Tapestry: A resilient global-scale overlay for service deployment BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz IEEE Journal on selected areas in communications 22 (1), 41-53, 2004 | 2842 | 2004 |
Adversarial machine learning L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 1498 | 2011 |
Detecting large-scale system problems by mining console logs W Xu, L Huang, A Fox, D Patterson, MI Jordan Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009 | 1368 | 2009 |
Fast approximate spectral clustering D Yan, L Huang, MI Jordan Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009 | 649 | 2009 |
Antidote: understanding and defending against poisoning of anomaly detectors BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ... Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, 1-14, 2009 | 470 | 2009 |
Brocade: Landmark routing on overlay networks BY Zhao, Y Duan, L Huang, AD Joseph, JD Kubiatowicz Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA …, 2002 | 344 | 2002 |
Juxtapp: A scalable system for detecting code reuse among android applications S Hanna, L Huang, E Wu, S Li, C Chen, D Song Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013 | 322 | 2013 |
Learning in a large function space: Privacy-preserving mechanisms for SVM learning BIP Rubinstein, PL Bartlett, L Huang, N Taft arXiv preprint arXiv:0911.5708, 2009 | 322 | 2009 |
In-network PCA and anomaly detection L Huang, XL Nguyen, M Garofalakis, M Jordan, A Joseph, N Taft Advances in neural information processing systems 19, 2006 | 289 | 2006 |
Evolution of social-attribute networks: measurements, modeling, and implications using google+ NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song Proceedings of the 2012 internet measurement conference, 131-144, 2012 | 268 | 2012 |
Joint link prediction and attribute inference using a social-attribute network NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, E Shi, ... ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 1-20, 2014 | 231 | 2014 |
Online system problem detection by mining patterns of console logs W Xu, L Huang, A Fox, D Patterson, M Jordan 2009 ninth IEEE international conference on data mining, 588-597, 2009 | 219 | 2009 |
Approximate object location and spam filtering on peer-to-peer systems F Zhou, L Zhuang, BY Zhao, L Huang, AD Joseph, J Kubiatowicz ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2003 | 197 | 2003 |
Communication-efficient online detection of network-wide anomalies L Huang, XL Nguyen, M Garofalakis, JM Hellerstein, MI Jordan, ... IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 183 | 2007 |
Predicting execution time of computer programs using sparse polynomial regression L Huang, J Jia, B Yu, BG Chun, P Maniatis, M Naik Advances in neural information processing systems 23, 2010 | 172 | 2010 |
An analysis of the convergence of graph Laplacians D Ting, L Huang, M Jordan arXiv preprint arXiv:1101.5435, 2011 | 162 | 2011 |
I know why you went to the clinic: Risks and realization of https traffic analysis B Miller, L Huang, AD Joseph, JD Tygar Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 143 | 2014 |
Mining Console Logs for Large-Scale System Problem Detection. W Xu, L Huang, A Fox, DA Patterson, MI Jordan SysML 8, 4-4, 2008 | 143 | 2008 |
Query Strategies for Evading Convex-Inducing Classifiers. B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar Journal of Machine Learning Research 13 (5), 2012 | 125 | 2012 |
Approaches to adversarial drift A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ... Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013 | 111 | 2013 |