Name
Affiliation
Papers
YINGLIAN XIE
MSR Silicon Valley, Mountain View, CA, USA
37
Collaborators
Citations 
PageRank 
65
1140
76.73
Referers 
Referees 
References 
2674
1097
598
Search Limit
1001000
Title
Citations
PageRank
Year
Web PKI: Closing the Gap between Guidelines and Practices.70.612014
TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services00.342014
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures421.342013
Intention and Origination: An Inside Look at Large-Scale Bot Queries.40.522013
SocialWatch: detection of online service abuse via large-scale social graphs90.592013
Global authentication in an untrustworthy world100.742013
Early security classification of skype users via machine learning60.442013
Collaborative TCP sequence number inference attack: how to crack sequence number under a second361.262012
Populated IP addresses: classification and applications60.612012
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.583.912012
Knowing your enemy: understanding and detecting malicious web advertising672.242012
Innocent by association: early recognition of legitimate users180.652012
How user behavior is related to social affinity160.652012
Heat-seeking honeypots: design and experience140.952011
Optimizing data partitioning for data-parallel computing200.902011
Context-based online configuration-error detection200.742011
deSEO: combating search-result poisoning351.852011
On Network-level Clusters for Spam Detection.332.822010
SBotMiner: large scale search bot detection291.472010
How to tell an airport from a home: techniques and applications40.712010
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique70.632010
Searching the searchers with searchaudit60.742010
BotGraph: large scale spamming botnet detection813.552009
De-anonymizing the internet using unreliable IDs161.092009
Less is More: Sparse Graph Mining with Compact Matrix Decomposition302.662008
Spamming botnets: signatures and characteristics1849.682008
End-to-end web application security322.202007
How dynamic are IP addresses?957.142007
Forensic Analysis for Epidemic Attacks in Federated Networks191.002006
Virtual disk based centralized management for enterprise networks00.342006
Protecting Privacy in Key-Value Search Systems30.442006
Worm Origin Identification Using Random Moonwalks533.232005
Seurat: A Pointillist Approach to Anomaly Detection231.942004
A secure distributed search system40.482002
Locality in search engine queries and its implications for caching967.852002
Early measurements of a cluster-based architecture for P2P systems459.392001
A Secure, Publisher-Centric Web Caching Infrastructure121.042001