-
1
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
T. Kanade, A. K. Jain and N. K. Ratha, LNCS, Springer
-
A. Adler, Vulnerabilities in biometric encryption systems, 5th Int. Conf. Audio- and Video-Based Biometric Person Authentication, eds. T. Kanade, A. K. Jain and N. K. Ratha, LNCS, Vol. 3546(Springer, 2005), pp. 1100-1109.
-
(2005)
5th Int. Conf. Audio- and Video-based Biometric Person Authentication
, vol.3546
, pp. 1100-1109
-
-
Adler, A.1
-
2
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of DGA-based malware
-
USENIX
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee and D. Dagon, From throw-away traffic to bots: Detecting the rise of DGA-based malware, in 21st USENIX Security Symp. (USENIX, 2012), pp. 491-506.
-
(2012)
21st USENIX Security Symp
, pp. 491-506
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
3
-
-
3042745793
-
The weakest link revisited
-
I. Arce, The weakest link revisited, IEEE Security Privacy 1 (2) (2003) 72-76.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.2
, pp. 72-76
-
-
Arce, I.1
-
4
-
-
84878115018
-
A survey of image spamming and -ltering techniques
-
A. Attar, R. M. Rad and R. E. Atani, A survey of image spamming and -ltering techniques, Artif. Intell. Rev. 40 (1) (2013) 71-105.
-
(2013)
Artif. Intell. Rev.
, vol.40
, Issue.1
, pp. 71-105
-
-
Attar, A.1
Rad, R.M.2
Atani, R.E.3
-
5
-
-
70349235375
-
Open problems in the security of learning
-
ACM
-
M. Barreno, P. L. Bartlett, F. J. Chi, A. D. Joseph, B. Nelson, B. I. Rubinstein, U. Saini and J. D. Tygar, Open problems in the security of learning, Proc. 1st ACM Workshop on Arti-cial Intell. Sec., AISec'08(ACM, 2008), pp. 19-26.
-
(2008)
Proc. 1st ACM Workshop on Arti-cial Intell. Sec., AISec'08
, pp. 19-26
-
-
Barreno, M.1
Bartlett, P.L.2
Chi, F.J.3
Joseph, A.D.4
Nelson, B.5
Rubinstein, B.I.6
Saini, U.7
Tygar, J.D.8
-
6
-
-
33845989821
-
Can machine learning be secure? Proc. ACM Symp. Information
-
ACM
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph and J. D. Tygar, Can machine learning be secure? Proc. ACM Symp. Information, Computer and Comm. Sec., ASIACCS'06(ACM, 2006), pp. 16-25.
-
(2006)
Computer and Comm. Sec., ASIACCS'06
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
7
-
-
84861164054
-
A learning-based approach to reactive security
-
A. Barth, B. I. Rubinstein, M. Sundararajan, J. C. Mitchell, D. Song and P. L. Bartlett, A learning-based approach to reactive security, IEEE Trans. Dependable Secure Comput. 9 (4) (2012) 482-493.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.4
, pp. 482-493
-
-
Barth, A.1
Rubinstein, B.I.2
Sundararajan, M.3
Mitchell, J.C.4
Song, D.5
Bartlett, P.L.6
-
8
-
-
84866671111
-
Security evaluation of biometric authentication systems under real spoo-ng attacks
-
B. Biggio, Z. Akhtar, G. Fumera, G. L. Marcialis and F. Roli, Security evaluation of biometric authentication systems under real spoo-ng attacks, IET Biometrics 1 (1) (2012) 11-24.
-
(2012)
IET Biometrics
, vol.1
, Issue.1
, pp. 11-24
-
-
Biggio, B.1
Akhtar, Z.2
Fumera, G.3
Marcialis, G.L.4
Roli, F.5
-
9
-
-
80053015779
-
Bagging classiers for-ghting poisoning attacks in adversarial environments
-
C. Sansone et al., LNCS, Springer
-
B. Biggio, I. Corona, G. Fumera, G. Giacinto and F. Roli, Bagging classiers for-ghting poisoning attacks in adversarial environments, in 10th Int. Workshop on MCSs, eds. C. Sansone et al., LNCS, Vol. 6713(Springer, 2011), pp. 350-359.
