Presentation Schedule


Paper Presenter
10/12 TCP ex Machina: Computer-Generated Congestion Control, Winstein/Balakrishnan, SIGCOMM13 Yiting Mao
  Keyboard emanations revisited, Zhuang, Zhou, Tygar, CCS05 Bolun Wang
10/14 Partitioned Logistic Regression for Spam Filtering, Chang et al, KDD08 Xinyi Zhang
  An Experimental Study of the Learnability of Congestion Control, Sivaraman et al, SIGCOMM14 Shiliang Tang
10/19 PTE: Predictive Text Embedding through Large-scale Heterogeneous Text Networks, Tang et al, KDD'15 Sicong Feng
  In-Network PCA and Anomaly Detection, Huang et al, NIPS'07 Angad Gill
10/21 Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning, Mozafari et al, PVLDB'14 Kevin Malta
  You are How You Click: Clickstream Analysis for Sybil Detection, Wang et al, UsenixSecurity 2013 Pritha D. N.
10/26 No class
10/28 No class
11/2 Traffic Prediction in a Bike-Sharing System, Li et al, SIGSPATIAL'15 Sharath Rao
  Mining Anomalies Using Traffic Feature Distributions, Lakhina et al, SIGCOMM05 Ana Nika
11/4 Efficient Synthesis of Probabilistic Programs, Nori et al, PLDI 2015 Debjani Banerjee
  ReBucket: A Method for Clustering Duplicate Crash Reports Based on Call Stack Similarity, Dang et al, ICSE'12 Zhijing Li
11/6 Communication-Efficient Online Detection of Network-Wide Anomalies, Huang et al, INFOCOM'07 Tiawna Cayton
  Fingerprinting the Datacenter: Automated Classification of Performance Crises, Bodik et al, Eurosys'10 Jordan Hughes
11/9 Learning to Identify Regular Expressions that Describe Email Campaigns, Prasse et al, ICML'12 Omid Askarisichani
  Poisoning Attacks against Support Vector Machines, Biggio et al, ICML'12 Gang Wang
11/11 No class Veteran's Day
11/16 No papers (Midquarter project presentations)  
11/18 From Word Embeddings To Document Distances, Kusner et al, ICML'15 Brandon Huynh
  Bayesian Watermark Attacks, Shterev et al, ICML'12 Anastasiya Lazareva
11/23 Detecting large-scale system problems by mining console logs, Xu et al, SOSP'09 Yanzi Zhu
  Nonparametric Link Prediction in Dynamic Networks, Sarkar et al, ICML'12 Qingyun Liu
11/25 Finding Advertising Keywords on Web Pages, Yih/Goodman/Carvalho, WWW06 Nimisha Srinivasa
  Adversarial Machine Learning, Huang et al, AISec'11 Zenghui Yan
  Learning for Control from Multiple Demonstrations, Coates et al, ICML'08 Mas Oug
11/30 Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers, Wang et al, Usenix Security'14 Ankita Singh
  Sparse Real Estate Ranking with Online User Reviews and Offline Moving Behaviors, Fu et al, ICDM'14 Sahaj Biyani
  Narrowing the Gap: Random Forests In Theory and In Practice, Olaoluwa Osuntokun
12/2 Online Novelty Detection on Temporal Sequences, Ma et al, KDD'03 Metehan Ozten
  Modeling Virtualized Applications using Machine Learning Techniques, Kundu et al, VEE'12 Ravi Kumar Suresh Babu
  Feature-Budgeted Random Forest, Nan et al, ICML 2015 Oliver Townsend