1. Graph regularization methods for Web spam detection
2. Adamic, L. and Glance, N. (2005). The political blogosphere and the 2004 US election: divided they blog. In Proceedings of the 3rd International Workshop on Link Discovery, pages 36{43. ACM.
3. Altun, Y., Tsochantaridis, I., Hofmann, T., et al. (2003). Hidden markov FIGURE 1: The challenger influences the hidden information as an answer to the learner's policy. vector machines. In ICML, volume 3, pages 3{10.
4. An, B., Kempe, D., Kiekintveld, C., Shieh, E., Singh, S., Tambe, M., and Vorobeychik, Y. (2012). Security games with limited surveillance. Ann Arbor, 1001:48109.
5. Bakir, G. H., Hofmann, T., Scholkopf, B., Smola, A. J., Taskar, B., and Vishwanathan, S. V. N. (2007). Predicting Structured Data. MIT Press.