-
1
-
-
33845989821
-
Can machine learning be secure?
-
Barreno, M., Nelson, B., Sears, R., Joseph, A. D., & Tygar, J. D. (2006). Can machine learning be secure? In Proceedings of the ACM symposium on InformAtion, computer, and communications security (ASIACCS).
-
(2006)
Proceedings of the ACM Symposium on InformAtion, Computer, and Communications Security (ASIACCS)
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
18244390064
-
On robustness properties of convex risk minimization methods for pattern recognition
-
2248007
-
A. Christmann I. Steinwart 2004 On robustness properties of convex risk minimization methods for pattern recognition Journal of Machine Learning Research (JMLR) 5 1007 1034 2248007
-
(2004)
Journal of Machine Learning Research (JMLR)
, vol.5
, pp. 1007-1034
-
-
Christmann, A.1
Steinwart, I.2
-
7
-
-
12244295760
-
Adversarial classification
-
Dalvi, N., Domingos, P., Mausam, Sanghai, S., & Verma, D. (2004). Adversarial classification. In Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (pp. 99-108).
-
(2004)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
9
-
-
0002294353
-
Question 14: Combining independent tests of significance
-
10.2307/2681650
-
R. A. Fisher 1948 Question 14: Combining independent tests of significance American Statistician 2 5 30 31 10.2307/2681650
-
(1948)
American Statistician
, vol.2
, Issue.5
, pp. 30-31
-
-
Fisher, R.A.1
-
12
-
-
78049526843
-
-
A plan for spam
-
Graham, P. (2002). A plan for spam. http://www.paulgraham.com/spam.html.
-
(2002)
-
-
Graham, P.1
-
13
-
-
0003841907
-
-
Wiley New York
-
Hampel, F. R., Ronchetti, E. M., Rousseeuw, P. J., & Stahel, W. A. (1986). Robust statistics: the approach based on influence functions. Probability and mathematical statistics. New York: Wiley.
-
(1986)
Robust Statistics: The Approach Based on Influence Functions. Probability and Mathematical Statistics
-
-
Hampel, F.R.1
Ronchetti, E.M.2
Rousseeuw, P.J.3
Stahel, W.A.4
-
15
-
-
0027640858
-
Learning in the presence of malicious errors
-
10.1137/0222052 1227763
-
M. Kearns M. Li 1993 Learning in the presence of malicious errors SIAM Journal on Computing 22 807 837 10.1137/0222052 1227763
-
(1993)
SIAM Journal on Computing
, vol.22
, pp. 807-837
-
-
Kearns, M.1
Li, M.2
-
16
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Kim, H. A., & Karp, B. (2004). Autograph: Toward automated, distributed worm signature detection. In USENIX security symposium.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.A.1
Karp, B.2
-
21
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
Recent Advances in Intrusion Detection
-
Mahoney, M., & Chan, P. (2003). An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. Lecture notes in computer science (pp. 220-238). (Pubitemid 37171501)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2820
, pp. 220-238
-
-
Mahoney, M.V.1
Chan, P.K.2
-
25
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Nelson, B., Barreno, M., Chi, F. J., Joseph, A. D., Rubinstein, B. I. P., Saini, U., Sutton, C., Tygar, J. D., & Xia, K. (2008). Exploiting machine learning to subvert your spam filter. In Proceedings of the workshop on large-scale exploits and emerging threats (LEET).
-
(2008)
Proceedings of the Workshop on Large-scale Exploits and Emerging Threats (LEET)
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
28
-
-
1542634595
-
A statistical approach to the spam problem
-
Robinson, G. (2003). A statistical approach to the spam problem. Linux Journal.
-
(2003)
Linux Journal
-
-
Robinson, G.1
-
30
-
-
84856043672
-
A mathematical theory of communication
-
26286 and 623-656
-
C. E. Shannon 1948 A mathematical theory of communication Bell System Technical Journal 27 379 423 26286 and 623-656
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
34
-
-
0021518106
-
THEORY OF THE LEARNABLE
-
DOI 10.1145/1968.1972
-
L. G. Valiant 1984 A theory of the learnable Communications of the ACM 27 11 1134 1142 10.1145/1968.1972 (Pubitemid 15425292)
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
39
-
-
84904804970
-
Filtering image spam with near-duplicate detection
-
Wang, Z., Josephson, W., Lv, Q., Charikar, M., & Li, K. (2007). Filtering image spam with near-duplicate detection. In Proceedings of the conference on email and anti-spam (CEAS).
-
(2007)
Proceedings of the Conference on Email and Anti-spam (CEAS)
-
-
Wang, Z.1
Josephson, W.2
Lv, Q.3
Charikar, M.4
Li, K.5
-
41
-
-
38149081049
-
Computational information theory
-
Y. Abu-Mostafa (eds). Springer Berlin
-
Yao, A. C. (1988). Computational information theory. In Y. Abu-Mostafa (Ed.), Complexity in information theory (pp. 1-15). Berlin: Springer.
-
(1988)
Complexity in Information Theory
, pp. 1-15
-
-
Yao, A.C.1
|