-
1
-
-
12244295760
-
Adversarial classification
-
ACM
-
Nilesh Dalvi, Pedro Domingos, Sumit Sanghai, Deepak Verma, et al. Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 99-108. ACM, 2004.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sanghai, S.3
Verma, D.4
-
2
-
-
80955143573
-
Adversarial machine learning
-
New York, NY, USA. ACM
-
Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I.P. Rubinstein, and J. D. Tygar. Adversarial machine learning. In Proceedings of the 4th ACM workshop on Security and artificial intelligence, AlSec '11, pages 43-58, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AlSec '11
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, P.B.I.4
Tygar, J.D.5
-
5
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
B. Nelson, B. Rubinstein, L. Huang, A. Joseph, S. Lee, S. Rao, and J. D. Tygar. Query strategies for evading convex-inducing classifiers. Journal of Machine Learning Research, 13:1293-1332, 2012.
-
(2012)
Journal of Machine Learning Research
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.2
Huang, L.3
Joseph, A.4
Lee, S.5
Rao, S.6
Tygar, J.D.7
-
11
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Robin Sommer and Vern Paxson. Outside the closed world: On using machine learning for network intrusion detection. In IEEE Symposium on Security and Privacy, pages 305-316, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
12
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games
-
P. Paruchuri, J. Pearce, Janus Marecki, and Milind Tambe. Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Seventh International Conference on Autonomous Agents and Multiagent Systems, pages 895-902, 2008.
-
(2008)
Seventh International Conference on Autonomous Agents and Multiagent Systems
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.2
Marecki, J.3
Tambe, M.4
-
13
-
-
77955458634
-
Software assistants for randomized patrol planning for the lax airport police and the federal air marshals service
-
Manish Jain, Jason Tsai, James Pita, Christopher Kiekintveld, S. Rathi, Milind Tambe, and Fernando Ordonez. Software assistants for randomized patrol planning for the lax airport police and the federal air marshals service. Interfacs, 40:267-290, 2010.
-
(2010)
Interfacs
, vol.40
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Tambe, M.6
Ordonez, F.7
-
14
-
-
84899445988
-
Game-theoretic resource allocation for malicious packet detection in computer networks
-
Ondrej Vanek, Zhengyu Yin, Manish Jain, Branislav Bosansky, Milind Tambe, and Michal Pechoucek. Game-theoretic resource allocation for malicious packet detection in computer networks. In Eleventh International Conference on Autonomous Agents and Multiagent Systems, 2012.
-
(2012)
Eleventh International Conference on Autonomous Agents and Multiagent Systems
-
-
Vanek, O.1
Yin, Z.2
Jain, M.3
Bosansky, B.4
Tambe, M.5
Pechoucek, M.6
-
15
-
-
58349121261
-
Adversarial pattern classification using multiple classifiers and randomisation
-
Battista Biggio, Giorgio Fumera, and Fabio Roli. Adversarial pattern classification using multiple classifiers and randomisation. In Lecture Notes in Computer Science, pages 500-509, 2008.
-
(2008)
Lecture Notes in Computer Science
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
16
-
-
0024140061
-
The influence of variables on boolean functions
-
IEEE
-
Jeff Kahn, Gil Kalai, and Nathan Linial. The influence of variables on boolean functions. In Foundations of Computer Science, 1988., 29th Annual Symposium on, pages 68-80. IEEE, 1988.
-
(1988)
Foundations of Computer Science 1988., 29th Annual Symposium on
, pp. 68-80
-
-
Kahn, J.1
Kalai, G.2
Linial, N.3
-
17
-
-
84879485129
-
Cybercrime, cyberweapons, cyber wars: Is there too much of it in the air?
-
Stas Filshtinskiy. Cybercrime, cyberweapons, cyber wars: Is there too much of it in the air? Communications of the ACM, 56(6):28-30, 2013.
-
(2013)
Communications of the ACM
, vol.56
, Issue.6
, pp. 28-30
-
-
Filshtinskiy, S.1
-
18
-
-
12244295760
-
Adversarial classification
-
New York, NY, USA. ACM
-
Nilesh Dalvi, Pedro Domingos, Mausam, Sumit Sang-hai, and Deepak Verma. Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '04, pages 99-108, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '04
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sumit Sang-Hai, M.3
Verma, D.4
-
20
-
-
77954628286
-
A brief introduction to fourier analysis on the boolean cube
-
Ronald De Wolf. A brief introduction to fourier analysis on the boolean cube. Theory of Computing, Graduate Surveys, 1:1-20, 2008.
-
(2008)
Theory of Computing, Graduate Surveys
, vol.1
, pp. 1-20
-
-
De Wolf, R.1
-
21
-
-
84904809957
-
Spam filtering with naive bayes-which naive bayes?
-
Vangelis Metsis, Ion Androutsopoulos, and Georgios Paliouras. Spam filtering with naive bayes-which naive bayes? In CEAS, pages 27-28, 2006.
-
(2006)
CEAS
, pp. 27-28
-
-
Metsis, V.1
Androutsopoulos, I.2
Paliouras, G.3
|