Han Zhang

Associate Professor
Email: zhhan@tsinghua.edu.cn

My research interests broadly span network systems and security, with a focus on wide area networks, the Internet, and cloud computing. My work aims to make these systems smarter and more secure by bridging networking and security with observability, data science, machine learning, formal verification, artificial intelligence, and distributed computing.

In the areas of observability and routing technologies, I have conducted in-depth research and led projects such as DeepShield. To date, I have published nearly 100 papers in top-tier international conferences and journals, including SIGCOMM, INFOCOM, CoNEXT, and CCS. My research outcomes have been widely adopted in the industry, with related technologies deeply integrated into critical national network infrastructures such as China Telecom's backbone network, the Future Internet Technology Infrastructure (FITI), and CERNET/CERNET2. These contributions serve vital sectors including telecommunications operators, the military, and other areas crucial to the national economy and people's livelihoods.

I have received the ACM SIGCSE China Rising Star Award and serve as an editorial board member for domestic journals such as Communication Technology, as well as a guest editor for international journals including MDPI Electronics and IEEE JSAC. I also regularly review for prestigious international journals such as IEEE/ACM TON, IEEE TPDS, and IEEE TIFS. In addition, I have been actively involved in organizing and serving on program committees for major international conferences, including ACM SIGCOMM, ACM CoNEXT, and IEEE INFOCOM. The technologies developed through my research have been applied to serve hundreds of millions of users.

I am looking for PhD/master students (will enroll in fall 2027) to join our exciting system and networking projects. Experience with system programming is a big plus. Feel free to contact me!

Research areas

  • Network Observability: Distributed tracing system[SIGCOMM'23] [[SIGCOMM'25]. SSL/TLS Certificate analysis framework[WWW'25]. Configuration verification algorithm[TIFS'24]. Malicious container detection system[CCS'22].Malicious traffic detection algorithm[TIFS'22],[TIFS'23],[CCS'21],[NDSS'22], [SIGCOMM'25]. Log analysis framework[TIFS'21]. APT detection algorithm[TIFS'23]. Flow measurement algorithm[TPDS'21].
  • Internet Routing: Routing reliability[ToN'22][CoNEXT'21].SDN routing[ICNP'22][INFOCOM'20].Routing protection algorithm[JNCA'20].Hybrid SDN routing[JNCA'20].Routing tester[TIFS'23].Programmable switch based routing[INFOCOM'24],[TPDS'22]. Serverless function routing[TPDS'23]. Cloud routing[INFOCOM'15],[ToN'20][IWQoS'23].Coflow routing frawework[TPDS'19][ICNP'17]
  • Selected publications (* is corresponding author) (Google scholar)

    2026

    [1] Yantao Geng, Han Zhang*, Zhiheng Wu, Yahui Li, Jilong Wang, Xia Yin. "Non-Intrusive Distributed Tracing with Method-Level Delay Estimation for Microservices Troubleshooting", ACM ICSE 2026.(to appear)

