메뉴 건너뛰기




Volumn 9783319023007, Issue , 2014, Pages 105-153

Security evaluation of support vector machines in adversarial environments

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; LEARNING ALGORITHMS; MALWARE; OPEN SOURCE SOFTWARE; OPEN SYSTEMS;

EID: 84927956444     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-319-02300-7_4     Document Type: Chapter
Times cited : (119)

References (68)
  • 1
    • 85192419764 scopus 로고    scopus 로고
    • Adobe Systems Incorporated:PDF Reference, sixth edition, Adobe Portable Document Format, Version 1.7, November
    • Adobe Systems Incorporated: PDF Reference, sixth edition, Adobe Portable Document Format, Version 1.7, November 2006
    • (2006)
  • 4
    • 78049530550 scopus 로고    scopus 로고
    • The security of machine learning
    • Barreno, M., Nelson, B., Joseph, A., Tygar, J.: The security of machine learning. Mach. Learn. 81, 121-148 (2010). doi:10.1007/s10994-010-5188-5
    • (2010) Mach. Learn. , vol.81 , pp. 121-148
    • Barreno, M.1    Nelson, B.2    Joseph, A.3    Tygar, J.4
  • 10
    • 79956346771 scopus 로고    scopus 로고
    • A survey and experimental evaluation of image spam filtering techniques
    • Biggio, B., Fumera, G., Pillai, I., Roli, F.: A survey and experimental evaluation of image spam filtering techniques. Pattern Recogn. Lett. 32(10), 1436-1446 (2011)
    • (2011) Pattern Recogn. Lett , vol.32 , Issue.10 , pp. 1436-1446
    • Biggio, B.1    Fumera, G.2    Pillai, I.3    Roli, F.4
  • 12
    • 84886467730 scopus 로고    scopus 로고
    • Security evaluation of pattern classifiers under attack
    • Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. Data Eng. 99, 1 (2013)
    • (2013) IEEE Trans. Knowl. Data Eng , vol.99 , pp. 1
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 16
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123-140 (1996)
    • (1996) Mach. Learn. , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 17
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • Brückner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13, 2617-2654 (2012)
    • (2012) J. Mach. Learn. Res. , vol.13 , pp. 2617-2654
    • Brückner, M.1    Kanzow, C.2    Scheffer, T.3
  • 19
    • 84869483719 scopus 로고    scopus 로고
    • The 5th acm workshop on artificial intelligence and security (aisec)
    • New York
    • Cárdenas, A.A., Nelson, B., Rubinstein, B.I. (eds.): The 5th ACM Workshop on Artificial Intelligence and Security (AISec). ACM, New York (2012)
    • (2012) ACM
    • Cárdenas, A.A.1    Nelson, B.2    Rubinstein, B.I.3
  • 20
    • 0003238552 scopus 로고    scopus 로고
    • Incremental and decremental support vector machine learning
    • Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) MIT Press,Cambridge
    • Cauwenberghs, G., Poggio, T.: Incremental and decremental support vector machine learning. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) NIPS, pp. 409-415. MIT Press, Cambridge (2000)
    • (2000) NIPS , pp. 409-415
    • Cauwenberghs, G.1    Poggio, T.2
  • 23
    • 18244390064 scopus 로고    scopus 로고
    • On robust properties of convex risk minimization methods for pattern recognition
    • Christmann, A., Steinwart, I.: On robust properties of convex risk minimization methods for pattern recognition. J. Mach. Learn. Res. 5, 1007-1034 (2004)
    • (2004) J. Mach. Learn. Res , vol.5 , pp. 1007-1034
    • Christmann, A.1    Steinwart, I.2
  • 25
    • 34249753618 scopus 로고
    • Support-vector networks
    • Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273-297 (1995)
    • (1995) Mach. Learn. , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 28
    • 0032594950 scopus 로고    scopus 로고
    • Support vector machines for spam categorization
    • Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048-1054 (1999)
    • (1999) IEEE Trans. Neural Netw. , vol.10 , Issue.5 , pp. 1048-1054
    • Drucker Wu H, D.1    Vapnik, V.N.2
  • 33
