Publications
Parameterized Explainer for Graph Neural Network
Thirty-Fourth Annual Conference on Neural Information Processing Systems (NeurIPS 2020)
1-17, 2020
12/12/2020This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
2020 Annual Computer Security Applications Conference
1-14, 2020
12/11/2020T2-Net: A Semi-supervised Deep Model for Turbulence Forecasting
ICDM 2020 - The 20th IEEE International Conference on Data Mining
1-11, 2020
11/20/2020Anomaly Detection on Web-User Behaviors through Deep Learning
16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2020)
1-6, 2020
10/23/2020VESSELS: Efficient and Scalable Deep Learning Prediction on Trusted Processors
ACM Symposium on Cloud Computing 2020 (SoCC 2020)
1-15, 2020
10/21/2020Node Classification in Temporal Graphs through Stochastic Sparsification and Temporal Structural Convolution
ECML-PKDD 2020 - The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
1-17. 2020
09/18/2020Robust Graph Representation Learning via Neural Sparsification
The 37th International Conference on Machine Learning (ICML 2020)
pp. 1-12, 2020
07/18/2020At At the Speed of Sound: Efficient Audio Scene Classification
The Annual ACM International Conference on Multimedia Retrieval (ICMR 2020)
pp. 301-305, 2020
06/11/2020RULENet: End-to-end Learning with the Dual-estimator for Remaining Useful Life Estimation
2020 IEEE International Conference on Prognostics and Health Management , Detroit, MI
pp. 1-8, 2020
06/10/2020Inductive and Unsupervised Representation Learning on Graph Structured Objects
8th International Conference on Learning Representations (ICLR 2020)
pp. 1-20, 2020
04/30/2020A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement
The Web Conference 2020 (WWW 2020)
pp. 2144-2154, 2020
04/24/2020Adversarial Cooperative Imitation Learning for Dynamic Treatment Regimes
The Web Conference 2020 (WWW 2020)
pp. 1785-1795, 2020
04/24/2020APTrace: A Responsive System for Agile Enterprise Level Causality Analysis
36th IEEE International Conference on Data Engineering (ICDE 2020)
pp. 1701-1712, 2020
04/24/2020You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
NDSS Symposium 2020
pp. 1-17, 2020
03/09/2020Asymmetrically Hierarchical Networks with Attentive Interactions for Interpretable Review-based Recommendation
The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020)
pp. 1-8, 2020
02/12/2020Tensorized LSTM with Adaptive Shared Memory for Learning Trends in Multivariate Time Series
The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020)
pp. 1-10, 2020
02/12/2020A Deep Unsupervised Binary Coding Networks for Multivariate Time Series Retrieval
The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020)
pp. 1-8, 2020
02/12/2020Interpretable Click-Through Rate Prediction through Hierarchical Attention
The 13th ACM International Conference on Web Search and Data Mining (WSDM 2020)
pp. 313-321, 2020
02/07/2020Temporal Context-aware Representation Learning for Question Routing
The 13th ACM International Conference on Web Search and Data Mining (WSDM 2020)
pp. 753-761, 2020
02/07/2020Progressive Processing of System-Behavioral Query
The 35th Annual Computer Security Applications Conference (ACSAC 2019)
pp. 378-389, 2019
12/13/2019Self-Attentive Attributed Network Embedding Through Adversarial Learning
The 19th IEEE International Conference on Data Mining (ICDM 2019)
pp. 758-767, 2019
11/11/2019Learning Robust Representations with Graph Denoising Policy Network
The 19th IEEE International Conference on Data Mining (ICDM 2019)
pp. 1378-1383, 2019
11/11/2019Adaptive Neural Network for Node Classification in Dynamic Networks
The 19th IEEE International Conference on Data Mining (ICDM 2019)
pp. 1402-1407, 2019
11/11/2019A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security
45th International Conference on Very Large Data Bases (VLDB 2019)
pp. 1802-1805, 2019
08/30/2019Heterogeneous Graph Matching Networks for Unknown Malware Detection
The 28th International Joint Conference on Artificial Intelligence (IJCAI 2019)
pp. 3762-3770, 2019
08/16/2019Spatio-Temporal Attentive RNN for Node Classification in Temporal Attributed Graphs
