-
1
-
-
85192419764
-
-
Adobe Systems Incorporated:PDF Reference, sixth edition, Adobe Portable Document Format, Version 1.7, November
-
Adobe Systems Incorporated: PDF Reference, sixth edition, Adobe Portable Document Format, Version 1.7, November 2006
-
(2006)
-
-
-
4
-
-
78049530550
-
The security of machine learning
-
Barreno, M., Nelson, B., Joseph, A., Tygar, J.: The security of machine learning. Mach. Learn. 81, 121-148 (2010). doi:10.1007/s10994-010-5188-5
-
(2010)
Mach. Learn.
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
5
-
-
33845989821
-
Can machine learning be secure
-
ACM,New York
-
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygar, J.D.: Can machine learning be secure? In: ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information. Computer and Communications Security, pp. 16-25. ACM, New York (2006). doi: http://doi. Acm.org/10.1145/1128817.1128824
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
6
-
-
84861164054
-
A learning-based approach to reactive security
-
Barth, A., Rubinstein, B.I.P., Sundararajan, M., Mitchell, J.C., Song, D., Bartlett, P.L.: A learning-based approach to reactive security. IEEE Trans. Depend. Secure Comput. 9(4), 482-493 (2012)
-
(2012)
IEEE Trans. Depend. Secure Comput.
, vol.9
, Issue.4
, pp. 482-493
-
-
Barth, A.1
Rubinstein, B.I.P.2
Sundararajan, M.3
Mitchell, J.C.4
Song, D.5
Bartlett, P.L.6
-
7
-
-
80053015779
-
Bagging classifiers for fighting poisoning attacks in adversarial environments
-
Springer, Berlin
-
Biggio, B., Corona, I., Fumera, G., Giacinto, G., Roli, F.: Bagging classifiers for fighting poisoning attacks in adversarial environments. In: The 10th International Workshop on Multiple Classifier Systems (MCS). Lecture Notes in Computer Science, vol. 6713, pp. 350-359. Springer, Berlin (2011)
-
(2011)
The 10th International Workshop on Multiple Classifier Systems (MCS). Lecture Notes in Computer Science
, vol.6713
, pp. 350-359
-
-
Biggio, B.1
Corona, I.2
Fumera, G.3
Giacinto, G.4
Roli, F.5
-
8
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Blockeel, H., et al. (eds.) Springer, Berlin Heidelberg
-
Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndíc, N., Laskov, P., Giacinto, G., Roli, F.: Evasion attacks against machine learning at test time. In: Blockeel, H., et al. (eds.) European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III. Lecture Notes in Artificial Intelligence, vol. 8190, pp. 387-402. Springer, Berlin Heidelberg (2013)
-
(2013)
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III. Lecture Notes in Artificial Intelligence
, vol.8190
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndíc, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
9
-
-
84887437820
-
Poisoning attacks to compromise face templates
-
Biggio, B., Didaci, L., Fumera, G., Roli, F.: Poisoning attacks to compromise face templates. In: The 6th IAPR International Conference on Biometrics (ICB) (2013)
-
(2013)
The 6th IAPR International Conference on Biometrics(ICB)
-
-
Biggio, B.1
Didaci, L.2
Fumera, G.3
Roli, F.4
-
10
-
-
79956346771
-
A survey and experimental evaluation of image spam filtering techniques
-
Biggio, B., Fumera, G., Pillai, I., Roli, F.: A survey and experimental evaluation of image spam filtering techniques. Pattern Recogn. Lett. 32(10), 1436-1446 (2011)
-
(2011)
Pattern Recogn. Lett
, vol.32
, Issue.10
, pp. 1436-1446
-
-
Biggio, B.1
Fumera, G.2
Pillai, I.3
Roli, F.4
-
11
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
Biggio, B., Fumera, G., Roli, F.: Design of robust classifiers for adversarial environments. IEEE Int. Conf. Syst. Man Cybern. (SMC), 977-982 (2011)
-
(2011)
IEEE Int. Conf. Syst. Man Cybern. (SMC)
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
12
-
-
84886467730
-
Security evaluation of pattern classifiers under attack
-
Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. Data Eng. 99, 1 (2013)
-
(2013)
IEEE Trans. Knowl. Data Eng
, vol.99
, pp. 1
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
13
-
-
84868094889
-
Poisoning adaptive biometric systems
-
Biggio, B., Fumera, G., Roli, F., Didaci, L.: Poisoning adaptive biometric systems. In: Structural, Syntactic, and Statistical Pattern Recognition. Lecture Notes in Computer Science, vol. 7626, pp. 417-425 (2012)
-
(2012)
Structural, Syntactic, and Statistical Pattern Recognition. Lecture Notes in Computer Science
, vol.7626
, pp. 417-425
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
Didaci, L.4
-
15
-
-
33244468835
-
Practical privacy: The sulq framework
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: Proceedings of the 24th Symposium on Principles of Database Systems, pp. 128-138 (2005)
-
(2005)
Proceedings of the 24th Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
16
-
-
0030211964
-
Bagging predictors
-
Breiman, L.: Bagging predictors. Mach. Learn. 24(2), 123-140 (1996)
-
(1996)
Mach. Learn.
