His scientific interests lie mostly in Artificial intelligence, Machine learning, Data mining, Pattern recognition and Online machine learning. His study in Constrained clustering, Active learning, Correlation clustering, Data stream clustering and Cluster analysis are all subfields of Artificial intelligence. His research in Machine learning intersects with topics in Bridge, Adversarial machine learning, Dynamic network analysis and Network simulation.
His Data mining research is multidisciplinary, relying on both Software, File system, Parsing and Source code. His work on Anomaly detection as part of general Pattern recognition study is frequently connected to Anomaly, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. The Online machine learning study combines topics in areas such as Adversary model, Instance-based learning, Computational learning theory and Algorithmic learning theory.
Artificial intelligence, Machine learning, Data mining, Anomaly detection and Classifier are his primary areas of study. The study incorporates disciplines such as Malware and Pattern recognition in addition to Artificial intelligence. His research in the fields of Instance-based learning overlaps with other disciplines such as Generalization, Noise and Sample.
His work on Decision tree is typically connected to Anomaly and Detector as part of general Data mining study, connecting several disciplines of science. He combines subjects such as Volume, Denial-of-service attack, Real-time computing and Principal component analysis with his study of Anomaly detection. In the subject of general Classifier, his work in Decision boundary is often linked to Regular polygon, thereby combining diverse domains of study.
Ling Huang spends much of his time researching Artificial intelligence, Machine learning, Data mining, Anomaly detection and Adversarial system. His study in Artificial intelligence is interdisciplinary in nature, drawing from both The Internet, Malware and Pattern recognition. His Machine learning research is multidisciplinary, incorporating perspectives in Relationship extraction and Relation.
Data mining and Homophily are commonly linked in his work. His Anomaly detection research incorporates elements of Generative grammar, Clustering high-dimensional data and Dimension. His Instance-based learning research integrates issues from Software architecture, Human–computer interaction and Security domain.
His main research concerns Artificial intelligence, Machine learning, Instance-based learning, Data mining and Software architecture. His Artificial intelligence research is multidisciplinary, relying on both Adversary model and Hash function. The concepts of his Machine learning study are interwoven with issues in Node, Inference and Homophily.
His studies in Instance-based learning integrate themes in fields like Online machine learning, Adversarial machine learning and Algorithmic learning theory. His biological study spans a wide range of topics, including Malware and False positive rate. He has researched Software architecture in several fields, including Adversarial system, Human–computer interaction and Security domain.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Tapestry: a resilient global-scale overlay for service deployment
B.Y. Zhao;Ling Huang;J. Stribling;S.C. Rhea.
IEEE Journal on Selected Areas in Communications (2004)
Adversarial machine learning
L Huang;AD Joseph;B Nelson;Bip Rubinstein.
computer and communications security (2011)
Detecting large-scale system problems by mining console logs
Wei Xu;Ling Huang;Armando Fox;David Patterson.
symposium on operating systems principles (2009)
Detecting large-scale system problems by mining console logs
Wei Xu;Ling Huang;Armando Fox;David A. Patterson.
symposium on operating systems principles (2009)
Fast approximate spectral clustering
Donghui Yan;Ling Huang;Michael I. Jordan.
knowledge discovery and data mining (2009)
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Benjamin I.P. Rubinstein;Blaine Nelson;Ling Huang;Anthony D. Joseph.
internet measurement conference (2009)
Brocade: Landmark Routing on Overlay Networks
Ben Y. Zhao;Yitao Duan;Ling Huang;Anthony D. Joseph.
international workshop on peer to peer systems (2002)
Juxtapp: a scalable system for detecting code reuse among android applications
Steve Hanna;Ling Huang;Edward Wu;Saung Li.
international conference on detection of intrusions and malware and vulnerability assessment (2012)
Evolution of social-attribute networks: measurements, modeling, and implications using google+
Neil Zhenqiang Gong;Wenchang Xu;Ling Huang;Prateek Mittal.
internet measurement conference (2012)
In-Network PCA and Anomaly Detection
Ling Huang;Long Nguyen;Minos Garofalakis;Michael I. Jordan.
neural information processing systems (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Berkeley
University of California, Berkeley
Google (United States)
University of California, Berkeley
University of California, Berkeley
University of California, Berkeley
University of Chicago
University of California, Berkeley
University of California, Berkeley
Google (United States)
Universidade Federal de Minas Gerais
Technical University of Denmark
Purdue University West Lafayette
Hamburg University of Technology
University of Wisconsin–Madison
Environmental Molecular Sciences Laboratory
University of Miami
Shimane University
University of Kentucky
Institut Pasteur
University of California, Los Angeles
University of Würzburg
University of Amsterdam
University of California, Davis
University of Colorado Denver
European Southern Observatory