Ennan Zhai
Ennan Zhai
Alibaba Group Inc.
Verified email at alibaba-inc.com - Homepage
Cited by
Cited by
Heading off correlated failures through independence-as-a-service
E Zhai, R Chen, DI Wolinsky, B Ford
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
Anonrep: Towards tracking-resistant anonymous reputation
E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Luax, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
Claper: Recommend classical papers to beginners
Y Wang, E Zhai, J Hu, Z Chen
2010 Seventh International Conference on Fuzzy Systems and Knowledge …, 2010
An untold story of redundant clouds: Making your service deployment truly reliable
E Zhai, R Chen, DI Wolinsky, B Ford
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 1-6, 2013
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems
TT Chekam, E Zhai, Z Li, Y Cui, K Ren
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Filtering spam in social tagging system with dynamic behavior analysis
B Liu, E Zhai, H Sun, Y Chen, Z Chen
2009 International Conference on Advances in Social Network Analysis and …, 2009
isac: Intimacy based access control for social network sites
Y Wang, E Zhai, EK Lua, J Hu, Z Chen
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
Auditing the structural reliability of the clouds
E Zhai, DI Wolinsky, H Xiao, H Liu, BF Xueyuan Su
Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale …, 2014
VRank: A context-aware approach to vulnerability scoring and ranking in SOA
J Jiang, L Ding, E Zhai, T Yu
2012 IEEE Sixth International Conference on Software Security and …, 2012
Spamclean: Towards spam-free tagging systems
E Zhai, H Sun, S Qing, Z Chen
2009 International Conference on Computational Science and Engineering 4 …, 2009
Resisting tag spam by leveraging implicit user behaviors
E Zhai, Z Li, Z Li, F Wu, G Chen
Proceedings of the VLDB Endowment 10 (3), 241-252, 2016
Dspam: Defending against spam in tagging systems via users' reliability
Y Wang, E Zhai, C Cao, Y Xie, Z Wang, J Hu, Z Chen
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
A risk-evaluation assisted system for service selection
E Zhai, L Gu, Y Hai
2015 IEEE International Conference on Web Services, 671-678, 2015
Towards web-based delta synchronization for cloud storage services
H Xiao, Z Li, E Zhai, T Xu, Y Li, Y Liu, Q Zhang, Y Liu
16th {USENIX} Conference on File and Storage Technologies ({FAST} 18), 155-168, 2018
A multi-compositional enforcement on information flow security
C Sun, E Zhai, Z Chen, J Ma
International Conference on Information and Communications Security, 345-359, 2011
Towards a reliable spam-proof tagging system
E Zhai, L Ding, S Qing
2011 Fifth International Conference on Secure Software Integration and …, 2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems
E Zhai, H Sun, S Qing, Z Chen
Peer-to-Peer Networking and Applications 4 (2), 178-191, 2011
Secguard: Secure and practical integrity protection model for operating systems
E Zhai, Q Shen, Y Wang, T Yang, L Ding, S Qing
Asia-Pacific Web Conference, 370-375, 2011
Synthesizing configuration file specifications with association rule learning
M Santolucito, E Zhai, R Dhodapkar, A Shim, R Piskac
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-20, 2017
The system can't perform the operation now. Try again later.
Articles 1–20