Tao Lin

Tao Lin
Amazon

PHD student

About

11
Publications
3,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
434
Citations
Introduction
Tao Lin currently works at the College of Information Sciences and Technology, Pennsylvania State University. Tao does research in Computer Engineering, Computer Communications (Networks) and Computer Security and Reliability. Their most recent publication is 'A Novel Bug Report Extraction Approach'.
Additional affiliations
September 2010 - July 2013
East China Normal University
Position
  • Student
September 2009 - July 2016
Shanghai Normal University
Position
  • Student

Publications

Publications (11)
Preprint
Full-text available
There are two major points in the social construction of technology. In part I, human action shapes technology. In part II, SCOT argues that technological innovation is not the result of the mythical and lone man who introduce new 'technologies'. Part I Technology determining human action (technology determinism), or human action shaping technology...
Preprint
Full-text available
From ANT, technology is not lone technology, rather technology is a network, which is the combination of knowledge, action and power. Previously, one of the authors (Lin Tao) illustrated ANT in Terms of Enhanced Interrogation Techniques. In this paper, we illustrated ANT by the example of News of the World from above three perspectives and the prof...
Preprint
Full-text available
Preprint
Full-text available
Because of COVID-19, A large number of tech companies transferred to virtual onboarding for new hires. Is it different or hard to virtual onboarding? This presentation is targeted at new hires, who is joined Amazon recently, for engaging a remote team quickly at Amazon. Perhaps it’s your first time onboarding a remote team. Or perhaps you’ve been o...
Article
Full-text available
Preprint
Full-text available
Conference Paper
Full-text available
Article
Full-text available
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational awareness in a Security Operations Center (SOC). It has a high requirement for cyber security analysts' capabilities of information processing and expertise in cyber defense. However, the present situation is that most novice analysts who are responsible fo...
Chapter
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers (SOCs). The massive data sources generate great demands on cyber security analysts’ capability of information processing and analytical reasoning. Furthermore, most junior security analysts perform much less efficiently than senior analysts in deciding what da...
Conference Paper
There are more and more bug reports in software. Software companies and developers invest a large number of resources into the dramatic accumulation of reports. We introduce Bayes classifier into bug reports compression, which is the first effort in the literature. For this purpose, the vector space model as well as some conventional text mining va...

Network

Cited By