    2025

    [1] Zhang Tianyu, Han Zhang*, Yunze Wei, Yahui Li, Xingang Shi, Jilong Wang, and Xia Yin. "ACME++: Secure ACME Client Verification for Web-PKI." ACM WWW 2025.[PDF]
    [2] Zhaozhen Wang, Xingang Shi*, Haijun Geng, Han Zhang, Xia Yin and Zhiliang Wang. "On Non-Commutative Routing. In Proceedings of the IEEE INFOCOM 2025 Conference, pp. 420-437. 2025."(to appear)
    [3] Zhang, Weiting, Jiadong Ren, Tao Zheng, Ruibin Guo, Han Zhang, Shiwen Mao, and Hongke Zhang*. "GenNet: Computing-Efficient Generative AI for Deterministic Transmission Scheduling in 6G Networks", IEEE Transactions on Information Forensics and Security.in IEEE Communications Magazine, vol. 63, no. 8, pp. 48-55, August 2025, [PDF]
    [4] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang and Han Zhang*. "Centralized Network Utility Maximization with Accelerated Gradient Method", IEEE Transactions on Networking (2025). [PDF]
    [5] Yantao Geng, Han Zhang*, Zhiheng Wu, Yahui Li, Jilong Wang, Xia Yin. "Low-Overhead Distributed Application Observation with DeepTrace: Achieving Accurate Tracing in Production Systems", In Proceedings of the ACM SIGCOMM 2025 Conference, pp. 1056-1069. 2025. [PDF]
    [6] Han Zhang, Guyue Liu*, Xingang Shi, Yahui Li, Jilong Wang, Yongqing Zhu, Ke Ruan, Jie Liang, Xia Yin. "Achieving High-Speed and Robust Encrypted Traffic Anomaly Detection with Programmable Switches", In Proceedings of the ACM SIGCOMM 2025 Conference, pp. 1254-1256. 2025. [PDF]
    [7] Zhiyun Tang, Yahui Li, Xingang Shi, Jilong Wang, Yongqing Zhu, Ke Ruan, Xia Yin, Han Zhang*. " Probabilistic Analysis of Overload-Free Property for Critical Traffic", In 2025 IEEE/ACM 33rd International Symposium on Quality of Service (IWQoS), pp. 1-6. IEEE, 2025. [PDF]
    [8] Xingang Shi, Zitong Jin*, Bin Xiong, Xinyao Huang, Xiaotian Xi, Dan Li, Han Zhang, Zhiliang Wang, Xia Yin. " HELA: Inferring AS Relationships withH a Hybrid of Empirical and Learning Algorithms", IEEE Transactions on Networking (2025). [PDF]
    [9] Kaiyang Zhao, Han Zhang*, Yao Tong, Yahui Li, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu . " SRmesh: Deterministic and Efficient Diagnosis of Latency Bottleneck Links in SRv6 Networks", In 2025 IEEE 33rd International Conference on Network Protocols (ICNP) (pp. 1-12). IEEE. [PDF]
    [10] Su Wang, Hongbin Sun, Zhiliang Wang,Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang. End-to-end Attack Scene Reconstruction in a Host with Rules and Anomaly-based Detection Models. IEEE Transactions on Information Forensics and Security.[PDF]
    [11] Yanxu Fu, Pei Zhang*, Han Zhang, Xiaohong Huang, kun Xie, Dandan Li. " BGPFlow: Flow-based Feature Extraction for BGP Anomaly Detection", In Proceedings of the 1st Workshop on Next-Generation Network Observability of SIGCOMM 2025 (pp. 13-20). [PDF]
    [12] XinZhe Liu, Yahui Li*, Han Zhang,Xia Yin, Xingang Shi, Zhiliang Wang, Gang Ren, Jilong Wang, Jiangyuan Yao " Scalable and Interpretable Overlay Network Checking via Ensemble Verification", ACM CoNEXT 2025 [PDF]
    [13] Renrui Tian, Yahui Li*, Han Zhang, XinZhe Liu, Xia Yin, Xingang Shi, Zhiliang Wang, and Jilong Wang. 2025. Poster: ERIS: Evaluating ROV via ICMPv6 Rate Limiting Side Channels. In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS '25). [PDF]

    2024

    [1] Yi Qiao, Han Zhang*, Jilong Wang. "NNetFEC: In-network FEC Encoding Acceleration for Latency-sensitive Multimedia Applications." In Proceedings of the IEEE INFOCOM 2024 Conference, pp. 420-437. 2024. [PDF]
    [2] Xinzhe Liu, Yahui Li*, Han Zhang, Xia Yin, Xingang Shi, Zhiliang Wang, Gang Ren, and Jiangyuan Yao. "Poster: Scalable and Interpretable Multilayer Overlay Network Checking via Ensemble Verification. In Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos (ACM SIGCOMM Posters and Demos '24)." [PDF]
    [3] Yahui Li, Han Zhang* Jilong Wang, Xingang Shi, Xia Yin, Zhiliang Wang, Jiankun Hu, Congcong Miao, and Jianping Wu. "Proactively Verifying Quantitative Network Policy across Unsafe and Unreliable Environments", IEEE Transactions on Information Forensics and Security 19 (2024): 10099-10113. [PDF]
    [4] Weihan Chen, Zhiliang Wang*, Han Zhang, Xia Yin, Xingang Shi, "Cost-efficient flow migration for SFC dynamical scheduling in geo-distributed clouds", Computer Networks Volume 249, July 2024. [PDF]
    [5] He Jun, Yahui Li*, Han Zhang*, Changqing An, and Jilong Wang. "ROV-GD: Improving the Measurement of ROV Deployment Using Graph Difference." In 2024 IEEE Symposium on Computers and Communications (ISCC), pp. 1-7. IEEE, 2024. [PDF]
    [6] Kunling, H., L. Fenghua, Jessie Hui Wang, Han Zhang, and Yiren Zhao. "AB-TCAD: An Access Behavior-Based Two-Stage Compromised Account Detection Framework." In 2024 IFIP Networking Conference (IFIP Networking), pp. 104-112. IEEE, 2024 [PDF]

