Follow
Da Yu
Da Yu
Research Scientist at ByteDance
Verified email at bytedance.com - Homepage
Title
Cited by
Cited by
Year
Safely and automatically updating in-network acl configurations with intent language
B Tian, X Zhang, E Zhai, HH Liu, Q Ye, C Wang, X Wu, Z Ji, Y Sang, ...
Proceedings of the ACM Special Interest Group on Data Communication, 214-226, 2019
882019
{dShark}: A general, easy to program and scalable framework for analyzing in-network packet traces
D Yu, Y Zhu, B Arzani, R Fonseca, T Zhang, K Deng, L Yuan
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019
542019
Accuracy, scalability, coverage: A practical configuration verifier on a global wan
F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye, C Wang, X Wu, T Guo, C Jin, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
372020
Non-access-stratum request attack in E-UTRAN
D Yu, W Wen
2012 Computing, Communications and Applications Conference, 48-53, 2012
362012
Cochecker: Detecting capability and sensitive data leaks from component chains in android
X Cui, D Yu, P Chan, LCK Hui, SM Yiu, S Qing
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
342014
Simon: Scriptable interactive monitoring for SDNs
T Nelson, D Yu, Y Li, R Fonseca, S Krishnamurthi
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking …, 2015
322015
Exodus: Toward automatic migration of enterprise network configurations to SDNs
T Nelson, AD Ferguson, D Yu, R Fonseca, S Krishnamurthi
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking …, 2015
302015
Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS)
Z Chen, W Wen, D Yu
2012 International Conference on Computing, Networking and Communications …, 2012
132012
Towards a network marketplace in a cloud
D Yu, L Mai, S Arianfar, R Fonseca, O Krieger, D Oran
8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16), 2016
72016
Automated Vulnerability Assessment and Intrusion for Server Vulnerabilities
W Huang, W Wen, D Yu
Practical Applications of Intelligent Systems: Proceedings of the Sixth …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–10