default search action
Lu-An Tang
Person information
- affiliation: NEC Laboratories America, Princeton, NJ, USA
- affiliation: University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Kunal Mukherjee, Joshua Wiedemeier, Qi Wang, Junpei Kamimura, Junghwan John Rhee, James Wei, Zhichun Li, Xiao Yu, Lu-An Tang, Jiaping Gui, Kangkook Jee:
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security. ACNS (3) 2024: 241-268 - [c25]Yuyang Ye, Lu-An Tang, Haoyu Wang, Runlong Yu, Wenchao Yu, Erhu He, Haifeng Chen, Hui Xiong:
PAIL: Performance based Adversarial Imitation Learning Engine for Carbon Neutral Optimization. KDD 2024: 6148-6157 - [i6]Yuyang Ye, Lu-An Tang, Haoyu Wang, Runlong Yu, Wenchao Yu, Erhu He, Haifeng Chen, Hui Xiong:
PAIL: Performance based Adversarial Imitation Learning Engine for Carbon Neutral Optimization. CoRR abs/2407.08910 (2024) - 2023
- [c24]Peng Yuan, Lu-An Tang, Haifeng Chen, David S. Chang, Moto Sato, Kevin Woodward:
Temporal Graph Based Incident Analysis System for Internet of Things. ECML/PKDD (7) 2023: 305-309 - 2022
- [j11]Peng Yuan, Lu-An Tang, Haifeng Chen, Moto Sato, Kevin Woodward:
3D Histogram Based Anomaly Detection for Categorical Sensor Data in Internet of Things. Open J. Internet Things 8(1): 32-43 (2022) - [c23]Junheng Hao, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Haifeng Chen, Junghwan Rhee, Zhichuan Li, Wei Wang:
Multi-source Inductive Knowledge Graph Transfer. ECML/PKDD (2) 2022: 155-171 - [c22]Peng Yuan, Lu-An Tang, Haifeng Chen, Moto Sato, Kevin Woodward:
Explainable Anomaly Detection System for Categorical Sensor Data in Internet of Things. ECML/PKDD (6) 2022: 594-598 - 2021
- [j10]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021)
2010 – 2019
- 2019
- [c21]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks for Unknown Malware Detection. IJCAI 2019: 3762-3770 - [c20]Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li:
Countering Malicious Processes with Process-DNS Association. NDSS 2019 - [c19]Shen Wang, Zhengzhang Chen, Ding Li, Zhichun Li, Lu-An Tang, Jingchao Ni, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification. SDM 2019: 693-701 - [i5]Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu:
Heterogeneous Graph Matching Networks. CoRR abs/1910.08074 (2019) - 2018
- [c18]Qi Song, Bo Zong, Yinghui Wu, Lu-An Tang, Hui Zhang, Guofei Jiang, Haifeng Chen:
TGNet: Learning to Rank Nodes in Temporal Graphs. CIKM 2018: 97-106 - [c17]Cheng Cao, Zhengzhang Chen, James Caverlee, Lu-An Tang, Chen Luo, Zhichun Li:
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks. CIKM 2018: 1977-1985 - [c16]Ying Lin, Zhengzhang Chen, Cheng Cao, Lu-An Tang, Kai Zhang, Wei Cheng, Zhichun Li:
Collaborative Alert Ranking for Anomaly Detection. CIKM 2018: 1987-1995 - [c15]Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Zhichun Li, Haifeng Chen, Jieping Ye:
TINET: Learning Invariant Networks via Knowledge Transfer. KDD 2018: 1890-1899 - [i4]Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu:
Deep Program Reidentification: A Graph Neural Network Solution. CoRR abs/1812.04064 (2018) - 2017
- [c14]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [i3]Chen Luo, Zhengzhang Chen, Lu-An Tang, Anshumali Shrivastava, Zhichun Li:
Accelerating Dependency Graph Learning from Heterogeneous Categorical Event Streams via Knowledge Transfer. CoRR abs/1708.07867 (2017) - 2016
- [c13]Ting Chen, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Kai Zhang:
Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events. IJCAI 2016: 1396-1403 - [c12]Ting Chen, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Haifeng Chen, Guofei Jiang:
Integrating Community and Role Detection in Information Networks. SDM 2016: 72-80 - [i2]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - [i1]Ting Chen, Lu-An Tang, Yizhou Sun, Zhengzhang Chen, Kai Zhang:
Entity Embedding-based Anomaly Detection for Heterogeneous Categorical Events. CoRR abs/1608.07502 (2016) - 2015
- [j9]Shaojie Qiao, Huidong Jin, Yunjun Gao, Lu-An Tang, Huanlai Xing:
Trajectory Data Mining in Distributed Sensor Networks. Int. J. Distributed Sens. Networks 11: 913165:1-913165:3 (2015) - [j8]Jun Li, Qiming Qin, Jiawei Han, Lu-An Tang, Kin Hou Lei:
Mining Trajectory Data and Geotagged Data in Social Media for Road Map Inference. Trans. GIS 19(1): 1-18 (2015) - [j7]Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Guofei Jiang, Alice Leung, Thomas La Porta:
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System. ACM Trans. Knowl. Discov. Data 9(3): 16:1-16:35 (2015) - 2013
- [b1]Lu An Tang:
Mining sensor and mobility data in cyber-physical systems. University of Illinois Urbana-Champaign, USA, 2013 - [j6]Lu-An Tang, Xiao Yu, Sangkyum Kim, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:
Trustworthiness analysis of sensor data in cyber-physical systems. J. Comput. Syst. Sci. 79(3): 383-401 (2013) - [j5]Lu-An Tang, Yu Zheng, Jing Yuan, Jiawei Han, Alice Leung, Wen-Chih Peng, Thomas La Porta:
A framework of traveling companion discovery on trajectory data streams. ACM Trans. Intell. Syst. Technol. 5(1): 3:1-3:34 (2013) - [c11]Tanvi Jindal, Prasanna Giridhar, Lu-An Tang, Jun Li, Jiawei Han:
Spatiotemporal periodical pattern mining in traffic data. UrbComp@KDD 2013: 11:1-11:8 - [c10]Lu-An Tang, Xiao Yu, Quanquan Gu, Jiawei Han, Alice Leung, Thomas La Porta:
Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system. KDD 2013: 410-418 - 2012
- [j4]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen-Chih Peng, Yizhou Sun, Alice Leung, Thomas La Porta:
Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach. Int. J. Distributed Sens. Networks 8 (2012) - [c9]Lu-An Tang, Yu Zheng, Jing Yuan, Jiawei Han, Alice Leung, Chih-Chieh Hung, Wen-Chih Peng:
On Discovery of Traveling Companions from Streaming Trajectories. ICDE 2012: 186-197 - [c8]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen-Chih Peng, Yizhou Sun, Hector Gonzalez, Sebastian Seith:
Multidimensional Analysis of Atypical Events in Cyber-Physical Data. ICDE 2012: 1025-1036 - [c7]Lu-An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thomas La Porta, Alice Leung, Tarek F. Abdelzaher, Lance M. Kaplan:
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems. SDM 2012: 600-611 - 2011
- [j3]Zhenhui Li, Jiawei Han, Ming Ji, Lu-An Tang, Yintao Yu, Bolin Ding, Jae-Gil Lee, Roland Kays:
MoveMine: Mining moving object data for discovery of animal movement patterns. ACM Trans. Intell. Syst. Technol. 2(4): 37:1-37:32 (2011) - [c6]Xiao Yu, Ang Pan, Lu-An Tang, Zhenhui Li, Jiawei Han:
Geo-Friends Recommendation in GPS-based Cyber-physical Social Network. ASONAM 2011: 361-368 - [c5]Lu-An Tang, Yu Zheng, Xing Xie, Jing Yuan, Xiao Yu, Jiawei Han:
Retrieving k-Nearest Neighboring Trajectories by a Set of Point Locations. SSTD 2011: 223-241 - 2010
- [c4]Jiawei Han, Zhenhui Li, Lu-An Tang:
Mining Moving Object, Trajectory and Traffic Data. DASFAA (2) 2010: 485-486 - [c3]Lu-An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chih-Chieh Hung, Wen-Chih Peng:
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems. ICDM 2010: 1079-1084 - [c2]Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yintao Yu, Jiawei Han, Roland Kays:
MoveMine: mining moving object databases. SIGMOD Conference 2010: 1203-1206
2000 – 2009
- 2009
- [c1]Xiao Yu, Lu An Tang, Jiawei Han:
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection. ICDM 2009: 617-626 - 2008
- [j2]Lu-An Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Dongqing Yang, Xinbiao Zhou:
PGG: An Online Pattern Based Approach for Stream Variation Management. J. Comput. Sci. Technol. 23(4): 497-515 (2008) - [j1]Cyrus Shahabi, Lu-An Tang, Songhua Xing:
Indexing land surface for efficient kNN query. Proc. VLDB Endow. 1(1): 1020-1031 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint