-
1
-
-
33845989821
-
Can machine learning be secure?
-
NY, USA, ACM
-
Barreno, Marco, Nelson, Blaine, Sears, Russell, Joseph, Anthony D., and Tygar, J. D. Can machine learning be secure? In ASIACCS, pp. 16-25, NY, USA, 2006. ACM.
-
(2006)
ASIACCS
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
2
-
-
78049530550
-
The security of machine learning
-
Barreno, Marco, Nelson, Blaine, Joseph, Anthony, and Tygar, J. The security of machine learning. Machine Learning, 81:121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
3
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Blockeel, H. et al. (eds.), Springer Berlin Heidelberg
-
Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., and Roli, F. Evasion attacks against machine learning at test time. In Blockeel, H. et al. (eds.), ECML PKDD, Part III, vol. 8190 of LNCS, pp. 387-402. Springer Berlin Heidelberg, 2013a.
-
(2013)
ECML PKDD, Part III, Vol. 8190 of LNCS
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
4
-
-
84867136631
-
Poisoning attacks against support vector machines
-
Lang-ford, J. and Pineau, J. (eds.), Omnipress
-
Biggio, Battista, Nelson, Blaine, and Laskov, Pavel. Poisoning attacks against support vector machines. In Lang-ford, J. and Pineau, J. (eds.), 29th Int'l Conf. on Machine Learning, pp. 1807-1814. Omnipress, 2012.
-
(2012)
29th Int'l Conf. on Machine Learning
, pp. 1807-1814
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
5
-
-
84888997884
-
Is data clustering in adversarial settings secure?
-
ACM
-
Biggio, Battista, Pillai, Ignazio, Bulò, Samuel Rota, Ariu, Davide, Pelillo, Marcello, and Roli, Fabio. Is data clustering in adversarial settings secure? In ACM Workshop on Artificial Intell. and Sec., pp. 87-98, 2013b. ACM.
-
(2013)
ACM Workshop on Artificial Intell. and Sec.
, pp. 87-98
-
-
Biggio, B.1
Pillai, I.2
Bulò, S.R.3
Ariu, D.4
Pelillo, M.5
Roli, F.6
-
6
-
-
84992268362
-
Security evaluation of pattern classifiers under attack
-
Biggio, Battista, Fumera, Giorgio, and Roli, Fabio. Security evaluation of pattern classifiers under attack. IEEE Trans. Knowl. and Data Eng., 26(4):984-996, 2014.
-
(2014)
IEEE Trans. Knowl. and Data Eng.
, vol.26
, Issue.4
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
8
-
-
84863403768
-
Conditional likelihood maximisation: A unifying framework for information theoretic feature selection
-
Brown, Gavin, Pocock, Adam, Zhao, Ming-Jie, and Luján, Mikel. Conditional likelihood maximisation: A unifying framework for information theoretic feature selection. J. Mach. Learn. Res., 13:27-66, 2012.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 27-66
-
-
Brown, G.1
Pocock, A.2
Zhao, M.-J.3
Luján, M.4
-
9
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
Brückner, Michael, Kanzow, Christian, and Scheffer, Tobias. Static prediction games for adversarial learning problems. J. Mach. Learn. Res., 13:2617-2654, 2012.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
10
-
-
0003238552
-
Incremental and decremental support vector machine learning
-
Leen, T. K. et al. (eds.), MIT Press
-
Cauwenberghs, Gert and Poggio, Tomaso. Incremental and decremental support vector machine learning. In Leen, T. K. et al. (eds.), NIPS, pp. 409-415. MIT Press, 2000.
-
(2000)
NIPS
, pp. 409-415
-
-
Cauwenberghs, G.1
Poggio, T.2
-
11
-
-
12244295760
-
Adversarial classification
-
Dalvi, Nilesh, Domingos, Pedro, Mausam, Sanghai, Sumit, and Verma, Deepak. Adversarial classification. In Knowl. Disc, and Data Mining, pp. 99-108, 2004.
-
(2004)
Knowl. Disc, and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam, S.3
Sumit4
Verma, D.5
-
12
-
-
77950537175
-
Regularization paths for generalized linear models via coordinate descent
-
2
-
Friedman, Jerome H., Hastie, Trevor, and Tibshirani, Rob. Regularization paths for generalized linear models via coordinate descent. J. Stat. Softw., 33(1):1-22, 2 2010.
-
(2010)
J. Stat. Softw.
, vol.33
, Issue.1
, pp. 1-22
-
-
Friedman, J.H.1
Hastie, T.2
Tibshirani, R.3
-
13
-
-
33749242256
-
Nightmare at test time: Robust learning by feature deletion
-
Cohen, W. and Moore, A. (eds.), ACM
-
Globerson, Amir and Roweis, Sam T. Nightmare at test time: robust learning by feature deletion. In Cohen, W. and Moore, A. (eds.), 23rd Int'l Conf. on Machine Learning, volume 148, pp. 353-360. ACM, 2006.
-
(2006)
23rd Int'l Conf. on Machine Learning
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
15
-
-
84942484786
-
Ridge regression: Biased estimation for nonorthogonal problems
-
Feb.
-
Hoerl, A. E. and Kennard, R. W. Ridge regression: Biased estimation for nonorthogonal problems. Technometrics, 12(1):55-67, Feb. 1970.
-
(1970)
Technometrics
, vol.12
, Issue.1
, pp. 55-67
-
-
Hoerl, A.E.1
Kennard, R.W.2
-
16
-
-
80955143573
-
Adversarial machine learning
-
Chicago, IL, USA
-
Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B., and Tygar, J. D. Adversarial machine learning. In ACM Workshop on Artificial Intell. and Sec., pp. 43-57, Chicago, IL, USA, 2011.
-
(2011)
ACM Workshop on Artificial Intell. and Sec.
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
18
-
-
84922860136
-
Machine learning methods for computer security (dagstuhl perspectives workshop 12371)
-
Joseph, Anthony D., Laskov, Pavel, Roli, Fabio, Tygar, J. Doug, and Nelson, Blaine. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371). Dagstuhl Manifestos, 3(1):1-30, 2013.
-
(2013)
Dagstuhl Manifestos
, vol.3
, Issue.1
, pp. 1-30
-
-
Joseph, A.D.1
Laskov, P.2
Roli, F.3
Tygar, J.D.4
Nelson, B.5
-
21
-
-
84937909075
-
Feature cross-substitution in adversarial classification
-
Ghahramani, Z. et al. (eds.), Curran Associates, Inc.
-
Li, Bo and Vorobeychik, Yevgeniy. Feature cross-substitution in adversarial classification. In Ghahramani, Z. et al. (eds.), NIPS 27, pp. 2087-2095. Curran Associates, Inc., 2014.
-
(2014)
NIPS
, vol.27
, pp. 2087-2095
-
-
Li, B.1
Vorobeychik, Y.2
-
23
-
-
84864937789
-
A pattern recognition system for malicious PDF files detection
-
Perner, P. (ed.), Springer Berlin Heidelberg
-
Maiorca, Davide, Giacinto, Giorgio, and Corona, Igino. A pattern recognition system for malicious PDF files detection. In Perner, P. (ed.), MLDM, vol. 7376 of LNCS, pp. 510-524. Springer Berlin Heidelberg, 2012.
-
(2012)
MLDM, Vol. 7376 of LNCS
, pp. 510-524
-
-
Maiorca, D.1
Giacinto, G.2
Corona, I.3
-
24
-
-
84877998967
-
Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection
-
ACM
-
Maiorca, Davide, Corona, Igino, and Giacinto, Giorgio. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In ASIACCS, pp. 119-130, 2013. ACM.
-
(2013)
ASIACCS
, pp. 119-130
-
-
Maiorca, D.1
Corona, I.2
Giacinto, G.3
-
27
-
-
85162357937
-
Robust lasso with missing and grossly corrupted observations
-
Shawe-Taylor, J. et al. (eds.), Curran Associates, Inc.
-
Nasrabadi, Nasser M., Tran, Trac D., and Nguyen, Nam. Robust lasso with missing and grossly corrupted observations. In Shawe-Taylor, J. et al. (eds.), NIPS 24, pp. 1881-1889. Curran Associates, Inc., 2011.
-
(2011)
NIPS
, vol.24
, pp. 1881-1889
-
-
Nasrabadi, N.M.1
Tran, T.D.2
Nguyen, N.3
-
28
-
-
0029291966
-
Sparse approximate solutions to linear systems
-
April
-
Natarajan, B. K. Sparse approximate solutions to linear systems. SIAM J. Comput., 24(2):227-234, April 1995.
-
(1995)
SIAM J. Comput.
, vol.24
, Issue.2
, pp. 227-234
-
-
Natarajan, B.K.1
-
29
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
USENIX Association
-
Nelson, Blaine, Barreno, Marco, Chi, Fuching Jack, Joseph, Anthony D., Rubinstein, Benjamin I. P., Saini, Udam, Sutton, Charles, Tygar, J. D., and Xia, Kai. Exploiting machine learning to subvert your spam filter. In 1st Workshop on Large-Scale Exploits and Emergent Threats, pp. 1-9, 2008. USENIX Association.
-
(2008)
1st Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.3
Jack, J.4
Anthony, D.5
Rubinstein, B.I.P.6
Saini, U.7
Sutton, C.8
Tygar, J.D.9
Xia, K.10
-
30
-
-
84896691627
-
Robust lasso with missing and grossly corrupted observations
-
Nguyen, N.H. and Tran, T.D. Robust lasso with missing and grossly corrupted observations. IEEE Trans. Inf. Theor., 59(4):2036-2058, 2013.
