Tentative paper list
Please note new papers are being actively added to the list. Check back often for updates.
- "Keyboard emanations revisited," L. Zhuang, F. Zhou, J. D. Tygar. CCS 2005, pdf
- "Mining Anomalies Using Traffic Feature Distributions," A. Lakhina, M. Crovella, and C. Diot, SIGCOMM 2005. pdf
- "In-network PCA and anomaly detection," L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. Joseph, and N. Taft, NIPS 2007. pdf
- "Online Novelty Detection on Temporal Sequences," J. Ma and S. Perkins. KDD 2003. pdf
- "You are How You Click: Clickstream Analysis for Sybil Detection," Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng and Ben Y. Zhao, Usenix Security 2013, pdf
- "Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers," Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y. Zhao, Usenix Security 2014. pdf
- "Fingerprinting the datacenter: automated classification of performance crises," Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn B. Woodard, and Hans Andersen, Eurosys 2010, paper
- "Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning", Barzan Mozafari, Purna Sarkar, Michael Franklin, Michael Jordan, Samuel Madden, PVLDB 2014, pdf
- "Nonparametric Link Prediction in Dynamic Networks", P. Sarkar, D. Chakrabarti, and M. I. Jordan, ICML 2012, pdf
- "Detecting Large-scale System Problems by Mining Console Logs." W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, SOSP 2009, pdf.
- "Communication-Efficient Online Detection of Network-Wide Anomalies," Ling Huang, XuanLong Nguyen, Minos Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft, INFOCOM 2007, pdf
- "ReBucket: A Method for Clustering Duplicate Crash Reports Based on Call Stack Similiarity," Yingnong Dang, Rongxin Wu, Hongyu Zhang, Dongmei Zhang, Peter Nobel. ICSE 2012, pdf
- "TCP ex Machina: Computer-Generated Congestion Control," Keith Winstein and Hari Balakrishnan, SIGCOMM 2013, pdf
- "An Experimental Study of the Learnability of Congestion Control," Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, and Hari Balakrishnan, SIGCOMM 2014, pdf
- "Finding Advertising Keywords on Web Pages," W. Yih, J. Goodman, and V. Carvalho, WWW 2006, paper
- "Partitioned Logistic Regression for Spam Filtering," Ming-Wei Chang, Wen-tau Yih, and Christopher Meek, KDD 2008, paper (file under NLP)
- "Traffic Prediction in a Bike-Sharing System," Yexin Li, Yu Zheng, Huichu Zhang, and Lei Chen, SIGSPATIAL 2015, paper
- "PTE: Predictive Text Embedding through Large-scale Heterogeneous Text Networks," Jian Tang, Meng Qu, Qiaozhu Mei, KDD 2015, paper
- "Efficient Synthesis of Probabilistic Programs," Aditya V. Nori, Sherjil Ozair, Sriram K. Rajamani, and Deepak Vijaykeerthy, PLDI 2015, pdf
- "Sparse Real Estate Ranking with Online User Reviews and Offline Moving Behaviors," Yanjie Fu, Yong Ge, Yu Zheng, Yanchi Liu, Hui Xiong, and Nicholas Jing Yuan, ICDM 2014, pdf
- "Adversarial Machine Learning", Ling Huang, Anthony Joseph, Blaine Nelson, B. Rubinstein, J. D. Tygar, AISec 2011. pdf
- "Learning for Control from Multiple Demonstrations", Coates, Abbeel, Ng, ICML'08, PDF.
- NEW PAPERS
- "Poisoning Attacks against Support Vector Machines," Battista Biggio, Blaine Nelson, Pavel Laskov, ICML 2012, PDF
- "Bayesian Watermark Attacks," Ivo Shterev, David Dunson, ICML 2012, PDF
- "Learning to Identify Regular Expressions that Describe Email Campaigns," Paul Prasse, Christoph Sawade, Niels Landwehr, Tobias Scheffer, ICML 2012, PDF
- "Finding Botnets Using Minimal Graph Clusterings," Peter Haider, Tobias Scheffer, ICML 2014 PDF
- "Structured Generative Models of Natural Source Code," Chris Maddison, Daniel Tarlow, ICML 2014, PDF
- "Automated inference of point of view from user interactions in collective intelligence venues," Sanmay Das, Allen Lavoie, ICML 2014, PDF
- "Narrowing the Gap: Random Forests In Theory and In Practice", Misha Denil, David Matheson, Nando De Freitas, ICML 2014, PDF
- "Correlation Clustering in Data Streams," KookJin Ahn, Graham Cormode, Sudipto Guha, Andrew McGregor, Anthony Wirth, ICML 2015, PDF
- "Feature-Budgeted Random Forest," Feng Nan, Joseph Wang, Venkatesh Saligrama, ICML 2015, PDF
- "From Word Embeddings To Document Distances," Kusner, Sun, Kolkin, Weinberger, ICML 2015, PDF
- "A Divide and Conquer Framework for Distributed Graph Clustering," Yang, Xu, ICML 2015, PDF
- "Modeling Virtualized Applications using Machine Learning Techniques," Kundu, Rangaswami, Gulati, Zhao, Dutta, VEE 2012, PDF
-