-
1
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
DOI 10.1145/1265530.1265569, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS'07, pages 273-282, 2007. (Pubitemid 47620902)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
2
-
-
33845989821
-
Can machine learning be secure?
-
DOI 10.1145/1128817.1128824, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In ASIACCS'06, pages 16-25, 2006. (Pubitemid 46644722)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
4
-
-
77952042088
-
Multiple classifier systems under attack
-
B. Biggio, G. Fumera, and F. Roli. Multiple classifier systems under attack. In Proc. Int. Workshop Multiple Classifier Systems, volume 5997, pages 74-83, 2010.
-
(2010)
Proc. Int. Workshop Multiple Classifier Systems
, vol.5997
, pp. 74-83
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
6
-
-
33244468835
-
Practical privacy: The SulQ framework
-
DOI 10.1145/1065167.1065184, Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In PODS'05, pages 128-138, 2005. (Pubitemid 43275476)
-
(2005)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
7
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC'08, pages 609-618, 2008.
-
(2008)
STOC'08
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
8
-
-
84858719086
-
Nash equilibria of static prediction games
-
M. Brückner and T. Scheffer. Nash equilibria of static prediction games. In NIPS, pages 171-179. 2009.
-
(2009)
NIPS
, pp. 171-179
-
-
Brückner, M.1
Scheffer, T.2
-
10
-
-
84858769465
-
Privacy-preserving logistic regression
-
K. Chaudhuri and C. Monteleoni. Privacy-preserving logistic regression. In NIPS, pages 289-296, 2009.
-
(2009)
NIPS
, pp. 289-296
-
-
Chaudhuri, K.1
Monteleoni, C.2
-
11
-
-
79955858775
-
Differentially private empirical risk minimization
-
K. Chaudhuri, C. Monteleoni, and A. D. Sarwate. Differentially private empirical risk minimization. JMLR, 12:1069-1109, 2011.
-
(2011)
JMLR
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
13
-
-
38149123929
-
Advanced allergy attacks: Does a corpus really help?
-
of LNCS
-
S. P. Chung and A. K. Mok. Advanced allergy attacks: Does a corpus really help? In RAID'07, volume 4637 of LNCS, pages 236-255, 2007.
-
(2007)
RAID'07
, vol.4637
, pp. 236-255
-
-
Chung, S.P.1
Mok, A.K.2
-
15
-
-
34248577801
-
Algorithms for Projection-Pursuit robust principal component analysis
-
DOI 10.1016/j.chemolab.2007.01.004, PII S016974390700007X
-
C. Croux, P. Filzmoser, and M. R. Oliveira. Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87(2):218-225, 2007. (Pubitemid 46755420)
-
(2007)
Chemometrics and Intelligent Laboratory Systems
, vol.87
, Issue.2
, pp. 218-225
-
-
Croux, C.1
Filzmoser, P.2
Oliveira, M.R.3
-
16
-
-
12244295760
-
Adversarial classification
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma. Adversarial classification. In KDD'04, pages 99-108, 2004. (Pubitemid 40114920)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
17
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS'03, pages 202-210, 2003.
-
(2003)
PODS'03
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
18
-
-
84883298285
-
P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users
-
Y. Duan, J. Canny, and J. Zhan. P4P: Practical large-scale privacy-preserving distributed computation robust against malicious users. In USENIX Security, pages 207-222, 2010.
-
(2010)
USENIX Security
, pp. 207-222
-
-
Duan, Y.1
Canny, J.2
Zhan, J.3
-
20
-
-
78650804208
-
A firm foundation for private data analysis
-
C. Dwork. A firm foundation for private data analysis. Comms. ACM, 54(1):86-95, 2011.
-
(2011)
Comms. ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
21
-
-
70350682013
-
Differential privacy and robust statistics
-
C. Dwork and J. Lei. Differential privacy and robust statistics. In STOC'09, pages 371-380, 2009.
-
(2009)
STOC'09
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
22
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC'06, pages 265-284, 2006. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
24
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC'09, pages 381-390, 2009.