The 28th International Joint Conference on Artificial Intelligence (IJCAI 2019)
pp. 3947- 3953, 2019
08/16/2019Clairvoyant Networks
Network Traffic Measurement and Analysis Conference (TMA Conference 2019)
pp. 89-96, 2019
06/21/2019Attentional Heterogeneous Graph Neural Network:Application to Program Reidentfication
SIAM International Conference on Data Mining (SDM 2019)
pp. 693-701, 2019
05/04/2019Deep Co-Clustering
SIAM International Conference on Data Mining (SDM 2019)
pp. 414-422, 2019
05/04/2019PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications
9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019)
pp. 209-220, 2019
03/27/2019NODOZE: Combatting Threat Alert Fatigue with Automated Provenance Triage
The 26th Annual Network and Distributed System Security Symposium (NDSS 2019)
pp. 1-15, 2019
02/27/2019Countering Malicious Processes with Process-DNS Association
The 26th Annual Network and Distributed System Security Symposium (NDSS 2019)
pp. 1-15, 2019
02/27/2019A Deep Neural Network for Unsupervised Anomaly Detection and Diagnosis in Multivariate Time Series Data
The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI 2019)
pp, 1-9, 2019
02/01/2019Collaborative Alert Ranking for Anomaly Detection
Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
pp. 1987-1995, 2018
10/26/2018TGNet: Learning to Rank Nodes in Temporal Graphs
Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
pp. 97-106, 2018
10/26/2018Behavior-based Community Detection: Application to Host Assessment in Enterprise Information Networks
Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM 2018)
pp. 1977-1985, 2018
10/26/2018NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)
pp. 1324-1337, 2018
10/19/2018Deep Learning IP Network Representations
Big-DAMA 2018 - ACM SIGCOMM 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks
pp. 33-39, 2018
08/24/2018NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks
KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
pp. 2672-2681, 2018
08/23/2018Learning Deep Network Representations with Adversarially Regularized Autoencoders
KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
pp. 2663-2671, 2018
08/23/2018Deep r-th Root Rank Supervised Joint Binary Embedding for Multivariate Time Series Retrieval
KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
pp. 2229-2238, 2018
08/23/2018TINET: Transferring Knowledge between Invariant Networks
KDD 2018 - 24th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
pp. 1890-1899, 2018
08/23/2018SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
The 27th USENIX Security Symposium (USENIX Security 2018)
pp. 639-656, 2018
08/17/2018Exploiting Graph Regularized Multi-dimensional Hawkes Processes for Modeling Events with Spatio-temporal Characteristics
The 27th International Joint Conference on Artificial Intelligence (IJCAI-18)
pp. 2475-2482, 2018
07/19/2018AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
Proceedings of the 2018 USENIX Annual Technical Conference (ATC ’18)
pp. 113-125, USENIX 2018
07/13/2018LogLens: A Real-time Log Analysis System
38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018)
pp. 1052-062, 2018
07/02/2018Deep Autoencoding Latent Representation with Mixture Modeling for Unsupervised Anomaly Detection
Proceedings of the 6th International Conference on Learning Representations, Vancouver Convention Center (ICLR 2018)
pp. 1-19, 2018
05/03/2018Co-Regularized Deep Multi-Network Embedding
Proceedings of the 2018 World Wide Web Conference (WWW 2018)
ACM ISBN 978-1-4503-5639-8/18/04, pp. 469-478, 2018
04/27/2018Towards A Timely Causality Analysis in Homogeneous Enterprise Hosts
Proceedings of Network and Distributed Systems Security (NDSS) Symposium 2018
1-15, 2018
02/21/2018Identifying and Quantifying Nonlinear Structured Relationships in Complex Manufactural Systems
Proceedings of the 2017 IEEE International Conference on Big Data (Big Data 2017) , Boston, MA
pp. 1357-1362, 2017 IEEE
12/14/2017Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (CIKM 2017), Pan Pacific, Singapore
pp. 707-715, 2017
