2012
47Robust detection of comment spam using entropy rate. Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar. AISec 2012, 59-70. Web SearchBibTeXDownload
46GPR simulation based on complex frequency shifted recursive integration PML boundary of 3D high order FDTD. Jing Li, Zhaofa Zeng, Ling Huang, Fengshan Liu. Computers & Geosciences (49): 121-130 (2012). Web SearchBibTeXDownload
45Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+. Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song. CoRR (abs/1209.0835) (2012). Web SearchBibTeXDownload
44Online Semi-Supervised Learning on Quantized Graphs. Michal Valko, Branislav Kveton, Ling Huang, Daniel Ting. CoRR (abs/1203.3522) (2012). Web SearchBibTeXDownload
43Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications. Steve Hanna, Ling Huang, Edward XueJun Wu, Saung Li, Charles Chen, Dawn Song. DIMVA 2012, 62-81. Web SearchBibTeXDownload
42Evolution of social-attribute networks: measurements, modeling, and implications using google+. Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song. Internet Measurement Conference 2012, 131-144. Web SearchBibTeXDownload
2011
41Adversarial machine learning. Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar. AISec 2011, 43-58. Web SearchBibTeXDownload
40Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song. CoRR (abs/1112.3265) (2011). Web SearchBibTeXDownload
39A preliminary study on impervious surface area dynamics and water quality response at watershed scale. Jinliang Huang, Yuan Feng, Ling Huang, Qinqin Sun. ICSDM 2011, 431-434. Web SearchBibTeXDownload
2010
38Mantis: Predicting System Performance through Program Analysis and Modeling. Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik. CoRR (abs/1010.0019) (2010). Web SearchBibTeXDownload
37Near-Optimal Evasion of Convex-Inducing Classifiers. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar. CoRR (abs/1003.2751) (2010). Web SearchBibTeXDownload
36Query Strategies for Evading Convex-Inducing Classifiers. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar. CoRR (abs/1007.0484) (2010). Web SearchBibTeXDownload
35Detecting Large-Scale System Problems by Mining Console Logs. Wei Xu, Ling Huang, Armando Fox, David Patterson, Michael I. Jordan. ICML 2010, 37-46. Web SearchBibTeXDownload
34An Analysis of the Convergence of Graph Laplacians. Daniel Ting, Ling Huang, Michael I. Jordan. ICML 2010, 1079-1086. Web SearchBibTeXDownload
33Semi-Supervised Learning with Max-Margin Graph Cuts. Branislav Kveton, Michal Valko, Ali Rahimi, Ling Huang. Journal of Machine Learning Research - Proceedings Track (9): 421-428 (2010). Web SearchBibTeXDownload
32Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression. Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, Mayur Naik. NIPS 2010, 883-891. Web SearchBibTeXDownload
31Classifier Evasion: Models and Open Problems. Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, J. D. Tygar. PSDML 2010, 92-98. Web SearchBibTeXDownload
30Online Semi-Supervised Learning on Quantized Graphs. Michal Valko, Branislav Kveton, Ling Huang, Daniel Ting. UAI 2010, 606-614. Web SearchBibTeXDownload
2009
29Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft. CoRR (abs/0911.5708) (2009). Web SearchBibTeXDownload
28Online System Problem Detection by Mining Patterns of Console Logs. Wei Xu, Ling Huang, Armando Fox, David Patterson, Michael I. Jordan. ICDM 2009, 588-597. Web SearchBibTeXDownload
27ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. Internet Measurement Conference 2009, 1-14. Web SearchBibTeXDownload
26Fast approximate spectral clustering. Donghui Yan, Ling Huang, Michael I. Jordan. KDD 2009, 907-916. Web SearchBibTeXDownload
25Incentive Mechanism Design to the Electronic Products Reverse Supply Chain of Remanufacture Considering the Random Time. Ling Huang. PACCS 2009, 591-594. Web SearchBibTeXDownload
24Stealthy poisoning attacks on PCA-based anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. SIGMETRICS Performance Evaluation Review (37): 73-74 (2009). Web SearchBibTeXDownload
