Publications

2008

Bodik, P., Goldszmidt M., & Fox A. (2008).  HiLighter: Automatically Building Robust Signatures of Performance Behavior. 3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Rubinstein, B. I. P., Nelson B., Huang L., Joseph A. D., Lau S. -hon, Taft N., et al. (2008).  Evading Anomaly Detection through Variance Injection Attacks on PCA . 11th International Symposium on Recent Advances in Intrusion Detection (RAID'08). 394-395. Abstract
Xu, W., Huang L., Fox A., Patterson D., & Jordan M. (2008).  Mining Console Logs for Large-Scale System Problem Detection. 3rd Workshop on Tackling System Problems with Machine Learning Techniques (SysML'08). 1-6. Abstract
Mackey, L. (2008).  Deflation Methods for Sparse PCA. Neural Information Processing Systems (NIPS'08). 1-8. Abstract
Rabkin, A. (2008).  Personal knowledge questions for fallback authentication. 4th Symposium on Usable Privacy and Security. 13-23. Abstract
Barreno, M., Nelson B., Joseph A. D., & Tygar D. (2008).  The security of machine learning. Machine Learning Journal (MLJ) Special Issue on Machine Learning in Adversarial Environments.
Liang, P., Klein D., & Jordan M. I. (2008).  Agreement-based learning. Advances in Neural Information Processing Systems (NIPS).