11/27/2017Ranking Causal Anomalies by Modeling Local Propagations on Networked Systems
Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM), New Orleans, LA
pp. 1003-1008, 2017 IEEE
11/22/2017Dual-Stage Attention Based Recurrent Neural Network for Time Series Prediction
Proceedings of The 26th International Joint Conference on Artificial Intelligence (IJCAI 2017)
pp. 2627-2633, 2017
08/25/2017Link Prediction with Spatial and Temporal Consistency in Dynamic Networks
Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI-17), Melbourne, Australia
pp. 3343-3349, 2017
08/25/2017Structural Event Detection from Log Messages
Proceedings of the 23rd SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2017), Halifax, Nova Scotia, Canada
pp. 1175-1184, 2017
08/18/2017Magneto: Unified Fine-grained Path Control in Legacy and OpenFlow Hybrid Networks
Proceedings of the Symposium on SDN Research (SOSR 2017)
pg. 75-87, 2017
04/04/2017Ranking Causal Anomalies for System Fault Diagnosis via Temporal and Dynamical Analysis on Vanishing Correlations
ACM Transactions on Knowledge Discovery from Data (TKDD) - Special Issue on the Best Papers from KDD 2016
11 (4): 40-40:28, June 2017
02/13/2017Automated IT System Failure Prediction: A Deep Learning Approach
Proceedings of the 2016 IEEE International Conference on Big Data
pp. 1291-1300, 2016
12/08/2016PerfGuard: Binary-Centric Application Performance Monitoring in Production Environments
The 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016)
pp. 595-606, 2016
11/18/2016High Fidelity Data Reduction for Big Data Security Dependency Analyses
The 23rd ACM Conference on Computer and Communications Security (CCS 2016)
pp. 504-516, 2016
10/28/2016LogMine: Fast Pattern Recognition for Log Analytics
The 25th ACM International Conference on Information and Knowledge Management (CIKM 2016)
pp. 1573-1582, 2016
10/28/2016Detecting Stack Layout Corruptions with Robust Stack Unwinding
The 19th International Symposium on Research in Attacks (RAID 2016)
Springer Publishing ISBN: 978-3-319-45719-2; pp. 71-94, 2016
09/21/2016Behavior Query Discovery in System-Generated Temporal Graphs
The 42nd International Conference on Bery Large Data Bases (VLDB 2016)
Vol. 9, No. 4; pp. 240-251, 2015
09/09/2016Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations
The 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD 2016)
pp. 805-814, 2016
08/27/2016Annealed Sparsity via Adaptive and Dynamic Shrinking
The 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2016)
pp. 1325-1334, 2016
08/17/2016PInfer: Learning to Infer Concurrent Request Paths from System Kernel Events
The 13th IEEE International Conference on Autonomic Computing (ICAC 2016)
pp. 1-10, 2016 IEEE
07/22/2016Entity Embedding-based Anomaly Detection for Heterogeneous Categorical Events
The 25th International Joint Conference on Artificial Intelligence (IJCAI 2016)
AAAI Press, pp. 1396-1403, 2016
07/15/2016A Dynamic Switching Flash Translation Layer Based on Page-Level Mapping
IEICE TRANSACTIONS on Information and Systems
Vol.E99-D (6); 1502-1511, 2016
06/01/2016Integrating Community and Role Detection in Information Networks
2016 SIAM International Conference on Data Mining (SDM 2016)
pp. 72-80, 2016
05/07/2016CloudSeer: Execution-Level Monitoring of Cloud Infrastructures via Distributed and Interleaved Logs
The 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2016)
pp. 489-502, 2016
04/06/2016Characterizing Rule Compression Mechanisms in Software-defined Networks
2016 Passive and Active Measurements Conference (PAM 2016 )
pp. 302-315, 2016
04/01/2016Extract Me If You Can: Abusing PDF Parsers in Malware Detectors
Proceedings of The Network and Distributed System Security Symposium 2016 (NDSS 2016)
pp. 1-15, 2016
02/24/2016Towards Automatic Generation of Security-Centric Descriptions for Android Apps
Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS 2015)
pp. 518-529 - 2015
11/23/2015Profiling Wireless Resource Usage for Mobile Apps via Crowdsourcing-based Network Analytics
IEEE Internet of Things Journal, Special Issue on Mobile Crowd Sensing for IoT
Vol. 2, (5): 391-398, 2015
