-
1
-
-
12244295760
-
Adversarial classification
-
N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, "Adversarial classification," in 10th ACM SIGKDD Int.'l Conf. Knowledge Discovery and Data Mining (KDD), Seattle, 2004, pp. 99-108.
-
10th ACM SIGKDD Int.'l Conf. Knowledge Discovery and Data Mining (KDD), Seattle, 2004
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
2
-
-
84904807829
-
Feature weighting for improved classifier robustness
-
A. Kolcz and C. H. Teo, "Feature weighting for improved classifier robustness," in 6th Conf. Email and Anti-Spam (CEAS), CA, USA, 2009.
-
6th Conf. Email and Anti-Spam (CEAS), CA, USA, 2009
-
-
Kolcz, A.1
Teo, C.H.2
-
3
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," J. Vis. Lang. Comput., vol. 20, no. 3, pp. 169-179, 2009.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
4
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. Joseph, and J. Tygar, "The security of machine learning," Machine Learning, vol. 81, pp. 121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
5
-
-
78049528115
-
Machine learning in adversarial environments
-
P. Laskov and R. Lippmann, "Machine learning in adversarial environments," Machine Learning, vol. 81, pp. 115-119, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 115-119
-
-
Laskov, P.1
Lippmann, R.2
-
6
-
-
33947663308
-
On attacking statistical spam filters
-
G. L. Wittel and S. F. Wu, "On attacking statistical spam filters," in 1st Conf. Email and Anti-Spam (CEAS), CA, USA, 2004.
-
1st Conf. Email and Anti-Spam (CEAS), CA, USA, 2004
-
-
Wittel, G.L.1
Wu, S.F.2
-
7
-
-
65449142381
-
Good word attacks on statistical spam filters
-
D. Lowd and C. Meek, "Good word attacks on statistical spam filters,"in 2nd Conf. Email and Anti-Spam (CEAS), CA, USA, 2005.
-
2nd Conf. Email and Anti-Spam (CEAS), CA, USA, 2005
-
-
Lowd, D.1
Meek, C.2
-
8
-
-
84856463585
-
-
TREC, E. M. Voorhees and L. P. Buckland, Eds., vol. Special Publication 500-272. NIST
-
D. Sculley, G. Wachman, and C. E. Brodley, "Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers," in TREC, E. M. Voorhees and L. P. Buckland, Eds., vol. Special Publication 500-272. NIST, 2006.
-
(2006)
Spam Filtering Using Inexact String Matching in Explicit Feature Space with On-line Linear Classifiers
-
-
Sculley, D.1
Wachman, G.2
Brodley, C.E.3
-
9
-
-
46249103547
-
A multiple instance learning strategy for combating good word attacks on spam filters
-
June
-
Z. Jorgensen, Y. Zhou, and M. Inge, "A multiple instance learning strategy for combating good word attacks on spam filters," Journal of Machine Learning Research, vol. 9, pp. 1115-1146, June 2008.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 1115-1146
-
-
Jorgensen, Z.1
Zhou, Y.2
Inge, M.3
-
10
-
-
33749242256
-
Nightmare at test time: Robust learning by feature deletion
-
ser. ACM International Conference Proceeding Series, W. W. Cohen and A. Moore, Eds., ACM
-
A. Globerson and S. T. Roweis, "Nightmare at test time: robust learning by feature deletion," in ICML, ser. ACM International Conference Proceeding Series, W. W. Cohen and A. Moore, Eds., vol. 148. ACM, 2006, pp. 353-360.
-
(2006)
ICML
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
11
-
-
85162055491
-
Convex learning with invariances,"
-
J. Platt, D. Koller, Y. Singer, and S. Roweis, Eds. Cambridge, MA: MIT Press
-
C. H. Teo, A. Globerson, S. Roweis, and A. Smola, "Convex learning with invariances," in Advances in Neural Information Processing Systems 20, J. Platt, D. Koller, Y. Singer, and S. Roweis, Eds. Cambridge, MA: MIT Press, 2008, pp. 1489-1496.
-
(2008)
Advances in Neural Information Processing Systems
, vol.20
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
-
12
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
O. Dekel, O. Shamir, and L. Xiao, "Learning to classify with missing and corrupted features," Machine Learning, vol. 81, pp. 149-178, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
13
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
B. Biggio, G. Fumera, and F. Roli, "Multiple classifier systems for robust classifier design in adversarial environments," Int.'l Journal of Machine Learning and Cybernetics, vol. 1, no. 1, pp. 27-41, 2010.
-
(2010)
Int.'l Journal of Machine Learning and Cybernetics
, vol.1
, Issue.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
14
-
-
37549016464
-
Likelihood ratiobased biometric score fusion
-
February
-
K. Nandakumar, Y. Chen, S. C. Dass, and A. Jain, "Likelihood ratiobased biometric score fusion," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 30, pp. 342-347, February 2008.
-
(2008)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.30
, pp. 342-347
-
-
Nandakumar, K.1
Chen, Y.2
Dass, S.C.3
Jain, A.4
-
15
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
vol. 0
-
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo, and A. D. Keromytis, "Casting out demons: Sanitizing training data for anomaly sensors,"Security and Privacy, IEEE Symposium on, vol. 0, pp. 81-95, 2008.
-
(2008)
Security and Privacy, IEEE Symposium on
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
16
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
ser. IMC '09. NY, USA: ACM
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, S. Rao, N. Taft, and J. D. Tygar, "Antidote: understanding and defending against poisoning of anomaly detectors," in Proc. 9th ACM SIGCOMM Internet Measurement Conf., ser. IMC '09. NY, USA: ACM, 2009, pp. 1-14.
-
(2009)
Proc. 9th ACM SIGCOMM Internet Measurement Conf.
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
17
-
-
0037753593
-
-
Ph.D. dissertation, Advanced School for Computing and Imaging (ASCI)
-
D. M. J. Tax, "One-class classification," Ph.D. dissertation, Advanced School for Computing and Imaging (ASCI), 2001.
-
(2001)
One-class Classification
-
-
Tax, D.M.J.1
-
19
-
-
0005373173
-
A bayesian approach to filtering junk e-mail
-
Madison, Wisconsin
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, "A bayesian approach to filtering junk e-mail," AAAI Technical Report WS-98-05, Madison, Wisconsin, 1998.
-
(1998)
AAAI Technical Report WS-98-05
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
20
-
-
77953056409
-
-
TREC, E. M. Voorhees and L. P. Buckland, Eds., vol. Special Publication 500-274. National Institute of Standards and Technology (NIST)
-
G. V. Cormack, "Trec 2007 spam track overview," in TREC, E. M. Voorhees and L. P. Buckland, Eds., vol. Special Publication 500-274. National Institute of Standards and Technology (NIST), 2007.
-
(2007)
Trec 2007 Spam Track Overview
-
-
Cormack, G.V.1
|