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
17
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
Brückner, M., Kanzow, C., Scheffer, T.: Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 13, 2617-2654 (2012)
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
19
-
-
84869483719
-
The 5th acm workshop on artificial intelligence and security (aisec)
-
New York
-
Cárdenas, A.A., Nelson, B., Rubinstein, B.I. (eds.): The 5th ACM Workshop on Artificial Intelligence and Security (AISec). ACM, New York (2012)
-
(2012)
ACM
-
-
Cárdenas, A.A.1
Nelson, B.2
Rubinstein, B.I.3
-
20
-
-
0003238552
-
Incremental and decremental support vector machine learning
-
Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) MIT Press,Cambridge
-
Cauwenberghs, G., Poggio, T.: Incremental and decremental support vector machine learning. In: Leen, T.K., Dietterich, T.G., Tresp, V. (eds.) NIPS, pp. 409-415. MIT Press, Cambridge (2000)
-
(2000)
NIPS
, pp. 409-415
-
-
Cauwenberghs, G.1
Poggio, T.2
-
21
-
-
79955858775
-
Differentially private empirical risk minimization
-
Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12, 1069-1109 (2011)
-
(2011)
J. Mach. Learn. Res.
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
22
-
-
85192427279
-
-
ACM, New York
-
Chen, Y., Cárdenas, A.A., Greenstadt, R., Rubinstein, B. (eds.): Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence (AISec). ACM, New York (2011)
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence (AISec)
-
-
Chen, Y.1
Cárdenas, A.A.2
Greenstadt, R.3
Rubinstein, B.4
-
23
-
-
18244390064
-
On robust properties of convex risk minimization methods for pattern recognition
-
Christmann, A., Steinwart, I.: On robust properties of convex risk minimization methods for pattern recognition. J. Mach. Learn. Res. 5, 1007-1034 (2004)
-
(2004)
J. Mach. Learn. Res
, vol.5
, pp. 1007-1034
-
-
Christmann, A.1
Steinwart, I.2
-
25
-
-
34249753618
-
Support-vector networks
-
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273-297 (1995)
-
(1995)
Mach. Learn.
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
26
-
-
12244295760
-
Adversarial classification
-
Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 99-108 (2004)
-
(2004)
Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam Sanghai, S.3
Verma, D.4
-
27
-
-
85192425100
-
-
Dimitrakakis, C., Gkoulalas-Divanis, A., Mitrokotsa, A., Verykios, V.S., Saygin, Y. (eds.): International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning (2010)
-
(2010)
International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning
-
-
Dimitrakakis, C.1
Gkoulalas-Divanis, A.2
Mitrokotsa, A.3
Verykios, V.S.4
Saygin, Y.5
-
28
-
-
0032594950
-
Support vector machines for spam categorization
-
Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048-1054 (1999)
-
(1999)
IEEE Trans. Neural Netw.
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker Wu H, D.1
Vapnik, V.N.2
-
29
-
-
0003922190
-
-
Wiley-Interscience, Chichester
-
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley-Interscience, Chichester (2000)
-
(2000)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
30
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference (TCC 2006), pp. 265-284 (2006)
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference (TCC 2006)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
31
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O., Lee, W.: Polymorphic blending attacks. In: Proceedings of the 15th Conference on USENIX Security Symposium (2006)
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
33
-
-
2442643467
-
Discriminative direction for kernel classifiers
-
MIT Press,Cambridge
-
Golland, P.: Discriminative direction for kernel classifiers. In: Neural Information Processing Systems (NIPS), pp. 745-752. MIT Press, Cambridge (2002)
-
(2002)
Neural Information Processing Systems (NIPS)
, pp. 745-752
-
-
Golland, P.1
-
35
-
-
0003841907
-
Robust statistics: The approach based on influence functions
-
Wiley, New York
-
Hampel, F.R., Ronchetti, E.M., Rousseeuw, P.J., Stahel,W.A.: Robust Statistics: The Approach Based on Influence Functions. Probability and Mathematical Statistics. Wiley, New York (1986). http://www.worldcat.org/isbn/0471735779
-
(1986)
Probability and Mathematical Statistics
-
-
Hampel, F.R.1
Ronchetti, E.M.2
Rousseeuw, P.J.3
Stahel, W.A.4
-
36
-
-
80955143573
-
-
Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B., Tygar, J.D.: Adversarial machine learning. In: Proceedings of the 4th ACM Workshop on Artificial Intelligence and Security (AISec), pp. 43-57 (2011)
-
(2011)
Adversarial Machine Learning. In: Proceedings of the 4th ACM Workshop on Artificial Intelligence and Security (AISec)
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
37
-
-
85192427248
-
Dagstuhl perspectives workshop on machine learning methods for computer security
-
12371
-
Joseph, A.D., Laskov, P., Roli, F., Tygar, D. (eds.): Dagstuhl Perspectives Workshop on Machine Learning Methods for Computer Security. Workshop 12371 (2012)
-
(2012)
Workshop
-
-
Joseph, A.D.1
Laskov, P.2
Roli, F.3
Tygar, D.4
-
39
-
-
85192400620
-
A 'poisoning' attack against online anomaly detection
-
12371 Joseph, A.D., Laskov, P., Roli, F., Tygar, D. (eds.) Workshop
-
Kloft, M., Laskov, P.: A 'poisoning' attack against online anomaly detection. In: Joseph, A.D., Laskov, P., Roli, F., Tygar, D. (eds.) Dagstuhl Perspectives Workshop on Machine Learning Methods for Computer Security. Workshop 12371 (2012)
-
(2012)
Dagstuhl Perspectives Workshop on Machine Learning Methods for Computer Security
-
-
Kloft, M.1
Laskov, P.2
-
40
-
-
84873445143
-
Security analysis of online centroid anomaly detection
-
Kloft, M., Laskov, P.: Security analysis of online centroid anomaly detection. J. Mach. Learn. Res. 13, 3647-3690 (2012)
-
(2012)
J. Mach. Learn. Res
, vol.13
, pp. 3647-3690
-
-
Kloft, M.1
Laskov, P.2
-
44
-
-
78049528115
-
Machine learning in adversarial environments
-
Laskov, P., Lippmann, R.: Machine learning in adversarial environments. Mach. Learn. 81, 115-119 (2010)
-
(2010)
Mach. Learn.
, vol.81
, pp. 115-119
-
-
Laskov, P.1
Lippmann, R.2
-
45
-
-
0002331173
-
Comparison of learning algorithms for handwritten digit recognition
-
LeCun, Y., Jackel, L., Bottou, L., Brunot, A., Cortes, C., Denker, J., Drucker, H., Guyon, I., Müller, U., Säckinger, E., Simard, P., Vapnik, V.: Comparison of learning algorithms for handwritten digit recognition. In: International Conference on Artificial Neural Networks, pp. 53-60 (1995)
-
(1995)
International Conference on Artificial Neural Networks
, pp. 53-60
-
-
Lecun, Y.1
Jackel, L.2
Bottou, L.3
Brunot, A.4
Cortes, C.5
Denker, J.6
Drucker, H.7
Guyon, I.8
Müller, U.9
Säckinger, E.10
Simard, P.11
Vapnik, V.12
-
49
-
-
84877998967
-
Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious PDF files detection
-
ACM, New York
-
Maiorca, D., Corona, I., Giacinto, G.: Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications security (ASIA CCS '13), pp. 119-130. ACM, New York (2013)
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security (ASIA CCS '13)
, pp. 119-130
-
-
Maiorca, D.1
Corona, I.2
Giacinto, G.3
-
50
-
-
84864937789
-
A pattern recognition system for malicious PDF files detection
-
Springer,Berlin
-
Maiorca, D., Giacinto, G., Corona, I.: A pattern recognition system for malicious PDF files detection. In: MLDM, pp. 510-524. Springer, Berlin (2012)
-
(2012)
MLDM
, pp. 510-524
-
-
Maiorca, D.1
Giacinto, G.2
Corona, I.3
-
51
-
-
84947338420
-
Robust statistics: Theory and methods
-
Wiley, New York
-
Maronna, R.A., Martin, R.D., Yohai, V.J.: Robust Statistics: Theory and Methods. Probability and Mathematical Statistics. Wiley, New York (2006). http://www.worldcat.org/isbn/ 0471735779
-
(2006)
Probability and Mathematical Statistics
-
-
Maronna, R.A.1
Martin, R.D.2
Yohai, V.J.3
-
53
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Nelson, B., Barreno, M., Chi, F.J., Joseph, A.D., Rubinstein, B.I.P., Saini, U., Sutton, C., Tygar, J.D., Xia, K.: Exploiting machine learning to subvert your spam filter. In: Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, pp. 1-9 (2008)
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
54
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
Nelson, B., Rubinstein, B.I., Huang, L., Joseph, A.D., Lee, S.J., Rao, S., Tygar, J.D.: Query strategies for evading convex-inducing classifiers. J. Mach. Learn. Res. 13, 1293-1332 (2012)
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.I.2
Huang, L.3
Joseph, A.D.4
Lee, S.J.5
Rao, S.6
Tygar, J.D.7
-
55
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
Perdisci, R., Gu, G., Lee, W.: Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems. In: Proceedings of the International Conference on Data Mining (ICDM), pp. 488-498 (2006)
-
(2006)
Proceedings of the International Conference on Data Mining (ICDM)
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
56
-
-
0003243224
-
Probabilistic outputs for support vector machines and comparison to regularized likelihood methods
-
MIT Press, Cambridge
-
Platt, J.: Probabilistic outputs for support vector machines and comparison to regularized likelihood methods. In: Advances in Large Margin Classifiers, pp. 61-74. MIT Press, Cambridge (2000)
-
(2000)
Advances in Large Margin Classifiers
, pp. 61-74
-
-
Platt, J.1
-
57
-
-
70350052805
-
What-if analysis
-
Springer,New York
-
Rizzi, S.: What-if analysis. In: Encyclopedia of Database Systems, pp. 3525-3529. Springer, New York (2009)
-
(2009)
Encyclopedia of Database Systems
, pp. 3525-3529
-
-
Rizzi, S.1
-
58
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric fusion methods against spoof attacks. J. Vis. Lang. Comput. 20(3), 169-179 (2009)
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
59
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.h., Rao, S., Taft, N., Tygar, J.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th Conference on Internet Measurement Conference (IMC), pp. 1-14 (2009)
-
(2009)
Proceedings of the 9th Conference on Internet Measurement Conference (IMC)
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Rao, S.5
Taft, N.6
Tygar, J.D.7
-
60
-
-
84877781092
-
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
-
Rubinstein, B.I.P., Bartlett, P.L., Huang, L., Taft, N.: Learning in a large function space: privacy-preserving mechanisms for SVM learning. J. Privacy Confidentiality 4(1), 65-100 (2012)
-
(2012)
J. Privacy Confidentiality
, vol.4
, Issue.1
, pp. 65-100
-
-
Rubinstein, B.I.P.1
Bartlett, P.L.2
Huang, L.3
Taft, N.4
-
61
-
-
84865131152
-
A generalized representer theorem
-
Springer, Berlin
-
Schölkopf, B., Herbrich, R., Smola, A.J.: A generalized representer theorem. In: Computational Learning Theory. Lecture Notes in Computer Science, vol. 2111, pp. 416-426. Springer, Berlin (2001)
-
(2001)
Computational Learning Theory. Lecture Notes in Computer Science
, vol.2111
, pp. 416-426
-
-
Schölkopf, B.1
Herbrich, R.2
Smola, A.J.3
-
62
-
-
0004094721
-
-
MIT Press, Cambridge
-
Schölkopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge (2001)
-
(2001)
Rfeti Learning with Kernels: Support Vector Machines, Regularization, Optimization, and beyond
-
-
Schölkopf, B.1
Smola, A.J.2
-
65
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10(5), 557-570 (2002)
-
(2002)
Int. J. Uncertain. Fuzz. Knowl. Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
68
-
-
84886544735
-
2010 IBM x-force mid-year trend & risk report
-
IBM
-
Young, R.: 2010 IBM x-force mid-year trend & risk report. Technical Report, IBM (2010)
-
(2010)
Technical Report
-
-
Young, R.1
|