A new approach to dimensionality reduction for anomaly detection in data traffic T Huang, H Sethu, N Kandasamy IEEE Transactions on Network and Service Management 13 (3), 651-665, 2016 | 45 | 2016 |
Joint power allocation and scheduling of multi-antenna OFDM system in broadcast channel F She, W Chen, H Luo, T Huang, X Wang 2009 IEEE International Conference on Communications, 1-5, 2009 | 19 | 2009 |
Evaluating compressive sampling strategies for performance monitoring of data centers T Huang, N Kandasamy, H Sethu Proceedings of the 9th international conference on Autonomic computing, 201-210, 2012 | 11 | 2012 |
An efficient strategy for online performance monitoring of datacenters via adaptive sampling T Huang, N Kandasamy, H Sethu, MC Stamm IEEE Transactions on Cloud Computing 7 (1), 155-169, 2016 | 7 | 2016 |
Anomaly detection in computer systems using compressed measurements T Huang, N Kandasamy, H Sethu 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 6 | 2015 |
Detecting incipient faults in software systems: a compressed sampling-based approach S DeCelles, T Huang, MC Stamm, N Kandasamy 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 303-310, 2016 | 5 | 2016 |
A fast algorithm for detecting anomalous changes in network traffic T Huang, H Sethu, N Kandasamy 2015 11th International Conference on Network and Service Management (CNSM …, 2015 | 4 | 2015 |
Adaptive sampling and statistical inference for anomaly detection T Huang Drexel University, 2015 | 1 | 2015 |
Methods for Anomaly Detection and Classification in Network Traffic T Huang | 1 | 2011 |
Dynamic power allocation for multi-hop linear non-regenerative relay networks T Huang, W Chen, J Li 2009 Fourth International Conference on Communications and Networking in …, 2009 | 1 | 2009 |
A modular multi-location anonymized traffic monitoring tool for a WiFi network J Hummel, A McDonald, V Shah, R Singh, BD Boyle, T Huang, ... Proceedings of the 4th ACM conference on Data and application security and …, 2014 | | 2014 |
Location Privacy and Game-Theoretic Analysis T Huang | | |