-
1
-
-
33745518484
-
-
sixth edn. version 1.7
-
Adobe: PDF Reference, sixth edn. version 1.7
-
Adobe: PDF Reference
-
-
-
2
-
-
33845989821
-
Can machine learning be secure?
-
ACM, New York
-
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS 2006: Proc. of the 2006 ACM Symp. on Information, Computer and Comm. Security, pp. 16-25. ACM, New York (2006)
-
(2006)
ASIACCS 2006: Proc. of the 2006 ACM Symp. on Information, Computer and Comm. Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
Biggio, B., Fumera, G., Roli, F.: Multiple classifier systems for robust classifier design in adversarial environments. Int'l J. of Machine Learning and Cybernetics 1(1), 27-41 (2010)
-
(2010)
Int'l J. of Machine Learning and Cybernetics
, vol.1
, Issue.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
4
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
Biggio, B., Fumera, G., Roli, F.: Design of robust classifiers for adversarial environments. In: IEEE Int'l Conf. on Systems, Man, and Cybernetics (SMC), pp. 977-982 (2011)
-
(2011)
IEEE Int'l Conf. on Systems, Man, and Cybernetics (SMC)
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
5
-
-
84886467730
-
Security evaluation of pattern classifiers under attack
-
PrePrints
-
Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. on Knowl. and Data Eng. 99(PrePrints), 1 (2013)
-
(2013)
IEEE Trans. on Knowl. and Data Eng.
, vol.99
, pp. 1
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
6
-
-
84867136631
-
Poisoning attacks against support vector machines
-
Langford, J., Pineau, J. (eds.)
-
Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. In: Langford, J., Pineau, J. (eds.) 29th Int'l Conf. on Mach. Learn. (2012)
-
29th Int'l Conf. on Mach. Learn. (2012)
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
8
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
Brückner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13, 2617-2654 (2012)
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
9
-
-
12244295760
-
Adversarial classification
-
Dalvi, N., Domingos, P., Mausam, S.S., Verma, D.: Adversarial classification. In: 10th ACM SIGKDD Int'l Conf. on Knowl. Discovery and Data Mining (KDD), pp. 99-108 (2004)
-
(2004)
10th ACM SIGKDD Int'l Conf. on Knowl. Discovery and Data Mining (KDD)
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam, S.S.3
Verma, D.4
-
10
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
Dekel, O., Shamir, O., Xiao, L.: Learning to classify with missing and corrupted features. Mach. Learn. 81, 149-178 (2010)
-
(2010)
Mach. Learn.
, vol.81
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
11
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O., Lee, W.: Polymorphic blending attacks. In: Proc. 15th Conf. on USENIX Sec. Symp. USENIX Association, CA (2006)
-
Proc. 15th Conf. on USENIX Sec. Symp. USENIX Association, CA (2006)
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
12
-
-
33749242256
-
Nightmare at test time: Robust learning by feature deletion
-
Cohen, W.W., Moore, A. (eds.) ACM
-
Globerson, A., Roweis, S.T.: Nightmare at test time: robust learning by feature deletion. In: Cohen, W.W., Moore, A. (eds.) Proc. of the 23rd Int'l Conf. on Mach. Learn., vol. 148, pp. 353-360. ACM (2006)
-
(2006)
Proc. of the 23rd Int'l Conf. on Mach. Learn.
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
13
-
-
2442643467
-
Discriminative direction for kernel classifiers
-
Golland, P.: Discriminative direction for kernel classifiers. In: Neu. Inf. Proc. Syst (NIPS), pp. 745-752 (2002)
-
(2002)
Neu. Inf. Proc. Syst (NIPS)
, pp. 745-752
-
-
Golland, P.1
-
14
-
-
80955143573
-
Adversarial machine learning
-
Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: 4th ACM Workshop on Art. Int. and Sec (AISec 2011), Chicago, IL, USA, pp. 43-57 (2011)
-
(2011)
4th ACM Workshop on Art. Int. and Sec (AISec 2011), Chicago, IL, USA
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
16
-
-
84904807829
-
Feature weighting for improved classifier robustness
-
Kolcz, A., Teo, C.H.: Feature weighting for improved classifier robustness. In: Sixth Conf. on Email and Anti-Spam (CEAS), Mountain View, CA, USA (2009)
-
Sixth Conf. on Email and Anti-Spam (CEAS), Mountain View, CA, USA (2009)
-
-
Kolcz, A.1
Teo, C.H.2
-
18
-
-
0002331173
-
Comparison of learning algorithms for handwritten digit recognition
-
LeCun, Y., Jackel, L., Bottou, L., Brunot, A., Cortes, C., Denker, J., Drucker, H., Guyon, I., Müller, U., Säckinger, E., Simard, P., Vapnik, V.: Comparison of learning algorithms for handwritten digit recognition. In: Int'l Conf. on Art. Neu. Net., pp. 53-60 (1995)
-
(1995)
Int'l Conf. on Art. Neu. Net.
, pp. 53-60
-
-
LeCun, Y.1
Jackel, L.2
Bottou, L.3
Brunot, A.4
Cortes, C.5
Denker, J.6
Drucker, H.7
Guyon, I.8
Müller, U.9
Säckinger, E.10
Simard, P.11
Vapnik, V.12
-
19
-
-
32344435632
-
Adversarial learning
-
Press, A. (ed.)
-
Lowd, D., Meek, C.: Adversarial learning. In: Press, A. (ed.) Proc. of the Eleventh ACM SIGKDD Int'l Conf. on Knowl. Disc. and D. Mining (KDD), Chicago, IL, pp. 641-647 (2005)
-
(2005)
Proc. of the Eleventh ACM SIGKDD Int'l Conf. on Knowl. Disc. and D. Mining (KDD), Chicago, IL
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
20
-
-
84864937789
-
A pattern recognition system for malicious pdf files detection
-
Maiorca, D., Giacinto, G., Corona, I.: A pattern recognition system for malicious pdf files detection. In: MLDM, pp. 510-524 (2012)
-
(2012)
MLDM
, pp. 510-524
-
-
Maiorca, D.1
Giacinto, G.2
Corona, I.3
-
21
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
USENIX Association, Berkeley
-
Nelson, B., Barreno, M., Chi, F.J., Joseph, A.D., Rubinstein, B.I.P., Saini, U., Sutton, C., Tygar, J.D., Xia, K.: Exploiting machine learning to subvert your spam filter. In: LEET 2008: Proc. of the 1st USENIX Work. on L.-S. Exp. and Emerg. Threats, pp. 1-9. USENIX Association, Berkeley (2008)
-
(2008)
LEET 2008: Proc. of the 1st USENIX Work. on L.-S. Exp. and Emerg. Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
22
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
Nelson, B., Rubinstein, B.I., Huang, L., Joseph, A.D., Lee, S.J., Rao, S., Tygar, J.D.: Query strategies for evading convex-inducing classifiers. J. Mach. Learn. Res. 13, 1293-1332 (2012)
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.I.2
Huang, L.3
Joseph, A.D.4
Lee, S.J.5
Rao, S.6
Tygar, J.D.7
-
23
-
-
0003243224
-
Probabilistic outputs for support vector machines and comparison to regularized likelihood methods
-
Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D. (eds.)
-
Platt, J.: Probabilistic outputs for support vector machines and comparison to regularized likelihood methods. In: Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D. (eds.) Adv. in L. M. Class, pp. 61-74 (2000)
-
(2000)
Adv. in L. M. Class
, pp. 61-74
-
-
Platt, J.1
|