Anthony D. Joseph

According to our database1, Anthony D. Joseph authored at least 89 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
FPGA Accelerated INDEL Realignment in the Cloud.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019

2018
Using Multitask Learning to Improve 12-Lead Electrocardiogram Classification.
CoRR, 2018

2017
A Berkeley View of Systems Challenges for AI.
CoRR, 2017

2016
Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR, 2015

Evasion and Hardening of Tree Ensemble Classifiers.
CoRR, 2015

Rethinking Data-Intensive Science Using Scalable Analytics Systems.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
CoRR, 2014

I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Large-Margin Convex Polytope Machine.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013

2012
Understanding TCP Incast and Its Implications for Big Data Workloads.
;login:, 2012

A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks.
IEEE Trans. Vehicular Technology, 2012

Query Strategies for Evading Convex-Inducing Classifiers.
J. Mach. Learn. Res., 2012

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012

GPUs as an opportunity for offloading garbage collection.
Proceedings of the International Symposium on Memory Management, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Mesos: Flexible Resource Sharing for the Cloud.
;login:, 2011

Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

A Taxonomy of Cyber Attacks on SCADA Systems.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Datacenter Needs an Operating System.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011

Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
The security of machine learning.
Machine Learning, 2010

Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Near-Optimal Evasion of Convex-Inducing Classifiers
CoRR, 2010

A view of cloud computing.
Commun. ACM, 2010

Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Performance Evaluation Review, 2009

Guest Editors' Introduction: Smarter Phones.
IEEE Pervasive Computing, 2009

OSNP: Secure wireless authentication protocol using one-time key.
Computers & Security, 2009

Understanding TCP incast throughput collapse in datacenter networks.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

2008
Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Support Vector Machines, Data Reduction, and Approximate Kernel Matrices.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2008

Improving MapReduce Performance in Heterogeneous Environments.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Exploiting Machine Learning to Subvert Your Spam Filter.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Open problems in the security of learning.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
Very Large Scale Cooperative Experiments in Emulab-Derived Systems.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Design, Deployment, and Use of the DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Communication-Efficient Online Detection of Network-Wide Anomalies.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Communication-Efficient Tracking of Distributed Cumulative Triggers.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Mobile and Ubiquitous Objects.
IEEE Pervasive Computing, 2006

Intelligent Transportation Systems.
IEEE Pervasive Computing, 2006

Determining model accuracy of network traces.
J. Comput. Syst. Sci., 2006

Experience with deter: A testbed for security research.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

In-Network PCA and Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Toward sophisticated detection with distributed triggers.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

06131 Abstracts Collection -- Peer-to -Peer -Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

06131 Executive Summary -- Peer-to-Peer-Systems and -Applications.
Proceedings of the Peer-to-Peer-Systems and -Applications, 26.03. - 29.03.2006, 2006

Can machine learning be secure?
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Guest Editorial.
Wireless Networks, 2005

Energy harvesting projects.
IEEE Pervasive Computing, 2005

Choosing an Accurate Network Model using Domain Analysis.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Analyzing Behavioral Features for Email Classification.
Proceedings of the CEAS 2005, 2005

2004
Tapestry: a resilient global-scale overlay for service deployment.
IEEE Journal on Selected Areas in Communications, 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Analysis of Wide Area User Mobility Patterns.
Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), 2004

Rapid Mobility via Type Indirection.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
A Markov-Based Channel Model Algorithm for Wireless Networks.
Wireless Networks, 2003

Choosing an accurate network path model.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
Optimizing the End-to-End Performance of Reliable Flows over Wireless Links.
Wireless Networks, 2002

An Architecture for Secure Wide-Area Service Discovery.
Wireless Networks, 2002

A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices.
MONET, 2002

Tapestry: a fault-tolerant wide-area application infrastructure.
Computer Communication Review, 2002


Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

2001
The Ninja architecture for robust Internet-scale systems and services.
Computer Networks, 2001

Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

Performance evaluation of UDP lite for cellular video.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

Using Simple Remote Evaluation to Enable Efficient Application Protocols in Mobile Environments.
Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2001), 2001

Pricing experiments for a computer-telephony-service usage allocation.
Proceedings of the Global Telecommunications Conference, 2001

2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Personal Commun., 2000

IP-based mobile telecommunications networks.
IEEE Personal Commun., 2000

Universal Inbox: providing extensible personal mobility and service mobility in an integrated communication network.
Proceedings of the 3rd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2000), 2000

A Signaling System Using Lightweight Call Sessions.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System.
Proceedings of the 2000 International Workshop on Parallel Processing, 2000

1999
Multi-Layer Tracing of TCP over a Reliable Wireless Link.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links.
Proceedings of the MOBICOM '99, 1999

An Architecture for a Secure Service Discovery Service.
Proceedings of the MOBICOM '99, 1999

1998
Mobile computing with the Rover Toolkit.
PhD thesis, 1998

The Case for Services over Cascaded Networks.
Proceedings of First ACM International Workshop on Wireless Mobile Multimedia, 1998

1997
Building reliable mobile-aware applications using the Rover toolkit.
Wireless Networks, 1997

Mobile Computing with the Rover Toolkit.
IEEE Trans. Computers, 1997

1995
Rover: A Toolkit for Mobile Information Access.
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995

1992
PRELUDE: A System for Portable Parallel Software.
Proceedings of the PARLE '92: Parallel Architectures and Languages Europe, 1992


  Loading...