Ling Huang

According to our database1, Ling Huang
  • authored at least 111 papers between 1999 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Cyclist Social Force Model at Unsignalized Intersections With Heterogeneous Traffic.
IEEE Trans. Industrial Informatics, 2017

Kriging with Unknown Variance Components for Regional Ionospheric Reconstruction.
Sensors, 2017

Monitoring drivers' sleepy status at night based on machine vision.
Multimedia Tools Appl., 2017

Airborne Transient Electromagnetic Modeling and Inversion Under Full Attitude Change.
IEEE Geosci. Remote Sensing Lett., 2017

Reliable and efficient big service selection.
Information Systems Frontiers, 2017

Study of Bicycle Movements in Conflicts at Mixed Traffic Unsignalized Intersections.
IEEE Access, 2017

Phased Array Radar-Based Channel Modeling and Sparse Channel Estimation for an Integrated Radar and Communication System.
IEEE Access, 2017

Waveform Design for Joint Radar-Communication with Nonideal Power Amplifier and Outband Interference.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A Modified Waveform Design for Radar-Communication Integration Based on LFM-CPM.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Community Detection in Graph Streams by Pruning Zombie Nodes.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Geographical and Overlapping Community Modeling Based on Business Circles for POI Recommendation.
Proceedings of the Intelligence Science and Big Data Engineering, 2017

Low-Rank and Sparse Matrix Completion for Recommendation.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Social and Content Based Collaborative Filtering for Point-of-Interest Recommendations.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A Hybrid Approach for Recovering Information Propagational Direction.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Visual Saliency Fusion Based Multi-feature for Semantic Image Retrieval.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
A Cascaded Linear High-Voltage Amplifier Circuit for Dielectric Measurement.
IEEE Trans. Industrial Electronics, 2016

Event-Triggered Faults Tolerant Control for Stochastic Systems with Time Delays.
Scientific Programming, 2016

Development and Characterization a Single-Active-Chamber Piezoelectric Membrane Pump with Multiple Passive Check Valves.
Sensors, 2016

An Elaborately Designed Virtual Frame to Level Aeromagnetic Data.
IEEE Geosci. Remote Sensing Lett., 2016

Disturbance attenuation observer design for fuzzy time-delay system with fault.
Journal of Intelligent and Fuzzy Systems, 2016

Computational analysis and enzyme assay of inhibitor response to disease single nucleotide polymorphisms (SNPs) in lipoprotein lipase.
J. Bioinformatics and Computational Biology, 2016

Transmit beampattern optimisation design based on constant beamwidth.
IJMIC, 2016

Long-term revenue maximization pricing scheme for cloud.
Comput. Syst. Sci. Eng., 2016

EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses.
CoRR, 2016

Phased array radar based angular domain channel estimation scheme for integrated radar-communication system.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Design and Implementation of Library Books Search and Management System Using RFID Technology.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Topology Structure Repair Algorithm for Triangular Mesh Model.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

An Adaptive Slicing Thickness Adjustment Method Based on Cloud Point in 3D Printing.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

CloudKeyBank: Privacy and owner authorization enforced key management framework.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Time delay compensation for positive nonlinear networked control systems with bounded controls.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Saliency Region Detection via Graph Model and Statistical Learning.
Proceedings of the Pattern Recognition - 7th Chinese Conference, 2016

Spectrum Allocation Based on Gaussian - Cauchy Mutation Shuffled Frog Leaping Algorithm.
Proceedings of the Advances in Services Computing, 2016

2015
Mantis: Efficient Predictions of Execution Time, Energy Usage, Memory Usage and Network Usage on Smart Mobile Devices.
IEEE Trans. Mob. Comput., 2015

CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework.
IEEE Trans. Knowl. Data Eng., 2015

What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Information Forensics and Security, 2015

Improving Target Detection Accuracy Based on Multipolarization MIMO GPR.
IEEE Trans. Geoscience and Remote Sensing, 2015

DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS.
Security and Communication Networks, 2015

Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR, 2015

A low-complexity detector for uplink massive MIMO systems based on Gaussian approximate belief propagation.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Modified-prior PLDA and score calibration for duration mismatch compensation in speaker recognition system.
Proceedings of the INTERSPEECH 2015, 2015

