-
1
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A.D. Joseph, and JD Tygar, 'The security of machine learning', Machine Learning, 81(2), 121-148, (2010).
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
2
-
-
84867112504
-
Support vector machines under adversarial label noise
-
B. Biggio, B. Nelson, and B. Laskov, 'Support vector machines under adversarial label noise', in Proc. of 3rd ACML, pp. 97-112, (2011).
-
(2011)
Proc. of 3rd ACML
, pp. 97-112
-
-
Biggio, B.1
Nelson, B.2
Laskov, B.3
-
4
-
-
56449100938
-
Learning to classify with missing and corrupted features
-
O. Dekel and O. Shamir, 'Learning to classify with missing and corrupted features', in Proc. of 25th ICML, pp. 216-223, (2008).
-
(2008)
Proc. of 25th ICML
, pp. 216-223
-
-
Dekel, O.1
Shamir, O.2
-
5
-
-
71149089151
-
Good learners for evil teachers
-
ACM
-
O. Dekel and O. Shamir, 'Good learners for evil teachers', in Proc. of 26th ICML, pp. 233-240. ACM, (2009).
-
(2009)
Proc. of 26th ICML
, pp. 233-240
-
-
Dekel, O.1
Shamir, O.2
-
6
-
-
34250717444
-
Nightmare at test time: Robust learning by feature deletion
-
ACM
-
A. Globerson and S. Roweis, 'Nightmare at test time: robust learning by feature deletion', in Proc. of 23rd ICML, pp. 353-360. ACM, (2006).
-
(2006)
Proc. of 23rd ICML
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.2
-
7
-
-
33646761263
-
Learning in the presence of malicious errors
-
ACM
-
M. Kearns and M. Li, 'Learning in the presence of malicious errors', in Proc. of 20th STOC, pp. 267-280. ACM, (1988).
-
(1988)
Proc. of 20th STOC
, pp. 267-280
-
-
Kearns, M.1
Li, M.2
-
8
-
-
75249095624
-
Learning halfspaces with malicious noise
-
A.R. Klivans, P.M. Long, and R.A. Servedio, 'Learning halfspaces with malicious noise', JMLR, 10, 2715-2740, (2009).
-
(2009)
JMLR
, vol.10
, pp. 2715-2740
-
-
Klivans, A.R.1
Long, P.M.2
Servedio, R.A.3
-
9
-
-
32344435632
-
Adversarial learning
-
ACM
-
D. Lowd and C. Meek, 'Adversarial learning', in Proc. of 11th SIGKDD, pp. 641-647. ACM, (2005).
-
(2005)
Proc. of 11th SIGKDD
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
11
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F.J. Chi, A.D. Joseph, B.I.P. Rubinstein, U. Saini, C. Sutton, JD Tygar, and K. Xia, 'Exploiting machine learning to subvert your spam filter', in Proc. of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, p. 7, (2008).
-
(2008)
Proc. of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 7
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
12
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Springer
-
J. Newsome, B. Karp, and D. Song, 'Paragraph: Thwarting signature learning by training maliciously', in Recent Advances in Intrusion Detection, pp. 81-105. Springer, (2006).
-
(2006)
Recent Advances in Intrusion Detection
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
13
-
-
0028425698
-
Descent approaches for quadratic bilevel programming
-
L. Vicente, G. Savard, and J. Júdice, 'Descent approaches for quadratic bilevel programming', Journal of Optimization Theory and Applications, 81(2), 379-399, (1994).
-
(1994)
Journal of Optimization Theory and Applications
, vol.81
, Issue.2
, pp. 379-399
-
-
Vicente, L.1
Savard, G.2
Júdice, J.3
-
14
-
-
84861429312
-
Evasion attack of multi-class linear classifiers
-
Han Xiao, T. Stibor, and C. Eckert, 'Evasion attack of multi-class linear classifiers', in Proc. of 16th PAKDD, pp. 207-218, (2012).
-
(2012)
Proc. of 16th PAKDD
, pp. 207-218
-
-
Xiao, H.1
Stibor, T.2
Eckert, C.3
|