Xiaowei Yang
Associate Professor of Computer Science
Current Appointments & Affiliations
- Associate Professor of Computer Science, Computer Science, Trinity College of Arts & Sciences 2012
Contact Information
- Box 90129, Durham, NC 27708-0129
- Lsrc-D336, Durham, NC 27708
-
xiaowei.yang@duke.edu
(919) 660-6536
-
http://www.cs.duke.edu/~xwy/
- Background
-
Education, Training, & Certifications
- Ph.D., Massachusetts Institute of Technology 2004
- B.S.E., Tsinghua University (China) 1996
-
Previous Appointments & Affiliations
- Associate Professor in the Department of Electrical and Computer Engineering, Electrical and Computer Engineering, Pratt School of Engineering 2014 - 2021
- Assistant Professor, Electrical and Computer Engineering, Pratt School of Engineering 2009 - 2014
- Assistant Professor of Computer Science, Computer Science, Trinity College of Arts & Sciences 2008 - 2011
- Recognition
-
Awards & Honors
- Research
-
Selected Grants
- CNS Core:Small: Optimizing IP Anycast Performance at Scale awarded by National Science Foundation 2022 - 2025
- CNS Core: Small: Collaborative Research: Improving the Reliability of Cable Broadband Networks with Proactive Network Maintenance awarded by National Science Foundation 2019 - 2022
- FIA-NP: Collaborative Research: The Next-Phase MobilityFirst Project - From Architecture and Protocol Design to Advanced Services and Trial Deployments awarded by National Science Foundation 2014 - 2018
- NeTS: Small: Exploiting Social Networks to Build Trustworthy Distributed Systems awarded by National Science Foundation 2010 - 2015
- FIA:Collaborative Research:MobilityFirst: A Robust and Trustworthy Mobility-Centric Architecture for the Future Internet awarded by National Science Foundation 2010 - 2014
- CAREER: A Multidisciplinary Approach to Network Architecture Design awarded by National Science Foundation 2009 - 2014
- CT-ER: A DoS-Resistant Internet Architecture awarded by National Science Foundation 2008 - 2009
- NETS-FIND: An Internet Architecture for User-Controlled Routes awarded by National Science Foundation 2008 - 2009
-
Fellowships, Supported Research, & Other Grants
- Seed Grant: The Identity & Computing Lecture Series: Understanding Racism and Bias in Computing awarded by Duke Office of Faculty Advancement 2021
-
External Relationships
- Google LLC
- Publications & Artistic Works
-
Selected Publications
-
Academic Articles
-
Xie, B., X. Yang, Z. Yu, G. Luo, and R. Guo. “Two-stage optimization model for annual rolling generation scheduling considering open and impartial dispatching.” Dianli Zidonghua Shebei/Electric Power Automation Equipment 38, no. 12 (December 10, 2018): 155–61. https://doi.org/10.16081/j.issn.1006-6047.2018.12.023.Full Text
-
Chen, Y., Q. Cao, and X. Yang. “PacketCloud: A Cloudlet-Based Open Platform for In-Network Services.” Ieee Transactions on Parallel and Distributed Systems 27, no. 4 (April 1, 2016): 1146–59. https://doi.org/10.1109/TPDS.2015.2424222.Full Text
-
Sirivianos, M., K. Kim, J. W. Gan, and X. Yang. “Leveraging social feedback to verify online identity claims.” Acm Transactions on the Web 8, no. 2 (January 1, 2014). https://doi.org/10.1145/2543711.Full Text
-
Chen, Y., B. Liu, A. Li, X. Yang, and J. Bi. “PacketCloud: An open platform for elastic in-network services.” Proceedings of the Annual International Conference on Mobile Computing and Networking, Mobicom, November 13, 2013, 17–22. https://doi.org/10.1145/2505906.2505910.Full Text
-
