Ling Huang
Cited by
Cited by
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
Fast approximate spectral clustering
D Yan, L Huang, MI Jordan
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
arXiv preprint arXiv:0911.5708, 2009
In-network PCA and anomaly detection
L Huang, XL Nguyen, M Garofalakis, M Jordan, A Joseph, N Taft
Advances in neural information processing systems 19, 2006
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 internet measurement conference, 131-144, 2012
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, E Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 1-20, 2014
Online system problem detection by mining patterns of console logs
W Xu, L Huang, A Fox, D Patterson, M Jordan
2009 ninth IEEE international conference on data mining, 588-597, 2009
Approximate object location and spam filtering on peer-to-peer systems
F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003
Communication-efficient online detection of network-wide anomalies
L Huang, XL Nguyen, M Garofalakis, JM Hellerstein, MI Jordan, ...
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Predicting execution time of computer programs using sparse polynomial regression
L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik
Advances in neural information processing systems 23, 2010
An analysis of the convergence of graph Laplacians
D Ting, L Huang, M Jordan
arXiv preprint arXiv:1101.5435, 2011
I know why you went to the clinic: Risks and realization of https traffic analysis
B Miller, L Huang, AD Joseph, JD Tygar
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
Mining Console Logs for Large-Scale System Problem Detection.
W Xu, L Huang, A Fox, DA Patterson, MI Jordan
SysML 8, 4-4, 2008
Query Strategies for Evading Convex-Inducing Classifiers.
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
Journal of Machine Learning Research 13 (5), 2012
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20