Name
Affiliation
Papers
MUNG CHIANG
Princeton University
274
Collaborators
Citations 
PageRank 
338
7303
486.32
Referers 
Referees 
References 
11356
4876
3526
Search Limit
1001000
Title
Citations
PageRank
Year
Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?00.342022
Expert Intervention Learning An online framework for robot learning from explicit and implicit human feedback00.342022
On-the-fly Resource-Aware Model Aggregation for Federated Learning in Heterogeneous Edge00.342021
Demo: Discover, Provision, and Orchestration of Machine Learning Inference Services in Heterogeneous Edge00.342021
Minimizing Age-of-Information in Heterogeneous Multi-Channel Systems: A New Partial-Index Approach00.342021
AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming00.342020
Characterizing Task Completion Latencies In Multi-Point Multi-Quality Fog Computing Systems00.342020
Detecting Malware Injection with Program-DNS Behavior00.342020
Analyzing the Robustness of Open-World Machine Learning10.352019
Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning00.342019
Time-Dependent Pricing for Multimedia Data Traffic: Analysis, Systems, & Trials10.352019
Adaptive Remediation with Multi-modal Content.00.342019
DARTS: Deceiving Autonomous Cars with Toxic Signs.40.432018
Characterizing Task Completion Latencies in Fog Computing.10.362018
Learner Behavioral Feature Refinement and Augmentation Using GANs.00.342018
Model Predictive Compression for Drone Video Analytics00.342018
Behavior-Based Latent Variable Model for Learner Engagement.10.372017
Fog Computing and Networking: Part 2.00.342017
Incentivizing self-capping to increase cloud utilization.20.362017
Acoustic Denial of Service Attacks on HDDs.10.342017
Mining MOOC Clickstreams: Video-Watching Behavior vs. In-Video Quiz Performance.90.592016
SkyEyes: adaptive video streaming from UAVs.90.702016
Quantifying Political Leaning from Tweets, Retweets, and Retweeters.100.582016
Innovation in network pricing [Guest Editorial].00.342016
Internet of Things Session Management Over LTE - Balancing Signal Load, Power, and Delay.60.622016
Need For Speed: Cora Scheduler For Optimizing Completion-Times In The Cloud100.542015
Convergence Properties Of General Network Selection Games60.512015
How to Bid the Cloud411.282015
RAPTOR: Routing Attacks on Privacy in Tor.260.812015
Do Mobile Data Plans Affect Usage? Results From A Pricing Trial With Isp Customers40.432015
Stable Sleep Mode Optimization for Energy Efficient DSL10.352015
Fair And Optimal Resource Allocation For Lte Multicast (Embms): Group Partitioning And Dynamics140.692015
SAP: Similarity-aware partitioning for efficient cloud storage50.482014
Social learning networks: A brief survey130.842014
Stock Market Prediction from WSJ: Text Mining via Sparse Matrix Factorization80.472014
SDP: smart data pricing, from theorems to trials00.342014
When the price is right: enabling time-dependent pricing of broadband data180.942013
Joint Server Selection and Routing for Geo-replicated Services20.392013
A survey of smart data pricing: Past proposals, current plans, and future trends743.002013
Self-Adaptive, Deadline-Aware Resource Control in Cloud Computing30.422013
Why Steiner-tree type algorithms work for community detection.10.462013
Indoor Location Estimation with Reduced Calibration Exploiting Unlabeled Data via Hybrid Generative/Discriminative Learning271.042012
Analysis Of Slotted Aloha With Multipacket Messages In Clustered Surveillance Networks40.492012
Global 1-Mbps Peer-Assisted Streaming: Fine-Grain Measurement of a Configurable Platform10.352012
Better energy-delay tradeoff via server resource pooling.30.382012
A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies60.492012
Iterative resource pooling for bandwidth allocation in TDM-PON: algorithm, convergence and experimental evaluation10.372012
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis251.012012
Congestion Control for Multicast Flows With Network Coding80.682012
Autonomous, Collaborative Control for Resilient Cyber Defense (ACCORD)110.722012
  • 1
  • 2