-
(2011)
10th Int. Workshop on MCSs
, vol.6713
, pp. 350-359
-
-
Biggio, B.1
Corona, I.2
Fumera, G.3
Giacinto, G.4
Roli, F.5
-
10
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
H. Blockeel et al., LNCS, Springer
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Šrndiæ, P. Laskov, G. Giacinto and F. Roli, Evasion attacks against machine learning at test time, in European Conf. Machine Learning and Principles and Practice Knowl. Discovery in Databases, Part III, eds. H. Blockeel et al., LNCS, Vol. 8190(Springer, 2013), pp. 387-402.
-
(2013)
European Conf. Machine Learning and Principles and Practice Knowl. Discovery in Databases, Part III
, vol.8190
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndiæ, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
11
-
-
84927956444
-
Security evaluation of support vector machines in adversarial environments
-
Y. Ma and G. Guo, Springer International Publishing
-
B. Biggio, I. Corona, B. Nelson, B. Rubinstein, D. Maiorca, G. Fumera, G. Giacinto and F. Roli, Security evaluation of support vector machines in adversarial environments, in Support Vector Machines Applications, eds. Y. Ma and G. Guo (Springer International Publishing, 2014), pp. 105-153.
-
(2014)
Support Vector Machines Applications
, pp. 105-153
-
-
Biggio, B.1
Corona, I.2
Nelson, B.3
Rubinstein, B.4
Maiorca, D.5
Fumera, G.6
Giacinto, G.7
Roli, F.8
-
12
-
-
84887437820
-
Poisoning attacks to compromise face templates
-
B. Biggio, L. Didaci, G. Fumera and F. Roli, Poisoning attacks to compromise face templates, 6th IAPR Int. Conf. Biometrics (2013), pp. 1-7.
-
(2013)
6th IAPR Int. Conf. Biometrics
, pp. 1-7
-
-
Biggio, B.1
Didaci, L.2
Fumera, G.3
Roli, F.4
-
13
-
-
79956346771
-
A survey and experimental evaluation of image spamltering techniques
-
B. Biggio, G. Fumera, I. Pillai and F. Roli, A survey and experimental evaluation of image spamltering techniques, Pattern Recogn. Lett. 32 (10) (2011) 1436-1446.
-
(2011)
Pattern Recogn. Lett.
, vol.32
, Issue.10
, pp. 1436-1446
-
-
Biggio, B.1
Fumera, G.2
Pillai, I.3
Roli, F.4
-
14
-
-
58349121261
-
Adversarial pattern classi-cation using multiple classi-ers and randomisation
-
Springer-Verlag
-
B. Biggio, G. Fumera and F. Roli, Adversarial pattern classi-cation using multiple classi-ers and randomisation, 12th Joint IAPR Int. Workshop on Structural and Syntactic Pattern Rec., LNCS, Vol. 5342(Springer-Verlag, 2008), pp. 500-509.
-
(2008)
12th Joint IAPR Int. Workshop on Structural and Syntactic Pattern Rec., LNCS
, vol.5342
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
15
-
-
70350241126
-
Evade hard multiple classi-er systems
-
O. Okun and G. Valentini, Studies in Computational Intell, Springer
-
B. Biggio, G. Fumera and F. Roli, Evade hard multiple classi-er systems, in Supervised and Unsupervised Ensemble Methods and their Applications, eds. O. Okun and G. Valentini, Vol. 245, Studies in Computational Intell. (Springer, 2009), pp. 15-38.
-
(2009)
Supervised and Unsupervised Ensemble Methods and Their Applications
, vol.245
, pp. 15-38
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
16
-
-
70349319703
-
Multiple classifier systems for adversarial classification tasks
-
J. A. Benediktsson, J. Kittler and F. Roli, LNCS, Springer
-
B. Biggio, G. Fumera and F. Roli, Multiple classifier systems for adversarial classification tasks, Proc. 8th Int. Workshop on MCSs, eds. J. A. Benediktsson, J. Kittler and F. Roli, LNCS, Vol. 5519(Springer, 2009), pp. 132-141.
