Peng Huang
Orcid: 0000-0001-6315-0848Affiliations:
- University of Michigan, Ann Arbor, USA
- Johns Hopkins University, Baltimore, MD, USA (former)
- University of California, San Diego, CA, USA (PhD 2016)
According to our database1,
Peng Huang
authored at least 35 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2024
Efficient Reproduction of Fault-Induced Failures in Distributed Systems with Feedback-Driven Fault Injection.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
Efficient Exposure of Partial Failure Bugs in Distributed Systems with Inferred Abstract States.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
2023
ACM Trans. Storage, November, 2023
Proceedings of the 29th Symposium on Operating Systems Principles, 2023
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023
Proceedings of the Eighteenth European Conference on Computer Systems, 2023
2022
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
RESIN: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
2021
IEEE Des. Test, 2021
Argus: Debugging Performance Issues in Modern Desktop Applications with Annotated Causal Tracing.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021
2020
Predictive and Adaptive Failure Mitigation to Avert Production Cloud VM Interruptions.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the Workshop on Hot Topics in Operating Systems, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018
2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017
2016
PhD thesis, 2016
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the Eleventh European Conference on Computer Systems, 2016
2015
Proceedings of the Tenth European Conference on Computer Systems, 2015
2014
Proceedings of the 36th International Conference on Software Engineering, 2014
2013
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013
2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
2010
A multiple user sharing behaviors based approach for fake file detection in P2P environments.
Sci. China Inf. Sci., 2010