10/31/2015Revisiting Hash Table Design for Phase Change Memory
Proceedgins of the 3rd workshop on Interactions of NVM/FLash with Operating-Systems and Workloads (INFLOW 2015)
http://dx.doi.org/10.1145/2819001.2819002
10/05/2015CrowdMi: Scalable and Diagnosable Mobile Voice Quality Assessment Through Wireless Analytics
IEEE Internet of Things Journal, Special Issue on Big Data Analytics and Management in Internet of Things
Vol. 2, (4): 287-294, 2015
08/31/2015SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
Proceedings of the 24th USENIX Security Symposium, Washington, DC
pp. 977-992, 2015
08/12/2015Telekinesis: Controlling Legacy Switch Routing with OpenFlow in Hybrid SDN Networks
Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research
Copyright 2015 ACM. ISBN 978-1-4503-3451-8/15/06
06/16/2015AppContext: Differentiating Malicious and Benign Mobile App Behaviors Under Context
Proceedings of the IEEE/ACM 37th International Conference on Software Engineering (ICSE 2015)
pp. 303-313, 2015
05/24/2015Discover and Tame Long-running Idling Processes in Enterprise Systems
ASIACCS 2015 -- 10th ACM Symposium on Information, Computer and Communications Security , Singapore, China
ACM 978-1-4503-3245-3/15/04; pp. 543-554, 2015
04/15/2015Software-defined Latency Monitoring in Data Center Networks
PAM 2015 -- Passive and Active Measurement Conference, New York City, NY
Conference Proceedings of PAM 2015; pp. 360-372, 2015
03/19/2015Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting
NDSS Symposium 2015 -- The 2015 Network and Distributed System Security , San Diego, CA
Proceedings of the NDSS 2015 Symposium
02/09/2015An Analytics Approach to Traffic Analysis in Network Virtualization
CNSM 2014 - The 10th International Conference on Network and Service Management
Proceedings of CNSM 2014, pp. 316 - 319
11/19/2014PerfScope: Online Faulty Function Localization for Debugging Performance Anomalies in Virtualized Hosting Infrastructures
Proceedings of the ACM Symposium on Cloud Computing (SOCC 2014)
ACM New York, NY; pp. 1-13, 2014 (ISBN: 978-1-4503-3252-1)
11/04/2014Extracting Discriminative Features in Multivariate Data from Heterogeneous Sensors
Proceedings of IEEE BigData 2014 - (2014 IEEE International Conference on Big Data, Washington, DC)
pp. 1095-1104; 2014
10/27/2014Proactive Workload Management in Hybrid Cloud Computing
IEEE Transactions on Network and Service Management
11(1):90-100, 2014
10/01/2014Temporal Skeletonization on Sequential Data: Patterns, Categorization, and Visualization
KDD 2014 -- Data Mining for Social Good Patterns, Categorization, and Visualization, New York City, NY
ACM New York, NY., pp. 1336-1345, 2014
08/25/2014Enabling Layer 2 Pathlet Tracing through Context Encoding in Software-Defined Networking
Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), Chicago, IL
ACM, New York, NY, pp. 169-174
08/22/2014Generating Consistent Updates for Software-Defined Network Configurations
Proceeding of the 3rd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), Chicago, IL
ACM, New York, NY, pp. 221-222
08/18/2014Uscope: A Scalable Unified Tracer from Kernel to User Space
Proceedings of The 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), Krakow, Poland
pp. 1-8
05/06/2014Software System Performance Debugging with Kernel Events Feature Guidance
Proceedings of The 14th IEEE/IFIP NOMS 2014 Special Track - Data Centric Cloud and Network Management (NOMS 2014), Krakow, Poland
pp. 1-5
05/06/2014CLUE: IT System Performance Diagnosis from Kernels to Clusters
Proceedings of The 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), Krakow, Poland
pp. 1-9
05/06/2014Software System Performance Debugging with Kernel Events Feature Guidance
Proceedings of The 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), Krakow, Poland
pp. 1-5
05/05/2014HybNET: Network Manager for a Hybrid Network Infrastructure
Middleware 2013 (Industrial Track)
ACM 978-1-4503-2550-9, 2013
12/09/2013Efficient Invariant Search for Distributed Information Systems
2013 IEEE 13th International Conference on Data Mining (ICDM 2013)
pp. 1049-1054, 2013