-
(2009)
STOC'09
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
25
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
C. Dwork and S. Yekhanin. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO'08, pages 469-480, 2008.
-
(2008)
CRYPTO'08
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
26
-
-
0002294353
-
Question 14: Combining independent tests of significance
-
R. A. Fisher. Question 14: Combining independent tests of significance. American Statistician, 2(5):30-31, 1948.
-
(1948)
American Statistician
, vol.2
, Issue.5
, pp. 30-31
-
-
Fisher, R.A.1
-
27
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
P. Fogla and W. Lee. Evading network anomaly detection systems: Formal reasoning and practical techniques. In CCS'06, pages 59-68, 2006. (Pubitemid 47131356)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
28
-
-
34250717444
-
Nightmare at test time: Robust learning by feature deletion
-
A. Globerson and S. Roweis. Nightmare at test time: Robust learning by feature deletion. In ICML'06, pages 353-360, 2006.
-
(2006)
ICML'06
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.2
-
29
-
-
80955145180
-
Secure multiparty linear regression based on homomorphic encryption
-
To appear
-
R. Hall, S. Fienberg, and Y. Nardi. Secure multiparty linear regression based on homomorphic encryption. J. Official Statistics, 2011. To appear.
-
(2011)
J. Official Statistics
-
-
Hall, R.1
Fienberg, S.2
Nardi, Y.3
-
31
-
-
77954711905
-
On the geometry of differential privacy
-
M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC'10, pages 705-714, 2010.
-
(2010)
STOC'10
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
33
-
-
57949111704
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In FOCS'08, pages 531-540, 2008.
-
(2008)
FOCS'08
, pp. 531-540
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
35
-
-
80955164793
-
Online anomaly detection under adversarial impact
-
M. Kloft and P. Laskov. Online anomaly detection under adversarial impact. In AISTATS'10, 2010.
-
(2010)
AISTATS'10
-
-
Kloft, M.1
Laskov, P.2
-
36
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM'04, pages 219-230, 2004. (Pubitemid 40954882)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
37
-
-
74049158178
-
A framework for quantitative security analysis of machine learning
-
P. Laskov and M. Kloft. A framework for quantitative security analysis of machine learning. In AISec'09, pages 1-4, 2009.
-
(2009)
AISec'09
, pp. 1-4
-
-
Laskov, P.1
Kloft, M.2
-
38
-
-
77953908448
-
Fighting unicode-obfuscated spam
-
Proceedings of the Anti-Phishing Working Groups 2
-
C. Liu and S. Stamm. Fighting unicode-obfuscated spam. In Proceedings of the Anti-Phishing Working Groups 2 Annual eCrime Researchers Summit, pages 45-59, 2007.
-
(2007)
Annual ECrime Researchers Summit
, pp. 45-59
-
-
Liu, C.1
Stamm, S.2
-
40
-
-
65449142381
-
Good word attacks on statistical spam filters
-
D. Lowd and C. Meek. Good word attacks on statistical spam filters. In CEAS'05, 2005.
-
(2005)
CEAS'05
-
-
Lowd, D.1
Meek, C.2
-
41
-
-
34248181923
-
ℓ-diversity: Privacy beyond fc-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond fc-anonymity. ACM Trans. KDD, 1(1), 2007.
-
(2007)
ACM Trans. KDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
43
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the net
-
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In KDD'09, pages 627-636, 2009.
-
(2009)
KDD'09
, pp. 627-636
-
-
Mcsherry, F.1
Mironov, I.2
-
44
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS'07, pages 94-103, 2007.
-
(2007)
FOCS'07
, pp. 94-103
-
-
Mcsherry, F.1
Talwar, K.2
-
45
-
-
13944276290
-
SpamBayes: Effective open-source, Bayesian based, email classification system
-
T. A. Meyer and B. Whateley. SpamBayes: Effective open-source, Bayesian based, email classification system. In CEAS'0Jh 2004.
-
(2004)
CEAS'0Jh
-
-
Meyer, T.A.1
Whateley, B.2
-
47
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. Exploiting machine learning to subvert your spam filter. In LEET'08, pages 1-9, 2008.
-
(2008)
LEET'08
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
48
-
-
78549280763
-
Misleading learners: Co-opting your spam filter
-
J. J. P. Tsai and P. S. Yu, editors Springer
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia. Misleading learners: Co-opting your spam filter. In J. J. P. Tsai and P. S. Yu, editors, Machine Learning in Cyber Trust: Security, Privacy, Reliability, pages 17-51. Springer, 2009.
-
(2009)
Machine Learning in Cyber Trust: Security, Privacy, Reliability
, pp. 17-51
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
50
-
-
80955172235
-
Near-optimal evasion of convex-inducing classifiers
-
B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, S. hon Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. Near-optimal evasion of convex-inducing classifiers. In AISTATS, 2010.
