Biblio

Export 18 results:
Filters: Author is Yang Wang  [Clear All Filters]
2021
Hu H, Jan STK, Wang Y, Wang G.  2021.  Assessing Browser-level Defense against IDN-based Phishing. 30th USENIX Security Symposium (USENIX Security 21). :3739--3756.
Wei J, Zhang G, Wang Y, Liu Z, Zhu Z, Chen J, Sun T, Zhou Q.  2021.  On the Feasibility of Parser-based Log Compression in Large-Scale Cloud Systems. 19th USENIX Conference on File and Storage Technologies (FAST 21). :249--262.
Kaushik S, Yao Y, Dewitte P, Wang Y.  2021.  "How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM}}}}). Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :159--180.
Zhang Z, Zhang Z, Yuan H, Barbosa NM, Das S, Wang Y.  2021.  WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :281--298.
2019
Hayes J, Kaushik S, Price CEmily, Wang Y.  2019.  Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies. Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). :1--20.
Wang Z, Zhang G, Wang Y, Yang Q, Zhu J.  2019.  Dayu: Fast and Low-interference Data Recovery in Very-large Storage Systems. 2019 USENIX Annual Technical Conference (USENIX ATC 19). :993--1008.
Jin P, Guo J, Xiao Y, Shi R, Niu Y, Liu F, Qian C, Wang Y.  2019.  PostMan: Rapidly Mitigating Bursty Traffic by Offloading Packet Processing. 2019 USENIX Annual Technical Conference (USENIX ATC 19). :849--862.
2018
Ma S, Wang Y.  2018.  Accurate Timeout Detection Despite Arbitrary Processing Delays. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :467--480.
Zhou F, Gan Y, Ma S, Wang Y.  2018.  wPerf: Generic Off-CPU Analysis to Identify Bottleneck Waiting Events. 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). :527--543.
2016
Shi R, Wang Y.  2016.  Cheap and Available State Machine Replication. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :265--279.
Barbosa N, Wang Y.  2016.  Lessons Learned from Designing and Evaluating Smart Device-based Authentication for Visually Impaired Users. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016).
2015
Dosono B, Hayes J, Wang Y.  2015.  ā€œIā€™m Stuck!ā€: A Contextual Inquiry of People with Visual Impairments in Authentication. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). :151--168.
2014
Wang Y, Kapritsos M, Schmidt L, Alvisi L, Dahlin M.  2014.  Exalt: Empowering Researchers to Evaluate Large-Scale Storage Systems. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). :129--141.
Xie C, Su C, Kapritsos M, Wang Y, Yaghmazadeh N, Alvisi L, Mahajan P.  2014.  Salt: Combining ACID and BASE in a Distributed Database. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :495--509.
2013
Wang Y, Kapritsos M, Ren Z, Mahajan P, Kirubanandam J, Alvisi L, Dahlin M.  2013.  Robustness in the Salus Scalable Block Store. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). :357--370.
2012
Kapritsos M, Wang Y, Quema V, Clement A, Alvisi L, Dahlin M.  2012.  All about Eve: Execute-Verify Replication for Multi-Core Servers. 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). :237--250.
Wang Y, Alvisi L, Dahlin M.  2012.  Gnothi: Separating Data and Metadata for Efficient and Available Storage Replication. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :413--424.