Ennan Zhai
Ennan Zhai
Alibaba Group
Verified email at - Homepage
Cited by
Cited by
The tail at store: A revelation from millions of hours of disk and {SSD} deployments
M Hao, G Soundararajan, D Kenchammana-Hosekote, AA Chien, ...
14th USENIX Conference on File and Storage Technologies (FAST 16), 263-276, 2016
Safely and automatically updating in-network ACL configurations with intent language
B Tian, X Zhang, E Zhai, HH Liu, Q Ye, C Wang, X Wu, Z Ji, Y Sang, ...
Proceedings of the ACM Special Interest Group on Data Communication, 214-226, 2019
Understanding fileless attacks on linux-based iot devices with honeycloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Lyra: A cross-platform language and compiler for data plane programming on heterogeneous asics
J Gao, E Zhai, HH Liu, R Miao, Y Zhou, B Tian, C Sun, D Cai, M Zhang, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
Heading Off Correlated Failures through {Independence-as-a-Service}
E Zhai, R Chen, DI Wolinsky, B Ford
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
Synthesizing configuration file specifications with association rule learning
M Santolucito, E Zhai, R Dhodapkar, A Shim, R Piskac
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-20, 2017
Understanding and detecting overlay-based android malware at market scales
Y Yan, Z Li, QA Chen, C Wilson, T Xu, E Zhai, Y Li, Y Liu
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Accuracy, scalability, coverage: A practical configuration verifier on a global WAN
F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye, C Wang, X Wu, T Guo, C Jin, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
Claper: Recommend classical papers to beginners
Y Wang, E Zhai, J Hu, Z Chen
2010 Seventh International Conference on Fuzzy Systems and Knowledge …, 2010
Probabilistic automated language learning for configuration files
M Santolucito, E Zhai, R Piskac
Computer Aided Verification: 28th International Conference, CAV 2016 …, 2016
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems
TT Chekam, E Zhai, Z Li, Y Cui, K Ren
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Aquila: a practically usable verification system for production-scale programmable data planes
B Tian, J Gao, M Liu, E Zhai, Y Chen, Y Zhou, L Dai, F Yan, M Ma, M Tang, ...
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 17-32, 2021
Towards web-based delta synchronization for cloud storage services
H Xiao, Z Li, E Zhai, T Xu, Y Li, Y Liu, Q Zhang, Y Liu
16th USENIX Conference on File and Storage Technologies (FAST 18), 155-168, 2018
Deterministically deterring timing attacks in deterland
W Wu, B Ford
arXiv preprint arXiv:1504.07070, 2015
An untold story of redundant clouds: Making your service deployment truly reliable
E Zhai, R Chen, DI Wolinsky, B Ford
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 1-6, 2013
isac: Intimacy based access control for social network sites
Y Wang, E Zhai, EK Lua, J Hu, Z Chen
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
Filtering spam in social tagging system with dynamic behavior analysis
B Liu, E Zhai, H Sun, Y Chen, Z Chen
2009 International Conference on Advances in Social Network Analysis and …, 2009
Check before you change: Preventing correlated failures in service updates
E Zhai, A Chen, R Piskac, M Balakrishnan, B Tian, B Song, H Zhang
17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020
Auditing the structural reliability of the clouds
E Zhai, DI Wolinsky, H Xiao, H Liu, BF Xueyuan Su
Technical Report YALEU/DCS/TR-1479, Department of Computer Science, Yale …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20