-
2
-
-
84889068480
-
-
Project Malfease
-
Project Malfease. http://malfease.oarci.net.
-
-
-
-
3
-
-
33845989821
-
Can machine learning be secure?
-
NY, USA, ACM
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In ASIACCS '06: Proc. 2006 ACM Symposium on Information, Computer and Communications Security, pages 16-25, NY, USA, 2006. ACM.
-
(2006)
ASIACCS '06: Proc. 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
4
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
The Internet Society
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Krügel, and E. Kirda. Scalable, behavior-based malware clustering. In NDSS. The Internet Society, 2009.
-
(2009)
NDSS
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Krügel, C.4
Kirda, E.5
-
5
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
B. Biggio, G. Fumera, and F. Roli. Design of robust classifiers for adversarial environments. In IEEE Int'l Conf. on Systems, Man, and Cybernetics (SMC), pages 977-982, 2011.
-
(2011)
IEEE Int'l Conf. on Systems, Man, and Cybernetics (SMC)
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
7
-
-
84867136631
-
Poisoning attacks against support vector machines
-
J. Langford and J. Pineau, editors, Omnipress
-
B. Biggio, B. Nelson, and P. Laskov. Poisoning attacks against support vector machines. In J. Langford and J. Pineau, editors, 29th Int'l Conf. on Machine Learning. Omnipress, 2012.
-
(2012)
29th Int'l Conf. on Machine Learning
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
8
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
M. Brückner, C. Kanzow, and T. Scheffer. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617-2654, 2012.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
9
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for android
-
NY, USA, ACM
-
I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In Proc. 1st ACM workshop on Security and Privacy in Smartphones and Mobile devices, SPSM '11, pages 15-26, NY, USA, 2011. ACM.
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Nadjm-Tehrani, S.3
-
13
-
-
84897500325
-
Bayesian games for adversarial regression problems
-
Proc. 30th Int'l Conf. on Machine Learning (ICML)
-
M. Großhans, C. Sawade, M. Brückner, and T. Scheffer. Bayesian games for adversarial regression problems. In J. Mach. Learn. Res. - Proc. 30th Int'l Conf. on Machine Learning (ICML), volume 28, 2013.
-
(2013)
J. Mach. Learn. Res.
, vol.28
-
-
Großhans, M.1
Sawade, C.2
Brückner, M.3
Scheffer, T.4
-
14
-
-
84866039328
-
Discriminative clustering for market segmentation
-
NY, USA, ACM
-
P. Haider, L. Chiarandini, and U. Brefeld. Discriminative clustering for market segmentation. In Proc. 18th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, KDD '12, pages 417-425, NY, USA, 2012. ACM.
-
(2012)
Proc. 18th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, KDD '12
, pp. 417-425
-
-
Haider, P.1
Chiarandini, L.2
Brefeld, U.3
-
15
-
-
0035676057
-
On clustering validation techniques
-
Dec.
-
M. Halkidi, Y. Batistakis, and M. Vazirgiannis. On clustering validation techniques. Journal of Intelligent Information Systems, 17(2-3):107-145, Dec. 2001.
-
(2001)
Journal of Intelligent Information Systems
, vol.17
, Issue.2-3
, pp. 107-145
-
-
Halkidi, M.1
Batistakis, Y.2
Vazirgiannis, M.3
-
16
-
-
84875649563
-
Juxtapp: A scalable system for detecting code reuse among android applications
-
Berlin, Heidelberg, Springer-Verlag
-
S. Hanna, L. Huang, E. Wu, S. Li, C. Chen, and D. Song. Juxtapp: a scalable system for detecting code reuse among android applications. In Proc. 9th Int'l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12, pages 62-81, Berlin, Heidelberg, 2013. Springer-Verlag.
-
(2013)
Proc. 9th Int'l Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'12
, pp. 62-81
-
-
Hanna, S.1
Huang, L.2
Wu, E.3
Li, S.4
Chen, C.5
Song, D.6
-
17
-
-
80955143573
-
Adversarial machine learning
-
Chicago, IL, USA
-
L. Huang, A. D. Joseph, B. Nelson, B. Rubinstein, and J. D. Tygar. Adversarial machine learning. In 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), pages 43-57, Chicago, IL, USA, 2011.
-
(2011)
4th ACM Workshop on Artificial Intelligence and Security (AISec 2011)
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
21
-
-
0002331173
-
Comparison of learning algorithms for handwritten digit recognition
-
Y. LeCun, L. Jackel, L. Bottou, A. Brunot, C. Cortes, J. Denker, H. Drucker, I. Guyon, U. Müller, E. Säckinger, P. Simard, and V. Vapnik. Comparison of learning algorithms for handwritten digit recognition. In Int'l Conf. on Artificial Neural Networks, pages 53-60, 1995.
-
(1995)
Int'l Conf. on Artificial Neural Networks
, pp. 53-60
-
-
LeCun, Y.1
Jackel, L.2
Bottou, L.3
Brunot, A.4
Cortes, C.5
Denker, J.6
Drucker, H.7
Guyon, I.8
Müller, U.9
Säckinger, E.10
Simard, P.11
Vapnik, V.12
-
23
-
-
84875216992
-
Scalable fine-grained behavioral clustering of http-based malware
-
R. Perdisci, D. Ariu, and G. Giacinto. Scalable fine-grained behavioral clustering of http-based malware. Computer Networks, 57(2):487-500, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.2
, pp. 487-500
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, G.3
-
24
-
-
84864753059
-
Early detection of malicious flux networks via large-scale passive DNS traffic analysis
-
R. Perdisci, I. Corona, and G. Giacinto. Early detection of malicious flux networks via large-scale passive DNS traffic analysis. IEEE Trans. on Dependable and Secure Comp., 9(5):714-726, 2012.
-
(2012)
IEEE Trans. on Dependable and Secure Comp.
, vol.9
, Issue.5
, pp. 714-726
-
-
Perdisci, R.1
Corona, I.2
Giacinto, G.3
-
25
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
March
-
F. Pouget, M. Dacier, J. Zimmerman, A. Clark, and G. Mohay. Internet attack knowledge discovery via clusters and cliques of attack traces. J. Information Assurance and Security, Vol. 1, Issue 1, March 2006.
-
(2006)
J. Information Assurance and Security
, vol.1
, Issue.1
-
-
Pouget, F.1
Dacier, M.2
Zimmerman, J.3
Clark, A.4
Mohay, G.5
-
26
-
-
0000470917
-
Cluster analysis in marketing research: Review and suggestions for application
-
May
-
G. Punj and D. W. Stewart. Cluster analysis in marketing research: Review and suggestions for application. J. Marketing Res., 20(2):134, May 1983.
-
(1983)
J. Marketing Res.
, vol.20
, Issue.2
, pp. 134
-
-
Punj, G.1
Stewart, D.W.2
-
27
-
-
77954868784
-
Adversarial knowledge discovery
-
D. B. Skillicorn. Adversarial knowledge discovery. IEEE Intelligent Systems, 24:54-61, 2009.
-
(2009)
IEEE Intelligent Systems
, vol.24
, pp. 54-61
-
-
Skillicorn, D.B.1
-
30
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
NY, USA, ACM
-
T. Zhang, R. Ramakrishnan, and M. Livny. Birch: an efficient data clustering method for very large databases. In Proc. 1996 ACM SIGMOD Int'l Conf. on Management of data, SIGMOD '96, pages 103-114, NY, USA, 1996. ACM.
-
(1996)
Proc. 1996 ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD '96
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
|