Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection in Clouds: Challenges and Practice.. ETCD@ASPLOS, page 6:1-6:2. ACM, (2017)Virt-LM: a benchmark for live migration of virtual machine., , , , and . ICPE, page 307-316. ACM, (2011)How Does the Workload Look Like in Production Cloud? Analysis and Clustering of Workloads on Alibaba Cluster Trace., , , , and . ICPADS, page 102-109. IEEE, (2018)Multi-Tier Workload Consolidations in the Cloud: Profiling, Modeling and Optimization., , , and . IEEE Trans. Cloud Comput., 10 (2): 899-912 (2022)An In-Depth Study of Microservice Call Graph and Runtime Performance., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 3901-3914 (2022)A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification., , , , and . IEEE/ACM Trans. Netw., 31 (3): 1369-1384 (June 2023)GLTC: A Metro Passenger Identification Method Across AFC Data and Sparse WiFi Data., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 18337-18351 (2022)Learning the Unlearnable: Adversarial Augmentations Suppress Unlearnable Example Attacks., , , , and . CoRR, (2023)Resource Management for GPT-based Model Deployed on Clouds: Challenges, Solutions, and Future Directions., , and . CoRR, (2023)Flareon: Stealthy any2any Backdoor Injection via Poisoned Augmentation., , , , , and . CoRR, (2022)