Lu-An Tang

Orcid: 0009-0005-0789-7265

Affiliations:
  • NEC Laboratories America, Princeton, NJ, USA
  • University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA


According to our database1, Lu-An Tang authored at least 43 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PAIL: Performance based Adversarial Imitation Learning Engine for Carbon Neutral Optimization.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

The WizARd and Apprentice: An Augmented Reality Expert Capture System.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2024

ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Temporal Graph Based Incident Analysis System for Internet of Things.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

2022
3D Histogram Based Anomaly Detection for Categorical Sensor Data in Internet of Things.
Open J. Internet Things, 2022

Explainable Anomaly Detection System for Categorical Sensor Data in Internet of Things.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Multi-source Inductive Knowledge Graph Transfer.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

2021
Anomalous Event Sequence Detection.
IEEE Intell. Syst., 2021

2019
Heterogeneous Graph Matching Networks.
CoRR, 2019

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Heterogeneous Graph Matching Networks for Unknown Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
Deep Program Reidentification: A Graph Neural Network Solution.
CoRR, 2018

TINET: Learning Invariant Networks via Knowledge Transfer.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

TGNet: Learning to Rank Nodes in Temporal Graphs.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Collaborative Alert Ranking for Anomaly Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

2017
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer.
CoRR, 2017

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems.
CoRR, 2016

Integrating Community and Role Detection in Information Networks.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

2015
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.
ACM Trans. Knowl. Discov. Data, 2015

Mining Trajectory Data and Geotagged Data in Social Media for Road Map Inference.
Trans. GIS, 2015

Trajectory Data Mining in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2013
Mining sensor and mobility data in cyber-physical systems
PhD thesis, 2013

A framework of traveling companion discovery on trajectory data streams.
ACM Trans. Intell. Syst. Technol., 2013

Trustworthiness analysis of sensor data in cyber-physical systems.
J. Comput. Syst. Sci., 2013

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Spatiotemporal periodical pattern mining in traffic data.
Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing, 2013

2012
Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.
Int. J. Distributed Sens. Networks, 2012

IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

On Discovery of Traveling Companions from Streaming Trajectories.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Multidimensional Analysis of Atypical Events in Cyber-Physical Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
MoveMine: Mining moving object data for discovery of animal movement patterns.
ACM Trans. Intell. Syst. Technol., 2011

Retrieving k-Nearest Neighboring Trajectories by a Set of Point Locations.
Proceedings of the Advances in Spatial and Temporal Databases, 2011

Geo-Friends Recommendation in GPS-based Cyber-physical Social Network.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
MoveMine: mining moving object databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems.
Proceedings of the ICDM 2010, 2010

Mining Moving Object, Trajectory and Traffic Data.
Proceedings of the Database Systems for Advanced Applications, 2010

2009
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection.
Proceedings of the ICDM 2009, 2009

2008
Indexing land surface for efficient kNN query.
Proc. VLDB Endow., 2008

PGG: An Online Pattern Based Approach for Stream Variation Management.
J. Comput. Sci. Technol., 2008


  Loading...