Follow
Yulai Xie
Yulai Xie
Professor of Cyber Science and Engineering, Huazhong University of Science and Technology
Verified email at hust.edu.cn - Homepage
Title
Cited by
Cited by
Year
Context-aware biaffine localizing network for temporal sentence grounding
D Liu, X Qu, J Dong, P Zhou, Y Cheng, W Wei, Z Xu, Y Xie
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
1302021
A resource-constrained and privacy-preserving edge-computing-enabled clinical decision system: A federated reinforcement learning approach
Z Xue, P Zhou, Z Xu, X Wang, Y Xie, X Ding, S Wen
IEEE Internet of Things Journal 8 (11), 9122-9138, 2021
612021
A docker container anomaly monitoring system based on optimized isolation forest
Z Zou, Y Xie, K Huang, G Xu, D Feng, D Long
IEEE Transactions on Cloud Computing 10 (1), 134-145, 2019
582019
A hybrid approach for efficient provenance storage
Y Xie, D Feng, Z Tan, L Chen, KK Muniswamy-Reddy, Y Li, DDE Long
Proceedings of the 21st ACM international conference on Information and …, 2012
542012
Evaluation of a hybrid approach for efficient provenance storage
Y Xie, KK Muniswamy-Reddy, D Feng, Y Li, DDE Long
ACM Transactions on Storage (TOS) 9 (4), 1-29, 2013
522013
Design and evaluation of oasis: An active storage framework based on t10 osd standard
Y Xie, KK Muniswamy-Reddy, D Feng, DDE Long, Y Kang, Z Niu, Z Tan
2011 IEEE 27th Symposium on Mass Storage Systems and Technologies (MSST), 1-12, 2011
522011
Real-time prediction of docker container resource load based on a hybrid model of ARIMA and triple exponential smoothing
Y Xie, M Jin, Z Zou, G Xu, D Feng, W Liu, D Long
IEEE Transactions on Cloud Computing 10 (2), 1386-1401, 2020
482020
Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments
Y Xie, D Feng, Y Hu, Y Li, S Sample, D Long
IEEE Transactions on Dependable and Secure Computing 17 (6), 1283-1296, 2018
432018
Compressing provenance graphs
Y Xie, KK Muniswamy-Reddy, DDE Long, A Amer, D Feng, Z Tan
3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP 11), 2011
432011
Unifying intrusion detection and forensic analysis via provenance awareness
Y Xie, D Feng, Z Tan, J Zhou
Future Generation Computer Systems 61, 26-36, 2016
422016
QoE-aware 3D video streaming via deep reinforcement learning in software defined networking enabled mobile edge computing
P Zhou, Y Xie, B Niu, L Pu, Z Xu, H Jiang, H Huang
IEEE Transactions on Network Science and Engineering 8 (1), 419-433, 2020
222020
Oasis: An active storage framework for object storage platform
Y Xie, D Feng, Y Li, DDE Long
Future Generation Computer Systems 56, 746-758, 2016
212016
P-gaussian: provenance-based gaussian distribution for detecting intrusion behavior variants using high efficient and real time memory databases
Y Xie, Y Wu, D Feng, D Long
IEEE Transactions on Dependable and Secure Computing 18 (6), 2658-2674, 2019
182019
Efficient provenance management via clustering and hybrid storage in big data environments
D Hu, D Feng, Y Xie, G Xu, X Gu, D Long
IEEE Transactions on Big Data 6 (4), 792-803, 2019
152019
Trustworthy and context-aware distributed online learning with autoscaling for content caching in collaborative mobile edge computing
P Zhou, S Gong, Z Xu, L Chen, Y Xie, C Jiang, X Ding
IEEE Transactions on Cognitive Communications and Networking 7 (4), 1032-1047, 2021
142021
Paradise: real-time, generalized, and distributed provenance-based intrusion detection
Y Wu, Y Xie, X Liao, P Zhou, D Feng, L Wu, X Li, A Wildani, D Long
IEEE Transactions on Dependable and Secure Computing 20 (2), 1624-1640, 2022
122022
EGC: A novel event-oriented graph clustering framework for social media text
D Hu, D Feng, Y Xie
Information Processing & Management 59 (6), 103059, 2022
112022
Method for managing object-based storage system
D Feng, L Pang, Y Xie, F Wang, Z Niu, K Zhou, J Wang, Y Yue, X Tu, S He, ...
US Patent 8,645,460, 2014
92014
An in-depth analysis of tcp and rdma performance on modern server platform
Y Wan, D Feng, F Wang, L Ming, Y Xie
2012 IEEE Seventh International Conference on Networking, Architecture, and …, 2012
82012
Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead
Y Xie, D Feng, X Liao, L Qin
Digital Investigation 26, 19-28, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20