Liu, B., J. Bi, and X. Yang. “FaaS: Filtering IP spoofing traffic as a service.” Computer Communication Review 42, no. 4 (December 1, 2012): 113–14. https://doi.org/10.1145/2377677.2377707.Full Text
-
Wu, X., D. Turner, C. C. Chen, D. A. Maltz, X. Yang, L. Yuan, and M. Zhang. “Netpilot: Automating datacenter network failure mitigation.” Computer Communication Review 42, no. 4 (December 1, 2012): 419–30. https://doi.org/10.1145/2377677.2377759.Full Text
-
Wu, X., and X. Yang. “DARD: Distributed adaptive routing for datacenter networks.” Proceedings International Conference on Distributed Computing Systems, October 5, 2012, 32–41. https://doi.org/10.1109/ICDCS.2012.69.Full Text
-
Liu, B., J. Bi, and X. Yang. “FaaS: Filtering IP spoofing traffic as a service.” Sigcomm’12 Proceedings of the Acm Sigcomm 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication, September 26, 2012, 113–14. https://doi.org/10.1145/2342356.2342386.Full Text
-
Wu, X., D. Turner, C. C. Chen, D. A. Maltz, X. Yang, L. Yuan, and M. Zhang. “NetPilot: Automating datacenter network failure mitigation.” Sigcomm’12 Proceedings of the Acm Sigcomm 2012 Conference Applications, Technologies, Architectures, and Protocols for Computer Communication, September 26, 2012, 419–30. https://doi.org/10.1145/2342356.2342438.Full Text
-
Sirivianos, M., K. Kim, J. W. Gan, and X. Yang. “Assessing the veracity of identity assertions via OSNs.” 2012 4th International Conference on Communication Systems and Networks, Comsnets 2012, March 15, 2012. https://doi.org/10.1109/COMSNETS.2012.6151325.Full Text
-
Li, A., X. Zong, S. Kandula, X. Yang, and M. Zhang. “CloudProphet: Towards application performance prediction in cloud.” Proceedings of the Acm Sigcomm 2011 Conference, Sigcomm’11, September 29, 2011, 426–27. https://doi.org/10.1145/2018436.2018502.Full Text
-
Li, A., X. Zong, S. Kandula, X. Yang, and M. Zhang. “Cloud Prophet: Towards application performance prediction in cloud.” Computer Communication Review 41, no. 4 (August 15, 2011): 426–27. https://doi.org/10.1145/2043164.2018502.Full Text
-
Sirivianos, M., K. Kim, and X. Yang. “SocialFilter: Introducing social trust to collaborative spam mitigation.” Proceedings Ieee Infocom, August 2, 2011, 2300–2308. https://doi.org/10.1109/INFCOM.2011.5935047.Full Text
-
Li, A., X. Yang, S. Kandula, and M. Zhang. “Comparing public-cloud providers.” Ieee Internet Computing 15, no. 2 (March 1, 2011): 50–53. https://doi.org/10.1109/MIC.2011.36.Full Text
-
Li, A., X. Yang, S. Kandula, and M. Zhang. “CloudCmp: Comparing public cloud providers.” Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc, December 1, 2010, 1–14. https://doi.org/10.1145/1879141.1879143.Full Text
-
Liu, X., X. Yang, and Y. Xia. “NetFence: Preventing internet denial of service from inside out.” Computer Communication Review 40, no. 4 (December 1, 2010): 255–66. https://doi.org/10.1145/1851275.1851214.Full Text
-
Liu, X., X. Yang, and Y. Xia. “NetFence: Preventing internet denial of service from inside out.” Sigcomm’10 Proceedings of the Sigcomm 2010 Conference, November 15, 2010, 255–66. https://doi.org/10.1145/1851182.1851214.Full Text
-
Almishari, M., and X. Yang. “Ads-portal domains: Identification and measurements.” Acm Transactions on the Web 4, no. 2 (April 1, 2010). https://doi.org/10.1145/1734200.1734201.Full Text
-
Yang, X., Y. Lu, and L. Zan. “Improving XCP to achieve max-min fair bandwidth allocation.” Computer Networks 54, no. 3 (February 26, 2010): 442–61. https://doi.org/10.1016/j.comnet.2008.08.025.Full Text
-
Li, A., X. Yang, and D. Wetherall. “SafeGuard: Safe forwarding during route changes.” Conext’09 Proceedings of the 2009 Acm Conference on Emerging Networking Experiments and Technologies, December 1, 2009, 301–12. https://doi.org/10.1145/1658939.1658974.Full Text
-
Sirivianos, M., X. Yang, and S. Jarecki. “Robust and efficient incentives for cooperative content distribution.” Ieee/Acm Transactions on Networking 17, no. 6 (December 1, 2009): 1766–79. https://doi.org/10.1109/TNET.2009.2021655.Full Text
-
Gjoka, M., M. Sirivianos, A. Markopoulou, and X. Yang. “Poking facebook: Characterization of OSN applications.” Proceedings of the Acm Sigcomm 2008 Conference on Computer Communications 1st Workshop on Online Social Networks, Wosp’08, December 1, 2008, 31–36. https://doi.org/10.1145/1397735.1397743.Full Text
-
Liu, X., X. Yang, and Y. Lu. “To filter or to authorize: Network-layer DoS defense against multimillion-node botnets.” Computer Communication Review 38, no. 4 (December 1, 2008): 195–206. https://doi.org/10.1145/1402946.1402981.Full Text
-
Yang, X. “Auction, but don't block.” Sigcomm 2008 Conference and the Co Located Workshops Proceedings of the 3rd International Workshop on Economics of Networked Systems, Netecon’08, December 1, 2008, 19–24. https://doi.org/10.1145/1403027.1403032.Full Text
-
Yang, X., D. Wetherall, and T. Anderson. “TVA: A DoS-limiting network architecture.” Ieee/Acm Transactions on Networking 16, no. 6 (August 12, 2008): 1267–80. https://doi.org/10.1109/TNET.2007.914506.Full Text
-
Lei, Z., and Y. Xiaowei. “Improving XCP to achieve max-min fair bandwidth allocation.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4479 LNCS (December 24, 2007): 992–1004.
-
Li, A., P. Francois, and X. Yang. “On improving the efficiency and manageability of NotVia.” Proceedings of 2007 Acm Conext Conference 3rd International Conference on Emerging Networking Experiments and Technologies, Conext, December 1, 2007. https://doi.org/10.1145/1364654.1364688.Full Text
-
Yang, X., D. Clark, and A. W. Berger. “NIRA: A new inter-domain routing architecture.” Ieee/Acm Transactions on Networking 15, no. 4 (December 1, 2007): 775–88. https://doi.org/10.1109/TNET.2007.893888.Full Text
-
Gjoka, M., V. Ram, and X. Yang. “Evaluation of IP fast reroute proposals.” Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, Comsware 2007, October 1, 2007. https://doi.org/10.1109/COMSWA.2007.382443.Full Text
-
Yang, X., L. Wang, Z. C. Guan, Y. Zhang, and X. Wang. “Effects of pulsed electromagnetic fields on osteoporosis model.” Ieej Transactions on Fundamentals and Materials 127, no. 9 (September 25, 2007). https://doi.org/10.1541/ieejfms.127.505.Full Text
-
Guan, Z., X. Yang, L. Wang, Y. Zhang, and Y. Liu. “Bio-effects of pulsed electromagnetic fields on osteoporosis.” Gaodianya Jishu/High Voltage Engineering 33, no. 2 (February 1, 2007): 1–6.
-
Yang, X., L. Wang, Z. Guan, Y. Zhang, and X. Wang. “Preventive effects of pulsed electromagnetic fields on osteoporosis model induced by ovariectomy.” Gaodianya Jishu/High Voltage Engineering 33, no. 2 (February 1, 2007): 97–100.
-
Yang, X., and D. Wetherall. “Source selectable path diversity via routing deflections.” Computer Communication Review 36, no. 4 (October 1, 2006): 159–70. https://doi.org/10.1145/1151659.1159933.Full Text
-
Yang, X., D. Wetherall, and T. Anderson. “A DoS-limiting network architecture.” Computer Communication Review 35, no. 4 (October 1, 2005): 241–52. https://doi.org/10.1145/1090191.1080120.Full Text
-
Krioukov, D., K. Fall, and X. Yang. “Compact routing on internet-like graphs.” Proceedings Ieee Infocom 1 (November 22, 2004): 209–19.
