Rahul Potharaju
Rahul Potharaju
Engineering Leader @ Databricks
E-mail confirmado em
Citado por
Citado por
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Demystifying the dark side of the middle: A field study of middlebox failures in datacenters
R Potharaju, N Jain
Proceedings of the 2013 conference on Internet measurement conference, 9-22, 2013
Where the sidewalk ends: Extending the Internet AS graph using traceroutes from P2P users
K Chen, DR Choffnes, R Potharaju, Y Chen, FE Bustamante, D Pei, ...
Proceedings of the 5th international conference on Emerging networking …, 2009
Identifying troubleshooting options for resolving network failures
N Jain, R Potharaju
US Patent 10,263,836, 2019
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
When the network crumbles: An empirical study of cloud network failures and their impact on services
R Potharaju, N Jain
Proceedings of the 4th annual Symposium on Cloud Computing, 1-17, 2013
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets
R Potharaju, N Jain, C Nita-Rotaru
Proceedings of the 10th USENIX Symposium on Networked Systems Design and …, 2013
Problem inference from support tickets
N Jain, R Potharaju
US Patent 9,229,800, 2016
Chi: A scalable and programmable control plane for distributed stream processing systems
L Mai, K Zeng, R Potharaju, L Xu, S Suh, S Venkataraman, P Costa, T Kim, ...
Proceedings of the VLDB Endowment 11 (10), 1303-1316, 2018
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
On the practicality of integrity attacks on document-level sentiment analysis
A Newell, R Potharaju, L Xiang, C Nita-Rotaru
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
You unlocked the mt. everest badge on foursquare! countering location fraud in geosocial networks
B Carbunar, R Potharaju
2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2012
Finding documents describing solutions to computing issues
R Potharaju, N Jain
US Patent 10,489,463, 2019
The dark menace: Characterizing network-based attacks in the cloud
R Miao, R Potharaju, M Yu, N Jain
Proceedings of the 2015 Internet Measurement Conference, 169-182, 2015
Middlebox reliability
N Jain, R Potharaju
US Patent 9,262,253, 2016
A longitudinal study of the google app market
B Carbunar, R Potharaju
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
The shy mayor: Private badges in geosocial networks
B Carbunar, R Sion, R Potharaju, M Ehsan
Applied Cryptography and Network Security: 10th International Conference …, 2012
ConfSeer: leveraging customer support knowledge bases for automated misconfiguration detection
R Potharaju, J Chan, L Hu, C Nita-Rotaru, M Wang, L Zhang, N Jain
Proceedings of the VLDB Endowment 8 (12), 1828-1839, 2015
Move fast and meet deadlines: Fine-grained real-time stream processing with cameo
L Xu, S Venkataraman, I Gupta, L Mai, R Potharaju
18th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2021
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20