-
(2010)
AISTATS
-
-
Nelson, B.1
Rubinstein, B.I.P.2
Huang, L.3
Joseph, A.D.4
Hon Lau, S.5
Lee, S.6
Rao, S.7
Tran, A.8
Tygar, J.D.9
-
51
-
-
80955145163
-
Classifier evasion: Models and open problems (position paper)
-
B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, and J. D. Tygar. Classifier evasion: Models and open problems (position paper). In Proc. Workshop on Privacy & Security issues in Data Mining and Machine Learning, 2010.
-
(2010)
Proc. Workshop on Privacy & Security Issues in Data Mining and Machine Learning
-
-
Nelson, B.1
Rubinstein, B.I.P.2
Huang, L.3
Joseph, A.D.4
Tygar, J.D.5
-
52
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In RAID, volume 4219 of LNCS, pages 81-105, 2006. (Pubitemid 44617848)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
53
-
-
84898063255
-
Learning convex bodies is hard
-
L. Rademacher and N. Goyal. Learning convex bodies is hard. In COLT, pages 303-308, 2009.
-
(2009)
COLT
, pp. 303-308
-
-
Rademacher, L.1
Goyal, N.2
-
54
-
-
36349029177
-
Sensitivity of PCA for traffic anomaly detection
-
DOI 10.1145/1269899.1254895, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
H. Ringberg, A. Soule, J. Rexford, and C. Diot. Sensitivity of PCA for traffic anomaly detection. In SIGMETRICS, pages 109-120, 2007. (Pubitemid 350158077)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
55
-
-
1542634595
-
A statistical approach to the spam problem
-
Mar.
-
G. Robinson. A statistical approach to the spam problem. Linux Journal, Mar. 2003.
-
(2003)
Linux Journal
-
-
Robinson, G.1
-
57
-
-
84877775237
-
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
-
A. Feldmann and L. Mathy, editors New York, NY, USA, November ACM
-
B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. hon Lau, S. Rao, N. Taft, and J. D. Tygar. ANTIDOTE: Understanding and defending against poisoning of anomaly detectors. In A. Feldmann and L. Mathy, editors, IMC'09, pages 1-14, New York, NY, USA, November 2009. ACM.
-
(2009)
IMC'09
, pp. 1-14
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Hon Lau, S.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
58
-
-
84856463585
-
Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers
-
D. Sculley, G. M. Wachman, and C. E. Brodley. Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers. In TREC'06, 2006.
-
(2006)
TREC'06
-
-
Sculley, D.1
Wachman, G.M.2
Brodley, C.E.3
-
59
-
-
79959714549
-
Privacy-preserving statistical estimation with optimal convergence rates
-
A. Smith. Privacy-preserving statistical estimation with optimal convergence rates. In STOC2011, pages 813-822, 2011.
-
(2011)
STOC2011
, pp. 813-822
-
-
Smith, A.1
-
60
-
-
20444503956
-
Detecting viral propagations using email behavior profiles
-
May
-
S. J. Stolfo, W. jen Li, S. Hershkop, K. Wang, C. wei Hu, and O. Nimeskern. Detecting viral propagations using email behavior profiles. In ACM Trans. Internet Technology, May 2004.
-
(2004)
ACM Trans. Internet Technology
-
-
Stolfo, S.J.1
Jen Li, W.2
Hershkop, S.3
Wang, K.4
Wei Hu, C.5
Nimeskern, O.6
-
62
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
of LNCS
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In RAID'02, volume 2516 of LNCS, pages 54-73, 2002.
-
(2002)
RAID'02
, vol.2516
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
63
-
-
85180803572
-
Limits of learning-based signature generation with adversaries
-
S. Venkataraman, A. Blum, and D. Song. Limits of learning-based signature generation with adversaries. In NDSS'08, 2008.
-
(2008)
NDSS'08
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
-
64
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
D. Wagner and P. Soto. Mimicry attacks on host-based intrusion detection systems. In CCS'02, pages 255-264, 2002.
-
(2002)
CCS'02
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
65
-
-
33947663308
-
On attacking statistical spam filters
-
G. L. Wittel and S. F. Wu. On attacking statistical spam filters. In CEAS'Oi, 2004.
-
(2004)
CEAS'Oi
-
-
Wittel, G.L.1
Wu, S.F.2
|