Publications
2008
Liang, P., Jordan M. I., & Klein D.
(2008). Probabilistic grammars and hierarhical Dirichlet processes.
The Handbook of APplied Bayesian Analysis.
Boulon, J., Konwinski A., Qi R., Rabkin A., Yang E., & Yang M.
(2008). Chukwa, a large-scale monitoring system.
In Cloud Computing and its Applications (CCA '08). 1-5. Abstract
Joseph, D., Tavakoli A., & Stoica I.
(2008). A Policy- aware Switching Layer for Data Centers.
SIGCOMM 2008. 51-62. Abstract
Lacoste-Julien, S., Sha F., & Jordan M. I.
(2008). Discriminative learning for dimensionality reduction and classification.
Neural Information Processing Systems (NIPS'08). Abstract
Nelson, B., Barreno M., Chi F. J., Joseph A. D., Rubinstein B. I. P., Saini U., et al.
(2008). Exploiting machine learning to subvert your spam filter.
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Abstract
Bodik, P., Goldszmidt M., & Fox A.
(2008). HiLighter: Automatically Building Robust Signatures of Performance Behavior.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al.
(2008). Evading Anomaly Detection through Variance Injection Attacks on PCA .
11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Obozinski, G., Grant C. E., Lanckriet G. R. G., Jordan M. I., & Noble W. W.
(2008). Consistent probabilistic outputs for protein function prediction.
Genome Biology.
Barreno, M., Nelson B., Joseph A. D., & Tygar D.
(2008). The security of machine learning.
Machine Learning Journal (MLJ) Special Issue on Machine Learning in Adversarial Environments.