메뉴 건너뛰기




Volumn 81, Issue 2, 2010, Pages 121-148

The security of machine learning

Author keywords

Adversarial environments; Adversarial learning; Security

Indexed keywords

ADVERSARIAL ENVIRONMENTS; ADVERSARIAL LEARNING; COMPUTER SECURITY; FUNDAMENTAL TOOLS; MACHINE LEARNING SYSTEMS; MACHINE-LEARNING; SECURITY; SPAM FILTER;

EID: 78049530550     PISSN: 08856125     EISSN: 15730565     Source Type: Journal    
DOI: 10.1007/s10994-010-5188-5     Document Type: Article
Times cited : (844)

References (41)
  • 3
    • 18244390064 scopus 로고    scopus 로고
    • On robustness properties of convex risk minimization methods for pattern recognition
    • 2248007
    • A. Christmann I. Steinwart 2004 On robustness properties of convex risk minimization methods for pattern recognition Journal of Machine Learning Research (JMLR) 5 1007 1034 2248007
    • (2004) Journal of Machine Learning Research (JMLR) , vol.5 , pp. 1007-1034
    • Christmann, A.1    Steinwart, I.2
  • 9
    • 0002294353 scopus 로고
    • Question 14: Combining independent tests of significance
    • 10.2307/2681650
    • R. A. Fisher 1948 Question 14: Combining independent tests of significance American Statistician 2 5 30 31 10.2307/2681650
    • (1948) American Statistician , vol.2 , Issue.5 , pp. 30-31
    • Fisher, R.A.1
  • 12
    • 78049526843 scopus 로고    scopus 로고
    • A plan for spam
    • Graham, P. (2002). A plan for spam. http://www.paulgraham.com/spam.html.
    • (2002)
    • Graham, P.1
  • 15
    • 0027640858 scopus 로고
    • Learning in the presence of malicious errors
    • 10.1137/0222052 1227763
    • M. Kearns M. Li 1993 Learning in the presence of malicious errors SIAM Journal on Computing 22 807 837 10.1137/0222052 1227763
    • (1993) SIAM Journal on Computing , vol.22 , pp. 807-837
    • Kearns, M.1    Li, M.2
  • 16
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Kim, H. A., & Karp, B. (2004). Autograph: Toward automated, distributed worm signature detection. In USENIX security symposium.
    • (2004) USENIX Security Symposium
    • Kim, H.A.1    Karp, B.2
  • 21
    • 35248857893 scopus 로고    scopus 로고
    • An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
    • Recent Advances in Intrusion Detection
    • Mahoney, M., & Chan, P. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. Lecture notes in computer science (pp. 220-238). (Pubitemid 37171501)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2820 , pp. 220-238
    • Mahoney, M.V.1    Chan, P.K.2
  • 28
    • 1542634595 scopus 로고    scopus 로고
    • A statistical approach to the spam problem
    • Robinson, G. (2003). A statistical approach to the spam problem. Linux Journal.
    • (2003) Linux Journal
    • Robinson, G.1
  • 30
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 26286 and 623-656
    • C. E. Shannon 1948 A mathematical theory of communication Bell System Technical Journal 27 379 423 26286 and 623-656
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 31
  • 34
    • 0021518106 scopus 로고
    • THEORY OF THE LEARNABLE
    • DOI 10.1145/1968.1972
    • L. G. Valiant 1984 A theory of the learnable Communications of the ACM 27 11 1134 1142 10.1145/1968.1972 (Pubitemid 15425292)
    • (1984) Communications of the ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.G.1
  • 41
    • 38149081049 scopus 로고
    • Computational information theory
    • Y. Abu-Mostafa (eds). Springer Berlin
    • Yao, A. C. (1988). Computational information theory. In Y. Abu-Mostafa (Ed.), Complexity in information theory (pp. 1-15). Berlin: Springer.
    • (1988) Complexity in Information Theory , pp. 1-15
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.