Publications
2008
Nelson, B., Barreno M., Chi F. J., Joseph A. D., Rubinstein B. I. P., Saini U., et al.
(2008). Exploiting machine learning to subvert your spam filter.
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Abstract
Bodik, P., Goldszmidt M., & Fox A.
(2008). HiLighter: Automatically Building Robust Signatures of Performance Behavior.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al.
(2008). Evading Anomaly Detection through Variance Injection Attacks on PCA .
11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M.
(2008). Mining Console Logs for Large-Scale System Problem Detection.
3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Barreno, M., Bartlett P. L., Chi F. J., Joseph A. D., Nelson B., Rubinstein B. I. P., et al.
(2008). Open Problems in the Security of Learning .
1st ACM Workshop on AlSec. 19-26. Abstract
Mackey, L.
(2008). Deflation Methods for Sparse PCA.
Neural Information Processing Systems (NIPS'08). 1-8. Abstract
Rabkin, A.
(2008). Personal knowledge questions for fallback authentication.
4th Symposium on Usable Privacy and Security. 13-23. Abstract
Barreno, M., Nelson B., Joseph A. D., & Tygar D.
(2008). The security of machine learning.
Machine Learning Journal (MLJ) Special Issue on Machine Learning in Adversarial Environments.
Liang, P., Klein D., & Jordan M. I.
(2008). Agreement-based learning.
Advances in Neural Information Processing Systems (NIPS).