    2023

    [1] Shen Junxian, Han Zhang*, Yang Xiang, Xingang Shi, Xinrui Li, Yunxi Shen, Zijian Zhang et al. "Network-centric distributed tracing with DeepFlow: Troubleshooting your microservices in zero code." In Proceedings of the ACM SIGCOMM 2023 Conference, pp. 420-437. 2023. [PDF]
    [2] Ming Wang, Yahui Li, Han Zhang, Anlun Hong, Jun He and Jilong Wang, "Knocking Cells: Latency-Based Identification of IPv6 Cellular Addresses on the Internet," 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia, 2023. [PDF]
    [3] Jiawei Li, Han Zhang* and Jilong Wang, "PUVAR:Minimize Idle Resource SLO Violations by Uncertainty-Aware Scheduling in Cloud Platforms," 2023 IEEE International Conference on Web Services (ICWS), Chicago, IL, USA, 2023. [PDF]
    [4] Yantao Geng, Han Zhang*, Jilong Wang, "Delay Based Congestion Control for Cross-Datacenter Networks," 2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), Orlando, FL, USA, 2023. [PDF]
    [5] Allen Hong, Yahui Li*, Han Zhang*, Ming Wang, Changqing An and Jilong Wang, "A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass," 2023 IFIP Networking Conference (IFIP Networking), Barcelona, Spain, 2023. [PDF]
    [6] Jun He, Yahui Li*, Han Zhang*, Ming Wang, Changqing An, Jilong Wang, "Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors," ICC 2023.
    [7] Shuanghong Yu, Fenghua Li*, Han Zhang, Kunling He and Xingkun Yao, "GapReplay: A High-Accuracy Packet Replayer," ICC 2023 - IEEE International Conference on Communications, Rome, Italy, 2023. [PDF]
    [8] Heng Yu, Han Zhang*, Junxian Shen, Yantao Geng et al., "Serpens: A High Performance FaaS Platform for Network Functions," in IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 8, pp. 2448-2463, Aug. 2023. [PDF]
    [9] Pei Zhang, Fangzhou He, Han Zhang*, Jiankun Hu et al., "Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2076-2090, 2023. [PDF]
    [10] Tianbo Wang, Huacheng Li, Chunhe Xia*, Han Zhang and Pei Zhang, "From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1610-1624, 2023. [PDF]
    [11] Yahui Li, Han Zhang*, Jilong Wang, Xia Yin, Xingang Shi, Jianping Wu, "A General Approach to Generate Test Packets With Network Configurations," in IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 4, pp. 1362-1375, April 2023. [PDF]

