-
1
-
-
79952312079
-
-
The Apache Spam Assassin Project
-
The Apache Spam Assassin Project. http://spamassassin.apache.org/.
-
-
-
-
2
-
-
33845989821
-
Can machine learning be secure?
-
New York, NY, USA. ACM, New York
-
Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure? In: ASIACCS '06: proceeding 2006 ACM symposium on information, computer and communications security, New York, NY, USA. ACM, New York, pp 16-25.
-
(2006)
ASIACCS '06: proceeding 2006 ACM symposium on information, computer and communications security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
70349429972
-
Multiple classifier systems, 8th international workshop (MCS 2009)
-
Springer, New York
-
Benediktsson JA, Kittler J, Roli F (eds) (2009) Multiple classifier systems, 8th international workshop (MCS 2009). In: Lecture notes in computer science, vol 5519. Springer, New York.
-
(2009)
Lecture notes in computer science
, vol.5519
-
-
Benediktsson, J.A.1
Kittler, J.2
Roli, F.3
-
4
-
-
58349121261
-
Adversarial pattern classification using multiple classifiers and randomisation
-
LNCS. Springer-Verlag, New York
-
Biggio B, Fumera G, Roli F (2008) Adversarial pattern classification using multiple classifiers and randomisation. In: 12th Joint IAPR international workshop on structural and syntactic pattern recognition (SSPR 2008). LNCS, vol 5342. Springer-Verlag, New York, pp 500-509.
-
(2008)
12th Joint IAPR international workshop on structural and syntactic pattern recognition (SSPR 2008)
, vol.5342
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
5
-
-
70350241126
-
Evade hard multiple classifier systems
-
Okun O, Valentini G (eds), Springer, Berlin
-
Biggio B, Fumera G, Roli F (2009) Evade hard multiple classifier systems. In: Okun O, Valentini G (eds) Supervised and unsupervised ensemble methods and their applications. Studies in computational intelligence, vol 245. Springer, Berlin, pp 15-38.
-
(2009)
Supervised and unsupervised ensemble methods and their applications. Studies in computational intelligence
, vol.245
, pp. 15-38
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
6
-
-
70349319703
-
Multiple classifier systems for adversarial classification tasks
-
Benediktsson JA, Kittler J, Roli F (eds), Springer, New York
-
Biggio B, Fumera G, Roli F (2009) Multiple classifier systems for adversarial classification tasks. In: Benediktsson JA, Kittler J, Roli F (eds) Multiple classifier systems, 8th international workshop (MCS 2009). Lecture notes in computer science, vol 5519. Springer, New York, pp 132-141.
-
(2009)
Multiple classifier systems, 8th international workshop (MCS 2009). Lecture notes in computer science
, vol.5519
, pp. 132-141
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
7
-
-
77952042088
-
Multiple classifier systems under attack
-
Gayar NE, Kittler J, Roli F (eds), Springer, Berlin
-
Biggio B, Fumera G, Roli F (2010) Multiple classifier systems under attack. In: Gayar NE, Kittler J, Roli F (eds) MCS. Lecture notes in computer science. Springer, Berlin, pp 74-83.
-
(2010)
MCS. Lecture notes in computer science
, pp. 74-83
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
9
-
-
0030211964
-
Bagging predictors
-
Breiman L (1996) Bagging predictors. Mach Learn 24(2):123-140.
-
(1996)
Mach Learn
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
10
-
-
0035478854
-
Random forests
-
Breiman L (2001) Random forests. Mach Learn 45:5-32.
-
(2001)
Mach Learn
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
11
-
-
0043289776
-
Analyzing bagging
-
Bühlmann P, Yu B (2002) Analyzing bagging. Ann Stat 30(4): 927-961.
-
(2002)
Ann Stat
, vol.30
, Issue.4
, pp. 927-961
-
-
Bühlmann, P.1
Yu, B.2
-
15
-
-
77953056409
-
Trec 2007 spam track overview
-
Voorhees EM, Buckland LP (eds), volume special publication 500-274. National Institute of Standards and Technology (NIST)
-
Cormack GV (2007) Trec 2007 spam track overview. In: Voorhees EM, Buckland LP (eds) TREC, volume special publication 500-274. National Institute of Standards and Technology (NIST).