-
(2009)
Proc. 8th Int. Workshop on MCSs
, vol.5519
, pp. 132-141
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
17
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
B. Biggio, G. Fumera and F. Roli, Multiple classifier systems for robust classifier design in adversarial environments, Int. J. Mach. Learn. Cybern. 1 (1) (2010) 27-41.
-
(2010)
Int. J. Mach. Learn. Cybern.
, vol.1
, Issue.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
18
-
-
77952042088
-
Multiple classifier systems under attack
-
N. E. Gayar et al., LNCS, Springer
-
B. Biggio, G. Fumera and F. Roli, Multiple classifier systems under attack, in 9th Int. Workshop on MCSs, eds. N. E. Gayar et al., LNCS, Vol. 5997(Springer, 2010), pp. 74-83.
-
(2010)
9th Int. Workshop on MCSs
, vol.5997
, pp. 74-83
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
19
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
B. Biggio, G. Fumera and F. Roli, Design of robust classifiers for adversarial environments, IEEE Int. Conf. Systems, Man and Cybern. (2011), pp. 977-982.
-
(2011)
IEEE Int. Conf. Systems, Man and Cybern.
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
20
-
-
84992268362
-
Security evaluation of pattern classifiers under attack
-
B. Biggio, G. Fumera and F. Roli, Security evaluation of pattern classifiers under attack, IEEE Trans. Knowl. Data Eng. 26 (4) (2014) 984-996.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.4
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
21
-
-
84868094889
-
Poisoning adaptive biometric systems
-
G. Gimel'farb et al., LNCS, Springer
-
B. Biggio, G. Fumera, F. Roli and L. Didaci, Poisoning adaptive biometric systems, in Structural, Syntactic and Statistical Pattern Recognition, eds. G. Gimel'farb et al., LNCS, Vol. 7626(Springer, 2012), pp. 417-425.
-
(2012)
Structural, Syntactic and Statistical Pattern Recognition
, vol.7626
, pp. 417-425
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
Didaci, L.4
-
22
-
-
84867136631
-
Poisoning attacks against support vector machines
-
J. Langford et al, Omnipress
-
B. Biggio, B. Nelson and P. Laskov, Poisoning attacks against support vector machines, 29th Int. Conf. Mach. Learn., eds. J. Langford et al. (Omnipress, 2012), pp. 1807-1814.
-
(2012)
29th Int. Conf. Mach. Learn.
, pp. 1807-1814
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
23
-
-
84888997884
-
Is data clustering in adversarial settings secure?
-
ACM
-
B. Biggio, I. Pillai, S. R. Bulò, D. Ariu, M. Pelillo and F. Roli, Is data clustering in adversarial settings secure? Proc. Workshop on Artificial Intell. Security, AISec'13(ACM, 2013), pp. 87-98.
-
(2013)
Proc. Workshop on Artificial Intell. Security, AISec'13
, pp. 87-98
-
-
Biggio, B.1
Pillai, I.2
Bulò, S.R.3
Ariu, D.4
Pelillo, M.5
Roli, F.6
-
24
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
M. Brückner, C. Kanzow and T. Scheffer, Static prediction games for adversarial learning problems, J. Mach. Learn. Res. 13 (2012) 2617-2654.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
25
-
-
84858719086
-
Nash equilibria of static prediction games
-
Y. Bengio et al, MIT Press
-
M. Brückner and T. Scheffer, Nash equilibria of static prediction games, in Advances in Neural Information Processing Systems 22, eds. Y. Bengio et al. (MIT Press, 2009), pp. 171-179.
-
(2009)
Advances in Neural Information Processing Systems
, vol.22
, pp. 171-179
-
-
Brückner, M.1
Scheffer, T.2
-
27
-
-
18244390064
-
On robust properties of convex risk minimization methods for pattern recognition
-
A. Christmann and I. Steinwart, On robust properties of convex risk minimization methods for pattern recognition, J. Mach. Learn. Res. 5 (2004) 1007-1034.
-
(2004)
J. Mach. Learn. Res.
, vol.5
, pp. 1007-1034
-
-
Christmann, A.1
Steinwart, I.2
-
28
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
IEEE CS
-
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo and A. D. Keromytis, Casting out demons: Sanitizing training data for anomaly sensors, IEEE Symp. Security Privacy (IEEE CS, 2008), pp. 81-95.
-
(2008)
IEEE Symp. Security Privacy
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
29
-
-
34248577801
-
Algorithms for projection - Pursuit robust principal component analysis
-
C. Croux, P. Filzmoser and M. R. Oliveira, Algorithms for projection - pursuit robust principal component analysis, Chemometr. Intell. Lab. Syst. 87 (2) (2007) 218-225.
-
(2007)
Chemometr. Intell. Lab. Syst.
, vol.87
, Issue.2
, pp. 218-225
-
-
Croux, C.1
Filzmoser, P.2
Oliveira, M.R.3
-
30
-
-
85008536972
-
Security analytics and measurements
-
G. Cybenko and C. E. Landwehr, Security analytics and measurements, IEEE Security Privacy 10 (3) (2012) 5-8.
-
(2012)
IEEE Security Privacy
, vol.10
, Issue.3
, pp. 5-8
-
-
Cybenko, G.1
Landwehr, C.E.2
-
31
-
-
12244295760
-
Adversarial classification
-
N. Dalvi, P. Domingos, Mausam, S. Sanghai and D. Verma, Adversarial classification, 10th Int. Conf. Knowl. Disc. Data Mining (2004), pp. 99-108.
-
(2004)
10th Int. Conf. Knowl. Disc. Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam, S.S.3
Verma, D.4
-
32
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
O. Dekel, O. Shamir and L. Xiao, Learning to classify with missing and corrupted features, Mach. Learn. 81 (2010) 149-178.
-
(2010)
Mach. Learn.
, vol.81
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
35
-
-
85077703150
-
Polymorphic blending attacks
-
USENIX Association, Berkeley, CA, USA
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov and W. Lee, Polymorphic blending attacks, Proc. 15th Conf. USENIX Security Symp. (USENIX Association, Berkeley, CA, USA, 2006), pp. 241-256.
-
(2006)
Proc. 15th Conf. USENIX Security Symp
, pp. 241-256
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
36
-
-
70449713306
-
On the vulnerability of face verification systems to hill-climbing attacks
-
J. Galbally, C. McCool, J. Fierrez, S. Marcel and J. Ortega-Garcia, On the vulnerability of face verification systems to hill-climbing attacks, Pattern Recogn. 43 (3) (2010) 1027-1038.
-
(2010)
Pattern Recogn.
, vol.43
, Issue.3
, pp. 1027-1038
-
-
Galbally, J.1
McCool, C.2
Fierrez, J.3
Marcel, S.4
Ortega-Garcia, J.5
-
37
-
-
33749242256
-
Nightmare at test time: Robust learning by feature deletion
-
W. W. Cohen and A. Moore, ACM
-
A. Globerson and S. T. Roweis, Nightmare at test time: Robust learning by feature deletion, Proc. 23rd Int. Conf. Mach. Learn., eds. W. W. Cohen and A. Moore, Vol. 148(ACM, 2006), pp. 353-360.
-
(2006)
Proc. 23rd Int. Conf. Mach. Learn.
, vol.148
, pp. 353-360
-
-
Globerson, A.1
Roweis, S.T.2
-
38
-
-
84897500325
-
Bayesian games for adversarial regression problems
-
Atlanta, USA
-
M. Großhans, C. Sawade, M. Brückner and T. Scheffer, Bayesian games for adversarial regression problems, Proc. 30th Int. Conf. Mach. Learn., Vol. 28(3) (Atlanta, USA, 2013), pp. 55-63.
-
(2013)
Proc. 30th Int. Conf. Mach. Learn.
, vol.28
, Issue.3
, pp. 55-63
-
-
Großhans, M.1
Sawade, C.2
Brückner, M.3
Scheffer, T.4
-
39
-
-
84866039328
-
Discriminative clustering for market segmentation
-
ACM
-
P. Haider, L. Chiarandini and U. Brefeld, Discriminative clustering for market segmentation, Proc. 18th Int. Conf. Knowl. Disc. and Data Mining, KDD'12(ACM, 2012), pp. 417-425.
-
(2012)
Proc. 18th Int. Conf. Knowl. Disc. and Data Mining, KDD'12
, pp. 417-425
-
-
Haider, P.1
Chiarandini, L.2
Brefeld, U.3
-
40
-
-
0003841907
-
Robust statistics: The approach based on influence functions
-
John Wiley and Sons, NY, USA
-
F. R. Hampel, E. M. Ronchetti, P. J. Rousseeuw and W. A. Stahel, Robust Statistics: The Approach Based on Influence Functions, Probability and Mathematical Statistics (John Wiley and Sons, NY, USA, 1986).
-
(1986)
Probability and Mathematical Statistics
-
-
Hampel, F.R.1
Ronchetti, E.M.2
Rousseeuw, P.J.3
Stahel, W.A.4
-
41
-
-
80955143573
-
Adversarial machine learning
-
L. Huang, A. D. Joseph, B. Nelson, B. Rubinstein and J. D. Tygar, Adversarial machine learning, in 4th Workshop on Artificial Intell. Sec. (2011), pp. 43-57.
-
(2011)
4th Workshop on Artificial Intell. Sec.
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
42
-
-
33744779400
-
Biometrics: A tool for information security
-
A. K. Jain, A. Ross, S. Pankanti and S. Member, Biometrics: A tool for information security, IEEE Trans. Inf. Forensics Security 1 (2006) 125-143.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
Member, S.4
-
43
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov, Abusing file processing in malware detectors for fun and profit, Proc. 33rd IEEE Symp. Sec. & Privacy (2012), pp. 80-94.
-
(2012)
Proc. 33rd IEEE Symp. Sec. & Privacy
, pp. 80-94
-
-
Jana, S.1
Shmatikov, V.2
-
44
-
-
84922860136
-
Machine learning methods for computer security (Dagstuhl Perspectives Workshop 12371)
-
A. D. Joseph, P. Laskov, F. Roli, J. D. Tygar and B. Nelson, Machine learning methods for computer security (Dagstuhl Perspectives Workshop 12371), Dagstuhl Manifestos 3 (1) (2013) 1-30.
-
(2013)
Dagstuhl Manifestos
, vol.3
, Issue.1
, pp. 1-30
-
-
Joseph, A.D.1
Laskov, P.2
Roli, F.3
Tygar, J.D.4
Nelson, B.5
-
45
-
-
84988398412
-
Classifier evaluation and attribute selection against active adversaries
-
M. Kantarcioglu, B. Xi and C. Clifton, Classifier evaluation and attribute selection against active adversaries, Data Mining Knowl. Discov. (2010), pp. 1-45.
-
(2010)
Data Mining Knowl. Discov.
, pp. 1-45
-
-
Kantarcioglu, M.1
Xi, B.2
Clifton, C.3
-
47
-
-
84904807829
-
Feature weighting for improved classifier robustness
-
Mountain View, CA, USA
-
A. Kolcz and C. H. Teo, Feature weighting for improved classifier robustness, in 6th Conf. Email and Anti-Spam (Mountain View, CA, USA, 2009), pp. 1-8.
-
(2009)
6th Conf. Email and Anti-Spam
, pp. 1-8
-
-
Kolcz, A.1
Teo, C.H.2
-
48
-
-
70349310717
-
Classifier ensembles for detecting concept change in streaming data: Overview and perspectives
-
O. Okun and G. Valentini, Patras, Greece
-
L. I. Kuncheva, Classifier ensembles for detecting concept change in streaming data: Overview and perspectives, in Workshop on Supervised and Unsupervised Ensemble Methods and their Applications, eds. O. Okun and G. Valentini (Patras, Greece, 2008), pp. 5-10.
-
(2008)
Workshop on Supervised and Unsupervised Ensemble Methods and Their Applications
, pp. 5-10
-
-
Kuncheva, L.I.1
-
49
-
-
77955660961
-
Mining adversarial patterns via regularized loss minimization
-
W. Liu and S. Chawla, Mining adversarial patterns via regularized loss minimization, Mach. Learn. 81 (1) (2010) 69-83.
-
(2010)
Mach. Learn.
