Ling Huang
Title
Cited by
Cited by
Year
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
25482004
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
7192009
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
7192009
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
6942011
Fast approximate spectral clustering
D Yan, L Huang, MI Jordan
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4742009
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 34-44, 2002
3242002
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 1-14, 2009
2512009
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
International Conference on Detection of Intrusions and Malware, and …, 2012
2492012
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 Internet Measurement Conference, 131-144, 2012
2262012
In-network PCA and anomaly detection
L Huang, XL Nguyen, M Garofalakis, MI Jordan, A Joseph, N Taft
Advances in Neural Information Processing Systems, 617-624, 2007
2102007
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
arXiv preprint arXiv:0911.5708, 2009
1962009
Approximate object location and spam filtering on peer-to-peer systems
F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003
1832003
Communication-efficient online detection of network-wide anomalies
L Huang, XL Nguyen, M Garofalakis, JM Hellerstein, MI Jordan, ...
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1562007
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, E Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 1-20, 2014
1492014
Mining Console Logs for Large-Scale System Problem Detection.
W Xu, L Huang, A Fox, DA Patterson, MI Jordan
SysML 8, 4-4, 2008
1212008
Online system problem detection by mining patterns of console logs
W Xu, L Huang, A Fox, D Patterson, M Jordan
2009 Ninth IEEE International Conference on Data Mining, 588-597, 2009
1202009
Predicting execution time of computer programs using sparse polynomial regression
L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik
Advances in neural information processing systems, 883-891, 2010
1082010
An analysis of the convergence of graph Laplacians
D Ting, L Huang, M Jordan
arXiv preprint arXiv:1101.5435, 2011
1072011
Query strategies for evading convex-inducing classifiers
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
The Journal of Machine Learning Research 13 (1), 1293-1332, 2012
962012
I know why you went to the clinic: Risks and realization of https traffic analysis
B Miller, L Huang, AD Joseph, JD Tygar
International Symposium on Privacy Enhancing Technologies Symposium, 143-163, 2014
902014
The system can't perform the operation now. Try again later.
Articles 1–20