MPDQ-based high-order QAM detection scheme for massive MIMO with low-precision quantization.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Application for Party Based on Cloud Platform.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network.
ACM TIST, 2014

Effective Scanned-Certification Image Retrieval Based on Local Object and Block Matching.
JSW, 2014

I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
CoRR, 2014

I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Large-Margin Convex Polytope Machine.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Morpheus: benchmarking computational diversity in mobile malware.
Proceedings of the HASP 2014, 2014

A neural network based modeling and simulation of bicycle conflict avoidance behaviors at non-signalized intersections.
Proceedings of the 10th International Conference on Natural Computation, 2014

Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
On the Convergence of Ionospheric Constrained Precise Point Positioning (IC-PPP) Based on Undifferential Uncombined Raw GNSS Observations.
Sensors, 2013

Mantis: Automatic Performance Prediction for Smartphone Applications.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Visual analysis on online display advertising data.
Proceedings of the IEEE Symposium on Large-Scale Data Analysis and Visualization, 2013


2012
Query Strategies for Evading Convex-Inducing Classifiers.
Journal of Machine Learning Research, 2012

GPR simulation based on complex frequency shifted recursive integration PML boundary of 3D high order FDTD.
Computers & Geosciences, 2012

Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
CoRR, 2012

Online Semi-Supervised Learning on Quantized Graphs
CoRR, 2012

Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

A GPS/Wi-Fi integrated system for positioning in Cooperative Vehicle and Infrastructure System.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2012

Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

Short paper: smartphones: not smart enough?
Proceedings of the SPSM'12, 2012

2011
Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
CoRR, 2011

An analysis on traffic flow characteristics and lane changing behaviors in Beijing urban expressway bottlenecks.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

A preliminary study on impervious surface area dynamics and water quality response at watershed scale.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Semi-Supervised Learning with Max-Margin Graph Cuts.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Mantis: Predicting System Performance through Program Analysis and Modeling
CoRR, 2010

Query Strategies for Evading Convex-Inducing Classifiers
CoRR, 2010

Near-Optimal Evasion of Convex-Inducing Classifiers
CoRR, 2010

Online Semi-Supervised Learning on Quantized Graphs.
Proceedings of the UAI 2010, 2010

Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Experience Mining Google's Production Console Logs.
Proceedings of the Workshop on Managing Systems via Log Analysis and Machine Learning Techniques, 2010

Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

Detecting Large-Scale System Problems by Mining Console Logs.
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010

An Analysis of the Convergence of Graph Laplacians.
Proceedings of the 27th International Conference on Machine Learning (ICML-10), 2010

Online semi-supervised perception: Real-time learning without explicit feedback.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Performance Evaluation Review, 2009

Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning
CoRR, 2009

Detecting large-scale system problems by mining console logs.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Impact of IT monoculture on behavioral end host intrusion detection.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

Incentive Mechanism Design to the Electronic Products Reverse Supply Chain of Remanufacture Considering the Random Time.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

Fast approximate spectral clustering.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Online System Problem Detection by Mining Patterns of Console Logs.
Proceedings of the ICDM 2009, 2009

2008
Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Support Vector Machines, Data Reduction, and Approximate Kernel Matrices.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2008

Mining Console Logs for Large-Scale System Problem Detection.
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008

Spectral Clustering with Perturbed Data.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

Feature Extraction of EEG Signals Using Power Spectral Entropy.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Communication-Efficient Online Detection of Network-Wide Anomalies.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Communication-Efficient Tracking of Distributed Cumulative Triggers.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Dynamic Programming Algorithms for Generating Optimal Strip Layouts.
Comp. Opt. and Appl., 2006

In-Network PCA and Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Toward sophisticated detection with distributed triggers.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

Mixed Backlogging and Outsourcing Models with Nondecreasing Inventory Capacity.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

ICA-Based Potential Significant Feature Extraction for Market Forecast.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

ICA/RBF-Based Prediction of Varying Trend in Real Exchange Rate.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
76-Space Analysis of Grey Matter Diffusivity: Methods and Applications.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2005

2004
Tapestry: a resilient global-scale overlay for service deployment.
IEEE Journal on Selected Areas in Communications, 2004

Rapid Mobility via Type Indirection.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

The Information Feedback System of Tsinghua Web-Based School.
ICCE, 2002

1999
Force-Responsive Robotic Assembly of Transmission Components.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999


  Loading...