Ling Huang

Affiliations:
  • Tsinghua University, Institute of Interdisciplinary Information Sciences, Beijing, China
  • DataVisor, Mountain View, CA, USA (former)
  • Intel Research, Berkeley, CA, USA (former)
  • University of California Berkeley, Computer Science Division, CA, USA (PhD)


According to our database1, Ling Huang authored at least 55 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Modeling Heterogeneous Statistical Patterns in High-dimensional Data by Adversarial Distributions: An Unsupervised Generative Framework.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

FDHelper: Assist Unsupervised Fraud Detection Experts with Interactive Feature Selection and Evaluation.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
No Place to Hide: Catching Fraudulent Entities in Tensors.
Proceedings of the World Wide Web Conference, 2019

DIAG-NRE: A Neural Pattern Diagnosis Framework for Distantly Supervised Neural Relation Extraction.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
DIAG-NRE: A Deep Pattern Diagnosis Framework for Distant Supervision Neural Relation Extraction.
CoRR, 2018

Do Not Pull My Data for Resale: Protecting Data Providers Using Data Retrieval Pattern Analysis.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

FraudVis: Understanding Unsupervised Fraud Detection Algorithms.
Proceedings of the IEEE Pacific Visualization Symposium, 2018

2016
EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses.
CoRR, 2016

Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices.
IEEE Trans. Mob. Comput., 2015

CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework.
IEEE Trans. Knowl. Data Eng., 2015

What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015

DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS.
Secur. Commun. Networks, 2015

Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR, 2015

2014
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network.
ACM Trans. Intell. Syst. Technol., 2014

I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Large-Margin Convex Polytope Machine.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Morpheus: benchmarking computational diversity in mobile malware.
Proceedings of the HASP 2014, 2014

Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
Mantis: Automatic Performance Prediction for Smartphone Applications.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013


2012
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning.
J. Priv. Confidentiality, 2012

Query Strategies for Evading Convex-Inducing Classifiers.
J. Mach. Learn. Res., 2012

Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

Short paper: smartphones: not smart enough?
Proceedings of the SPSM'12, 2012

2011
Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
CoRR, 2011

Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Mantis: Predicting System Performance through Program Analysis and Modeling
CoRR, 2010

Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Experience Mining Google's Production Console Logs.
Proceedings of the Workshop on Managing Systems via Log Analysis and Machine Learning Techniques, 2010

Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

Detecting Large-Scale System Problems by Mining Console Logs.
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010

An Analysis of the Convergence of Graph Laplacians.
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Perform. Evaluation Rev., 2009

Impact of IT monoculture on behavioral end host intrusion detection.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

Fast approximate spectral clustering.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Online System Problem Detection by Mining Patterns of Console Logs.
Proceedings of the ICDM 2009, 2009

2008
Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Support Vector Machines, Data Reduction, and Approximate Kernel Matrices.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2008

Mining Console Logs for Large-Scale System Problem Detection.
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008

Spectral Clustering with Perturbed Data.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

2007
Communication-Efficient Online Detection of Network-Wide Anomalies.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Communication-Efficient Tracking of Distributed Cumulative Triggers.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
In-Network PCA and Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Toward sophisticated detection with distributed triggers.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

2004
Tapestry: a resilient global-scale overlay for service deployment.
IEEE J. Sel. Areas Commun., 2004

Rapid Mobility via Type Indirection.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002


  Loading...