Author of the publication

Failure Diagnosis for Distributed Systems Using Targeted Fault Injection.

, , , , , , and . IEEE Trans. Parallel Distributed Syst., 28 (2): 503-516 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personalized password guessing: a new security threat., , , , , and . HotSoS, page 22. ACM, (2014)AcMC 2 : Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models., , and . ASPLOS, page 515-528. ACM, (2019)CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks., , , , , , and . NSDI, page 667-682. USENIX Association, (2019)Unsupervised single-cell analysis in triple-negative breast cancer: A case study., , , , , , , and . BIBM, page 556-563. IEEE Computer Society, (2016)FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices., , , , and . OSDI, page 805-825. USENIX Association, (2020)Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds., , , , , , and . VEE, page 157-170. ACM, (2017)Game Theory with Learning for Cyber Security Monitoring., , , , and . HASE, page 1-8. IEEE Computer Society, (2016)ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection., , , , , , , and . DSN, page 112-124. IEEE, (2019)LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications., , , , and . FTXS@HPDC, page 11-18. ACM, (2015)Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster., , and . HotSoS, page 21:1. ACM, (2018)