Differences

This shows you the differences between the selected revision and the current version of the page.

publications:all_by_year 2018/07/04 16:17 publications:all_by_year 2018/12/15 22:32 current
Line 23: Line 23:
===== 2018 ===== ===== 2018 =====
-  - <html><a name='hyzhang_snam18'></a></html> "Overlapping community detection with preference and locality information: a non-negative matrix factorization approach," Hongyi Zhang, Xingyu Niu, Irwin King, and **M.R. Lyu**, // Social Network Analysis and Mining. (SNAM)//, accepted, 2018. \\ {{:journal:hyzhang_snam18.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\+  - <html><a name='pjhe_tdsc18'></a></html> "Towards Automated Log Parsing for Large-Scale Log Data Analysis," Pinjia He, Jieming Zhu, Shilin He, Jian Li, and **M.R. Lyu**, // IEEE Transactions on Dependable and Secure Computing. (TDSC)//, (accepted in 2017), vol.15, no.6, 2018, pp.931-944. \\ {{:journal:pjhe_tdsc18.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\ 
 +  - <html><a name='tdsc2016'></a></html> "ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy," Pengfei Chen, Yong Qi, Xinyi Li, Di Hou and **M.R. Lyu**, //IEEE Transactions on Dependable and Secure Computing (TDSC)//, (accepted in 2016), vol.15, no.4, 2018, pp.675-693. \\ {{:journal:pfchen_TDSC18.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\ 
 +  - <html><a name='jwzhou_tsc18'></a></html> "A Data Set for User Request Trace-Oriented Monitoring and its Applications," Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, and **M.R. Lyu**, // IEEE Transactions on Services Computing. (TSC)//, vol.11, no.4, 2018, pp.699-712. \\ {{:journal:jwzhou_tsc18.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\ 
 +  - <html><a name='hyzhang_snam18'></a></html> "Overlapping community detection with preference and locality information: a non-negative matrix factorization approach," Hongyi Zhang, Xingyu Niu, Irwin King, and **M.R. Lyu**, // Social Network Analysis and Mining. (SNAM)//, 8, no.1(2018):43. \\ {{:journal:hyzhang_snam18.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\
  - <html><a name='xtyu_uai18'></a></html> "Pure Exploration of Multi-Armed Bandits with Heavy-Tailed Payoffs," Xiaotian Yu, Han Shao, **M. R. Lyu**, Irwin King, // in Proceedings of the 2018 International Conference on Uncertainty in Artificial Intelligence (UAI 2018)//, Monterey, California, USA, August 6–10, 2018. \\ {{:conference:xtyu_uai18.pdf|Paper}} [<color black/fuchsia>ML</color>] \\ \\   - <html><a name='xtyu_uai18'></a></html> "Pure Exploration of Multi-Armed Bandits with Heavy-Tailed Payoffs," Xiaotian Yu, Han Shao, **M. R. Lyu**, Irwin King, // in Proceedings of the 2018 International Conference on Uncertainty in Artificial Intelligence (UAI 2018)//, Monterey, California, USA, August 6–10, 2018. \\ {{:conference:xtyu_uai18.pdf|Paper}} [<color black/fuchsia>ML</color>] \\ \\
  - <html><a name='hxu_dsn18'></a></html> "Manufacturing Resilient Bi-Opaque Predicates against Symbolic Execution," Hui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu and **Michael R. Lyu**, //in Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. (DSN 2018)//, Luxembourg City, Luxembourg, June 1-5, 2018.\\ {{:conference:hxu_dsn18.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\   - <html><a name='hxu_dsn18'></a></html> "Manufacturing Resilient Bi-Opaque Predicates against Symbolic Execution," Hui Xu, Yangfan Zhou, Yu Kang, Fengzhi Tu and **Michael R. Lyu**, //in Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. (DSN 2018)//, Luxembourg City, Luxembourg, June 1-5, 2018.\\ {{:conference:hxu_dsn18.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\
Line 32: Line 35:
===== 2017 ===== ===== 2017 =====
-  - <html><a name='pjhe_tdsc17'></a></html> "Towards Automated Log Parsing for Large-Scale Log Data Analysis," Pinjia He, Jieming Zhu, Shilin He, Jian Li, and **M.R. Lyu**, // IEEE Transactions on Dependable and Secure Computing. (TDSC)//, accepted, 2017. \\ {{:journal:pjhe_tdsc17.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\+  - <html><a name='xyniu_adma17'></a></html> "From Mutual Friends to Overlapping Community Detection: A Non-negative Matrix Factorization Approach," Xinyu Niu, Hongyi Zhang, **M. R. Lyu**, and Irwin King, // in International Conference on Advanced Data Mining and Applications (ADMA 2017)//, pp. 180-194. Springer, Cham, 2017. \\ {{:conference:xyniu_adma17.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\