12/07/2013Automating Cloud Network Optimization and Evolution
IEEE Journal on Selected Areas in Communications
31(12):pp. 2620-2631, 2013
12/01/2013iProbe: A Lightweight User-Level Dynamic Instrumentation Tool
28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013)
pp. 742-745, 2013
11/11/2013Modeling Heterogeneous Time Series Dynamics to Profile Big Sensor Data in Complex Physical Systems
2013 IEEE International Conference on Big Data
pp. 631-638, 2013
10/06/2013A Data Analytic Engine Towards Self-Management of Cyber-Physical Systems
The 3rd International Workshop on Cyber-Physical Networking Systems (CPSN2013) in conjunction with ICDCS2013, Philadelphia, PA
ICDCSW 2013:pp. 303-308, © 2013 IEEE
07/08/2013Fault Detection and Localization in Distributed Systems using Invariant Relationships
The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
978-1-4799-0181-4, 2013
06/24/2013Modeling and Analytics for Cyber-Physical Systems in the Age of Big Data
The Big Data Analytics workshop held in conjunction with SIGMETRICS 2013
pp. 1-4, 2013
06/21/2013Predictive VM Consolidation on Multiple Resources: Beyond Load Balancing
ACM/IEEE International Symposium on Quality of Service (IWQoS 2013), Montreal, Canada
3-4 June 2013; 978-1-4799-0590-4/13 ©2013 IEEE
06/03/2013Network-Aware Coordination of Virtual Machine Migrations in Enterprise Data Centers and Clouds
13th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2013)
pp. 888-891, 2013
05/27/2013FlowSense: Monitoring Network Utilization with Zero Measurement Cost
14th Passive and Active Measurement Conference, Hong Kong Polytechnic University, Hong Kong
M. Roughan and R. Chang (Eds.) PAM 2013, LNCS 7799, pp. 31-41, 2013, Springer-Verlag Berlin Heidelberg 2013
03/18/2013Observing Common Spam in Tweets and Email
Internet Measurement Conference 2012, Boston, MA, USA
IMC'12, November 14-16, 2012, Copyright 2012 ACM 978-1-453-1705-4/12/11
11/14/2012CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)
ACM, pp. 229-240; 2012
10/16/2012NetDEO: Automating Network Design, Evolution, and Optimization
Proceedings of the 20th International Workshop on Quality of Serivce (IEEE/ACM IWQoS 2012), Coimbra, Portugal
2012 IEEE, 978-1-4673-1298-1/12
06/04/2012Application Dependency Discovery Using Matrix Factorization
Proceedings of the 20th International Workshop on Quality of Service (IEEE/ACM IWQoS 2012) , Coimbra, Portugal
2012 IEEE, 978-1-4673-1298-1/12
06/04/2012A Scalable Publish/Subscribe Broker Network using Active Load Balancing
Future Internet Services and Service Architectures
Anand R. Prasad, John F. Buford, K. Vijay Gurbani (eds), River Publishers, pp.317-337, 2011
01/06/2012Untangling Mixed Information to Calibrate Resource Utilization in Virtual Machines
ICAC'11
pp. 151-160, 2011
06/14/2011iPOEM: A Middleware for Integrated Management in Virtualized Data Centers
ICAC'11
pp. 41-50, 2011
06/14/2011Effective VM Sizing in Virtualized Data Centers
12th IFIP/IEEE IM 2011: Mini Conference
pp. 594-601, 2011 IEEE
05/23/2011
Ranking the Importance of Alerts for Problem Determination in Large Computer Systems
Cluster Computing(Springer), Vol. 14, No. 3, 2011.
G. Jiang, H. Chen, K. Yoshihira and A. Saxena
Experience Transfer for the Configuration Tuning in Large Scale Computing Systems
IEEE Trans. on Knowledge and Data Engineering, Vol. 23, No. 3, 2011.
H. Chen, W. Zhang and G. Jiang
VCAE: a Virtualization and Consolidation Analysis Engine for Enterprise Data Centers
the 4th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2010), Budapest, Hungary, September, 2010.
H. Chen, H. Kang, G. Jiang, K. Yoshihira and A. Saxena
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, INDIA, October 2010
H. Chen, G. Jiang, H. Zhang and K. Yoshihira
Invariants Based Failure Diagnosis in Distributed Computing Systems
the 29th IEEE International Symposium on Reliable Distributed Systems(SRDS 2010), New Delhi, INDIA, October 2010
H. Chen, G. Jiang, K. Yoshihira and A. Saxena
PeerWatch: a fault detection and diagnosis tool for virtualized consolidation system
the 7th International ACM Conference on Autonomic Computing (ICAC10), Washington DC, June, 2010.
H. Kang, H. Chen and G. Jiang
Ranking the Importance of Alerts for Problem Determination in Large Computer Systems
Cluster Computing, (Springer),2010.
G. Jiang, H. Chen, K. Yoshihira and A. Saxena
Understanding Internet Video Sharing Site Workload: A View from Data Center
Journal of Visual Communication and Image Representation (Elsevier), Vol. 21, No. 2, 2010.
X. Kang, H. Zhang, G. Jiang, H. Chen, X. Meng and K. Yoshihira
Fast Indexing for Large-scale Networked system Modeling
Journal of Networks (Academy), 2009.
H. Zhang, H. Chen, G. Jiang, X. Meng, and K. Yoshihira
Intelligent Workload Factoring for a Hybrid Cloud Computing Model
International Workshop on Cloud Services, Los Angeles, California, July, 2009.
H. Zhang, G. Jiang, K. Yoshihira, H. Chen and A. Saxena
Ranking the Importance of Alerts for Problem Determination in Large Computer Systems
the 6th International ACM Conference on Autonomic Computing (ICAC09), Barcelona, Spain, June, 2009.
G. Jiang, H. Chen, K. Yoshihira and A. Saxena
Resilient Workload Manager: Taming Bursty Workload of Scaling Internet Applications
Industrial Session at the 6th International ACM Conference on Autonomic Computing (ICAC09), Barcelona, Spain, June, 2009.
H. Zhang, G. Jiang, K. Yoshihira, H. Chen and A. Saxena
Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems
the 29th International Conference on Distributed Computing Systems(ICDCS 2009), Montreal, Canada, June, 2009.
J. Gao, G. Jiang, H. Chen and J. Han
Experience Transfer for the Configuration Tuning in Large Scale Computing Systems
the ACM SIGMETRICS/Performance, Seattle, June, 2009.
H. Chen, W. Zhang and G. Jiang
A Gradient Oriented Recombination Scheme for Evolution Strategies
the 24th Annual ACM Symposium on Applied Computing (SAC), Hawaii, March, 2009.
H. Chen and G. Jiang
Boosting the Performance of Computing Systems through Adaptive Configuration Tuning
the 24th Annual ACM Symposium on Applied Computing (SAC), Hawaii, March, 2009.
H. Chen, G. Jiang, H. Zhang and K. Yoshihira
Enabling Information Confidentiality in Publish/Subscribe Overlay Networks
Handbook on Security and Networks, World Scientific Publishing Co., 2009.
H. Zhang, H. Chen, G. Jiang, X. Meng and K. Yoshihira
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
the Eighth IEEE International Conference on Data Mining, Pisa, Italy, Dec. 15-19, 2008.
H. Chen, H. Cheng, G. Jiang, and K. Yoshihira
Measurement, Modeling, and Analysis of Internet Video Sharing Site Workload: A Case Study
IEEE International Conference on Web Services (ICWS 2008), Beijing, China, Sept., 2008
X. Kang, H. Zhang, G. Jiang, H. Chen, X. Meng and K. Yoshihira
Profiling Services for Resource Optimization and Capacity Planning in Distributed Systems
Cluster Computing, vol. 11, pp 313-329, 2008 (Springer).
G. Jiang, H. Chen and K. Yoshihira
Monitoring High Dimensional Data for Failure Detection and Localization in Large Scale Computing Systems
IEEE Trans. on Knowledge and Data Engineering, vol.20, no.1, pp.13-25, 2008.
H. Chen, G. Jiang and K. Yoshihira
Automatic Profiling of Network Event Sequences: Algorithm and Applications
the 27th IEEE Conference on Computer Communications (InfoCom 2008), Phoenix, AZ, April, 2008.
X. Meng, G. Jiang, H. Zhang, H. Chen and K. Yoshihira
Fast Statistical Relationship Discovery in Massive Monitoring Data
1st IEEE Workshop on Automated Network Management(ANM08) in conjunction with InfoCom 2008, Phoenix, AZ, April, 2008.
H. Zhang, H. Chen, G. Jiang, X. Meng and K. Yoshihira
Understanding Internet Video Sharing Site Workload: A View from Data Center Design
the 17th ACM International World Wide Web Conference (WWW 2008), 2-page Poster, Beijing, China, April, 2008.
X. Kang, H. Zhang, G. Jiang, H. Chen, X. Meng and K. Yoshihira
Enabling Information Confidentiality in Publish/Subscribe Overlay Services
the 2008 IEEE International Conference on Communications (ICC 2008), Beijing, China, May, 2008.
H. Zhang, A. Sharma, H. Chen, G. Jiang, X. Meng and K. Yoshihira
Autotuning Configurations in Distributed Systems for Performance Improvements using Evolutionary Strategies
the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June, 2008.
A. Saboori, G. Jiang and H. Chen
Correlating Real-time Monitoring Data for Mobile Network Management
the 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks(WOWMOM 2008), Newport Beach, CA, June, 2008.
N. Jiang, G. Jiang, H. Chen and K. Yohsihira
Efficient and Scalable Algorithms for Inferring Invariants in Distributed Systems
IEEE Trans. on Knowledge and Data Engineering, vol.19, no.11, pp.1508-1523, 2007.
G. Jiang, H. Chen and K. Yoshihira
Failure Detection in Large Scale Internet Services by Principal Subspace Mapping
IEEE Trans. on Knowledge and Data Engineering, vol.19, no.10, pp.1308-1320, 2007.
H. Chen, G. Jiang and K. Yoshihira
Online Tracking of Component Interactions for Failure Detection and Localization in Distributed Systems
IEEE Trans. on System, Man and Cybernetics, Part C, vol.37, no. 4, pp 644-651, 2007.
H. Chen, G. Jiang, C. Ungureanu and K. Yoshihira
Multi-resolution Abnormal Trace Detection Using Varied-length and Automata
IEEE Trans. on System, Man and Cybernetics, Part C, vol.37, no.1, pp. 86-97, 2007.
G. Jiang, H. Chen, C. Ungureanu and K. Yoshihira
Nonlinear Feature Selection by Relevance Feature Vector Machine
Lecture Notes in Computer Science, Volume 4571/2007, International Conference on Machine Learning and Data Mining(MLDM-2007), Leipzig, Germany, 2007
H. Cheng, H. Chen, G. Jiang and K. Yoshihira
Trace Analysis For Fault Detection in Application Servers
Handbook of Autonomic Computing: Concepts, Infrastructure, and Applications, edited by S. Hariri and M. Parashar, CRC Press, 2007.
G. Jiang, H. Chen, C. Ungureanu and K. Yoshihira
Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems
IEEE Trans. on Dependable and Secure Computing, vol.3, no.4, pp.312-326, 2006.
G. Jiang, H. Chen and K. Yoshihira
Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management
Cluster Computing (Springer), vol.9, no.4,pp. 385-399, 2006.
G. Jiang, H. Chen and K. Yoshihira
Fault Detection in Distributed Systems by Representative Subspace Mapping
the 2006 International Conference on Pattern Recognition (ICPR), Hong Kong, 2006.
H. Chen, G. Jiang and K. Yoshihira
Robust Nonlinear Dimensionality Reduction by Manifold Learning
the 2006 International Conference on Pattern Recognition (ICPR), Hong Kong, 2006.
H. Chen, G. Jiang and K. Yoshihira
Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management
the 3rd International Conference on Autonomic Computing (ICAC2006), Dublin, Ireland, 2006.
G. Jiang, H. Chen and K. Yoshihira
Tracking Probabilistic Correlation of Monitoring Data for Fault Detection and Isolation in Complex Systems
2006 International Conference on Dependable Systems and Networks (DSN-2006)- DCCS track, Philadelphia, PA.
G. Zhen, G. Jiang, H. Chen and K. Yoshihira
Combining Supervised and Unsupervised Monitoring for System Failure Detection
the 21st Annual ACM symposium on Applied Computing (SAC) DADS track, Dijon, France.
H. Chen, G. Jiang, C. Ungureanu and K. Yoshihira
Failure Detection and Localization in Component Based Systems by Online Tracking
the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, August 2005.
H. Chen, G. Jiang, C. Ungureanu, K. Yoshihira
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
2nd International Conference on Autonomic Computing (ICAC 2005), Seattle, WA, June 2005.
G. Jiang, H. Chen, C. Ungureanu, K. Yoshihira