2012
49Robust detection of comment spam using entropy rate. Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar. AISec 2012, 59-70. Web SearchBibTeXDownload
2011
48Adversarial machine learning. Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar. AISec 2011, 43-58. Web SearchBibTeXDownload
2010
47A view of cloud computing. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andy Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia. Commun. ACM (53): 50-58 (2010). Web SearchBibTeXDownload
46Near-Optimal Evasion of Convex-Inducing Classifiers. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar. CoRR (abs/1003.2751) (2010). Web SearchBibTeXDownload
45Query Strategies for Evading Convex-Inducing Classifiers. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar. CoRR (abs/1007.0484) (2010). Web SearchBibTeXDownload
44The security of machine learning. Marco Barreno, Blaine Nelson, Anthony D. Joseph, J. D. Tygar. Machine Learning (81): 121-148 (2010). Web SearchBibTeXDownload
43Classifier Evasion: Models and Open Problems. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, J. D. Tygar. PSDML 2010, 92-98. Web SearchBibTeXDownload
2009
42ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. Internet Measurement Conference 2009, 1-14. Web SearchBibTeXDownload
41Stealthy poisoning attacks on PCA-based anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. SIGMETRICS Performance Evaluation Review (37): 73-74 (2009). Web SearchBibTeXDownload
40Understanding TCP incast throughput collapse in datacenter networks. Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Katz, Anthony D. Joseph. WREN 2009, 73-82. Web SearchBibTeXDownload
2008
39Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. XuanLong Nguyen, Ling Huang, Anthony D. Joseph. ECML/PKDD (2) 2008, 137-153. Web SearchBibTeXDownload
38Exploiting Machine Learning to Subvert Your Spam Filter. Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia. LEET 2008. Web SearchBibTeXDownload
37Improving MapReduce Performance in Heterogeneous Environments. Matei Zaharia, Andy Konwinski, Anthony D. Joseph, Randy H. Katz, Ion Stoica. OSDI 2008, 29-42. Web SearchBibTeXDownload
36Evading Anomaly Detection through Variance Injection Attacks on PCA. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar. RAID 2008, 394-395. Web SearchBibTeXDownload
2007
35Communication-Efficient Tracking of Distributed Cumulative Triggers. Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft. ICDCS 2007, 54. Cited by 13Web SearchBibTeXDownload
34Communication-Efficient Online Detection of Network-Wide Anomalies. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft. INFOCOM 2007, 134-142. Cited by 26Web SearchBibTeXDownload
2006
33Can machine learning be secure?. Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar. ASIACCS 2006, 16-25. Web SearchBibTeXDownload
32Intelligent Transportation Systems. Anthony D. Joseph, Alastair R. Beresford, Jean Bacon, David N. Cottingham, Jonathan J. Davies, Brian D. Jones, Haitao Guo, Wei Guan, Yong Lin, Houbing Song, Liviu Iftode, Simone Fuchs, Bernhard Lamprecht, Kyandoghere Kyamakya, Jorge González Fernández, Juan Carlos Yelmo García, Yod Samuel Martín García, Jorge de Gracia Santos, Milind Nimesh, Gang Pan, Zhaohui Wu, Qing Wu, Zhenyu Shan, Jie Sun, Jian Lu, Guoqing Yang, Muhammad Khurram Khan, Jiashu Zhang. IEEE Pervasive Computing (5): 63-67 (2006). Web SearchBibTeXDownload
31Determining model accuracy of network traces. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph. J. Comput. Syst. Sci. (72): 1156-1171 (2006). Web SearchBibTeXDownload
30Toward sophisticated detection with distributed triggers. Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft. MineNet 2006, 311-316. Cited by 17Web SearchBibTeXDownload
29In-Network PCA and Anomaly Detection. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft. NIPS 2006, 617-624. Cited by 19Web SearchBibTeXDownload
2806131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications. Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle. Peer-to-Peer-Systems and -Applications 2006. Web SearchBibTeXDownload
2706131 Executive Summary -- Peer-to-Peer-Systems and -Applications. Anthony D. Joseph, Ralf Steinmetz, Ion Stoica, Klaus Wehrle. Peer-to-Peer-Systems and -Applications 2006. Web SearchBibTeXDownload
26Experience with deter: A testbed for security research. Terry Benzel, Robert Braden, Dongho Kim, Cliford Neuman, Anthony D. Joseph, Keith Sklower. TRIDENTCOM 2006. Web SearchBibTeX
2005