23Detecting large-scale system problems by mining console logs. Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan. SOSP 2009, 117-132. Web SearchBibTeXDownload
22Impact of IT monoculture on behavioral end host intrusion detection. Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire. WREN 2009, 27-36. Web SearchBibTeXDownload
2008
21Feature Extraction of EEG Signals Using Power Spectral Entropy. Aihua Zhang, Bin Yang, Ling Huang. BMEI (2) 2008, 435-439. Web SearchBibTeXDownload
20Support Vector Machines, Data Reduction, and Approximate Kernel Matrices. XuanLong Nguyen, Ling Huang, Anthony D. Joseph. ECML/PKDD (2) 2008, 137-153. Web SearchBibTeXDownload
19Spectral Clustering with Perturbed Data. Ling Huang, Donghui Yan, Michael I. Jordan, Nina Taft. NIPS 2008, 705-712. Web SearchBibTeXDownload
18Evading Anomaly Detection through Variance Injection Attacks on PCA. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar. RAID 2008, 394-395. Web SearchBibTeXDownload
17Mining Console Logs for Large-Scale System Problem Detection. Wei Xu, Ling Huang, Armando Fox, David A. Patterson, Michael I. Jordan. SysML 2008. Web SearchBibTeXDownload
2007
16Communication-Efficient Tracking of Distributed Cumulative Triggers. Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft. ICDCS 2007, 54. Cited by 13Web SearchBibTeXDownload
15Communication-Efficient Online Detection of Network-Wide Anomalies. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft. INFOCOM 2007, 134-142. Cited by 26Web SearchBibTeXDownload
2006
14ICA/RBF-Based Prediction of Varying Trend in Real Exchange Rate. Ling Huang, Fenggang Li, Lin Xing. APSCC 2006, 572-580. Web SearchBibTeXDownload
13ICA-Based Potential Significant Feature Extraction for Market Forecast. Ling Huang, Jinhong Zhong. CIMCA/IAWTIC 2006, 176. Web SearchBibTeXDownload
12Dynamic Programming Algorithms for Generating Optimal Strip Layouts. Yaodong Cui, Ling Huang. Comp. Opt. and Appl. (33): 287-301 (2006). Web SearchBibTeXDownload
11Mixed Backlogging and Outsourcing Models with Nondecreasing Inventory Capacity. Ling Huang, Jinhong Zhong, Zhiwei Ni, Shanling Yang. ISDA (1) 2006, 1161-1166. Web SearchBibTeXDownload
10Toward sophisticated detection with distributed triggers. Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft. MineNet 2006, 311-316. Cited by 17Web SearchBibTeXDownload
9In-Network PCA and Anomaly Detection. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft. NIPS 2006, 617-624. Cited by 19Web SearchBibTeXDownload
2005
876-Space Analysis of Grey Matter Diffusivity: Methods and Applications. Tianming Liu, Geoffrey Young, Ling Huang, Nankuei Chen, Stephen T. C. Wong. MICCAI 2005, 148-155. Web SearchBibTeXDownload
2004
7Tapestry: a resilient global-scale overlay for service deployment. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, John Kubiatowicz. IEEE Journal on Selected Areas in Communications (22): 41-53 (2004). Web SearchBibTeXDownload
6Rapid Mobility via Type Indirection. Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz. IPTPS 2004, 64-74. Web SearchBibTeXDownload
2003
5Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays. Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, John Kubiatowicz. ICNP 2003, 246-257. Web SearchBibTeXDownload
4Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowicz. Middleware 2003, 1-20. Web SearchBibTeXDownload
2002
3The Information Feedback System of Tsinghua Web-Based School. Ling Huang, Dongxing Jiang, Nianlong Luo. ICCE 2002, 627-631. Web SearchBibTeXDownload
2Brocade: Landmark Routing on Overlay Networks. Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz. IPTPS 2002, 34-44. Web SearchBibTeXDownload
1999
1Force-Responsive Robotic Assembly of Transmission Components. Wyatt S. Newman, Michael S. Branicky, Andy Podgurski, Siddharth R. Chhatpar, Ling Huang, Jayendran Swaminathan, Hao Zhang. ICRA 1999, 2096-2102. Web SearchBibTeXDownload
from DBLP and Google Scholar

Related People

Related Organizations

Developed by the Database Group at the University of Wisconsin and Yahoo! Research