Deeplog: Anomaly detection and diagnosis from system logs through deep learning M Du, F Li, G Zheng, V Srikumar Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 1847 | 2017 |
Spell: Streaming parsing of system event logs M Du, F Li 2016 IEEE 16th International Conference on Data Mining (ICDM), 859-864, 2016 | 455 | 2016 |
Robust anomaly detection and backdoor attack detection via differential privacy M Du, R Jia, D Song ICLR 2020, 2020 | 210 | 2020 |
Curriculum adversarial training QZ Cai, M Du, C Liu, D Song arXiv preprint arXiv:1805.04807, 2018 | 200 | 2018 |
Malware detection on highly imbalanced data through sequence modeling R Oak, M Du, D Yan, H Takawale, I Amit Proceedings of the 12th ACM Workshop on artificial intelligence and security …, 2019 | 172 | 2019 |
Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems W Guo, L Wang, X Xing, M Du, D Song arXiv preprint arXiv:1908.01763, 2019 | 169 | 2019 |
Lifelong anomaly detection through unlearning M Du, Z Chen, C Liu, R Oak, D Song Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 161 | 2019 |
FalconDB: Blockchain-based collaborative database Y Peng, M Du, F Li, R Cheng, D Song Proceedings of the 2020 ACM SIGMOD international conference on management of …, 2020 | 152 | 2020 |
Free-riders in federated learning: Attacks and defenses J Lin, M Du, J Liu arXiv preprint arXiv:1911.12560, 2019 | 109 | 2019 |
Spell: Online streaming parsing of large unstructured system logs M Du, F Li IEEE Transactions on Knowledge and Data Engineering 31 (11), 2213-2227, 2018 | 99 | 2018 |
Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks W Guo, L Wang, Y Xu, X Xing, M Du, D Song ICDM 2020, 2020 | 85 | 2020 |
Time-aware gradient attack on dynamic network link prediction J Chen, J Zhang, Z Chen, M Du, Q Xuan IEEE Transactions on Knowledge and Data Engineering 35 (2), 2091-2102, 2021 | 54 | 2021 |
{DEEPVSA}: Facilitating value-set analysis with deep learning for postmortem program analysis W Guo, D Mu, X Xing, M Du, D Song 28th USENIX Security Symposium (USENIX Security 19), 1787-1804, 2019 | 48 | 2019 |
RobustECD: Enhancement of network structure for robust community detection J Zhou, Z Chen, M Du, L Chen, S Yu, G Chen, Q Xuan IEEE Transactions on Knowledge and Data Engineering 35 (1), 842-856, 2021 | 29 | 2021 |
ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources M Du, F Li IEEE Transactions on Parallel and Distributed Systems 28 (8), 2172-2189, 2017 | 26 | 2017 |
Pcard: Personalized restaurants recommendation from card payment transaction records M Du, R Christensen, W Zhang, F Li The World Wide Web Conference, 2687-2693, 2019 | 15 | 2019 |
ATOM: Automated tracking, orchestration and monitoring of resource usage in infrastructure as a service systems M Du, F Li 2015 IEEE International Conference on Big Data (Big Data), 271-278, 2015 | 13 | 2015 |
FACTS About Building Retrieval Augmented Generation-based Chatbots R Akkiraju, A Xu, D Bora, T Yu, L An, V Seth, A Shukla, P Gundecha, ... arXiv preprint arXiv:2407.07858, 2024 | 7 | 2024 |
AutoCombo: Automatic malware signature generation through combination rule mining M Du, W Hu, W Hewlett Proceedings of the 30th ACM International Conference on Information …, 2021 | 6 | 2021 |
LongTale: Toward automatic performance anomaly explanation in microservices R Li, M Du, Z Wang, H Chang, S Mukherjee, E Eide Proceedings of the 2022 ACM/SPEC on International Conference on Performance …, 2022 | 5 | 2022 |