-
(2013)
IEEE Trans. Inf. Theor.
, vol.59
, Issue.4
, pp. 2036-2058
-
-
Nguyen, N.H.1
Tran, T.D.2
-
31
-
-
80555140075
-
Machine learning in Python
-
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cour-napeau, D., Brucher, M., Perrot, M., and Duchesnay, E. Scikit-learn: Machine learning in Python. J. Mach. Learn. Res., 12:2825-2830, 2011.
-
(2011)
J. Mach. Learn. Res.
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cour-Napeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.S.-L.16
-
32
-
-
1542634595
-
A statistical approach to the spam problem
-
Robinson, Gary. A statistical approach to the spam problem. Linux J., 2003(107):3, 2003.
-
(2003)
Linux J.
, vol.2003
, Issue.107
, pp. 3
-
-
Robinson, G.1
-
33
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
ACM
-
Rubinstein, Benjamin I.P., Nelson, Blaine, Huang, Ling, Joseph, Anthony D., Lau, Shing-hon, Rao, Satish, Taft, Nina, and Tygar, J. D. Antidote: understanding and defending against poisoning of anomaly detectors. In 9th Internet Meas. Conf, pp. 1-14, 2009. ACM.
-
(2009)
9th Internet Meas. Conf
, pp. 1-14
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
34
-
-
0005373173
-
-
AAAI Technical Report, Madison, Wisconsin
-
Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. A Bayesian approach to filtering junk e-mail. AAAI Technical Report WS-98-05, Madison, Wisconsin, 1998.
-
(1998)
A Bayesian Approach to Filtering Junk E-mail
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
35
-
-
84872119350
-
Malicious PDF detection using metadata and structural features
-
ACM
-
Smutz, Charles and Stavrou, Angelos. Malicious PDF detection using metadata and structural features. In 28th Annual Computer Security Applications Conf, pp. 239-248, 2012. ACM.
-
(2012)
28th Annual Computer Security Applications Conf
, pp. 239-248
-
-
Smutz, C.1
Stavrou, A.2
-
37
-
-
85162055491
-
Convex learning with invariances
-
MIT Press
-
Teo, Choon Hui, Globerson, Amir, Roweis, Sam, and Smola, Alex. Convex learning with invariances. In NIPS 20, pp. 1489-1496. MIT Press, 2008.
-
(2008)
NIPS
, vol.20
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
-
38
-
-
85194972808
-
Regression shrinkage and selection via the lasso
-
Tibshirani, R. Regression shrinkage and selection via the lasso. J. Royal Stat. Soc. (Ser. B), 58:267-288, 1996.
-
(1996)
J. Royal Stat. Soc. (Ser. B)
, vol.58
, pp. 267-288
-
-
Tibshirani, R.1
-
39
-
-
85180414841
-
Detection of malicious pdf files based on hierarchical document structure
-
The Internet Society
-
Šrndić, Nedim and Laskov, Pavel. Detection of malicious pdf files based on hierarchical document structure. In NDSS. The Internet Society, 2013.
-
(2013)
NDSS
-
-
Šrndić, N.1
Laskov, P.2
-
40
-
-
84936942529
-
On sparse feature attacks in adversarial learning
-
IEEE
-
Wang, Fei, Liu, Wei, and Chawla, Sanjay. On sparse feature attacks in adversarial learning. In IEEE Int'l Conf. on Data Mining (ICDM), pp. 1013-1018. IEEE, 2014.
-
(2014)
IEEE Int'l Conf. on Data Mining (ICDM)
, pp. 1013-1018
-
-
Wang, F.1
Liu, W.2
Chawla, S.3
-
41
-
-
85015150326
-
Adversarial feature selection against evasion attacks
-
Zhang, F., Chan, P.P.K., Biggio, B., Yeung, D.S., and Roli, F. Adversarial feature selection against evasion attacks. IEEE Trans, on Cybernetics, PP(99):1-1, 2015.
-
(2015)
IEEE Trans, on Cybernetics
, vol.PP
, Issue.99
, pp. 1
-
-
Zhang, F.1
Chan, P.P.K.2
Biggio, B.3
Yeung, D.S.4
Roli, F.5
-
42
-
-
16244401458
-
Regularization and variable selection via the elastic net
-
Zou, Hui and Hastie, Trevor. Regularization and variable selection via the elastic net. J. Royal Stat. Soc. (Ser. B), 67(2):301-320, 2005.
-
(2005)
J. Royal Stat. Soc. (Ser. B)
, vol.67
, Issue.2
, pp. 301-320
-
-
Zou, H.1
Hastie, T.2
|