default search action
Ling Huang 0001
Person information
- affiliation: Tsinghua University, Institute of Interdisciplinary Information Sciences, Beijing, China
- affiliation (former): DataVisor, Mountain View, CA, USA
- affiliation (former): Intel Research, Berkeley, CA, USA
- affiliation (PhD): University of California Berkeley, Computer Science Division, CA, USA
Other persons with the same name
- Ling Huang — disambiguation page
- Ling Huang 0002 — South China Agricultural University, College of Mathematics and Informatics, Guangzhou, China (and 1 more)
- Ling Huang 0003 — National University of Singapore, School of Public Health, Singapore (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c43]Jiao Sun, Yin Li, Charley Chen, Jihae Lee, Xin Liu, Zhongping Zhang, Ling Huang, Lei Shi, Wei Xu:
FDHelper: Assist Unsupervised Fraud Detection Experts with Interactive Feature Selection and Evaluation. CHI 2020: 1-12 - [c42]Han Zhang, Wenhao Zheng, Charley Chen, Kevin Gao, Yao Hu, Ling Huang, Wei Xu:
Modeling Heterogeneous Statistical Patterns in High-dimensional Data by Adversarial Distributions: An Unsupervised Generative Framework. WWW 2020: 1389-1399 - [i11]Han Zhang, Wenhao Zheng, Charley Chen, Kevin Gao, Yao Hu, Ling Huang, Wei Xu:
Modeling Heterogeneous Statistical Patterns in High-dimensional Data by Adversarial Distributions: An Unsupervised Generative Framework. CoRR abs/2012.08153 (2020)
2010 – 2019
- 2019
- [c41]Shun Zheng, Xu Han, Yankai Lin, Peilin Yu, Lu Chen, Ling Huang, Zhiyuan Liu, Wei Xu:
DIAG-NRE: A Neural Pattern Diagnosis Framework for Distantly Supervised Neural Relation Extraction. ACL (1) 2019: 1419-1429 - [c40]Yikun Ban, Xin Liu, Ling Huang, Yitao Duan, Xue Liu, Wei Xu:
No Place to Hide: Catching Fraudulent Entities in Tensors. WWW 2019: 83-93 - 2018
- [c39]Jiao Sun, Qixin Zhu, Zhifei Liu, Xin Liu, Jihae Lee, Zhigang Su, Lei Shi, Ling Huang, Wei Xu:
FraudVis: Understanding Unsupervised Fraud Detection Algorithms. PacificVis 2018: 170-174 - [c38]Guosai Wang, Shiyang Xiang, Yitao Duan, Ling Huang, Wei Xu:
Do Not Pull My Data for Resale: Protecting Data Providers Using Data Retrieval Pattern Analysis. SIGIR 2018: 1053-1056 - [i10]Shun Zheng, Peilin Yu, Lu Chen, Ling Huang, Wei Xu:
DIAG-NRE: A Deep Pattern Diagnosis Framework for Distant Supervision Neural Relation Extraction. CoRR abs/1811.02166 (2018) - 2016
- [c37]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. DIMVA 2016: 122-141 - [c36]Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou:
CloudKeyBank: Privacy and owner authorization enforced key management framework. ICDE 2016: 1478-1479 - [i9]Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari:
EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses. CoRR abs/1603.03086 (2016) - 2015
- [j9]Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang:
DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS. Secur. Commun. Networks 8(8): 1494-1508 (2015) - [j8]Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank:
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications. IEEE Trans. Inf. Forensics Secur. 10(1): 200-212 (2015) - [j7]Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou:
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework. IEEE Trans. Knowl. Data Eng. 27(12): 3217-3230 (2015) - [j6]Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek:
Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices. IEEE Trans. Mob. Comput. 14(10): 2059-2072 (2015) - [i8]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR abs/1510.07338 (2015) - 2014
- [j5]Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song:
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network. ACM Trans. Intell. Syst. Technol. 5(2): 27:1-27:20 (2014) - [c35]Brad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph, J. Doug Tygar:
Adversarial Active Learning. AISec@CCS 2014: 3-14 - [c34]Mikhail Kazdagli, Ling Huang, Vijay Janapa Reddi, Mohit Tiwari:
Morpheus: benchmarking computational diversity in mobile malware. HASP@ISCA 2014: 3:1-3:8 - [c33]Alex Kantchelian, Michael Carl Tschantz, Ling Huang, Peter L. Bartlett, Anthony D. Joseph, J. Doug Tygar:
Large-Margin Convex Polytope Machine. NIPS 2014: 3248-3256 - [c32]Brad Miller, Ling Huang, Anthony D. Joseph, J. D. Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. Privacy Enhancing Technologies 2014: 143-163 - [i7]Brad Miller, Ling Huang, Anthony D. Joseph, J. Doug Tygar:
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. CoRR abs/1403.0297 (2014) - 2013
- [c31]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - [c30]Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, Dawn Song:
SAFE: Secure authentication with Face and Eyes. PRISMS 2013: 1-8 - [c29]Yongin Kwon, Sangmin Lee, Hayoon Yi, Donghyun Kwon, Seungjun Yang, Byung-Gon Chun, Ling Huang, Petros Maniatis, Mayur Naik, Yunheung Paek:
Mantis: Automatic Performance Prediction for Smartphone Applications. USENIX ATC 2013: 297-308 - 2012
- [j4]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. J. Mach. Learn. Res. 13: 1293-1332 (2012) - [j3]Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft:
