Publications
(1992).
(2009).
Topologically-Constrained Latent Variable Models.
1080-1087.
(2008).
(2009).
(2008). Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction.
Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
(1991).
(1993). Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle.
Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
(1995). Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification.
International Conference on Learning Representations.
(2021).
(2009).
(2010).
VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007). Effects of Usage Based Feedback on Video Retrieval: A Simulation Based Study.
ACM Transactions on Information Systems. 29(2),
(2011). Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem.
Proceedings of the Internet Measurement Conference. 245-258.
(2019). Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
Proceedings of Workshop on Data and Algorithmic Transparency.
(2016).
(2015).
(2014).
(2015).
(2014).
(2013). Explaining the Structure of FrameNet with Concept Lattices.
Proceedings of the Third International Conference on Formal Concept Analysis (ICFCA 2005). 79-94.
(2005).
(2009).
(2014).
(1993).