Author of the publication

Identifying suspicious URLs: an application of large-scale online learning.

, , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 681-688. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Learning of Image Manifolds by Semidefinite Programming., and . CVPR (2), page 988-995. (2004)Statistical signal processing with nonnegativity constraints., , and . INTERSPEECH, ISCA, (2003)A Generalized Linear Model for Principal Component Analysis of Binary Data., , and . AISTATS, Society for Artificial Intelligence and Statistics, (2003)Semisupervised alignment of manifolds., , and . AISTATS, Society for Artificial Intelligence and Statistics, (2005)Exploiting Tractable Substructures in Intractable Networks., and . NIPS, page 486-492. MIT Press, (1995)Mapping Uncharted Waters: Exploratory Analysis, Visualization, and Clustering of Oceanographic Data., , , and . ICMLA, page 388-395. IEEE Computer Society, (2008)Learning to detect malicious URLs., , , and . ACM TIST, 2 (3): 30:1-30:24 (2011)IDES: An Internet Distance Estimation Service for Large Networks., , and . IEEE Journal on Selected Areas in Communications, 24 (12): 2273-2284 (2006)Spectral Methods for Dimensionality Reduction., , , , and . Semi-Supervised Learning, The MIT Press, (2006)A Variational Approximation for Topic Modeling of Hierarchical Corpora., , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 55-63. JMLR.org, (2013)