Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Macroscope: end-point approach to networked application dependency discovery., , , , and . CoNEXT, page 229-240. ACM, (2009)Mixture Models of Endhost Network Traffic, , , , and . CoRR, (2012)Estimating dynamic traffic matrices by using viable routing changes., , , , and . IEEE/ACM Trans. Netw., 15 (3): 485-498 (2007)Distributed PCA and Network Anomaly Detection, , , , , and . UCB/EECS-2006-99. EECS Department, University of California, Berkeley, (July 2006)Maximum entropy models: convergence rates and applications in dynamic system monitoring., , and . ISIT, page 168. IEEE, (2004)Stealthy poisoning attacks on PCA-based anomaly detectors., , , , , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 73-74 (2009)Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning., , , and . J. Priv. Confidentiality, (2012)Hark: A Deep Learning System for Navigating Privacy Feedback at Scale., , , , and . SP, page 2469-2486. IEEE, (2022)In-Network PCA and Anomaly Detection., , , , , and . NIPS, page 617-624. MIT Press, (2006)Can coexisting overlays inadvertently step on each other?, , , and . ICNP, page 201-214. IEEE Computer Society, (2005)