-
1
-
-
33845989821
-
Can machine learning be secure?
-
Barreno, Marco, Nelson, Blaine, Sears, Russell, Joseph, Anthony D., and Tygar, J. D. Can machine learning be secure? In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 16-25, 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
2
-
-
78049530550
-
The security of machine learning
-
November
-
Barreno, Marco, Nelson, Blaine, Joseph, Anthony D., and Tygar, J. D. The security of machine learning. Machine Learning, 81(2):121-148, November 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
3
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
Biggio, Battista, Fumera, Giorgio, and Roli, Fabio. Multiple classifier systems for robust classifier design in adversarial environments. International Journal of Machine Learning and Cybernetics, 1(1):27-41, 2010.
-
(2010)
International Journal of Machine Learning and Cybernetics
, vol.1
, Issue.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
4
-
-
0042421807
-
Statistical fraud detection: A review
-
Bolton, Richard J. and Hand, David J. Statistical fraud detection: A review. Journal of Statistical Science, 17(3):235-255, 2002.
-
(2002)
Journal of Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
6
-
-
80052866161
-
Incremental and decremental support vector machine learning
-
Leen, T.K., Diettrich, T.G., and Tresp, V. (eds.)
-
Cauwenberghs, Gert and Poggio, Tomaso. Incremental and decremental support vector machine learning. In Leen, T.K., Diettrich, T.G., and Tresp, V. (eds.), Advances in Neural Information Processing Systems 13, pp. 409-415, 2001.
-
(2001)
Advances in Neural Information Processing Systems
, vol.13
, pp. 409-415
-
-
Cauwenberghs, G.1
Poggio, T.2
-
7
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
Cova, M., Kruegel, C., and Vigna, G. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In International Conference on World Wide Web (WWW), pp. 281-290, 2010.
-
(2010)
International Conference on World Wide Web (WWW)
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
8
-
-
85076498355
-
ZOZ-ZLE: Fast and precise in-browser JavaScript malware detection
-
Curtsinger, C., Livshits, B., Zorn, B., and Seifert, C. ZOZ-ZLE: Fast and precise in-browser JavaScript malware detection. In USENIX Security Symposium, pp. 33-48, 2011.
-
(2011)
USENIX Security Symposium
, pp. 33-48
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
9
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
Dekel, O., Shamir, O., and Xiao, L. Learning to classify with missing and corrupted features. Machine Learning, 81(2):149-178, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
10
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, Stephanie, Hofmeyr, Steven A., Somayaji, Anil, and Longstaff, Thomas A. A sense of self for unix processes. In Proceedings of the LEEE Symposium on Security and Privacy, pp. 120-128, 1996.
-
(1996)
Proceedings of the LEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
0002331173
-
Comparison of learning algorithms for handwritten digit recognition
-
LeCun, Y., Jackel, L., Bottou, L., Brunot, A., Cortes, C., Denker, J., Drucker, H., Guyon, I., Müller, U., Säckinger, E., Simard, P., and Vapnik, V. Comparison of learning algorithms for handwritten digit recognition. In Int'l Conf. on Artificial Neural Networks, pp. 53-60, 1995.
-
(1995)
Int'l Conf. on Artificial Neural Networks
, pp. 53-60
-
-
LeCun, Y.1
Jackel, L.2
Bottou, L.3
Brunot, A.4
Cortes, C.5
Denker, J.6
Drucker, H.7
Guyon, I.8
Müller, U.9
Säckinger, E.10
Simard, P.11
Vapnik, V.12
-
16
-
-
13944276290
-
SpamBayes: Effective open-source, Bayesian based, email classification system
-
Meyer, Tony A. and Whateley, Brendon. SpamBayes: Effective open-source, Bayesian based, email classification system. In Proceedings of the Conference on Email and Anti-Spam (CEAS), July 2004.
-
Proceedings of the Conference on Email and Anti-Spam (CEAS), July 2004
-
-
Meyer, T.A.1
Whateley, B.2
-
17
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Nelson, Blaine, Barreno, Marco, Chi, Fuching Jack, Joseph, Anthony D., Rubinstein, Benjamin I. P., Saini, Udam, Sutton, Charles, Tygar, J. D., and Xia, Kai. Exploiting machine learning to subvert your spam filter. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), pp. 1-9, 2008.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
18
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
Rieck, K., Krüger, T., and Dewald, A. Cujo: Efficient detection and prevention of drive-by-download attacks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 31-39, 2010.
-
(2010)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 31-39
-
-
Rieck, K.1
Krüger, T.2
Dewald, A.3
-
19
-
-
84877775237
-
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
-
Rubinstein, Benjamin I. P., Nelson, Blaine, Huang, Ling, Joseph, Anthony D., hon Lau, Shing, Rao, Satish, Taft, Nina, and Tygar, J. D. ANTIDOTE: Understanding and defending against poisoning of anomaly detectors. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (IMC), pp. 1-14, 2009.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (IMC)
, pp. 1-14
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Hon Lau, S.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
20
-
-
67650697862
-
A behavior-based approach to securing email systems
-
Springer- Verlag
-
Stolfo, Salvatore J., Hershkop, Shlomo, Wang, Ke, Nimeskern, Olivier, and Hu, Chia-Wei. A behavior-based approach to securing email systems. In Mathematical Methods, Models and Architectures for Computer Networks Security. Springer-Verlag, 2003.
-
(2003)
Mathematical Methods, Models and Architectures for Computer Networks Security
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
21
-
-
85162055491
-
Convex learning with invariances
-
Teo, C.H., Globerson, A., Roweis, S., and Smola, A. Convex learning with invariances. In Advances in Neural Information Proccessing Systems (NIPS), pp. 1489-1496, 2008.
-
(2008)
Advances in Neural Information Proccessing Systems (NIPS)
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
|