Science and Technology |
Google:
"Yulai Xie"Parents
Sign in to add mentorDarrell D. E. Long | grad student | 2013 | Huazhong University of Science and Technology | |
(Efficient storage management of provenance and its application in security.) | ||||
Dan Feng | grad student | 2007-2013 | Huazhong University of Science and Technology |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Xie Y, Wu Y, Feng D, et al. (2020) P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases Ieee Transactions On Dependable and Secure Computing. 1-1 |
Xie Y, Jin M, Zou Z, et al. (2020) Real-time Prediction of Docker Container Resource Load Based on A Hybrid Model of ARIMA and Triple Exponential Smoothing Ieee Transactions On Cloud Computing. 1-1 |
Zou Z, Xie Y, Huang K, et al. (2019) A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest Ieee Transactions On Cloud Computing. 1-1 |
Hu D, Feng D, Xie Y, et al. (2019) Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments Ieee Transactions On Big Data |
Xie Y, Feng D, Hu Y, et al. (2018) Pagoda: A Hybrid Approach to Enable Efficient Real-time Provenance Based Intrusion Detection in Big Data Environments Ieee Transactions On Dependable and Secure Computing. 1-1 |
Xie Y, Feng D, Liao X, et al. (2018) Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead Digital Investigation. 26: 19-28 |
Xie Y, Feng D, Tan Z, et al. (2016) Unifying intrusion detection and forensic analysis via provenance awareness Future Generation Computer Systems. 61: 26-36 |
Xie Y, Feng D, Li Y, et al. (2016) Oasis: An active storage framework for object storage platform Future Generation Computer Systems. 56: 746-758 |
Xie Y, Muniswamy-Reddy K, Feng D, et al. (2013) Evaluation of a Hybrid Approach for Efficient Provenance Storage Acm Transactions On Storage. 9: 14 |
Xie Y, Feng D, Tan Z, et al. (2013) Design and Evaluation of a Provenance-Based Rebuild Framework Ieee Transactions On Magnetics. 49: 2805-2811 |