Dan Pei
Dan Pei
Associate Professor of Computer Science, Tsinghua University
Verified email at - Homepage
Cited by
Cited by
Robust anomaly detection for multivariate time series through stochastic recurrent neural network
Y Su, Y Zhao, C Niu, R Liu, W Sun, D Pei
Proceedings of the 25th ACM SIGKDD international conference on knowledge …, 2019
Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications
H Xu, W Chen, N Zhao, Z Li, J Bu, Z Li, Y Liu, Y Zhao, D Pei, Y Feng, ...
Proceedings of the 2018 world wide web conference, 187-196, 2018
Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs.
W Meng, Y Liu, Y Zhu, S Zhang, D Pei, Y Liu, Y Chen, R Zhang, S Tao, ...
IJCAI 19 (7), 4739-4745, 2019
PHAS: A Prefix Hijack Alert System.
M Lad, D Massey, D Pei, Y Wu, B Zhang, L Zhang
USENIX Security symposium 1 (2), 3, 2006
The (in) completeness of the observed Internet AS-level structure
R Oliveira, D Pei, W Willinger, B Zhang, L Zhang
IEEE/ACM Transactions on Networking 18 (1), 109-122, 2009
Opprentice: Towards practical and automatic anomaly detection through machine learning
D Liu, Y Zhao, H Xu, Y Sun, D Pei, J Luo, X Jing, M Feng
Proceedings of the 2015 internet measurement conference, 211-224, 2015
An analysis of BGP multiple origin AS (MOAS) conflicts
X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 31-35, 2001
A light-weight distributed scheme for detecting IP prefix hijacks in real-time
C Zheng, L Ji, D Pei, J Wang, P Francis
ACM SIGCOMM Computer Communication Review 37 (4), 277-288, 2007
Observation and analysis of BGP behavior under stress
L Wang, X Zhao, D Pei, R Bush, D Massey, A Mankin, SF Wu, L Zhang
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, 183-195, 2002
BGP-RCN: Improving BGP convergence through root cause notification
D Pei, M Azuma, D Massey, L Zhang
Computer Networks 48 (2), 175-194, 2005
To cache or not to cache: The 3G case
J Erman, A Gerber, M Hajiaghayi, D Pei, S Sen, O Spatscheck
IEEE Internet Computing 15 (2), 27-34, 2011
In search of the elusive ground truth: the Internet's AS-level connectivity structure
RV Oliveira, D Pei, W Willinger, B Zhang, L Zhang
ACM SIGMETRICS Performance Evaluation Review 36 (1), 217-228, 2008
Improving BGP convergence through consistency assertions
D Pei, X Zhao, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and …, 2002
Multivariate time series anomaly detection and interpretation using hierarchical inter-metric and temporal embedding
Z Li, Y Zhao, J Han, Y Su, R Jiao, X Wen, D Pei
Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data …, 2021
Personalized re-ranking for recommendation
C Pei, Y Zhang, Y Zhang, F Sun, X Lin, H Sun, J Wu, P Jiang, J Ge, W Ou, ...
Proceedings of the 13th ACM conference on recommender systems, 3-11, 2019
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users
K Chen, DR Choffnes, R Potharaju, Y Chen, FE Bustamante, D Pei, ...
Proceedings of the 5th international conference on Emerging networking …, 2009
Network-aware forward caching
J Erman, A Gerber, MT Hajiaghayi, D Pei, O Spatscheck
Proceedings of the 18th international conference on World wide web, 291-300, 2009
Quantifying path exploration in the Internet
R Oliveira, B Zhang, D Pei, R Izhak-Ratzin, L Zhang
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 269-282, 2006
Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks
P Liu, H Xu, Q Ouyang, R Jiao, Z Chen, S Zhang, J Yang, L Mo, J Zeng, ...
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
Detection of invalid routing announcement in the Internet
X Zhao, D Pei, L Wang, D Massey, A Mankin, SF Wu, L Zhang
Proceedings International Conference on Dependable Systems and Networks, 59-68, 2002
The system can't perform the operation now. Try again later.
Articles 1–20