Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)Towards a Timely Causality Analysis for Enterprise Security., , , , , , , and . NDSS, The Internet Society, (2018)TINET: Learning Invariant Networks via Knowledge Transfer., , , , , , and . KDD, page 1890-1899. ACM, (2018)Collaborative Alert Ranking for Anomaly Detection., , , , , , and . CIKM, page 1987-1995. ACM, (2018)BeeZip: Towards An Organized and Scalable Architecture for Data Compression., , , and . ASPLOS (3), page 133-148. ACM, (2024)Prototype Comparison Convolutional Networks for One-Shot Segmentation., , , , , and . IEEE Access, (2024)NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis., , , , , , , , , and . CCS, page 1324-1337. ACM, (2018)Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , and . INFOCOM, page 1091-1099. IEEE, (2010)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , and . AsiaCCS, page 543-554. ACM, (2015)High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , and . ACM Conference on Computer and Communications Security, page 504-516. ACM, (2016)