-
Yang, X. “NIRA: A new Internet routing architecture.” Proceedings of the Acm Sigcomm Workshop on Future Directions in Network Architecture, Fdna ’03, December 1, 2003, 301–12. https://doi.org/10.1145/944759.944768.Full Text
-
Bauer, S., and X. Yang. “Workshop report: Future Directions in Network Architecture (FDNA-03).” Computer Communication Review 33, no. 5 (October 1, 2003): 89–98. https://doi.org/10.1145/963985.963996.Full Text
-
Yang, X. “NIRA: A New Internet Routing Architecture.” Proceedings of the Acm Sigcomm Workshops, 2003, 301–12.
-
Yang, X. “Designing traffic profiles for bursty internet traffic.” Conference Record / Ieee Global Telecommunications Conference 3 (December 1, 2002): 2149–54.
-
Yang, X. “A model for window based flow control in packet-switched networks.” Proceedings Ieee Infocom 2 (December 1, 1999): 423–30. https://doi.org/10.1109/INFCOM.1999.751374.Full Text
-
-
Conference Papers
-
Lin, S., R. Xin, A. Goel, and X. Yang. “InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution.” In Proceedings of the Acm Conference on Computer and Communications Security, 1947–61, 2022. https://doi.org/10.1145/3548606.3559336.Full Text
-
Hu, J., Z. Zhou, and X. Yang. “Characterizing Physical-Layer Transmission Errors in Cable Broadband Networks.” In Proceedings of the 19th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2022, 845–59, 2022.
-
Zhang, X., T. Sen, Z. Zhang, T. April, B. Chandrasekaran, D. Choffnes, B. M. Maggs, H. Shen, R. K. Sitaraman, and X. Yang. “AnyOpt: Predicting and optimizing IP Anycast performance.” In Sigcomm 2021 Proceedings of the Acm Sigcomm 2021 Conference, 447–62, 2021. https://doi.org/10.1145/3452296.3472935.Full Text
-
Zhou, Z., and X. Yang. “Speeding Up TCP with Selective Loss Prevention.” In Proceedings International Conference on Network Protocols, Icnp, Vol. 2021-November, 2021. https://doi.org/10.1109/ICNP52444.2021.9651983.Full Text
-
Hu, J., Z. Zhou, X. Yang, J. Malone, and J. W. Williams. “CableMon: Improving the reliability of cable broadband networks via proactive network maintenance.” In Proceedings of the 17th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2020, 619–32, 2020.
-
Li, A., X. Yang, S. Kandula, and M. Zhang. “CloudCmp: Shopping for a cloud made easy.” In 2nd Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2010, 2020.
-
Li, A., X. Yang, S. Kandula, and M. Zhang. “CloudCmp: Shopping for a cloud made easy.” In 2nd Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2010, 2020.
-
Tang, H., Y. Cui, J. Wu, X. Yang, and Z. Yang. “Trigger relationship aware mobile traffic classification.” In Proceedings of the International Symposium on Quality of Service, Iwqos 2019, 2019. https://doi.org/10.1145/3326285.3329050.Full Text
-
Zheng, S., Z. Zhou, H. Tang, and X. Yang. “SwitchMan: An easy-to-use approach to secure user input and output.” In Proceedings 2019 Ieee Symposium on Security and Privacy Workshops, Spw 2019, 105–13, 2019. https://doi.org/10.1109/SPW.2019.00029.Full Text
-
Zheng, S., and X. Yang. “DynaShield: Reducing the cost of DDoS defense using cloud services.” In 11th Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2019, Co Located With Usenix Atc 2019, 2019.
-
Zheng, S., and X. Yang. “DynaShield: Reducing the cost of DDoS defense using cloud services.” In 11th Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2019, Co Located With Usenix Atc 2019, 2019.
-
“DynaShield: Reducing the cost of DDoS defense using cloud services.” In 11th Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2019, Co Located With Usenix Atc 2019, 2019.