  - <html><a name='ghtao_tr17'></a></html> "MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs," Guanhong Tao, Zibin Zheng, Ziying Guo, and **M.R. Lyu**, //IEEE Transactions on Reliability. (TR)//, accepted, 2017. \\ {{:journal:ghtao_tr17ac.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\   - <html><a name='ghtao_tr17'></a></html> "MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs," Guanhong Tao, Zibin Zheng, Ziying Guo, and **M.R. Lyu**, //IEEE Transactions on Reliability. (TR)//, accepted, 2017. \\ {{:journal:ghtao_tr17ac.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\
  - <html><a name='xtyu_icdm17'></a></html> "Risk Control of Best Arm Identification in Multi-Armed Bandits via Successive Rejects," Xiaotian Yu, Irwin King, **M. R. Lyu**, // in Proceedings of the 2017 IEEE International Conference on Data Mining series (ICDM 2017) //, New Orleans, USA, November 18–21, 2017, pp. 1147-1152. \\ {{:conference:xtyu_icdm2017.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\   - <html><a name='xtyu_icdm17'></a></html> "Risk Control of Best Arm Identification in Multi-Armed Bandits via Successive Rejects," Xiaotian Yu, Irwin King, **M. R. Lyu**, // in Proceedings of the 2017 IEEE International Conference on Data Mining series (ICDM 2017) //, New Orleans, USA, November 18–21, 2017, pp. 1147-1152. \\ {{:conference:xtyu_icdm2017.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\
Line 57: Line 60:
  - <html><a name='hxu_sp16'></a></html> "Assessing the Security Properties of Software Obfuscation," Hui Xu, and **Michael R. Lyu**, // IEEE Security & Privacy Magazine (SP)//, vol.14, issue.5, 2016, pp.80-83.\\ {{:journal:hxu_sp16.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\   - <html><a name='hxu_sp16'></a></html> "Assessing the Security Properties of Software Obfuscation," Hui Xu, and **Michael R. Lyu**, // IEEE Security & Privacy Magazine (SP)//, vol.14, issue.5, 2016, pp.80-83.\\ {{:journal:hxu_sp16.pdf|Paper}} [<color black/aqua>SE</color>]\\ \\
  - <html><a name='slzhao_iconip16'></a></html>"Aggregated Temporal Tensor Factorization Model for Point-of-interest Recommendation," Shenglin Zhao, **Michael R. Lyu**, and Irwin King, //in Proceedings of the 23rd International Conference on Neural Information Processing (ICONIP2016)//, Kyoto, Japan, October 16-21, 2016, pp. 450-458. \\ {{:conference:slzhao_iconip16.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\   - <html><a name='slzhao_iconip16'></a></html>"Aggregated Temporal Tensor Factorization Model for Point-of-interest Recommendation," Shenglin Zhao, **Michael R. Lyu**, and Irwin King, //in Proceedings of the 23rd International Conference on Neural Information Processing (ICONIP2016)//, Kyoto, Japan, October 16-21, 2016, pp. 450-458. \\ {{:conference:slzhao_iconip16.pdf|Paper}} [<color black/fuchsia>ML</color>]\\ \\
-  - <html><a name='tdsc2016'></a></html> "ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy," Pengfei Chen, Yong Qi, Xinyi Li, Di Hou and **M.R. Lyu**, //IEEE Transactions on Dependable and Secure Computing (TDSC)//, accepted. \\ {{:journal:pfchen_TDSC16.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\ 
  - <html><a name='tr2016'></a></html> "Web Service Personalized Quality-of-Service Prediction via Reputation-based Matrix Factorization," Jianlong Xu, Zibin Zheng, and **M.R. Lyu**, //IEEE Transactions on Reliability (TR)//, vol.65, no.1, 2016, pp.28-37. \\ {{:journal:jianlong_TR2015.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\   - <html><a name='tr2016'></a></html> "Web Service Personalized Quality-of-Service Prediction via Reputation-based Matrix Factorization," Jianlong Xu, Zibin Zheng, and **M.R. Lyu**, //IEEE Transactions on Reliability (TR)//, vol.65, no.1, 2016, pp.28-37. \\ {{:journal:jianlong_TR2015.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\
  - <html><a name='tcc2016'></a></html> "On Cloud Service Reliability Enhancement with Optimal Resource Usage," Ao Zhou, Shangguang Wang, Zibin Zheng, Ching-Hsien Hsu, **M.R. Lyu**, and Fangchun Yang, //IEEE Transactions on Cloud Computing (TCC)//, vol.4, no.4, 2016, pp.452-466. \\ {{:journal:aozhou_tcc.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\   - <html><a name='tcc2016'></a></html> "On Cloud Service Reliability Enhancement with Optimal Resource Usage," Ao Zhou, Shangguang Wang, Zibin Zheng, Ching-Hsien Hsu, **M.R. Lyu**, and Fangchun Yang, //IEEE Transactions on Cloud Computing (TCC)//, vol.4, no.4, 2016, pp.452-466. \\ {{:journal:aozhou_tcc.pdf|Paper}} [<color black/yellow>DS</color>]\\ \\
 
publications/all_by_year.1530692266.txt · Last modified: 2018/07/04 16:17 by lyu     Back to top