Author of the publication

Push-Button Reliability Testing for Cloud-Backed Applications with Rainmaker.

, , , , and . NSDI, page 1701-1716. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optical steganographic transmission of spectral-phase-encoded OCDMA signal over a public DPSK channel., , , , , , and . WOCC, page 552-554. IEEE, (2013)Automatic Root Cause Analysis via Large Language Models for Cloud Incidents., , , , , , , , , and 8 other author(s). EuroSys, page 674-688. ACM, (2024)Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents., , , , , , , , , and 7 other author(s). CoRR, (2023)SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records., , , , , , and . SP, page 489-506. IEEE, (2022)Noise suppression using modified NOLM for stealth signal receiving in optical steganography system., , , , , and . WOCC, page 630-633. IEEE, (2013)WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics., , , , , and . NDSS, The Internet Society, (2021)Push-Button Reliability Testing for Cloud-Backed Applications with Rainmaker., , , , and . NSDI, page 1701-1716. USENIX Association, (2023)Configuration Validation with Large Language Models., , , , , and . CoRR, (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions., , , , , , , , and . SP, page 2620-2638. IEEE, (2023)