메뉴 건너뛰기




Volumn , Issue , 2013, Pages 87-97

Is data clustering in adversarial settings secure?

Author keywords

adversarial learning; clustering; computer security; malware detection; security evaluation; unsupervised learning

Indexed keywords

ADVERSARIAL LEARNING; CLUSTERING; CLUSTERING PROCESS; HANDWRITTEN DIGIT; HIER-ARCHICAL CLUSTERING; MALWARE DETECTION; SECURITY APPLICATION; SECURITY EVALUATION;

EID: 84888997884     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517312.2517321     Document Type: Conference Paper
Times cited : (134)

References (30)
  • 2
    • 84889068480 scopus 로고    scopus 로고
    • Project Malfease
    • Project Malfease. http://malfease.oarci.net.
  • 7
    • 84867136631 scopus 로고    scopus 로고
    • Poisoning attacks against support vector machines
    • J. Langford and J. Pineau, editors, Omnipress
    • B. Biggio, B. Nelson, and P. Laskov. Poisoning attacks against support vector machines. In J. Langford and J. Pineau, editors, 29th Int'l Conf. on Machine Learning. Omnipress, 2012.
    • (2012) 29th Int'l Conf. on Machine Learning
    • Biggio, B.1    Nelson, B.2    Laskov, P.3
  • 8
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • M. Brückner, C. Kanzow, and T. Scheffer. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617-2654, 2012.
    • (2012) J. Mach. Learn. Res. , vol.13 , pp. 2617-2654
    • Brückner, M.1    Kanzow, C.2    Scheffer, T.3
  • 13
    • 84897500325 scopus 로고    scopus 로고
    • Bayesian games for adversarial regression problems
    • Proc. 30th Int'l Conf. on Machine Learning (ICML)
    • M. Großhans, C. Sawade, M. Brückner, and T. Scheffer. Bayesian games for adversarial regression problems. In J. Mach. Learn. Res. - Proc. 30th Int'l Conf. on Machine Learning (ICML), volume 28, 2013.
    • (2013) J. Mach. Learn. Res. , vol.28
    • Großhans, M.1    Sawade, C.2    Brückner, M.3    Scheffer, T.4
  • 23
    • 84875216992 scopus 로고    scopus 로고
    • Scalable fine-grained behavioral clustering of http-based malware
    • R. Perdisci, D. Ariu, and G. Giacinto. Scalable fine-grained behavioral clustering of http-based malware. Computer Networks, 57(2):487-500, 2013.
    • (2013) Computer Networks , vol.57 , Issue.2 , pp. 487-500
    • Perdisci, R.1    Ariu, D.2    Giacinto, G.3
  • 24
    • 84864753059 scopus 로고    scopus 로고
    • Early detection of malicious flux networks via large-scale passive DNS traffic analysis
    • R. Perdisci, I. Corona, and G. Giacinto. Early detection of malicious flux networks via large-scale passive DNS traffic analysis. IEEE Trans. on Dependable and Secure Comp., 9(5):714-726, 2012.
    • (2012) IEEE Trans. on Dependable and Secure Comp. , vol.9 , Issue.5 , pp. 714-726
    • Perdisci, R.1    Corona, I.2    Giacinto, G.3
  • 26
    • 0000470917 scopus 로고
    • Cluster analysis in marketing research: Review and suggestions for application
    • May
    • G. Punj and D. W. Stewart. Cluster analysis in marketing research: Review and suggestions for application. J. Marketing Res., 20(2):134, May 1983.
    • (1983) J. Marketing Res. , vol.20 , Issue.2 , pp. 134
    • Punj, G.1    Stewart, D.W.2
  • 27
    • 77954868784 scopus 로고    scopus 로고
    • Adversarial knowledge discovery
    • D. B. Skillicorn. Adversarial knowledge discovery. IEEE Intelligent Systems, 24:54-61, 2009.
    • (2009) IEEE Intelligent Systems , vol.24 , pp. 54-61
    • Skillicorn, D.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.