-
(2007)
TREC
-
-
Cormack, G.V.1
-
16
-
-
50249170401
-
Casting out demons: sanitizing training data for anomaly sensors
-
Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD (2008) Casting out demons: sanitizing training data for anomaly sensors. In: IEEE symposium on security and privacy, pp 81-95.
-
(2008)
IEEE symposium on security and privacy
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
17
-
-
12244295760
-
Adversarial classification
-
Seattle
-
Dalvi N, Domingos P, Mausam, Sanghai S, Verma D (2004) Adversarial classification. In: Tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD), Seattle, pp 99-108.
-
(2004)
Tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD)
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
19
-
-
0032594950
-
Support vector machines for spam categorization
-
Drucker H, Wu D, Vapnik VN (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5):1048-1054.
-
(1999)
IEEE Trans Neural Netw
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Wu, D.2
Vapnik, V.N.3
-
21
-
-
33750494541
-
On bagging and nonlinear estimation
-
Special issue on nonparametric statistics and related topics: in honor of M.L. Puri
-
Friedman JH, Hall P (2007) On bagging and nonlinear estimation. J Stat Plan Inference 137(3):669-683. Special issue on nonparametric statistics and related topics: in honor of M.L. Puri.
-
(2007)
J Stat Plan Inference
, vol.137
, Issue.3
, pp. 669-683
-
-
Friedman, J.H.1
Hall, P.2
-
22
-
-
37849011664
-
On the vulnerability of fingerprint verification systems to fake fingerprint attacks
-
ICCST
-
Galbally-Herrero J, Fierrez-Aguilar J, Rodriguez-Gonzalez JD, Alonso-Fernandez F, Ortega-Garcia J, Tapiador M (2006) On the vulnerability of fingerprint verification systems to fake fingerprint attacks. In: Proceedings of IEEE international Carnahan conference on security technology, ICCST, pp 130-136.
-
(2006)
Proceedings of IEEE international Carnahan conference on security technology
, pp. 130-136
-
-
Galbally-Herrero, J.1
Fierrez-Aguilar, J.2
Rodriguez-Gonzalez, J.D.3
Alonso-Fernandez, F.4
Ortega-Garcia, J.5
Tapiador, M.6
-
23
-
-
70349303508
-
Network protocol verification by a classifier selection ensemble
-
Benediktsson JA, Kittler J, Roli F (eds), In: Lecture notes in computer science. Springer, New York
-
Gargiulo F, Kuncheva LI, Sansone C. Network protocol verification by a classifier selection ensemble. In: Benediktsson JA, Kittler J, Roli F (eds) (2009) Multiple classifier systems, 8th international workshop (MCS 2009). In: Lecture notes in computer science, vol 5519. Springer, New York, pp 314-323.
-
(2009)
Multiple classifier systems, 8th international workshop (MCS 2009)
, vol.5519
, pp. 314-323
-
-
Gargiulo, F.1
Kuncheva, L.I.2
Sansone, C.3
-
24
-
-
34250717444
-
Nightmare at test time: robust learning by feature deletion
-
Cohen WW, Moore A (eds), ACM, New York
-
Globerson A, Roweis ST (2006) Nightmare at test time: robust learning by feature deletion. In: Cohen WW, Moore A (eds) ICML. ACM international conference proceeding series, vol 148. ACM, New York, pp 353-360.
-
(2006)
ICML. ACM international conference proceeding series
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
26
-
-
26944499161
-
How to beat an adaptive spam filter
-
Cambridge, MA, USA
-
Graham-Cumming J (2004) How to beat an adaptive spam filter. In: MIT Spam conference, Cambridge, MA, USA.
-
(2004)
MIT Spam conference
-
-
Graham-Cumming, J.1
-
27
-
-
3543107923
-
Bagging equalizes influence
-
Grandvalet Y (2004) Bagging equalizes influence. Mach Learn 55:251-270.
