Export 80 results:
Rabkin, Ariel (2008).  Personal knowledge questions for fallback authentication. 4th Symposium on Usable Privacy and Security. 13-23. Abstract
Barreno, Marco, Blaine Nelson, Anthony D. Joseph, & Doug Tygar (2008).  The security of machine learning. Machine Learning Journal (MLJ) Special Issue on Machine Learning in Adversarial Environments.
Thibaux, R., & M. Jordan (2007).  Hierarchical beta processes and the Indian buffet process. 11th Conference on Artificial Intelligence and Statistics (AISTAT). Abstract
Thibaux, R., & M. I. Jordan (2007).  Hierarchical beta processes and the Indian buffet process. Artificial Intelligence and Statistics (AISTATS).
Huang, L., X. Nguyen, M. Garofalakis, M. I. Jordan, A. Joseph, & N. Taft (2007).  In-network PCA and anomaly detection. Advances in Neural Information Processing Systems (NIPS).
Liang, P., S. Petrov, D. Klein, & M. Jordan (2007).  The infinite PCFG using Dirichlet processes. Empirical Methods in Natural Language Processing (EMNLP).
Liang, Percy, Michael I. Jordan, & Ben Taskar (2007).  A permutation-agumented sampler for DP mixture models. 24th International COnference on Machine Learning. 545-552.
Liang, P., M. Jordan, & B. Taskar (2007).  A Permutation-Augmented Sampler For DP Mixture Models. International Conference on Machine Learning (ICML). 545-552.
Nilsson, J., F. Sha, & M. Jordan (2007).  Regression on manifolds using kernel dimension reduction. 24th International Conference on Machine Learning (ICML). 697-704.
Kivenen, J., E. Sudderth, & M. Jordan (2007).  Image Denoising With Nonparametric Hidden Markov Trees. IEEE International Conference on Image Processing (ICIP). Abstract