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. J. Priv. Confidentiality 4(1) (2012) - [c28]Ian Timothy Fischer, Cynthia Kuo, Ling Huang, Mario Frank:
Short paper: smartphones: not smart enough? SPSM@CCS 2012: 27-32 - [c27]Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar:
Robust detection of comment spam using entropy rate. AISec 2012: 59-70 - [c26]Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song:
Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. DIMVA 2012: 62-81 - [c25]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song:
Evolution of social-attribute networks: measurements, modeling, and implications using google+. Internet Measurement Conference 2012: 131-144 - [i6]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song:
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+. CoRR abs/1209.0835 (2012) - 2011
- [c24]Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar:
Adversarial machine learning. AISec 2011: 43-58 - [i5]Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song:
Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). CoRR abs/1112.3265 (2011) - 2010
- [c23]Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan:
Detecting Large-Scale System Problems by Mining Console Logs. ICML 2010: 37-46 - [c22]Daniel Ting, Ling Huang, Michael I. Jordan:
An Analysis of the Convergence of Graph Laplacians. ICML 2010: 1079-1086 - [c21]Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, Mayur Naik:
Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression. NIPS 2010: 883-891 - [c20]Wei Xu, Ling Huang, Michael I. Jordan:
Experience Mining Google's Production Console Logs. SLAML 2010 - [c19]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, J. D. Tygar:
Classifier Evasion: Models and Open Problems. PSDML 2010: 92-98 - [c18]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. Doug Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. AISTATS 2010: 549-556 - [i4]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar:
Near-Optimal Evasion of Convex-Inducing Classifiers. CoRR abs/1003.2751 (2010) - [i3]Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar:
Query Strategies for Evading Convex-Inducing Classifiers. CoRR abs/1007.0484 (2010) - [i2]Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik:
Mantis: Predicting System Performance through Program Analysis and Modeling. CoRR abs/1010.0019 (2010)
2000 – 2009
- 2009
- [j2]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
Stealthy poisoning attacks on PCA-based anomaly detectors. SIGMETRICS Perform. Evaluation Rev. 37(2): 73-74 (2009) - [c17]Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan:
Online System Problem Detection by Mining Patterns of Console Logs. ICDM 2009: 588-597 - [c16]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar:
ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Internet Measurement Conference 2009: 1-14 - [c15]Donghui Yan, Ling Huang, Michael I. Jordan:
Fast approximate spectral clustering. KDD 2009: 907-916 - [c14]Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire:
Impact of IT monoculture on behavioral end host intrusion detection. WREN 2009: 27-36 - [c13]Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan:
Detecting large-scale system problems by mining console logs. SOSP 2009: 117-132 - [i1]Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft:
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. CoRR abs/0911.5708 (2009) - 2008
- [c12]Ling Huang, Donghui Yan, Michael I. Jordan, Nina Taft:
Spectral Clustering with Perturbed Data. NIPS 2008: 705-712 - [c11]Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan:
Mining Console Logs for Large-Scale System Problem Detection. SysML 2008 - [c10]XuanLong Nguyen, Ling Huang, Anthony D. Joseph:
Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. ECML/PKDD (2) 2008: 137-153 - [c9]Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. RAID 2008: 394-395 - 2007
- [c8]Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft:
Communication-Efficient Tracking of Distributed Cumulative Triggers. ICDCS 2007: 54 - [c7]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
Communication-Efficient Online Detection of Network-Wide Anomalies. INFOCOM 2007: 134-142 - 2006
- [c6]Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft:
Toward sophisticated detection with distributed triggers. MineNet 2006: 311-316 - [c5]Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft:
In-Network PCA and Anomaly Detection. NIPS 2006: 617-624 - 2004
- [j1]Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz:
Tapestry: a resilient global-scale overlay for service deployment. IEEE J. Sel. Areas Commun. 22(1): 41-53 (2004) - [c4]Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Rapid Mobility via Type Indirection. IPTPS 2004: 64-74 - 2003
- [c3]Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz:
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. ICNP 2003: 246-257 - [c2]Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Middleware 2003: 1-20 - 2002
- [c1]Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz:
Brocade: Landmark Routing on Overlay Networks. IPTPS 2002: 34-44
Coauthor Index
aka: J. Doug Tygar
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint