Ling Huang
タイトル引用先
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
25202004
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
6172009
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
6172009
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
5692011
Fast approximate spectral clustering
D Yan, L Huang, MI Jordan
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4432009
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 34-44, 2002
3232002
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
International Conference on Detection of Intrusions and Malware, and …, 2012
2342012
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 1-14, 2009
2212009
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 Internet Measurement Conference, 131-144, 2012
2082012
In-network PCA and anomaly detection
L Huang, XL Nguyen, M Garofalakis, MI Jordan, A Joseph, N Taft
Advances in Neural Information Processing Systems, 617-624, 2007
1972007
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
arXiv preprint arXiv:0911.5708, 2009
1782009
Approximate object location and spam filtering on peer-to-peer systems
F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003
1782003
Communication-Efficient Online Detection of Network-Wide Anomalies.
L Huang, XL Nguyen, MN Garofalakis, JM Hellerstein, MI Jordan, ...
INFOCOM 7, 134-142, 2007
1482007
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
1272014
Mining Console Logs for Large-Scale System Problem Detection.
W Xu, L Huang, A Fox, DA Patterson, MI Jordan
SysML 8, 4-4, 2008
1132008
An analysis of the convergence of graph Laplacians
D Ting, L Huang, M Jordan
arXiv preprint arXiv:1101.5435, 2011
1002011
Online system problem detection by mining patterns of console logs
W Xu, L Huang, A Fox, D Patterson, M Jordan
2009 Ninth IEEE International Conference on Data Mining, 588-597, 2009
992009
Predicting execution time of computer programs using sparse polynomial regression
L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik
Advances in neural information processing systems, 883-891, 2010
952010
Query strategies for evading convex-inducing classifiers
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
Journal of Machine Learning Research 13 (May), 1293-1332, 2012
892012
Spectral clustering with perturbed data
L Huang, D Yan, N Taft, MI Jordan
Advances in Neural Information Processing Systems, 705-712, 2009
842009
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20