Justin Ma

According to our database1, Justin Ma authored at least 20 papers between 2005 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Fast and Interactive Analytics over Hadoop Data with Spark.
login Usenix Mag., 2012

Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

An intermittent energy internet architecture.
Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Learning to detect malicious URLs.
ACM Trans. Intell. Syst. Technol., 2011

Privacy-preserving network forensics.
Commun. ACM, 2011

Design and Evaluation of a Real-Time URL Spam Filtering Service.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Managing data transfers in computer clusters with orchestra.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

The energy and emergy of the internet.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Scaling the mobile millennium system in the cloud.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

2010
Exploiting Feature Covariance in High-Dimensional Online Learning.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Neon: system support for derived data management.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010

2009
URL Reputation.
Dataset, October, 2009

Beyond blacklists: learning to detect malicious web sites from suspicious URLs.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Identifying suspicious URLs: an application of large-scale online learning.
Proceedings of the 26th Annual International Conference on Machine Learning, 2009

2006
Wireless Network Security and Interworking.
Proc. IEEE, 2006

Unexpected means of protocol inference.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Finding diversity in remote code injection exploits.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Self-stopping worms.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

Scalability, fidelity, and containment in the potemkin virtual honeyfarm.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005


  Loading...