    2022

    [1] Yi Qiao, Menghao Zhang, Yu Zhou, Xiao Kong, Han Zhang* et al, "NetEC: Accelerating Erasure Coding Reconstruction With In-Network Aggregation," in IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 10, pp. 2571-2583, 1 Oct. 2022 [PDF]
    [2] Su Wang, Zhiliang Wang*, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang et al., "THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3972-3987, 2022. [PDF]
    [3] Han Zhang, Yin Xia, Shi Xingang*, Wang Jilong, Wang Zhiliang, Guo Yingya, Lan Tian, Li Yahui, Zhu Yongqing, Ruan Ke, Geng Haijun. "Achieving High Availability in Inter-DC WAN Traffic Engineering". IEEE/ACM Transactions on Networking, 2022. [PDF]
    [4] Zongyi Zhao, Xingang Shi*, Zhiliang Wang, Qi Li, Han Zhang and Xia Yin, "Efficient and Accurate Flow Record Collection With HashFlow," in IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 5, pp. 1069-1083, 1 May 2022. [PDF]
    [5] Shangbin Han, Qianhong Wu, Han Zhang, Bo Qin, Jiangyuan Yao, Willy Susilo, "Autoperman: Automatic Network Traffic Anomaly Detection with Ensemble Learning". In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. [PDF]
    [6] Junxian Shen, Han Zhang*, Yantao Geng, Jiawei Li, Jilong Wang, and Mingwei Xu. 2022, "Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing", In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22). Association for Computing Machinery, New York, NY, USA, 2627–2641. [PDF]
    [7] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang et al.,"Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation", Network and Distributed System Security Symposium 2022. [PDF]
    [8] Heng Yu, Junxain Shen, Han Zhang*, Jilong Wang, Congcong Miao and Mingwei Xu, "Scorpius: Proactive Code Preparation to Accelerate Function Startup," 2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS), Oslo, Norway, 2022. [PDF]
    [9] Yongkang Chen, Ming Zhang*, Jin Li, Xiaohui Kuang, Xurong Zhang and Han Zhang, "Dynamic and Diverse Transformations for Defending Against Adversarial Examples," 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 2022. [PDF]
    [10] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang and Han Zhang, "Centralized Network Utility Maximization with Accelerated Gradient Method," 2022 IEEE 30th International Conference on Network Protocols (ICNP), Lexington, KY, USA, 2022. [PDF]
    [11] Shangbin Han, Qianhong Wu, Han Zhang* and Bo Qin, "Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic," 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), Guilin, China, 2022. [PDF]

    2021

    [1] Han Zhang, Xingang Shi*, Xia Yin, Jilong Wang, Zhiliang Wang, Yingya Guo, and Tian Lan. 2021, "Boosting bandwidth availability over inter-DC WAN," In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT '21). Association for Computing Machinery, New York, NY, USA. [PDF]
    [2] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, and Xia Yin. 2021, "DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications", In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21). Association for Computing Machinery, New York, NY, USA. [PDF]
    [3] Weihan Chen, Zhiliang Wang*, Han Zhang, Xia Yin and Xingang Shi, "Cost-Efficient Dynamic Service Function Chain Embedding in Edge Clouds," 2021 17th International Conference on Network and Service Management (CNSM), Izmir, Turkey, 2021. [PDF]
    [4] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang, Yingya Guo et al., "Traffic Engineering with Segment Routing Considering Probabilistic Failures," 2021 17th International Conference on Network and Service Management (CNSM), Izmir, Turkey, 2021. [PDF]
    [5] Yingya Guo, Weipeng Wang, Han Zhang, Wenzhong Guo, Zhiliang Wang, Ying Tian et al., "Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning", Journal of Network and Computer Applications 189, 103116, 2021. [PDF]
    [6] Shangbin Han, Qianhong Wu, Han Zhang*, Bo Qin, Jiankun Hu et al., "Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2300-2311, 2021. [PDF]
    [7] Haijun Geng, Han Zhang*, Yangyang Zhang, "Efficient Routing Protection Algorithm in Large-Scale Networks", Computers, Materials & Continua, 2021, Vol 66, Issue 3, p1733. [PDF]

    2020

    [1]Weihan Chen, Zhiliang Wang, Han Zhang, Xia Yin, Xingang Shi and Lei Sun, "Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing," IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 2020. [PDF]
    [2]Yahui Li, Zhiliang Wang*, Xia Yin, Xingang Shi, Jianping Wu, Fangdan Ye, Jiangyuan Yao, Han Zhang, "Assisting reachability verification of network configurations updates with NUV", Computer Networks Volume 177, 4 August 2020. [PDF]
    [3]Haijun Geng, Han Zhang, Xingang Shi*, Zhiliang Wang, Xia Yin, "Efficient computation of loop-free alternates", Journal of Network and Computer Applications, Volume 151, 1 February 2020. [PDF]
    [4]Haijun Geng, Han Zhang, Xingang Shi* et al., "A hybrid link protection scheme for ensuring network service availability in link-state routing networks," in Journal of Communications and Networks, vol. 22, no. 1, pp. 46-60, Feb. 2020 [PDF]

