Tentative paper list

Please note new papers are being actively added to the list. Check back often for updates.


  • "Keyboard emanations revisited," L. Zhuang, F. Zhou, J. D. Tygar. CCS 2005, pdf

  • "Mining Anomalies Using Traffic Feature Distributions," A. Lakhina, M. Crovella, and C. Diot, SIGCOMM 2005. pdf

  • "In-network PCA and anomaly detection," L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A. Joseph, and N. Taft, NIPS 2007. pdf

  • "Online Novelty Detection on Temporal Sequences," J. Ma and S. Perkins. KDD 2003. pdf

  • "You are How You Click: Clickstream Analysis for Sybil Detection," Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng and Ben Y. Zhao, Usenix Security 2013, pdf

  • "Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers," Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y. Zhao, Usenix Security 2014. pdf

  • "Fingerprinting the datacenter: automated classification of performance crises," Peter Bodik, Moises Goldszmidt, Armando Fox, Dawn B. Woodard, and Hans Andersen, Eurosys 2010, paper

  • "Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning", Barzan Mozafari, Purna Sarkar, Michael Franklin, Michael Jordan, Samuel Madden, PVLDB 2014, pdf

  • "Nonparametric Link Prediction in Dynamic Networks", P. Sarkar, D. Chakrabarti, and M. I. Jordan, ICML 2012, pdf

  • "Detecting Large-scale System Problems by Mining Console Logs." W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, SOSP 2009, pdf.

  • "Communication-Efficient Online Detection of Network-Wide Anomalies," Ling Huang, XuanLong Nguyen, Minos Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft, INFOCOM 2007, pdf

  • "ReBucket: A Method for Clustering Duplicate Crash Reports Based on Call Stack Similiarity," Yingnong Dang, Rongxin Wu, Hongyu Zhang, Dongmei Zhang, Peter Nobel. ICSE 2012, pdf

  • "TCP ex Machina: Computer-Generated Congestion Control," Keith Winstein and Hari Balakrishnan, SIGCOMM 2013, pdf

  • "An Experimental Study of the Learnability of Congestion Control," Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, and Hari Balakrishnan, SIGCOMM 2014, pdf

  • "Finding Advertising Keywords on Web Pages," W. Yih, J. Goodman, and V. Carvalho, WWW 2006, paper

  • "Partitioned Logistic Regression for Spam Filtering," Ming-Wei Chang, Wen-tau Yih, and Christopher Meek, KDD 2008, paper (file under NLP)

  • "Traffic Prediction in a Bike-Sharing System," Yexin Li, Yu Zheng, Huichu Zhang, and Lei Chen, SIGSPATIAL 2015, paper

  • "PTE: Predictive Text Embedding through Large-scale Heterogeneous Text Networks," Jian Tang, Meng Qu, Qiaozhu Mei, KDD 2015, paper

  • "Efficient Synthesis of Probabilistic Programs," Aditya V. Nori, Sherjil Ozair, Sriram K. Rajamani, and Deepak Vijaykeerthy, PLDI 2015, pdf

  • "Sparse Real Estate Ranking with Online User Reviews and Offline Moving Behaviors," Yanjie Fu, Yong Ge, Yu Zheng, Yanchi Liu, Hui Xiong, and Nicholas Jing Yuan, ICDM 2014, pdf

  • "Adversarial Machine Learning", Ling Huang, Anthony Joseph, Blaine Nelson, B. Rubinstein, J. D. Tygar, AISec 2011. pdf

  • "Learning for Control from Multiple Demonstrations", Coates, Abbeel, Ng, ICML'08, PDF.

  • NEW PAPERS

  • "Poisoning Attacks against Support Vector Machines," Battista Biggio, Blaine Nelson, Pavel Laskov, ICML 2012, PDF

  • "Bayesian Watermark Attacks," Ivo Shterev, David Dunson, ICML 2012, PDF

  • "Learning to Identify Regular Expressions that Describe Email Campaigns," Paul Prasse, Christoph Sawade, Niels Landwehr, Tobias Scheffer, ICML 2012, PDF

  • "Finding Botnets Using Minimal Graph Clusterings," Peter Haider, Tobias Scheffer, ICML 2014 PDF

  • "Structured Generative Models of Natural Source Code," Chris Maddison, Daniel Tarlow, ICML 2014, PDF

  • "Automated inference of point of view from user interactions in collective intelligence venues," Sanmay Das, Allen Lavoie, ICML 2014, PDF

  • "Narrowing the Gap: Random Forests In Theory and In Practice", Misha Denil, David Matheson, Nando De Freitas, ICML 2014, PDF

  • "Correlation Clustering in Data Streams," KookJin Ahn, Graham Cormode, Sudipto Guha, Andrew McGregor, Anthony Wirth, ICML 2015, PDF

  • "Feature-Budgeted Random Forest," Feng Nan, Joseph Wang, Venkatesh Saligrama, ICML 2015, PDF

  • "From Word Embeddings To Document Distances," Kusner, Sun, Kolkin, Weinberger, ICML 2015, PDF

  • "A Divide and Conquer Framework for Distributed Graph Clustering," Yang, Xu, ICML 2015, PDF

  • "Modeling Virtualized Applications using Machine Learning Techniques," Kundu, Rangaswami, Gulati, Zhao, Dutta, VEE 2012, PDF