메뉴 건너뛰기




Volumn 2, Issue , 2015, Pages 1689-1698

Is feature selection secure against training data poisoning?

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTATIONAL EFFICIENCY; LEARNING SYSTEMS; MALWARE; REGRESSION ANALYSIS;

EID: 84969900476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (444)

References (42)
  • 1
  • 4
    • 84867136631 scopus 로고    scopus 로고
    • Poisoning attacks against support vector machines
    • Lang-ford, J. and Pineau, J. (eds.), Omnipress
    • Biggio, Battista, Nelson, Blaine, and Laskov, Pavel. Poisoning attacks against support vector machines. In Lang-ford, J. and Pineau, J. (eds.), 29th Int'l Conf. on Machine Learning, pp. 1807-1814. Omnipress, 2012.
    • (2012) 29th Int'l Conf. on Machine Learning , pp. 1807-1814
    • Biggio, B.1    Nelson, B.2    Laskov, P.3
  • 6
    • 84992268362 scopus 로고    scopus 로고
    • Security evaluation of pattern classifiers under attack
    • Biggio, Battista, Fumera, Giorgio, and Roli, Fabio. Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. and Data Eng., 26(4):984-996, 2014.
    • (2014) IEEE Trans. Knowl. and Data Eng. , vol.26 , Issue.4 , pp. 984-996
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 8
    • 84863403768 scopus 로고    scopus 로고
    • Conditional likelihood maximisation: A unifying framework for information theoretic feature selection
    • Brown, Gavin, Pocock, Adam, Zhao, Ming-Jie, and Luján, Mikel. Conditional likelihood maximisation: A unifying framework for information theoretic feature selection. J. Mach. Learn. Res., 13:27-66, 2012.
    • (2012) J. Mach. Learn. Res. , vol.13 , pp. 27-66
    • Brown, G.1    Pocock, A.2    Zhao, M.-J.3    Luján, M.4
  • 9
    • 84869200775 scopus 로고    scopus 로고
    • Static prediction games for adversarial learning problems
    • Brückner, Michael, Kanzow, Christian, and Scheffer, Tobias. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617-2654, 2012.
    • (2012) J. Mach. Learn. Res. , vol.13 , pp. 2617-2654
    • Brückner, M.1    Kanzow, C.2    Scheffer, T.3
  • 10
    • 0003238552 scopus 로고    scopus 로고
    • Incremental and decremental support vector machine learning
    • Leen, T. K. et al. (eds.), MIT Press
    • Cauwenberghs, Gert and Poggio, Tomaso. Incremental and decremental support vector machine learning. In Leen, T. K. et al. (eds.), NIPS, pp. 409-415. MIT Press, 2000.
    • (2000) NIPS , pp. 409-415
    • Cauwenberghs, G.1    Poggio, T.2
  • 12
    • 77950537175 scopus 로고    scopus 로고
    • Regularization paths for generalized linear models via coordinate descent
    • 2
    • Friedman, Jerome H., Hastie, Trevor, and Tibshirani, Rob. Regularization paths for generalized linear models via coordinate descent. J. Stat. Softw., 33(1):1-22, 2 2010.
    • (2010) J. Stat. Softw. , vol.33 , Issue.1 , pp. 1-22
    • Friedman, J.H.1    Hastie, T.2    Tibshirani, R.3
  • 13
    • 33749242256 scopus 로고    scopus 로고
    • Nightmare at test time: Robust learning by feature deletion
    • Cohen, W. and Moore, A. (eds.), ACM
    • Globerson, Amir and Roweis, Sam T. Nightmare at test time: robust learning by feature deletion. In Cohen, W. and Moore, A. (eds.), 23rd Int'l Conf. on Machine Learning, volume 148, pp. 353-360. ACM, 2006.
    • (2006) 23rd Int'l Conf. on Machine Learning , vol.148 , pp. 353-360
    • Globerson, A.1    Roweis, S.T.2
  • 15
    • 84942484786 scopus 로고
    • Ridge regression: Biased estimation for nonorthogonal problems
    • Feb.
    • Hoerl, A. E. and Kennard, R. W. Ridge regression: Biased estimation for nonorthogonal problems. Technometrics, 12(1):55-67, Feb. 1970.
    • (1970) Technometrics , vol.12 , Issue.1 , pp. 55-67
    • Hoerl, A.E.1    Kennard, R.W.2
  • 18
    • 84922860136 scopus 로고    scopus 로고
    • Machine learning methods for computer security (dagstuhl perspectives workshop 12371)
    • Joseph, Anthony D., Laskov, Pavel, Roli, Fabio, Tygar, J. Doug, and Nelson, Blaine. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos, 3(1):1-30, 2013.
    • (2013) Dagstuhl Manifestos , vol.3 , Issue.1 , pp. 1-30
    • Joseph, A.D.1    Laskov, P.2    Roli, F.3    Tygar, J.D.4    Nelson, B.5
  • 21
    • 84937909075 scopus 로고    scopus 로고
    • Feature cross-substitution in adversarial classification
    • Ghahramani, Z. et al. (eds.), Curran Associates, Inc.
    • Li, Bo and Vorobeychik, Yevgeniy. Feature cross-substitution in adversarial classification. In Ghahramani, Z. et al. (eds.), NIPS 27, pp. 2087-2095. Curran Associates, Inc., 2014.
    • (2014) NIPS , vol.27 , pp. 2087-2095
    • Li, B.1    Vorobeychik, Y.2
  • 23
    • 84864937789 scopus 로고    scopus 로고
    • A pattern recognition system for malicious PDF files detection
    • Perner, P. (ed.), Springer Berlin Heidelberg
    • Maiorca, Davide, Giacinto, Giorgio, and Corona, Igino. A pattern recognition system for malicious PDF files detection. In Perner, P. (ed.), MLDM, vol. 7376 of LNCS, pp. 510-524. Springer Berlin Heidelberg, 2012.
    • (2012) MLDM, Vol. 7376 of LNCS , pp. 510-524
    • Maiorca, D.1    Giacinto, G.2    Corona, I.3
  • 24
    • 84877998967 scopus 로고    scopus 로고
    • Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection
    • ACM
    • Maiorca, Davide, Corona, Igino, and Giacinto, Giorgio. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In ASIACCS, pp. 119-130, 2013. ACM.
    • (2013) ASIACCS , pp. 119-130
    • Maiorca, D.1    Corona, I.2    Giacinto, G.3
  • 27
    • 85162357937 scopus 로고    scopus 로고
    • Robust lasso with missing and grossly corrupted observations
    • Shawe-Taylor, J. et al. (eds.), Curran Associates, Inc.
    • Nasrabadi, Nasser M., Tran, Trac D., and Nguyen, Nam. Robust lasso with missing and grossly corrupted observations. In Shawe-Taylor, J. et al. (eds.), NIPS 24, pp. 1881-1889. Curran Associates, Inc., 2011.
    • (2011) NIPS , vol.24 , pp. 1881-1889
    • Nasrabadi, N.M.1    Tran, T.D.2    Nguyen, N.3
  • 28
    • 0029291966 scopus 로고
    • Sparse approximate solutions to linear systems
    • April
    • Natarajan, B. K. Sparse approximate solutions to linear systems. SIAM J. Comput., 24(2):227-234, April 1995.
    • (1995) SIAM J. Comput. , vol.24 , Issue.2 , pp. 227-234
    • Natarajan, B.K.1
  • 30
    • 84896691627 scopus 로고    scopus 로고
    • Robust lasso with missing and grossly corrupted observations
    • Nguyen, N.H. and Tran, T.D. Robust lasso with missing and grossly corrupted observations. IEEE Trans. Inf. Theor., 59(4):2036-2058, 2013.
    • (2013) IEEE Trans. Inf. Theor. , vol.59 , Issue.4 , pp. 2036-2058
    • Nguyen, N.H.1    Tran, T.D.2
  • 32
    • 1542634595 scopus 로고    scopus 로고
    • A statistical approach to the spam problem
    • Robinson, Gary. A statistical approach to the spam problem. Linux J., 2003(107):3, 2003.
    • (2003) Linux J. , vol.2003 , Issue.107 , pp. 3
    • Robinson, G.1
  • 35
    • 84872119350 scopus 로고    scopus 로고
    • Malicious PDF detection using metadata and structural features
    • ACM
    • Smutz, Charles and Stavrou, Angelos. Malicious PDF detection using metadata and structural features. In 28th Annual Computer Security Applications Conf, pp. 239-248, 2012. ACM.
    • (2012) 28th Annual Computer Security Applications Conf , pp. 239-248
    • Smutz, C.1    Stavrou, A.2
  • 37
    • 85162055491 scopus 로고    scopus 로고
    • Convex learning with invariances
    • MIT Press
    • Teo, Choon Hui, Globerson, Amir, Roweis, Sam, and Smola, Alex. Convex learning with invariances. In NIPS 20, pp. 1489-1496. MIT Press, 2008.
    • (2008) NIPS , vol.20 , pp. 1489-1496
    • Teo, C.H.1    Globerson, A.2    Roweis, S.3    Smola, A.4
  • 38
    • 85194972808 scopus 로고    scopus 로고
    • Regression shrinkage and selection via the lasso
    • Tibshirani, R. Regression shrinkage and selection via the lasso. J. Royal Stat. Soc. (Ser. B), 58:267-288, 1996.
    • (1996) J. Royal Stat. Soc. (Ser. B) , vol.58 , pp. 267-288
    • Tibshirani, R.1
  • 39
    • 85180414841 scopus 로고    scopus 로고
    • Detection of malicious pdf files based on hierarchical document structure
    • The Internet Society
    • Šrndić, Nedim and Laskov, Pavel. Detection of malicious pdf files based on hierarchical document structure. In NDSS. The Internet Society, 2013.
    • (2013) NDSS
    • Šrndić, N.1    Laskov, P.2
  • 40
  • 42
    • 16244401458 scopus 로고    scopus 로고
    • Regularization and variable selection via the elastic net
    • Zou, Hui and Hastie, Trevor. Regularization and variable selection via the elastic net. J. Royal Stat. Soc. (Ser. B), 67(2):301-320, 2005.
    • (2005) J. Royal Stat. Soc. (Ser. B) , vol.67 , Issue.2 , pp. 301-320
    • Zou, H.1    Hastie, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.