    2019

    [1] Han Zhang, Haijun Geng, Yahui Li et al., "DA&FD–Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs," in IEEE/ACM Transactions on Networking, vol. 27, no. 6, pp. 2458-2471, Dec. 2019. [PDF]
    [2] Yingya Guo, Zhiliang Wang*, Han Zhang, Xia Yin, Xingang Shi, Jianping Wu, "Joint optimization of tasks placement and routing to minimize Coflow Completion Time", Journal of Network and Computer Applications, Volume 135, 1 June 2019. [PDF]
    [3] Yahui Li, Zhiliang Wang*, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu, Han Zhang, "MSAID: Automated detection of interference in multiple SDN applications", Computer Networks, Volume 153, 22 April 2019. [PDF]
    [4] Zhiliang Wang, Han Zhang*, Xingang Shi et al, "Efficient Scheduling of Weighted Coflows in Data Centers," in IEEE Transactions on Parallel and Distributed Systems, vol. 30, no. 9, pp. 2003-2017, 1 Sept. 2019. [PDF]
    [5] Yahui Li, Xia Yin, Zhiliang Wang*, Jiangyuan Yang, Xingang Shi, Jianping Wu, Han Zhang et al, "A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges," in IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 940-969, Firstquarter 2019. [PDF]

    2018 and before

    [1] Zhifeng Liu, Xia Yin,Zhiliang Wang,Xingang Shi,Yiqiang Hua, Xiaohong Huang,Liang Wei,Jiangyuan Yao, Han Zhang, Man Zeng,Zijun Su,Shuai Liu. Design and construction of hierarchical and cross-regional SDN verification and demonstration system[J]. Telecommunications Science, 2018. [PDF]
    [2] Han Zhang, Xingang Shi, Yingya Guo, Haijun Geng, Zhiliang Wang and Xia Yin, "Joint source selection and transfer optimization for erasure coding storage system," 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 2017 [PDF]
    [3] Han Zhang, Xingang Shi*, Xia Yin and Zhiliang Wang, "Yosemite: Efficient scheduling of weighted coflows in data centers," 2017 IEEE 25th International Conference on Network Protocols (ICNP), Toronto, ON, Canada, 2017. [PDF]
    [4] Han Zhang, Xingang Shi, Xia Yin, Zhiliang Wang and Yingya Guo, "FDRC - Flow duration time based rate control in data center networks," 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), Beijing, China, 2016 [PDF]
    [5] Zongyi Zhao, Qi Li, Mingwei Xu, Xingang Shi and Han Zhang, "Reduce completion time and guarantee throughput by transport with slight congestion," 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016. [PDF]
    [6] Xiao Ma, Chuang Lin, Han Zhang*, Jianwei Liu. "Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing". Sensors (Basel). 2018. [PDF]
    [7] M. Gharaibeh, Han Zhang, C. Papadopoulos and J. Heidemann, "Assessing co-locality of IP blocks," 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, 2016 [PDF]
    [8] Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu and Han Zhang, "Incremental deployment for traffic engineering in hybrid SDN network," 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China. [PDF]
    [9] Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang and Han Zhang, "Algebra and algorithms for efficient and correct multipath QoS routing in link state networks," 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), Portland, OR, USA, 2015. [PDF]
    [10] Haijun Geng, Xia Shi, Xia Yin, Zhiliang Wang and Han Zhang, "An efficient link protection scheme for link-state routing networks," 2015 IEEE International Conference on Communications (ICC), London, UK, 2015. [PDF]
    [11] Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren and Zhiliang Wang, "More load, more differentiation — A design principle for deadline-aware congestion control," 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China. [PDF]
    [12] Han Zhang and C. Papadopoulos, "BotTalker: Generating encrypted, customizable C&C traces," 2015 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 2015. [PDF]
    [13] Haijun Geng, Xia Shi, Xingang Yin, Zhiliang Wang, Han Zhang and Jiangyuan Yao, "A hybrid link protection scheme for link-state routing networks," 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, 2014. [PDF]
    [14] Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang and Jiangyuan Yao, "Let more nodes have a second choice," 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, 2014 [PDF]
    [15] Han Zhang, Xingang Shi*, Yingya Guo, Zhiliang Wang, and Xia Yin. 2017. More load, more differentiation Let more flows finish before deadline in data center networks. Comput. Netw. 127, C (November 2017). [PDF]

    Patents

    网络可观测性(Network Observability)