-
Zheng, S., and X. Yang. “DynaShield: A cost-effective DDoS defense architecture.” In Sigcomm 2018 Proceedings of the 2018 Posters and Demos, Part of Sigcomm 2018, 15–17, 2018. https://doi.org/10.1145/3234200.3234232.Full Text
-
Yang, J., X. Yang, Z. Zhou, X. Wu, T. Benson, and C. Hu. “FOCUS: Function Offloading from a Controller to Utilize Switch power.” In 2016 Ieee Conference on Network Function Virtualization and Software Defined Networks, Nfv Sdn 2016, 199–205, 2017. https://doi.org/10.1109/NFV-SDN.2016.7919498.Full Text
-
Cao, Q., M. Sirivianos, X. Yang, and K. Munagala. “Combating Friend Spam Using Social Rejections.” In Proceedings International Conference on Distributed Computing Systems, 2015-July:235–44, 2015. https://doi.org/10.1109/ICDCS.2015.32.Full Text
-
Bronzino, F., C. Han, Y. Chen, K. Nagaraja, X. Yang, I. Seskar, and D. Raychaudhuri. “In-network compute extensions for rate-adaptive content delivery in mobile networks.” In Proceedings International Conference on Network Protocols, Icnp, 511–17, 2014. https://doi.org/10.1109/ICNP.2014.81.Full Text
-
Cao, Q., X. Yang, J. Yu, and C. Palow. “Uncovering large groups of active malicious accounts in online social networks.” In Proceedings of the Acm Conference on Computer and Communications Security, 477–88, 2014. https://doi.org/10.1145/2660267.2660269.Full Text
-
Cao, Q., M. Sirivianos, X. Yang, and T. Pregueiro. “Aiding the detection of fake accounts in large scale social online services.” In Proceedings of Nsdi 2012: 9th Usenix Symposium on Networked Systems Design and Implementation, 197–210, 2012.
-
Li, A., X. Liu, and X. Yang. “Bootstrapping accountability in the internet we have.” In Proceedings of Nsdi 2011: 8th Usenix Symposium on Networked Systems Design and Implementation, 155–68, 2011.
-
Li, A., X. Yang, S. Kandula, and M. Zhang. “CloudCmp: Shopping for a cloud made easy.” In 2nd Usenix Workshop on Hot Topics in Cloud Computing, Hotcloud 2010, 2010.
-
Sirivianos, M., K. Kim, and X. Yang. “SocialFilter: Introducing social trust to collaborative spam mitigation.” In Collsec 2010 2010 Workshop on Collaborative Methods for Security and Privacy, 2010.
-
Sirivianos, M., K. Kim, and X. Yang. “FaceTrust: Assessing the credibility of online personas via social networks.” In Hotsec 2009 4th Usenix Workshop on Hot Topics in Security, 2009.
-
Liu, X., A. Li, X. Yang, and D. Wetherall. “Passport: Secure and adoptable source authentication.” In 5th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2008, 365–78, 2008.
-
Liu, X., X. Yang, D. Wetherall, and T. Anderson. “Efficient and secure source authentication with packet passports.” In 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, Sruti 2006, 7–13, 2006.
-
Yang, X., G. Tsudik, and X. Liu. “A Technical Approach to Net Neutrality.” In 5th Acm Workshop on Hot Topics in Networks, Hotnets 2006, 13–18, 2006.
-
Katabi, D., I. Bazzi, and X. Yang. “A passive approach for detecting shared bottlenecks.” In Proceedings International Conference on Computer Communications and Networks, Icccn, 2001-January:174–81, 2001. https://doi.org/10.1109/ICCCN.2001.956236.Full Text
-
-
- Teaching & Mentoring
-
Recent Courses
- COMPSCI 394: Research Independent Study 2023
- COMPSCI 356: Computer Network Architecture 2022
- COMPSCI 394: Research Independent Study 2022
- ECE 356: Computer Network Architecture 2022
- ECE 899: Special Readings in Electrical Engineering 2022
- COMPSCI 356: Computer Network Architecture 2021
- COMPSCI 393: Research Independent Study 2021
- COMPSCI 590: Advanced Topics in Computer Science 2021
- ECE 356: Computer Network Architecture 2021
- ECE 590: Advanced Topics in Electrical and Computer Engineering 2021
- Scholarly, Clinical, & Service Activities
-
Service to the Profession
Some information on this profile has been compiled automatically from Duke databases and external sources. (Our About page explains how this works.) If you see a problem with the information, please write to Scholars@Duke and let us know. We will reply promptly.