Ling Huang
TitleCited byYear
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
24852004
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
5832009
Detecting large-scale system problems by mining console logs
W Xu, L Huang, A Fox, D Patterson, MI Jordan
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
5832009
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
5122011
Fast approximate spectral clustering
D Yan, L Huang, MI Jordan
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4262009
Brocade: Landmark routing on overlay networks
BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz
International Workshop on Peer-to-Peer Systems, 34-44, 2002
3212002
Juxtapp: A scalable system for detecting code reuse among android applications
S Hanna, L Huang, E Wu, S Li, C Chen, D Song
International Conference on Detection of Intrusions and Malware, and …, 2012
2242012
Antidote: understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 1-14, 2009
2032009
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 Internet Measurement Conference, 131-144, 2012
1982012
In-network PCA and anomaly detection
L Huang, XL Nguyen, M Garofalakis, MI Jordan, A Joseph, N Taft
Advances in Neural Information Processing Systems, 617-624, 2007
1882007
Approximate object location and spam filtering on peer-to-peer systems
F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003
1742003
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
arXiv preprint arXiv:0911.5708, 2009
1642009
Communication-Efficient Online Detection of Network-Wide Anomalies.
L Huang, XL Nguyen, MN Garofalakis, JM Hellerstein, MI Jordan, ...
INFOCOM 7, 134-142, 2007
1472007
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
1192014
Mining Console Logs for Large-Scale System Problem Detection.
W Xu, L Huang, A Fox, DA Patterson, MI Jordan
SysML 8, 4-4, 2008
1122008
Online system problem detection by mining patterns of console logs
W Xu, L Huang, A Fox, D Patterson, M Jordan
2009 Ninth IEEE International Conference on Data Mining, 588-597, 2009
952009
An analysis of the convergence of graph Laplacians
D Ting, L Huang, M Jordan
arXiv preprint arXiv:1101.5435, 2011
922011
Predicting execution time of computer programs using sparse polynomial regression
L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik
Advances in neural information processing systems, 883-891, 2010
882010
Query strategies for evading convex-inducing classifiers
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
Journal of Machine Learning Research 13 (May), 1293-1332, 2012
822012
Exploiting routing redundancy via structured peer-to-peer overlays
BY Zhao, L Huang, J Stribling, AD Joseph, JD Kubiatowicz
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
822003
The system can't perform the operation now. Try again later.
Articles 1–20