  • [1] 张晗,钱林强,李卓,刘雪枫. 基于频域增强与单类自适应学习的加密流量异常检测技术: 中国, 2025108823700.
  • [2] 张晗,武志衡,耿彦涛. 一种基于内核态与用户态双路径协议特征解析的分布式请求追踪方法: 中国, 2025108823700.
  • [3] 张晗,武志衡,耿彦涛. 一种基于本地异常感知的元数据驱动型分布式请求追踪方法: 中国, 2025108823700.
  • [4] 张晗,李卓,武志衡,钱林强. 一种基于多层协议解析和智能分析的网络流量处理系统: 中国, 2025108823700.
  • [5] 张晗,李卓,钱林强,刘雪枫. 面向软件定义广域网的基于AE-DQN的双阶段自适应异常流量检测系统: 中国, 2025108823700.
  • [6] 张晗,张天宇. 一种深度学习恶意流量检测的预训练数据源审计方法: 中国, 2025108823700.
  • [7] 张晗,张天宇. 基于适应性分割熵的网络在线异常检测方法: 中国, 2025108823700.
  • [8] 张晗,张天宇. 基于频域增强与单类自适应学习的加密流量异常检测技术: 中国, 2025108823700.
  • [9] 张晗,钱林强,李卓. 基于可编程交换机的高速加密流量双平面特征提取技术: 中国, 2025108823700.
  • [10] 张晗,张天宇,李亚慧,施新刚,尹霞. 一种安全检测方法、装置、存储介质和计算机设备: 中国, 2025111146170.
  • [11] 张晗,耿彦涛,武志衡. 微服务的追踪方法、装置、设备及存储介质: 中国, 2025108823700.
  • [12] 张晗,耿彦涛,李卓,王继龙,李亚慧,尹霞. 异常流量的检测方法、装置和可编程交换机: 中国, 2025102455616.
  • [13] 张晗,沈俊贤,王继龙,李亚慧,张千里. 在线微服务应用的监控方法、系统、设备、产品及介质: 中国, 2025111339614.
  • [14] 张晗,李嘉睿,王继龙,尹霞,施新刚,安常青. 流量入侵检测方法、装置、设备、存储介质和程序产品: 中国, 2022113527830.
  • [15] 张晗,肖泽基,王继龙,李亚慧. 网络流量包头轨迹合成方法、装置、服务器及存储介质: 中国, 2025106930591.
  • [16] 张晗,赵铠阳,施新刚,尹霞,吴建平. 服务等级目标违规诊断方法、装置、设备及介质: 中国, 2025106249196.
  • [17] 张晗,汤之韫,李亚慧. 网络中链路可用性评估方法和装置、电子设备与存储介质: 中国, 2025101834526.
  • [18] 张晗,耿彦涛,施新刚,王继龙,尹霞. 基于远程带内遥测和时延的流量调度方法和装置: 中国, 2023103185259.
  • [19] 张晗,尹霞,施新刚,王继龙,王之梁. 在线检测网络流量的方法及系统: 中国, 2021112448521.
  • [20] 张晗,洪安伦,王继龙,李亚慧,安常青,王明,何俊. 基于主动时延探测的IP地理定位方法及装置: 中国, 2023104047646.
  • [21] 王之梁,韩东岐,陈闻起,钟莹,王苏,张晗,杨家海,施新刚,尹霞. 在线反馈的知识蒸馏方法和装置: 中国, 2021110457920.
  • [22] 王之梁,韩东岐,陈闻起,钟莹,王苏,张晗,杨家海,施新刚,尹霞. 面向网络安全异常检测中深度学习模型的解释方法: 中国, 2021110322092.
  • [23] 王之梁,韩东岐,金明辉,陈闻起,王凯,蔚睿,王苏,张晗,杨家海,施新刚,尹霞,肖飞,王治华,高峰. 一种网络安全异常检测中深度学习模型的更新方法与装置: 中国, 2022116066959.
  • [24] 王继龙,李嘉睿,张晗,安常青. 基于网络空间地图的网络异常检测方法及装置: 中国, 2022103140380.
  • [25] 施新刚,赵宗义,尹霞,张晗,王之梁. 一种丢包检测方法及装置、存储介质: 中国, 2022101711217.
  • [26] 施新刚,奚枭天,赵宗义,尹霞,王之梁,张晗. 一种网络异常流量检测方法和装置: 中国, 2022104896037.
  • [27] 王继龙,王明,李亚慧,王会,张晗,洪安伦,何俊. 基于时延的IPv6地址信用风险检测方法及装置: 中国, 2023105380631.
  • 互联网路由(Internet Routing)

  • [1] 张晗,佟瑶,童彦图,彭可心,高杨宸严,尹霞. 一种面向网络快速重路由的完美路由树构建方法: 中国, 2025108823700.
  • [2] 张晗,赵铠阳,尹霞,吴建平. 面向跨域分段路由的可信验证方法技术: 中国, 2025108823700.
  • [3] 张晗,童彦图,赵铠阳,高杨宸严,佟瑶,彭可心. 一种面向跨域训练流量的相位感知路由算法: 中国, 2025108823700.
  • [4] 张晗,张天宇,卫蕴泽,李亚慧,施新刚,尹霞. 基于ACME协议的安全验证方法、系统及相关装置: 中国, 2025103781364.
  • [5] 张晗,尹霞,施新刚,王之梁,王继龙. 网络资源管理方法及相关设备: 中国, 2021113508002.
  • [6] 张晗,刘雪枫,王继龙,李亚慧,尹霞. 路由中断检测方法、装置、设备及存储介质: 中国, 2025111212882.
  • [7] 张晗,王继龙,沈俊贤. 资源管理系统: 中国, 2022113735320.
  • [8] 张晗,赵铠阳,尹霞,吴建平. 一种基于带内网络遥测的OSPF路由异常检测方法技术: 中国, 2025108823700.
  • [9] 张晗,卫蕴泽,施新刚,李亚慧,尹霞. 互联网测量服务挖掘方法、装置和存储介质: 中国, 2025108823700.
  • [10] 张晗,卫蕴泽,尹霞,李亚慧,施新刚. 互联网路由器地理定位方法、装置和存储介质: 中国, 2025108823700.
  • [11] 张晗,李卓,王继龙,李亚慧,尹霞. 面向互联网服务提供商的加密多媒体流量分类方法及装置: 中国, 2025107230445.
  • [12] 王继龙,王明,李亚慧,王会,张晗,洪安伦,何俊. 基于时延的IPv6地址信用风险检测方法及装置: 中国, 2023105380631.
  • [13] 李亚慧,刘鑫喆,张晗,尹霞,施新刚,王之梁,任罡. 基于混合符号化的路由配置验证方法、装置和电子设备: 中国, 2024114253273.
  • [14] 李亚慧,刘鑫喆,张晗,尹霞,施新刚,王之梁,任罡. 基于大语言模型的路由配置互译方法、装置、设备及介质: 中国, 2024114230017.
  • [15] 李亚慧,刘鑫喆,张晗,尹霞,施新刚,王之梁,任罡.基于互联网路由配置的测试数据包生成方法及装置: 中国, 2023101936963.
  • [16] 王之梁,陈蔚瀚,张晗,尹霞,施新刚. 服务链部署处理的方法、装置、计算机存储介质及终端: 中国, 2021112477670.
  • [17] 王之梁,陈蔚瀚,张晗,尹霞,施新刚. 基于服务链的流量迁移方法、装置、电子设备及存储介质: 中国, 2023111883642.
  • [18] 王之梁,陈蔚瀚,张晗,尹霞,施新刚. 基于流量迁移的模型训练方法、装置、设备及介质: 中国, 2023111845852.
  • [19] 王之梁,田莹,尹霞,施新刚,杨家海,张晗. 一种分段路由网络中考虑故障的流量工程计算方法和装置: 中国, 2021112324196.
  • Key Projects

