Biblio

Export 18 results:
Filters: Author is Yang Wang  [Clear All Filters]
2021
Hu H, Jan STK, Wang Y, Wang G.  2021.  Assessing Browser-level Defense against IDN-based Phishing. 30th USENIX Security Symposium (USENIX Security 21). :3739--3756.
Wei J, Zhang G, Wang Y, Liu Z, Zhu Z, Chen J, Sun T, Zhou Q.  2021.  On the Feasibility of Parser-based Log Compression in Large-Scale Cloud Systems. 19th USENIX Conference on File and Storage Technologies (FAST 21). :249--262.
Kaushik S, Yao Y, Dewitte P, Wang Y.  2021.  "How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM}}}}). Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :159--180.
Zhang Z, Zhang Z, Yuan H, Barbosa NM, Das S, Wang Y.  2021.  WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :281--298.
2019
Hayes J, Kaushik S, Price CEmily, Wang Y.  2019.  Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). :1--20.
Wang Z, Zhang G, Wang Y, Yang Q, Zhu J.  2019.  Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems. 2019 {USENIX} Annual Technical Conference ({USENIX} {ATC} 19). :993--1008.
Jin P, Guo J, Xiao Y, Shi R, Niu Y, Liu F, Qian C, Wang Y.  2019.  PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing. 2019 {USENIX} Annual Technical Conference ({USENIX} {ATC} 19). :849--862.
2018
Ma S, Wang Y.  2018.  Accurate Timeout Detection Despite Arbitrary Processing Delays. 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). :467--480.
Zhou F, Gan Y, Ma S, Wang Y.  2018.  wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events. 13th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). :527--543.
2016
Shi R, Wang Y.  2016.  Cheap and Available State Machine Replication. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16). :265--279.
Barbosa N, Wang Y.  2016.  Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users. Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
2015
Dosono B, Hayes J, Wang Y.  2015.  ā€œIā€™m Stuck!ā€: A Contextual Inquiry of People with Visual Impairments in Authentication. Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). :151--168.
2014
Wang Y, Kapritsos M, Schmidt L, Alvisi L, Dahlin M.  2014.  Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. 11th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 14). :129--141.
Xie C, Su C, Kapritsos M, Wang Y, Yaghmazadeh N, Alvisi L, Mahajan P.  2014.  Salt: Combining ACID and BASE in a Distributed Database. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :495--509.
2013
Wang Y, Kapritsos M, Ren Z, Mahajan P, Kirubanandam J, Alvisi L, Dahlin M.  2013.  Robustness in the Salus Scalable Block Store. 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). :357--370.
2012
Kapritsos M, Wang Y, Quema V, Clement A, Alvisi L, Dahlin M.  2012.  All about Eve: Execute-Verify Replication for Multi-Core Servers. 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 12). :237--250.
Wang Y, Alvisi L, Dahlin M.  2012.  Gnothi: Separating Data and Metadata for Efficient and Available Storage Replication. 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). :413--424.