25Choosing an Accurate Network Model using Domain Analysis. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph. ICPADS (2) 2005, 100-104. Web SearchBibTeXDownload
24Guest Editorial. Darrell Conklin, Tadeusz A. Wysocki, Hamid Sharif, L. C. Gundersen, P. P. Leahy, W. Hill, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Keh-Ming Lu. Wireless Networks (11): 5-6 (2005). Cited by 2Web SearchBibTeXDownload
2004
23Cyber defense technology networking and evaluation. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu. Commun. ACM (47): 58-61 (2004). Web SearchBibTeXDownload
22Tapestry: a resilient global-scale overlay for service deployment. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz. IEEE Journal on Selected Areas in Communications (22): 41-53 (2004). Web SearchBibTeXDownload
21Rapid Mobility via Type Indirection. Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz. IPTPS 2004, 64-74. Web SearchBibTeXDownload
2003
20Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz. ICNP 2003, 246-257. Web SearchBibTeXDownload
19Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz. Middleware 2003, 1-20. Web SearchBibTeXDownload
18A Markov-Based Channel Model Algorithm for Wireless Networks. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig. Wireless Networks (9): 189-199 (2003). Web SearchBibTeXDownload
2002
17Tapestry: a fault-tolerant wide-area application infrastructure. Ben Y. Zhao, John Kubiatowicz, Anthony D. Joseph. Computer Communication Review (32): 81 (2002). Web SearchBibTeXDownload
16Brocade: Landmark Routing on Overlay Networks. Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz. IPTPS 2002, 34-44. Web SearchBibTeXDownload
15A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer. MONET (7): 389-406 (2002). Web SearchBibTeXDownload
14The SAHARA Model for Service Composition across Multiple Providers. Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica. Pervasive 2002, 1-14. Cited by 78Web SearchBibTeXDownload
13Optimizing the End-to-End Performance of Reliable Flows over Wireless Links. Reiner Ludwig, Almudena Konrad, Anthony D. Joseph, Randy H. Katz. Wireless Networks (8): 289-299 (2002). Web SearchBibTeXDownload
12An Architecture for Secure Wide-Area Service Discovery. Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz. Wireless Networks (8): 213-230 (2002). Web SearchBibTeXDownload
2001
11The Ninja architecture for robust Internet-scale systems and services. Steven D. Gribble, Matt Welsh, J. Robert von Behren, Eric A. Brewer, David E. Culler, Nikita Borisov, Steven E. Czerwinski, Ramakrishna Gummadi, Jon R. Hill, Anthony D. Joseph, Randy H. Katz, Zhuoqing Morley Mao, Steven J. Ross, Ben Y. Zhao. Computer Networks (35): 473-497 (2001). Web SearchBibTeXDownload
10A Markov-based channel model algorithm for wireless networks. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, Reiner Ludwig. MSWiM 2001, 28-36. Web SearchBibTeXDownload
9Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination. Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz. NOSSDAV 2001, 11-20. Web SearchBibTeXDownload
2000
8NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System. J. Robert von Behren, Steven E. Czerwinski, Anthony D. Joseph, Eric A. Brewer, John Kubiatowicz. ICPP Workshops 2000, 151. Web SearchBibTeXDownload
7A Signaling System Using Lightweight Call Sessions. Helen J. Wang, Anthony D. Joseph, Randy H. Katz. INFOCOM 2000, 697-706. Web SearchBibTeXDownload
6A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices. Steven J. Ross, Jason L. Hill, Michael Y. Chen, Anthony D. Joseph, David E. Culler, Eric A. Brewer. WMCSA 2000, 171-182. Web SearchBibTeXDownload
5Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network. Bhaskaran Raman, Randy H. Katz, Anthony D. Joseph. WMCSA 2000, 95. Web SearchBibTeXDownload
1999
4An Architecture for a Secure Service Discovery Service. Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz. MOBICOM 1999, 24-35. Web SearchBibTeXDownload
1998
3The Case for Services over Cascaded Networks. Anthony D. Joseph, B. R. Badrinath, Randy H. Katz. WOWMOM 1998, 2-10. Web SearchBibTeXDownload
1995
2Rover: A Toolkit for Mobile Information Access. Anthony D. Joseph, Alan F. deLespinasse, Joshua A. Tauber, David K. Gifford, M. Frans Kaashoek. SOSP 1995, 156-171. Web SearchBibTeXDownload
1992
1PRELUDE: A System for Portable Parallel Software. William E. Weihl, Eric A. Brewer, Adrian Colbrook, Chrysanthos Dellarocas, Wilson C. Hsieh, Anthony D. Joseph, Carl A. Waldspurger, Paul Wang. PARLE 1992, 971-973. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research