[1] Zhang Tianyu,
Han Zhang*, Yunze Wei, Yahui Li, Xingang Shi, Jilong Wang, and Xia Yin. "ACME++: Secure ACME Client Verification for Web-PKI." ACM WWW 2025.[
PDF]
[2] Zhaozhen Wang, Xingang Shi*, Haijun Geng, Han Zhang, Xia Yin and Zhiliang Wang. "On Non-Commutative Routing. In Proceedings of the IEEE INFOCOM 2025 Conference, pp. 420-437. 2025."(to appear)
[3] Yahui Li, Han Zhang*, Jilong Wang, Xingang Shi, Xia Yin, Zhiliang Wang,
Jiankun Hu, Congcong Miao, and Jianping Wu. "Proactively Verifying Quantitative Network Policy across Unsafe and Unreliable Environments", IEEE Transactions on Information Forensics and Security.
(to appear)
[4] Ying Tian, Zhiliang Wang*, Xia Yin, Xingang Shi, Jiahai Yang and
Han Zhang*. "Centralized Network Utility Maximization with Accelerated Gradient Method", IEEE Transactions on Networking.
[
PDF]
[5] Yantao Geng, Han Zhang*, Zhiheng Wu, Yahui Li, Jilong Wang, Xia Yin. "Low-Overhead Distributed Application Observation with
DeepTrace: Achieving Accurate Tracing in Production Systems", SIGCOMM 2025.(to appear)
[6] Han Zhang, Guyue Liu*, Xingang Shi, Yahui Li, Jilong Wang, Yongqing Zhu, Ke Ruan, Jie Liang, Xia Yin. "Achieving High-Speed and Robust Encrypted Traffic
Anomaly Detection with Programmable Switches", SIGCOMM 2025.(Short paper, to appear)
[7] Zhiyun Tang, Yahui Li, Xingang Shi, Jilong Wang, Yongqing Zhu, Ke Ruan, Xia Yin, Han Zhang*. " Probabilistic Analysis of Overload-Free Property for Critical Traffic", IWQOS 2025.(to appear)
[8] Zitong Jin, Xingang Shi*, Bin Xiong, Xinyao Huang, Xiaotian Xi, Dan Li, Han Zhang, Zhiliang Wang, Xia Yin. " HELA: Inferring AS Relationships withH a Hybrid of Empirical and Learning Algorithms", IEEE Transactions on Networking.(to appear)
[9] Kaiyang Zhao, Han Zhang*, Yao Tong, Yahui Li, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu . " SRmesh: Deterministic and Efficient Diagnosis of Latency Bottleneck Links in SRv6 Networks", IEEE ICNP 2025.(to appear)
[10] Su Wang, Hongbin Sun, Zhiliang Wang,Tao Zhou, Xia Yin, Dongqi Han,
Han Zhang, Xingang Shi, Jiahai Yang. End-to-end Attack Scene Reconstruction in a Host with Rules and Anomaly-based Detection Models. IEEE Transactions on Information Forensics and Security.[
PDF]
[11] Yanxu Fu, Pei Zhang*, Han Zhang, Xiaohong Huang, kun Xie, Dandan Li. " BGPFlow: Flow-based Feature Extraction for BGP Anomaly Detection", SIGCOMM 2025 workshop (to appear)