-
1
-
-
33845989821
-
Can machine learning be secure?
-
ACM, NY, USA
-
M. Barreno, B. Nelson, R. Sears, A.D. Joseph, J.D. Tygar, Can machine learning be secure? in: ASIACCS '06: Proceedings of the ACM Symposium on Information, Computer and Communication Security, ACM, NY, USA, 2006, pp. 16-25.
-
(2006)
ASIACCS '06: Proceedings of the ACM Symposium on Information, Computer and Communication Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
2
-
-
78049530550
-
The security of machine learning
-
Barreno M., Nelson B., Joseph A., Tygar J. The security of machine learning. Mach. Learn. 2010, 81:121-148.
-
(2010)
Mach. Learn.
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
3
-
-
80955143573
-
Adversarial machine learning
-
Chicago, IL, USA
-
L. Huang, A.D. Joseph, B. Nelson, B. Rubinstein, J.D. Tygar, Adversarial machine learning, in: 4th ACM Workshop on Artificial Intelligence and Security, Chicago, IL, USA, 2011, pp. 43-57.
-
(2011)
4th ACM Workshop on Artificial Intelligence and Security
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
5
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
USENIX Association, CA, USA
-
B. Nelson, M. Barreno, F.J. Chi, A.D. Joseph, B.I.P. Rubinstein, U. Saini, C. Sutton, J.D. Tygar, K. Xia, Exploiting machine learning to subvert your spam filter, in: 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, USENIX Association, CA, USA, 2008, pp. 1-9.
-
(2008)
1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
6
-
-
78549280763
-
Misleading learners: Co-opting your spam filter
-
Springer US
-
B. Nelson, M. Barreno, F. JackChi, A.D. Joseph, B.I.P. Rubinstein, U. Saini, C. Sutton, J.D. Tygar, K. Xia, Misleading learners: Co-opting your spam filter, in: Machine Learning in Cyber Trust, Springer US, 2009, pp. 17-51.
-
(2009)
Machine Learning in Cyber Trust
, pp. 17-51
-
-
Nelson, B.1
Barreno, M.2
JackChi, F.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
7
-
-
84877775237
-
Antidote: understanding and defending against poisoning of anomaly detectors
-
ACM, New York, NY, USA
-
B.I. Rubinstein, B. Nelson, L. Huang, A.D. Joseph, S.-h. Lau, S. Rao, N. Taft, J.D. Tygar, Antidote: understanding and defending against poisoning of anomaly detectors, in: 9th ACM SIGCOMM Internet Measurement Conference, IMC '09, ACM, New York, NY, USA, 2009, pp. 1-14.
-
(2009)
9th ACM SIGCOMM Internet Measurement Conference, IMC '09
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
8
-
-
84868094889
-
Poisoning adaptive biometric systems
-
G. Gimel'farb, E. Hancock, A. Imiya, A. Kuijper, M. Kudo, S. Omachi, T. Windeatt, K. Yamada (Eds.), Springer, Berlin, Heidelberg
-
B. Biggio, G. Fumera, F. Roli, L. Didaci, Poisoning adaptive biometric systems, in: G. Gimel'farb, E. Hancock, A. Imiya, A. Kuijper, M. Kudo, S. Omachi, T. Windeatt, K. Yamada (Eds.), Structural, Syntactic, and Statistical Pattern Recognition, Lecture Notes in Computer Science, vol. 7626, Springer, Berlin, Heidelberg, 2012, pp. 417-425.
-
(2012)
Structural, Syntactic, and Statistical Pattern Recognition, Lecture Notes in Computer Science
, vol.7626
, pp. 417-425
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
Didaci, L.4
-
9
-
-
84887437820
-
Poisoning attacks to compromise face templates
-
Madrid, Spain
-
B. Biggio, L. Didaci, G. Fumera, F. Roli, Poisoning attacks to compromise face templates, in: 6th IAPR International Conference on Biometrics, Madrid, Spain, 2013, pp. 1-7.
-
(2013)
6th IAPR International Conference on Biometrics
, pp. 1-7
-
-
Biggio, B.1
Didaci, L.2
Fumera, G.3
Roli, F.4
-
11
-
-
84873445143
-
Security analysis of online centroid anomaly detection
-
Kloft M., Laskov P. Security analysis of online centroid anomaly detection. J. Mach. Learn. Res. 2012, 13:3647-3690.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 3647-3690
-
-
Kloft, M.1
Laskov, P.2
-
12
-
-
84867136631
-
Poisoning attacks against support vector machines
-
J. Langford, J. Pineau (Eds.), Edinburgh, Scotland
-
B. Biggio, B. Nelson, P. Laskov, Poisoning attacks against support vector machines, in: J. Langford, J. Pineau (Eds.), 29th International Conference on Machine Learning, Omnipress, Edinburgh, Scotland, 2012.
-
(2012)
29th International Conference on Machine Learning, Omnipress
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
13
-
-
84927956444
-
Security evaluation of support vector machines in adversarial environments
-
Springer International Publishing, Switzerland, Y. Ma, G. Guo (Eds.)
-
Biggio B., Corona I., Nelson B., Rubinstein B., Maiorca D., Fumera G., Giacinto G., Roli F. Security evaluation of support vector machines in adversarial environments. Support Vector Machines Applications 2014, 105-153. Springer International Publishing, Switzerland. Y. Ma, G. Guo (Eds.).
-
(2014)
Support Vector Machines Applications
, pp. 105-153
-
-
Biggio, B.1
Corona, I.2
Nelson, B.3
Rubinstein, B.4
Maiorca, D.5
Fumera, G.6
Giacinto, G.7
Roli, F.8
-
14
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
H. Blockeel, K. Kersting, S. Nijssen, F. Železný (Eds.), Springer, Berlin, Heidelberg
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Šrndić, P. Laskov, G. Giacinto, F. Roli, Evasion attacks against machine learning at test time, in: H. Blockeel, K. Kersting, S. Nijssen, F. Železný (Eds.), European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, Lecture Notes in Computer Science, vol. 8190, Springer, Berlin, Heidelberg, 2013, pp. 387-402.
-
(2013)
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, Lecture Notes in Computer Science
, vol.8190
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
15
-
-
12244295760
-
Adversarial classification
-
N. Dalvi, P. Domingos, Mausam, S. Sanghai, D. Verma, Adversarial classification, in: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, 2004, pp. 99-108.
-
(2004)
10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle
, pp. 99-108
-
-
Dalvi, N.1
Mausam, D.P.2
Sanghai, S.3
Verma, D.4
-
16
-
-
32344435632
-
Adversarial learning
-
A. Press (Ed.), Chicago, IL
-
D. Lowd, C. Meek, Adversarial learning, in: A. Press (Ed.), Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Chicago, IL, 2005, pp. 641-647.
-
(2005)
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
17
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
Nelson B., Rubinstein B.I., Huang L., Joseph A.D., Lee S.J., Rao S., Tygar J.D. Query strategies for evading convex-inducing classifiers. J. Mach. Learn. Res. 2012, 13:1293-1332.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.I.2
Huang, L.3
Joseph, A.D.4
Lee, S.J.5
Rao, S.6
Tygar, J.D.7
-
18
-
-
84888997884
-
Is data clustering in adversarial settings secure?
-
ACM, NY, USA
-
B. Biggio, I. Pillai, S.R. Bulò, D. Ariu, M. Pelillo, F. Roli, Is data clustering in adversarial settings secure?, in: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, ACM, NY, USA, 2013, pp. 87-98.
-
(2013)
Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security
, pp. 87-98
-
-
Biggio, B.1
Pillai, I.2
Bulò, S.R.3
Ariu, D.4
Pelillo, M.5
Roli, F.6
-
19
-
-
84906311280
-
Poisoning complete-linkage hierarchical clustering
-
Springer Berlin Heidelberg, Joensuu, Finland
-
Biggio B., Bulò S.R., Pillai I., Mura M., Mequanint E.Z., Pelillo M., Roli F. Poisoning complete-linkage hierarchical clustering. Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Lecture Notes in Computer Science 2014, vol. 8621:42-52. Springer Berlin Heidelberg, Joensuu, Finland.
-
(2014)
Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, Lecture Notes in Computer Science
, vol.8621
, pp. 42-52
-
-
Biggio, B.1
Bulò, S.R.2
Pillai, I.3
Mura, M.4
Mequanint, E.Z.5
Pelillo, M.6
Roli, F.7
-
20
-
-
33749242256
-
Nightmare at test time: robust learning by feature deletion
-
W.W. Cohen, A. Moore (Eds.), ACM, Pittsburgh, Pennsylvania, USA
-
A. Globerson, S.T. Roweis, Nightmare at test time: robust learning by feature deletion, in: W.W. Cohen, A. Moore (Eds.), Proceedings of the 23rd International Conference on Machine Learning, vol. 148, ACM, Pittsburgh, Pennsylvania, USA, 2006, pp. 353-360.
-
(2006)
Proceedings of the 23rd International Conference on Machine Learning
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
21
-
-
85162055491
-
Convex learning with invariances
-
MIT Press, Cambridge, MA, J. Platt, D. Koller, Y. Singer, S. Roweis (Eds.)
-
Teo C.H., Globerson A., Roweis S., Smola A. Convex learning with invariances. NIPS 20 2008, 1489-1496. MIT Press, Cambridge, MA. J. Platt, D. Koller, Y. Singer, S. Roweis (Eds.).
-
(2008)
NIPS 20
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
-
22
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
Brückner M., Kanzow C., Scheffer T. Static prediction games for adversarial learning problems. J. Mach. Learn. Res. 2012, 13:2617-2654.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
23
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
B. Biggio, G. Fumera, F. Roli, Design of robust classifiers for adversarial environments, in: IEEE International Conference on Systems, Man, and Cybernetics, 2011, pp. 977-982.
-
(2011)
IEEE International Conference on Systems, Man, and Cybernetics
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
24
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
Rodrigues R.N., Ling L.L., Govindaraju V. Robustness of multimodal biometric fusion methods against spoof attacks. J. Vis. Lang. Comput. 2009, 20:169-179.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
25
-
-
84904807829
-
Feature weighting for improved classifier robustness
-
CA, USA
-
A. Kolcz, C.H. Teo, Feature weighting for improved classifier robustness, in: 6th Conference on Email and Anti-Spam, Mountain View, CA, USA, 2009.
-
(2009)
6th Conference on Email and Anti-Spam, Mountain View
-
-
Kolcz, A.1
Teo, C.H.2
-
26
-
-
77952042088
-
Multiple classifier systems under attack
-
N.E. Gayar, J. Kittler, F. Roli (Eds.), Springer, Cairo, Egypt
-
B. Biggio, G. Fumera, F. Roli, Multiple classifier systems under attack, in: N.E. Gayar, J. Kittler, F. Roli (Eds.), 9th International Workshop on Multiple Classifier Systems, Lecture Notes in Computer Science, vol. 5997, Springer, Cairo, Egypt, 2010, pp. 74-83.
-
(2010)
9th International Workshop on Multiple Classifier Systems, Lecture Notes in Computer Science
, vol.5997
, pp. 74-83
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
27
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
Biggio B., Fumera G., Roli F. Multiple classifier systems for robust classifier design in adversarial environments. Int. J. Mach. Learn. Cybern. 2010, 1:27-41.
-
(2010)
Int. J. Mach. Learn. Cybern.
, vol.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
28
-
-
50249170401
-
Casting out demons: sanitizing training data for anomaly sensors
-
Los Alamitos, CA, USA
-
G.F. Cretu, A. Stavrou, M.E. Locasto, S.J. Stolfo, A.D. Keromytis, Casting out demons: sanitizing training data for anomaly sensors, in: IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA, USA, 2008, pp. 81-95.
-
(2008)
IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
29
-
-
80053015779
-
Bagging classifiers for fighting poisoning attacks in adversarial environments
-
C. Sansone, J. Kittler, F. Roli (Eds.), Springer-Verlag, Naples, Italy
-
B. Biggio, I. Corona, G. Fumera, G. Giacinto, F. Roli, Bagging classifiers for fighting poisoning attacks in adversarial environments, in: C. Sansone, J. Kittler, F. Roli (Eds.), 10th International Workshop on Multiple Classifier Systems, Lecture Notes in Computer Science, vol. 6713, Springer-Verlag, Naples, Italy, 2011, pp. 350-359.
-
(2011)
10th International Workshop on Multiple Classifier Systems, Lecture Notes in Computer Science
, vol.6713
, pp. 350-359
-
-
Biggio, B.1
Corona, I.2
Fumera, G.3
Giacinto, G.4
Roli, F.5
-
30
-
-
18244390064
-
On robust properties of convex risk minimization methods for pattern recognition
-
Christmann A., Steinwart I. On robust properties of convex risk minimization methods for pattern recognition. J. Mach. Learn. Res. 2004, 5:1007-1034.
-
(2004)
J. Mach. Learn. Res.
, vol.5
, pp. 1007-1034
-
-
Christmann, A.1
Steinwart, I.2
-
31
-
-
0027640858
-
Learning in the presence of malicious errors
-
Kearns M., Li M. Learning in the presence of malicious errors. SIAM J. Comput. 1993, 22:807-837.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 807-837
-
-
Kearns, M.1
Li, M.2
-
32
-
-
84899651693
-
Classification in the presence of label noise. a survey
-
Frenay B., Verleysen M. Classification in the presence of label noise. a survey. IEEE Trans. Neural Netw. Learn. Syst. 2014, 35(5):845-869.
-
(2014)
IEEE Trans. Neural Netw. Learn. Syst.
, vol.35
, Issue.5
, pp. 845-869
-
-
Frenay, B.1
Verleysen, M.2
-
33
-
-
84873424228
-
Pac learning with nasty noise
-
O. Watanabe, T. Yokomori (Eds.), Springer, Berlin, Heidelberg
-
N. Bshouty, N. Eiron, E. Kushilevitz, Pac learning with nasty noise, in: O. Watanabe, T. Yokomori (Eds.), Algorithmic Learning Theory, Lecture Notes in Computer Science, vol. 1720, Springer, Berlin, Heidelberg, 1999, pp. 206-218.
-
(1999)
Algorithmic Learning Theory, Lecture Notes in Computer Science
, vol.1720
, pp. 206-218
-
-
Bshouty, N.1
Eiron, N.2
Kushilevitz, E.3
-
34
-
-
84867112504
-
Support vector machines under adversarial label noise
-
B. Biggio, B. Nelson, P. Laskov, Support vector machines under adversarial label noise, in: J. Mach. Learn. Res. - Proceedings of 3rd Asian Conference on Machine Learning, vol. 20, 2011, pp. 97-112.
-
(2011)
J. Mach. Learn. Res. - Proceedings of 3rd Asian Conference on Machine Learning
, vol.20
, pp. 97-112
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
36
-
-
84872119350
-
Malicious pdf detection using metadata and structural features
-
ACM, New York, NY, USA
-
C. Smutz, A. Stavrou, Malicious pdf detection using metadata and structural features, in: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, ACM, New York, NY, USA, 2012, pp. 239-248.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12
, pp. 239-248
-
-
Smutz, C.1
Stavrou, A.2
-
37
-
-
85006266573
-
Man vs. machine: practical adversarial detection of malicious crowdsourcing workers
-
USENIX Association, CA
-
G. Wang, T. Wang, H. Zheng, B.Y. Zhao, Man vs. machine: practical adversarial detection of malicious crowdsourcing workers, in: 23rd USENIX Security Symposium, USENIX Association, CA, 2014.
-
(2014)
23rd USENIX Security Symposium
-
-
Wang, G.1
Wang, T.2
Zheng, H.3
Zhao, B.Y.4
-
38
-
-
0003238552
-
Incremental and decremental support vector machine learning
-
MIT Press, Portland, Oregon, T.K. Leen, T.G. Dietterich, V. Tresp (Eds.)
-
Cauwenberghs G., Poggio T. Incremental and decremental support vector machine learning. NIPS 2000, 409-415. MIT Press, Portland, Oregon. T.K. Leen, T.G. Dietterich, V. Tresp (Eds.).
-
(2000)
NIPS
, pp. 409-415
-
-
Cauwenberghs, G.1
Poggio, T.2
-
39
-
-
0141480928
-
SVM incremental learning, adaptation and optimization
-
C.P. Diehl, G. Cauwenberghs, SVM incremental learning, adaptation and optimization, in: International Journal Conference on Neural Networks, 2003, pp. 2685-2690.
-
(2003)
International Journal Conference on Neural Networks
, pp. 2685-2690
-
-
Diehl, C.P.1
Cauwenberghs, G.2
-
40
-
-
0003450542
-
-
Springer-Verlag New York, Inc., New York, NY, USA
-
Vapnik V.N. The Nature of Statistical Learning Theory 1995, Springer-Verlag New York, Inc., New York, NY, USA.
-
(1995)
The Nature of Statistical Learning Theory
-
-
Vapnik, V.N.1
-
43
-
-
33745798002
-
An efficient implementation of an active set method for svms
-
Scheinberg K. An efficient implementation of an active set method for svms. J. Mach. Learn. Res. 2006, 7:2237-2257.
-
(2006)
J. Mach. Learn. Res.
, vol.7
, pp. 2237-2257
-
-
Scheinberg, K.1
-
44
-
-
80955157923
-
Understanding the risk factors of learning in adversarial environments
-
Chicago, IL, USA
-
B. Nelson, B. Biggio, P. Laskov, Understanding the risk factors of learning in adversarial environments, in: 4th ACM Workshop on Artificial Intelligence and Security, AISec '11, Chicago, IL, USA, 2011, pp. 87-92.
-
(2011)
4th ACM Workshop on Artificial Intelligence and Security, AISec '11
, pp. 87-92
-
-
Nelson, B.1
Biggio, B.2
Laskov, P.3
-
45
-
-
70350610827
-
Learning svms from sloppily labeled data
-
Springer-Verlag, Berlin, Heidelberg
-
G. Stempfel, L. Ralaivola, Learning svms from sloppily labeled data, in: Proceedings of the 19th International Conference on Artificial Neural Networks: Part I, ICANN '09, Springer-Verlag, Berlin, Heidelberg, 2009, pp. 884-893.
-
(2009)
Proceedings of the 19th International Conference on Artificial Neural Networks: Part I, ICANN '09
, pp. 884-893
-
-
Stempfel, G.1
Ralaivola, L.2
|