-
1
-
-
33845989821
-
Can machine learning be secure?
-
Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure? In: Proceedings of the ACM Symposium on InformAtion, Computer, and Communications Security (ASIACCS), pp 16-25.
-
(2006)
Proceedings of the ACM Symposium on InformAtion, Computer, and Communications Security (ASIACCS)
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
2
-
-
79957942924
-
The security of machine learning
-
University of California, Berkeley, URL
-
Barreno M, Nelson B, Joseph AD, Tygar JD (2008) The security of machine learning. Tech. Rep. UCB/EECS-2008-43, EECS Department, University of California, Berkeley, URL http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS- 2008-43.html.
-
(2008)
Tech. Rep. UCB/EECS-2008-43, EECS Department
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
6
-
-
12244295760
-
Adversarial classification
-
Dalvi N, Domingos P, Mausam, Sanghai S, Verma D (2004) Adversarial classification. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 99-108.
-
(2004)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
7
-
-
0002294353
-
Question 14: Combining independent tests of significance
-
30-30J
-
Fisher RA (1948) Question 14: Combining independent tests of significance. American Statistician 2(5):30-30J.
-
(1948)
American Statistician
, vol.2
, Issue.5
-
-
Fisher, R.A.1
-
10
-
-
0027640858
-
Learning in the presence of malicious errors
-
Kearns M, Li M (1993) Learning in the presence of malicious errors. SIAM Journal on Computing 22(4):807-837.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 807-837
-
-
Kearns, M.1
Li, M.2
-
11
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Kim HA, Karp B (2004) Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the USENIX Security Symposium, pp 271-286.
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.A.1
Karp, B.2
-
13
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Barbará D, Kamath C (eds)
-
Lazarevic A, Ertöz L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Barbará D, Kamath C (eds) Proceedings of the SIAM International Conference on Data Mining, pp 25-36.
-
(2003)
Proceedings of the SIAM International Conference on Data Mining
, pp. 25-36
-
-
Lazarevic, A.1
Ertöz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
19
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Nelson B, Barreno M, Chi FJ, Joseph AD, Rubinstein BIP, Saini U, Sutton C, Tygar JD, Xia K (2008) Exploiting machine learning to subvert your spam filter. In: Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET).
-
(2008)
Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
22
-
-
1542634595
-
A statistical approach to the spam problem
-
Robinson G (2003) A statistical approach to the spam problem. Linux Journal.
-
(2003)
Linux Journal
-
-
Robinson, G.1
-
24
-
-
20444503956
-
Detecting viral propagations using email behavior profiles
-
Stolfo SJ, Li WJ, Hershkop S, Wang K, Hu CW, Nimeskern O (2004) Detecting viral propagations using email behavior profiles. ACM Transactions on Internet Technology (TOIT) pp 187-221.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, pp. 187-221
-
-
Stolfo, S.J.1
Li, W.J.2
Hershkop, S.3
Wang, K.4
Hu, C.W.5
Nimeskern, O.6
|