    • 2442643467 scopus 로고    scopus 로고
    • Discriminative direction for kernel classifiers
    • MIT Press,Cambridge
    • Golland, P.: Discriminative direction for kernel classifiers. In: Neural Information Processing Systems (NIPS), pp. 745-752. MIT Press, Cambridge (2002)
    • (2002) Neural Information Processing Systems (NIPS) , pp. 745-752
    • Golland, P.1
  • 37
    • 85192427248 scopus 로고    scopus 로고
    • Dagstuhl perspectives workshop on machine learning methods for computer security
    • 12371
    • Joseph, A.D., Laskov, P., Roli, F., Tygar, D. (eds.): Dagstuhl Perspectives Workshop on Machine Learning Methods for Computer Security. Workshop 12371 (2012)
    • (2012) Workshop
    • Joseph, A.D.1    Laskov, P.2    Roli, F.3    Tygar, D.4
  • 40
    • 84873445143 scopus 로고    scopus 로고
    • Security analysis of online centroid anomaly detection
    • Kloft, M., Laskov, P.: Security analysis of online centroid anomaly detection. J. Mach. Learn. Res. 13, 3647-3690 (2012)
    • (2012) J. Mach. Learn. Res , vol.13 , pp. 3647-3690
    • Kloft, M.1    Laskov, P.2
  • 44
    • 78049528115 scopus 로고    scopus 로고
    • Machine learning in adversarial environments
    • Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Mach. Learn. 81, 115-119 (2010)
    • (2010) Mach. Learn. , vol.81 , pp. 115-119
    • Laskov, P.1    Lippmann, R.2
  • 50
    • 84864937789 scopus 로고    scopus 로고
    • A pattern recognition system for malicious PDF files detection
    • Springer,Berlin
    • Maiorca, D., Giacinto, G., Corona, I.: A pattern recognition system for malicious PDF files detection. In: MLDM, pp. 510-524. Springer, Berlin (2012)
    • (2012) MLDM , pp. 510-524
    • Maiorca, D.1    Giacinto, G.2    Corona, I.3
  • 56
    • 0003243224 scopus 로고    scopus 로고
    • Probabilistic outputs for support vector machines and comparison to regularized likelihood methods
    • MIT Press, Cambridge
    • Platt, J.: Probabilistic outputs for support vector machines and comparison to regularized likelihood methods. In: Advances in Large Margin Classifiers, pp. 61-74. MIT Press, Cambridge (2000)
    • (2000) Advances in Large Margin Classifiers , pp. 61-74
    • Platt, J.1
  • 57
    • 70350052805 scopus 로고    scopus 로고
    • What-if analysis
    • Springer,New York
    • Rizzi, S.: What-if analysis. In: Encyclopedia of Database Systems, pp. 3525-3529. Springer, New York (2009)
    • (2009) Encyclopedia of Database Systems , pp. 3525-3529
    • Rizzi, S.1
  • 58
    • 67349227385 scopus 로고    scopus 로고
    • Robustness of multimodal biometric fusion methods against spoof attacks
    • Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric fusion methods against spoof attacks. J. Vis. Lang. Comput. 20(3), 169-179 (2009)
    • (2009) J. Vis. Lang. Comput. , vol.20 , Issue.3 , pp. 169-179
    • Rodrigues, R.N.1    Ling, L.L.2    Govindaraju, V.3
  • 60
    • 84877781092 scopus 로고    scopus 로고
    • Learning in a large function space: Privacy-preserving mechanisms for SVM learning
    • Rubinstein, B.I.P., Bartlett, P.L., Huang, L., Taft, N.: Learning in a large function space: privacy-preserving mechanisms for SVM learning. J. Privacy Confidentiality 4(1), 65-100 (2012)
    • (2012) J. Privacy Confidentiality , vol.4 , Issue.1 , pp. 65-100
    • Rubinstein, B.I.P.1    Bartlett, P.L.2    Huang, L.3    Taft, N.4
  • 65
    • 0036811662 scopus 로고    scopus 로고
    • K-anonymity: A model for protecting privacy
    • Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10(5), 557-570 (2002)
    • (2002) Int. J. Uncertain. Fuzz. Knowl. Based Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 68
    • 84886544735 scopus 로고    scopus 로고
    • 2010 IBM x-force mid-year trend & risk report
    • IBM
    • Young, R.: 2010 IBM x-force mid-year trend & risk report. Technical Report, IBM (2010)
    • (2010) Technical Report
    • Young, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.