![]() | 2009 | |
---|---|---|
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Xu, Ling Huang, Armando Fox, David Patterson, Michael I. Jordan: Online System Problem Detection by Mining Patterns of Console Logs. ICDM 2009: 588-597 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar: ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Donghui Yan, Ling Huang, Michael I. Jordan: Fast approximate spectral clustering. KDD 2009: 907-916 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang: Incentive Mechanism Design to the Electronic Products Reverse Supply Chain of Remanufacture Considering the Random Time. PACCS 2009: 591-594 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan: Detecting large-scale system problems by mining console logs. SOSP 2009: 117-132 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire: Impact of IT monoculture on behavioral end host intrusion detection. WREN 2009: 27-36 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft: Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning CoRR abs/0911.5708: (2009) |
2008 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Aihua Zhang, Bin Yang, Ling Huang: Feature Extraction of EEG Signals Using Power Spectral Entropy. BMEI (2) 2008: 435-439 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | XuanLong Nguyen, Ling Huang, Anthony D. Joseph: Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. ECML/PKDD (2) 2008: 137-153 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Donghui Yan, Michael I. Jordan, Nina Taft: Spectral Clustering with Perturbed Data. NIPS 2008: 705-712 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar: Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan: Mining Console Logs for Large-Scale System Problem Detection. SysML 2008 |
2007 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft: Communication-Efficient Tracking of Distributed Cumulative Triggers. ICDCS 2007: 54 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft: Communication-Efficient Online Detection of Network-Wide Anomalies. INFOCOM 2007: 134-142 |
2006 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Jinhong Zhong: ICA-Based Potential Significant Feature Extraction for Market Forecast. CIMCA/IAWTIC 2006: 176 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Jinhong Zhong, Zhiwei Ni, Shanling Yang: Mixed Backlogging and Outsourcing Models with Nondecreasing Inventory Capacity. ISDA (1) 2006: 1161-1166 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft: Toward sophisticated detection with distributed triggers. MineNet 2006: 311-316 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft: In-Network PCA and Anomaly Detection. NIPS 2006: 617-624 |
2005 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Tianming Liu, Geoffrey Young, Ling Huang, Nankuei Chen, Stephen T. C. Wong: 76-Space Analysis of Grey Matter Diffusivity: Methods and Applications. MICCAI 2005: 148-155 |
2004 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Rapid Mobility via Type Indirection. IPTPS 2004: 64-74 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz: Tapestry: a resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 22(1): 41-53 (2004) |
2003 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz: Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. ICNP 2003: 246-257 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Middleware 2003: 1-20 |
2002 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Huang, Dongxing Jiang, Nianlong Luo: The Information Feedback System of Tsinghua Web-Based School. ICCE 2002: 627-631 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz: Brocade: Landmark Routing on Overlay Networks. IPTPS 2002: 34-44 |
1999 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Wyatt S. Newman, Michael S. Branicky, Andy Podgurski, Siddharth R. Chhatpar, Ling Huang, Jayendran Swaminathan, Hao Zhang: Force-Responsive Robotic Assembly of Transmission Components. ICRA 1999: 2096-2102 |