  • National Key Research and Development Program, Study of Inter-DC WAN resource allocation for bulk transfer, No.62002009, Project PI. (国家自然科学基金,青年项目, 面向批量传输的数据中心广域网资源分配研究, No.62002009, 项目负责人).
  • National Key Research and Development Program, Network Analysis Based Anomaly Detection Techniques for Distributed Microservices Architecture Applications, No.62572269, Project PI. (国家自然科学基金, 面上项目, 基于网络行为分析的分布式微服务架构应用异常检测技术研究,No.62572269, 项目负责人).
  • National Key Research and Development Program, Research on Key Technologies for Intelligent Computing Convergence Network Deployment and Routing, No.62394322, Sub-project PI. (国家自然科学基金, 重大项目, 智算融合网络组网与路由关键技术研究, No.62394322, 课题负责人).
  • National Key Research and Development Program, Research on IoT Security Technology Based on Blockchain, No.61932011, Sub-project PI. (国家自然科学基金, 重点项目, 基于区块链的物联网安全技术研究,No.61932011, 课题负责人).
  • Key research projects of the Ministry of Industry and Information Technology, High-precision BeiDou vehicle-grade positioning chip and terminal positioning system, No. TC220A04A-78, Project PI. (工信部重点研究计划, 一般项目, 高精度北斗车规级定位芯片及终端定位系统, 课题负责人).
  • 绿盟科技, 企事业单位合作, 安全试验设施关键技术研究,项目负责人
  • 中国电信, 企事业单位合作, 大规模广域网感知与优化技术研究,项目负责人
  • 深信服科技公司, 企事业单位合作, 应用行为感知的广域网传输优化技术项目,项目负责人
  • 腾讯科技, 企事业单位合作, 大规模微服务系统可观测性技术,项目负责人
  • 科技部, 重点研发计划, 2018YFB1800400, 大规模安全可信的编址路由关键技术和应用示范,参与
  • Academic Activites

  • TPC member,IEEE INFOCOM 2025, 2024, 2023
  • TPC member,ACM CoNEXT 2025,2026
  • TPC member,IEEE ICNP 2025,2024
  • TPC Chairs, ACM SIGCOMM-NGNO 2025
  • Travel Grant Chairs, ACM APNET 2025
  • Awards

  • First Prize, Science and Technology Award, China Institute of Communications, “Key Technologies and Large-Scale Applications of Metropolitan Area Cloud Networks”, 2025. (城域云网关键技术及规模应用,中国通信学会科学技术一等奖).
  • Excellent Service Award, ICA3PP 2023
  • ACM TURC SIGCSE China, 2023
  • Applied Networking Research Prize Certificate of Award, 2023
  • NSGA Best Researcher Award, 2025
  • Teachings

  • Internet engineering,(undergraduate, 32 class hours,Autumn 2023), Autumn 2024.
  • Network optimation theory and method,(graduate, 32 class hours,Autumn 2022), Autumn 2023, Autumn 2024.
  • Network anomaly detection,(graduate, 32 class hours),Spring 2022, Spring 2023, Spring 2024,Spring 2025.
  • Students

  • Kaiyang Zhao (Ph.D., Grade 5, co-advised with Prof. Xia Yin and Prof. Jianping Wu)
  • Chenyan Gaoyang (Ph.D., Grade 4, co-advised with Prof. Youjian Zhao)
  • Yantao Geng (Ph.D., Grade 4)
  • Xuefeng Liu (Ph.D., Grade 3)
  • Zeji Xiao (Ph.D., Grade 3, co-advised with Prof. Jilong Wang)
  • Zhuo Li (Master, Grade 3)
  • Boyang Wang (Ph.D., Grade 2, co-advised with Prof. Xia Yin)
  • Hanyang Lin (Master, Grade 2)
  • Zhiheng Wu (Master, Grade 2)
  • Yantu Tong (Ph.D., Grade 1)
  • Linqiang qian (Master, Grade 1)
  • Yao Tong (Master, Grade 1,co-advised with Prof. Xia Yin)
  • Kexin Peng (Master, Grade 1,co-advised with Prof. Youjian Zhao)
  • Alumni

  • Zhiyun Tang (Master), Joined Huawei Technologies Co., Ltd
  • Junxian Shen (Ph.D., co-advised with Prof. Jilong Wang),Joined South China University of Technology
  • Jiarui Li (Master, co-advised with Prof. Jilong Wang), Joined Alibaba Cloud Computing Co. Ltd.
  • Heng Yu (Ph.D. co-advised with Prof. Jilong Wang), Joined Zhongguancun Laboratory.
  • Yi Qiao (Ph.D., co-advised with Prof. Jilong Wang), Joined China Academy of Space Technology.
  • Shangbin Han (Ph.D., co-advised with Prof. Qianhong Wu), Joined Quan Cheng Laboratory.
  • 本站总访问量