Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al. (2008).  Evading Anomaly Detection through Variance Injection Attacks on PCA . 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M. (2008).  Mining Console Logs for Large-Scale System Problem Detection. 3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Mackey, L. (2008).  Deflation Methods for Sparse PCA. Neural Information Processing Systems (NIPS'08). 1-8. Abstract
Rabkin, A. (2008).  Personal knowledge questions for fallback authentication. 4th Symposium on Usable Privacy and Security. 13-23. Abstract
Sutton, C., & Jordan M. I. (2008).  Probabilistic Inference in Queueing Networks. In Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML). Abstract