Yang Zhang

Yang Zhang
University of Minnesota Twin Cities | UMN · Department of Computer Science and Engineering

About

13
Publications
977
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
161
Citations

Publications

Publications (13)
Article
Demands for wide-area connectivity between enterprise site-edge networks and central office core networks/cloud data centers have grown rapidly. Various software defined wide area network (SD-WAN) solutions have been developed with the primary aim of improving WAN link utilization. However, mechanisms used by existing SD-WAN solutions fail to provi...
Article
Website fingerprinting attacks can reveal the receiver in anonymous networks and cause a potential threat to users’ privacy. Previous studies focus more on identifying individual webpages. They also neglect the hyper-link transition information, because it induces extra “noise” to classify the original webpage. However, it is a common scenario that...
Conference Paper
Consensus is a fundamental problem in distributed computing. In this poster, we ask the following question: can we partially offload the execution of a consensus algorithm to the network to improve its performance? We argue for an affirmative answer by proposing a network-assisted implementation of the Raft consensus algorithm. Our approach reduces...
Conference Paper
In SDN, the logically centralized control plane ("network OS") is often realized via multiple SDN controllers for scalability and reliability. ONOS is such an example, where it employs Raft -- a new consensus protocol developed recently -- for state replication and consistency among the distributed SDN controllers. The reliance of network OS on con...
Conference Paper
Service Function Chains (SFCs) comprise a sequence of Network Functions (NFs) that are typically traversed in-order by data flows. Consequently, SFC delay grows linearly with the length of the SFC. Yet, for highly latency sensitive applications, this delay may be unacceptable---particularly when the constituent NFs are virtualized, running on commo...
Article
Hypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. Attackers typically use HTTP for communication with command-and-control servers, click fraud, phishing and other malicious activities, as they can easily hide among the large amount of benign HTTP traffic. The user-agent (UA) field in the HTTP header...
Article
This paper presents a framework for network bandwidth sharing to transport rate-adaptive packet video using feedback. We show how a weight-based bandwidth sharing policy can be used to allocated network bandwidth among competing video connections and design a feedback control algorithm using the available bit rate (ABR) flow control mechanism. A no...

Network

Cited By