default search action
An Wang 0002
Person information
- affiliation: Case Western Reserve University, Cleveland, Ohio, USA
- affiliation (Ph.D. 2018): George Mason University, Fairfax, VA, USA
Other persons with the same name
- An Wang — disambiguation page
- An Wang 0001 — Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China (and 3 more)
- An Wang 0003 — University of Washington, Seattle, WA, USA
- An Wang 0004 — Nanjing University of Information Science and Technology, Nanjing, China
- An Wang 0005 — Shandong University, Jinan, China
- An Wang 0006 — University of Western Ontario, Canada
- An Wang 0007 — Chinese University of Hong Kong, Department of Electronic Engineering, Hong Kong, China
- An Wang 0008 — Fuzhou University, National and Local Joint Engineering Research Center of Satellite Geospatial Information Technology, Key Laboratory of Spatial Data Mining and Information Sharing, Fuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Zili Zha, An Wang, Yang Guo, Songqing Chen:
Towards Software Defined Measurement in Data Centers: A Comparative Study of Designs, Implementation, and Evaluation. IEEE Trans. Cloud Comput. 11(2): 2057-2070 (2023) - [j7]Yuanjun Dai, An Wang, Yang Guo, Songqing Chen:
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks. ACM Trans. Internet Techn. 23(1): 9:1-9:25 (2023) - 2022
- [j6]Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j5]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [c29]Yu Mi, David Mohaisen, An Wang:
AutoDefense: Reinforcement Learning Based Autoreactive Defense Against Network Attacks. CNS 2022: 163-171 - [c28]Yibo Guo, An Wang:
dSyncPS: delayed synchronization for dynamic deployment of distributed machine learning. EuroMLSys@EuroSys 2022: 79-86 - [c27]Zili Zha, An Wang, Yang Guo, Qun Li, Kun Sun, Songqing Chen:
EZPath: Expediting Container Network Traffic via Programmable Switches. IFIP Networking 2022: 1-8 - 2021
- [c26]Li Liu, Haoliang Wang, An Wang, Mengbai Xiao, Yue Cheng, Songqing Chen:
Mind the Gap: Broken Promises of CPU Reservations in Containerized Multi-tenant Clouds. SoCC 2021: 243-257 - [i3]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i2]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - 2020
- [j4]An Wang, Wentao Chang, Songqing Chen, Aziz Mohaisen:
A Data-Driven Study of DDoS Attacks and Their Dynamics. IEEE Trans. Dependable Secur. Comput. 17(3): 648-661 (2020) - [c25]Afsah Anwar, Hisham Alasmary, Jeman Park, An Wang, Songqing Chen, David Mohaisen:
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. ICICS 2020: 443-461 - [c24]Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim:
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study. ICTC 2020: 100-104 - [c23]Pengfei Peng, An Wang:
SmartMon: Misbehavior Detection via Monitoring Smart Home Automations. SEC 2020: 327-333 - [c22]Yang Guo, Franklin Liu, An Wang, Hang Liu:
AccuPIPE: Accurate Heavy Flow Detection in the Data Plane Using Programmable Switches. NOMS 2020: 1-5 - [c21]Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen:
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks. WISA 2020: 362-374 - [i1]Jaesung Yoo, Jeman Park, An Wang, David Mohaisen, Joongheon Kim:
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study. CoRR abs/2009.09579 (2020)
2010 – 2019
- 2019
- [j3]An Wang, Zili Zha, Yang Guo, Songqing Chen:
Software-Defined Networking Enhanced Edge Computing: A Network-Centric Survey. Proc. IEEE 107(8): 1500-1519 (2019) - [c20]Zili Zha, An Wang, Yang Guo, Doug Montgomery, Songqing Chen:
BotSifter: An SDN-based Online Bot Detection Framework in Data Centers. CNS 2019: 142-150 - [c19]Yu Mi, An Wang:
ML-Pushback: Machine Learning Based Pushback Defense Against DDoS. CoNEXT Companion 2019: 80-81 - [c18]Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. DSC 2019: 1-8 - [c17]An Wang, Zili Zha, Yang Guo, Songqing Chen:
A SDN-based network layer for edge computing: poster. SEC 2019: 334-336 - [c16]An Wang, Aziz Mohaisen, Songqing Chen:
XLF: A Cross-layer Framework to Secure the Internet of Things (IoT). ICDCS 2019: 1830-1839 - [c15]Li Liu, Haoliang Wang, An Wang, Mengbai Xiao, Yue Cheng, Songqing Chen:
vCPU as a container: towards accurate CPU allocation for VMs. VEE 2019: 193-206 - 2018
- [j2]Mohammad Karami, An Wang, Songqing Chen:
Attribution of Economic Denial of Sustainability Attacks in Public Clouds. EAI Endorsed Trans. Security Safety 4(13): e2 (2018) - [j1]An Wang, Wentao Chang, Songqing Chen, Aziz Mohaisen:
Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis. IEEE/ACM Trans. Netw. 26(6): 2843-2855 (2018) - [c14]Li Liu, An Wang, Wanyu Zang, Meng Yu, Songqing Chen:
Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks. ICC 2018: 1-6 - [c13]Li Liu, An Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen:
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling. SecureComm (1) 2018: 491-511 - [c12]Zili Zha, An Wang, Yang Guo, Doug Montgomery, Songqing Chen:
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges. SOSR 2018: 16:1-16:7 - 2017
- [c11]An Wang, Aziz Mohaisen, Songqing Chen:
An Adversary-Centric Behavior Modeling of DDoS Attacks. ICDCS 2017: 1126-1136 - [c10]An Wang, Yang Guo, Songqing Chen, Fang Hao, T. V. Lakshman, Doug Montgomery, Kotikalapudi Sriram:
vPROM: VSwitch enhanced programmable measurement in SDN. ICNP 2017: 1-10 - [c9]Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Understanding Adversarial Strategies from Bot Recruitment to Scheduling. SecureComm 2017: 397-417 - 2016
- [c8]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks. WISA 2016: 15-28 - 2015
- [c7]Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Measuring Botnets in the Wild: Some New Trends. AsiaCCS 2015: 645-650 - [c6]An Wang, Yang Guo, Fang Hao, T. V. Lakshman, Songqing Chen:
UMON: flexible and fine grained traffic monitoring in open vSwitch. CoNEXT 2015: 15:1-15:7 - [c5]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Capturing DDoS Attack Dynamics Behind the Scenes. DIMVA 2015: 205-215 - [c4]An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. DSN 2015: 379-390 - 2014
- [c3]An Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen:
POSTER: How Distributed Are Today's DDoS Attacks? CCS 2014: 1511-1513 - [c2]An Wang, Yang Guo, Fang Hao, T. V. Lakshman, Songqing Chen:
Scotch: Elastically Scaling up SDN Control-Plane using vSwitch based Overlay. CoNEXT 2014: 403-414 - [c1]Wentao Chang, An Wang, Aziz Mohaisen, Songqing Chen:
Characterizing botnets-as-a-service. SIGCOMM 2014: 585-586
Coauthor Index
aka: Aziz Mohaisen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint