-
3
-
-
78049530550
-
The security of machine learning
-
Marco Barreno, Blaine Nelson, Anthony D Joseph, and J.D. Tygar. The security of machine learning. Machine Learning, 81(2):121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.D.4
-
4
-
-
70349235375
-
Open problems in the security of learning
-
ACM
-
Marco Barreno, Peter L Bartlett, Fuching Jack Chi, Anthony D Joseph, Blaine Nelson, Benjamin IP Rubinstein, Udam Saini, and J Doug Tygar. Open problems in the security of learning. In Proceedings of the 1st ACM workshop on Workshop on AISec, pages 19-26. ACM, 2008.
-
(2008)
Proceedings of the 1st ACM Workshop on Workshop on AISec
, pp. 19-26
-
-
Barreno, M.1
Bartlett, P.L.2
Chi, F.J.3
Joseph, A.D.4
Nelson, B.5
Rubinstein, B.I.P.6
Saini, U.7
Doug Tygar, J.8
-
5
-
-
84992268362
-
Security evaluation of pattern classifiers under attack
-
Battista Biggio, Giorgio Fumera, and Fabio Roli. Security evaluation of pattern classifiers under attack. IEEE Transactions on Data and Knowledge Engineering, 26(4):984-996, 2013.
-
(2013)
IEEE Transactions on Data and Knowledge Engineering
, vol.26
, Issue.4
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
6
-
-
78049528115
-
Machine learning in adversarial environments
-
Pavel Laskov and Richard Lippmann. Machine learning in adversarial environments. Machine learning, 81(2):115-119, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 115-119
-
-
Laskov, P.1
Lippmann, R.2
-
7
-
-
79955629381
-
Classifier evasion: Models and open problems
-
Springer
-
Blaine Nelson, Benjamin IP Rubinstein, Ling Huang, Anthony D Joseph, and JD Tygar. Classifier evasion: Models and open problems. In Privacy and Security Issues in Data Mining and Machine Learning, pages 92-98. Springer, 2011.
-
(2011)
Privacy and Security Issues in Data Mining and Machine Learning
, pp. 92-98
-
-
Nelson, B.1
Rubinstein, B.I.P.2
Huang, L.3
Joseph, A.D.4
Tygar, J.D.5
-
9
-
-
85084161850
-
Exploiting redundancy in natural language to penetrate Bayesian spam filters
-
Christoph Karlberger, Günther Bayler, Christopher Kruegel, and Engin Kirda. Exploiting redundancy in natural language to penetrate bayesian spam filters. WOOT, 7:1-7, 2007.
-
(2007)
WOOT
, vol.7
, pp. 1-7
-
-
Karlberger, C.1
Bayler, G.2
Kruegel, C.3
Kirda, E.4
-
10
-
-
0009304541
-
A Bayesian approach to filtering junk e-mail
-
Mehran Sahami, Susan Dumais, David Heckerman, and Eric Horvitz. A bayesian approach to filtering junk e-mail. In Learning for Text Categorization: Papers from the 1998 workshop, Volume 62, pages 98-105, 1998.
-
(1998)
Learning for Text Categorization: Papers from the 1998 Workshop
, vol.62
, pp. 98-105
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
12
-
-
84904809957
-
Spam filtering with naive bayes-which naive bayes?
-
Vangelis Metsis, Ion Androutsopoulos, and Georgios Paliouras. Spam filtering with naive bayes-which naive bayes? In CEAS, pages 27-28, 2006.
-
(2006)
CEAS
, pp. 27-28
-
-
Metsis, V.1
Androutsopoulos, I.2
Paliouras, G.3
-
13
-
-
12244295760
-
Adversarial classification
-
ACM
-
Nilesh Dalvi, Pedro Domingos, Sumit Sanghai, Deepak Verma, et al. Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 99-108. ACM, 2004.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sanghai, S.3
Verma, D.4
-
15
-
-
77951174541
-
A game theoretical model for adversarial learning
-
ICDMW'09. IEEE International Conference on IEEE
-
Wei Liu and Sanjay Chawla. A game theoretical model for adversarial learning. In Data Mining Workshops, 2009. ICDMW'09. IEEE International Conference on, pages 25-30. IEEE, 2009.
-
(2009)
Data Mining Workshops, 2009
, pp. 25-30
-
-
Liu, W.1
Chawla, S.2
-
16
-
-
12244261390
-
In vivo spam filtering: A challenge problem for kdd
-
Tom Fawcett. In vivo spam filtering: a challenge problem for kdd. ACM SIGKDD Explorations Newsletter, 5(2):140-148, 2003.
-
(2003)
ACM SIGKDD Explorations Newsletter
, vol.5
, Issue.2
, pp. 140-148
-
-
Fawcett, T.1
-
19
-
-
77950852684
-
Evaluation of approaches for dimensionality reduction applied with naive bayes anti-spam filters
-
ICMLA'09. International Conference on IEEE
-
Tiago A Almeida, Akebo Yamakami, and Jurandy Almeida. Evaluation of approaches for dimensionality reduction applied with naive bayes anti-spam filters. In Machine Learning and Applications, 2009. ICMLA'09. International Conference on, pages 517-522. IEEE, 2009.
-
(2009)
Machine Learning and Applications, 2009
, pp. 517-522
-
-
Almeida, T.A.1
Yamakami, A.2
Almeida, J.3
-
20
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
B. Nelson, B. Rubinstein, L. Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Query strategies for evading convex-inducing classifiers. Journal of Machine Learning Research, 13:1293-1332, 2012.
-
(2012)
Journal of Machine Learning Research
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.2
Huang, L.3
Joseph, A.4
Lee, S.5
Rao, S.6
Tygar, J.D.7
-
21
-
-
22944464423
-
The enron corpus: A new dataset for email classification research
-
Springer
-
Bryan Klimt and Yiming Yang. The enron corpus: A new dataset for email classification research. In Machine learning: ECML 2004, pages 217-226. Springer, 2004.
-
(2004)
Machine Learning: ECML 2004
, pp. 217-226
-
-
Klimt, B.1
Yang, Y.2
-
22
-
-
33646523095
-
-
arXiv preprint cs/0006013
-
Ion Androutsopoulos, John Koutsias, Konstantinos V Chandrinos, George Paliouras, and Constantine D Spyropoulos. An evaluation of naive bayesian anti-spam filtering. arXiv preprint cs/0006013, 2000.
-
(2000)
An Evaluation of Naive Bayesian Anti-spam Filtering
-
-
Androutsopoulos, I.1
Koutsias, J.2
Chandrinos, K.V.3
Paliouras, G.4
Spyropoulos, C.D.5
-
24
-
-
34250381644
-
Computability of global solutions to factorable nonconvex programs: Part iconvex underestimating problems
-
Garth P McCormick. Computability of global solutions to factorable nonconvex programs: Part iconvex underestimating problems. Mathematical programming, 10(1):147-175, 1976.
-
(1976)
Mathematical Programming
, vol.10
, Issue.1
, pp. 147-175
-
-
McCormick, G.P.1
|