|
Paper |
Presenter |
| 10/12 |
TCP ex Machina: Computer-Generated Congestion Control, Winstein/Balakrishnan, SIGCOMM13 |
Yiting Mao |
| |
Keyboard emanations revisited, Zhuang, Zhou, Tygar, CCS05 |
Bolun Wang |
| 10/14 |
Partitioned Logistic Regression for Spam Filtering, Chang et al, KDD08 |
Xinyi Zhang |
| |
An Experimental Study of the Learnability of Congestion Control, Sivaraman et al, SIGCOMM14 |
Shiliang Tang |
| 10/19 |
PTE: Predictive Text Embedding through Large-scale Heterogeneous Text Networks, Tang et al, KDD'15 |
Sicong Feng |
| |
In-Network PCA and Anomaly Detection, Huang et al, NIPS'07 |
Angad Gill |
| 10/21 |
Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning, Mozafari et al, PVLDB'14 |
Kevin Malta |
| |
You are How You Click: Clickstream Analysis for Sybil Detection, Wang et al, UsenixSecurity 2013 |
Pritha D. N. |
| 10/26 |
No class |
|
| 10/28 |
No class |
|
| 11/2 |
Traffic Prediction in a Bike-Sharing System, Li et al, SIGSPATIAL'15 |
Sharath Rao |
| |
Mining Anomalies Using Traffic Feature Distributions, Lakhina et al, SIGCOMM05 |
Ana Nika |
| 11/4 |
Efficient Synthesis of Probabilistic Programs, Nori et al, PLDI 2015 |
Debjani Banerjee |
| |
ReBucket: A Method for Clustering Duplicate Crash Reports Based on Call Stack Similarity, Dang et al, ICSE'12 |
Zhijing Li |
| 11/6 |
Communication-Efficient Online Detection of Network-Wide Anomalies, Huang et al, INFOCOM'07 |
Tiawna Cayton |
| |
Fingerprinting the Datacenter: Automated Classification of Performance Crises, Bodik et al, Eurosys'10 |
Jordan Hughes |
| 11/9 |
Learning to Identify Regular Expressions that Describe Email Campaigns, Prasse et al, ICML'12 |
Omid Askarisichani |
| |
Poisoning Attacks against Support Vector Machines, Biggio et al, ICML'12 |
Gang Wang |
| 11/11 |
No class |
Veteran's Day |
| 11/16 |
No papers (Midquarter project presentations) |
|
| 11/18 |
From Word Embeddings To Document Distances, Kusner et al, ICML'15 |
Brandon Huynh |
| |
Bayesian Watermark Attacks, Shterev et al, ICML'12 |
Anastasiya Lazareva |
| 11/23 |
Detecting large-scale system problems by mining console logs, Xu et al, SOSP'09 |
Yanzi Zhu |
| |
Nonparametric Link Prediction in Dynamic Networks, Sarkar et al, ICML'12 |
Qingyun Liu |
| 11/25 |
Finding Advertising Keywords on Web Pages, Yih/Goodman/Carvalho, WWW06 |
Nimisha Srinivasa |
| |
Adversarial Machine Learning, Huang et al, AISec'11 |
Zenghui Yan |
| |
Learning for Control from Multiple Demonstrations, Coates et al, ICML'08 |
Mas Oug
|
| 11/30 |
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers, Wang et al, Usenix Security'14 |
Ankita Singh |
| |
Sparse Real Estate Ranking with Online User Reviews and Offline Moving Behaviors, Fu et al, ICDM'14 |
Sahaj Biyani |
| |
Narrowing the Gap: Random Forests In Theory and In Practice, |
Olaoluwa Osuntokun |
| 12/2 |
Online Novelty Detection on Temporal Sequences, Ma et al, KDD'03 |
Metehan Ozten |
| |
Modeling Virtualized Applications using Machine Learning Techniques, Kundu et al, VEE'12 |
Ravi Kumar Suresh Babu |
| |
Feature-Budgeted Random Forest, Nan et al, ICML 2015 |
Oliver Townsend |