Seguir
Ling Huang
Título
Citado por
Citado por
Año
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
28372004
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
14762011
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
13492009
Fast approximate spectral clustering
D Yan, L Huang, MI Jordan
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
6422009
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009
4632009
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002
3442002
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
arXiv preprint arXiv:0911.5708, 2009
3202009
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
3192013
In-network PCA and anomaly detection
L Huang, XL Nguyen, M Garofalakis, M Jordan, A Joseph, N Taft
Advances in neural information processing systems 19, 2006
2882006
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 internet measurement conference, 131-144, 2012
2652012
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, E Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 1-20, 2014
2282014
Online system problem detection by mining patterns of console logs
W Xu, L Huang, A Fox, D Patterson, M Jordan
2009 ninth IEEE international conference on data mining, 588-597, 2009
2182009
Approximate object location and spam filtering on peer-to-peer systems
F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003
1972003
Communication-efficient online detection of network-wide anomalies
L Huang, XL Nguyen, M Garofalakis, JM Hellerstein, MI Jordan, ...
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1832007
Predicting execution time of computer programs using sparse polynomial regression
L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik
Advances in neural information processing systems 23, 2010
1702010
An analysis of the convergence of graph Laplacians
D Ting, L Huang, M Jordan
arXiv preprint arXiv:1101.5435, 2011
1622011
I know why you went to the clinic: Risks and realization of https traffic analysis
B Miller, L Huang, AD Joseph, JD Tygar
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
1432014
Mining Console Logs for Large-Scale System Problem Detection.
W Xu, L Huang, A Fox, DA Patterson, MI Jordan
SysML 8, 4-4, 2008
1432008
Query Strategies for Evading Convex-Inducing Classifiers.
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
Journal of Machine Learning Research 13 (5), 2012
1252012
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
1092013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20