Anthony D. Joseph
According to our database1,
Anthony D. Joseph
authored at least 89 papers
between 1992 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:
On csauthors.net:
Bibliography
2019
FPGA Accelerated INDEL Realignment in the Cloud.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019
2018
Using Multitask Learning to Improve 12-Lead Electrocardiogram Classification.
CoRR, 2018
2017
A Berkeley View of Systems Challenges for AI.
CoRR, 2017
2016
Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR, 2015
Evasion and Hardening of Tree Ensemble Classifiers.
CoRR, 2015
Rethinking Data-Intensive Science Using Scalable Analytics Systems.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
CoRR, 2014
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Large-Margin Convex Polytope Machine.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014
Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014
2013
Approaches to adversarial drift.
Proceedings of the AISec'13, 2013
2012
Understanding TCP Incast and Its Implications for Big Data Workloads.
;login:, 2012
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012
Query Strategies for Evading Convex-Inducing Classifiers.
J. Mach. Learn. Res., 2012
Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012
GPUs as an opportunity for offloading garbage collection.
Proceedings of the International Symposium on Memory Management, 2012
Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Mesos: Flexible Resource Sharing for the Cloud.
;login:, 2011
Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011
A Taxonomy of Cyber Attacks on SCADA Systems.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
The Datacenter Needs an Operating System.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011
Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
2010
The security of machine learning.
Machine Learning, 2010
Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010
Near-Optimal Evasion of Convex-Inducing Classifiers
CoRR, 2010
A view of cloud computing.
Commun. ACM, 2010
Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010
2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Performance Evaluation Review, 2009
Guest Editors' Introduction: Smarter Phones.
IEEE Pervasive Computing, 2009
OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security, 2009
Understanding TCP incast throughput collapse in datacenter networks.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009
ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
2008
Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Support Vector Machines, Data Reduction, and Approximate Kernel Matrices.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2008
Improving MapReduce Performance in Heterogeneous Environments.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Exploiting Machine Learning to Subvert Your Spam Filter.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Open problems in the security of learning.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
Very Large Scale Cooperative Experiments in Emulab-Derived Systems.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Design, Deployment, and Use of the DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Communication-Efficient Online Detection of Network-Wide Anomalies.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Communication-Efficient Tracking of Distributed Cumulative Triggers.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2006
Mobile and Ubiquitous Objects.
IEEE Pervasive Computing, 2006
Intelligent Transportation Systems.
IEEE Pervasive Computing, 2006
Determining model accuracy of network traces.
J. Comput. Syst. Sci., 2006
Experience with deter: A testbed for security research.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006
In-Network PCA and Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006
Toward sophisticated detection with distributed triggers.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006
06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006
06131 Executive Summary -- Peer-to-Peer-Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006
Can machine learning be secure?
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Guest Editorial.
Wireless Networks, 2005
Energy harvesting projects.
IEEE Pervasive Computing, 2005
Choosing an Accurate Network Model using Domain Analysis.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Analyzing Behavioral Features for Email Classification.
Proceedings of the CEAS 2005, 2005
2004
Tapestry: a resilient global-scale overlay for service deployment.
IEEE Journal on Selected Areas in Communications, 2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004
Analysis of Wide Area User Mobility Patterns.
Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), 2004
Rapid Mobility via Type Indirection.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
2003
A Markov-Based Channel Model Algorithm for Wireless Networks.
Wireless Networks, 2003
Choosing an accurate network path model.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
2002
Optimizing the End-to-End Performance of Reliable Flows over Wireless Links.
Wireless Networks, 2002
An Architecture for Secure Wide-Area Service Discovery.
Wireless Networks, 2002
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices.
MONET, 2002
Tapestry: a fault-tolerant wide-area application infrastructure.
Computer Communication Review, 2002
The SAHARA Model for Service Composition across Multiple Providers.
Proceedings of the Pervasive Computing, 2002
Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002
2001
The Ninja architecture for robust Internet-scale systems and services.
Computer Networks, 2001
Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001
Performance evaluation of UDP lite for cellular video.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001
Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile Environments.
Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2001), 2001
Pricing experiments for a computer-telephony-service usage allocation.
Proceedings of the Global Telecommunications Conference, 2001
2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Personal Commun., 2000
IP-based mobile telecommunications networks.
IEEE Personal Commun., 2000
Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network.
Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2000), 2000
A Signaling System Using Lightweight Call Sessions.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000
NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System.
Proceedings of the 2000 International Workshop on Parallel Processing, 2000
1999
Multi-Layer Tracing of TCP over a Reliable Wireless Link.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links.
Proceedings of the MOBICOM '99, 1999
An Architecture for a Secure Service Discovery Service.
Proceedings of the MOBICOM '99, 1999
1998
Mobile computing with the Rover Toolkit.
PhD thesis, 1998
The Case for Services over Cascaded Networks.
Proceedings of First ACM International Workshop on Wireless Mobile Multimedia, 1998
1997
Building reliable mobile-aware applications using the Rover toolkit.
Wireless Networks, 1997
Mobile Computing with the Rover Toolkit.
IEEE Trans. Computers, 1997
1995
Rover: A Toolkit for Mobile Information Access.
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995
1992
PRELUDE: A System for Portable Parallel Software.
Proceedings of the PARLE '92: Parallel Architectures and Languages Europe, 1992