-
(2004)
Mach Learn
, vol.55
, pp. 251-270
-
-
Grandvalet, Y.1
-
28
-
-
78651563435
-
Multiple classifier systems
-
Prague, Czech Republic, May 23-25, 2007. Proceedings, lecture notes in computer science. Springer, New York
-
Haindl M, Kittler J, Roli F (eds) (2007) Multiple classifier systems. 7th international workshop, MCS 2007, Prague, Czech Republic, May 23-25, 2007. Proceedings, lecture notes in computer science, vol 4472. Springer, New York.
-
(2007)
7th international workshop, MCS 2007
, vol.4472
-
-
Haindl, M.1
Kittler, J.2
Roli, F.3
-
30
-
-
0032139235
-
The random subspace method for constructing decision forests
-
Ho TK (1998) The random subspace method for constructing decision forests. IEEE Trans Pattern Anal Mach Intell 20(8): 832-844.
-
(1998)
IEEE Trans Pattern Anal Mach Intell
, vol.20
, Issue.8
, pp. 832-844
-
-
Ho, T.K.1
-
31
-
-
46249103547
-
A multiple instance learning strategy for combating good word attacks on spam filters
-
Jorgensen Z, Zhou Y, Inge M (2008) A multiple instance learning strategy for combating good word attacks on spam filters. J Mach Learn Res 9:1115-1146.
-
(2008)
J Mach Learn Res
, vol.9
, pp. 1115-1146
-
-
Jorgensen, Z.1
Zhou, Y.2
Inge, M.3
-
32
-
-
0037002475
-
Intrusion detection: a brief history and overview (supplement to Computer magazine)
-
Kemmerer RA, Vigna G (2002) Intrusion detection: a brief history and overview (supplement to Computer magazine). Computer 35:27-30.
-
(2002)
Computer
, vol.35
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
33
-
-
0032021555
-
On combining classifiers
-
Kittler J, Hatef M, Duin RP, Matas J (1998) On combining classifiers. IEEE Trans Pattern Anal Mach Intell 20(3):226-239.
-
(1998)
IEEE Trans Pattern Anal Mach Intell
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.3
Matas, J.4
-
43
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
Perdisci R, Dagon D, Lee W, Fogla P, Sharif M (2006) Misleading worm signature generators using deliberate noise injection. In: IEEE symposium on security and privacy, pp 15-31.
-
(2006)
IEEE symposium on security and privacy
, pp. 15-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
44
-
-
60349101742
-
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
-
IEEE Computer Society
-
Perdisci R, Gu G, Lee W (2006) Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In: International conference on data mining (ICDM). IEEE Computer Society, pp 488-498.
-
(2006)
International conference on data mining (ICDM)
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
45
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169-179.
-
(2009)
J Vis Lang Comput
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
47
-
-
77954868784
-
Adversarial knowledge discovery
-
Skillicorn DB (2009) Adversarial knowledge discovery. IEEE Intell Syst 24:54-61.
-
(2009)
IEEE Intell Syst
, vol.24
, pp. 54-61
-
-
Skillicorn, D.B.1
-
49
-
-
0036080160
-
Bagging, boosting and the random subspace method for linear classifiers
-
Skurichina M, Duin RPW (2002) Bagging, boosting and the random subspace method for linear classifiers. Pattern Anal Appl 5(2):121-135.
-
(2002)
Pattern Anal Appl
, vol.5
, Issue.2
, pp. 121-135
-
-
Skurichina, M.1
Duin, R.P.W.2
-
52
-
-
77957967781
-
An adjustable combination of linear regression and modified probabilistic neural network for antispam filtering
-
Tran T, Tsai P, Jan T (2008) An adjustable combination of linear regression and modified probabilistic neural network for antispam filtering. In: International conference on pattern recognition (ICPR08), pp 1-4.
-
(2008)
International conference on pattern recognition (ICPR08)
, pp. 1-4
-
-
Tran, T.1
Tsai, P.2
Jan, T.3
|