, vol.81
, Issue.1
, pp. 69-83
-
-
Liu, W.1
Chawla, S.2
-
51
-
-
65449142381
-
Good word attacks on statistical spam filters
-
Mountain View, CA, USA
-
D. Lowd and C. Meek, Good word attacks on statistical spam filters, 2nd Conf. Email and Anti-Spam (Mountain View, CA, USA, 2005), pp. 1-8.
-
(2005)
2nd Conf. Email and Anti-Spam
, pp. 1-8
-
-
Lowd, D.1
Meek, C.2
-
52
-
-
84877998967
-
Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection
-
ACM
-
D. Maiorca, I. Corona and G. Giacinto, Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection, Proc. 8th Symp. Inform., Comp. and Comm. Sec., ASIACCS'13(ACM, 2013), pp. 119-130.
-
(2013)
Proc. 8th Symp. Inform., Comp. and Comm. Sec., ASIACCS'13
, pp. 119-130
-
-
Maiorca, D.1
Corona, I.2
Giacinto, G.3
-
53
-
-
84947338420
-
Robust Statistics: Theory and Methods
-
John Wiley and Sons, NY, USA
-
R. A. Maronna, R. D. Martin and V. J. Yohai, Robust Statistics: Theory and Methods, Probability and Mathematical Statistics (John Wiley and Sons, NY, USA, 2006).
-
(2006)
Probability and Mathematical Statistics
-
-
Maronna, R.A.1
Martin, R.D.2
Yohai, V.J.3
-
54
-
-
79959265863
-
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
-
M. Martinez-Diaz, J. Fierrez, J. Galbally and J. Ortega-Garcia, An evaluation of indirect attacks and countermeasures in fingerprint verification systems, Pattern Recogn. Lett. 32 (12) (2011) 1643-1651.
-
(2011)
Pattern Recogn. Lett.
, vol.32
, Issue.12
, pp. 1643-1651
-
-
Martinez-Diaz, M.1
Fierrez, J.2
Galbally, J.3
Ortega-Garcia, J.4
-
55
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
USENIX
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar and K. Xia, Exploiting machine learning to subvert your spam filter, Proc. 1st Workshop on Large-Scale Expl. and Em. Threats (USENIX, 2008), pp. 1-9.
-
(2008)
Proc. 1st Workshop on Large-scale Expl. and Em. Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
56
-
-
80955157923
-
Understanding the risk factors of learning in adversarial environments
-
ACM
-
B. Nelson, B. Biggio and P. Laskov, Understanding the risk factors of learning in adversarial environments, 4th Workshop on Artificial Intell. and Sec., AISec'11(ACM, 2011), pp. 87-92.
-
(2011)
4th Workshop on Artificial Intell. and Sec., AISec'11
, pp. 87-92
-
-
Nelson, B.1
Biggio, B.2
Laskov, P.3
-
57
-
-
84862001718
-
Query strategies for evading convex-inducing classifiers
-
B. Nelson, B. I. Rubinstein, L. Huang, A. D. Joseph, S. J. Lee, S. Rao and J. D. Tygar, Query strategies for evading convex-inducing classifiers, J. Mach. Learn. Res. 13 (2012) 1293-1332.
-
(2012)
J. Mach. Learn. Res.
, vol.13
, pp. 1293-1332
-
-
Nelson, B.1
Rubinstein, B.I.2
Huang, L.3
Joseph, A.D.4
Lee, S.J.5
Rao, S.6
Tygar, J.D.7
-
58
-
-
84862282845
-
Near-optimal evasion of convex-inducing classifiers
-
Chia, Sardinia, Italy
-
B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, S. Hon Lau, S. Lee, S. Rao, A. Tran and J. D. Tygar, Near-optimal evasion of convex-inducing classifiers, in J. Mach. Learn. Res. Proc. 13th Int. Conf. Artificial Intell. and Statistics (AISTATS), Vol. 9. (Chia, Sardinia, Italy, 2010), pp. 549-556.
-
(2010)
J. Mach. Learn. Res. Proc. 13th Int. Conf. Artificial Intell. and Statistics (AISTATS)
, vol.9
, pp. 549-556
-
-
Nelson, B.1
Rubinstein, B.I.P.2
Huang, L.3
Joseph, A.D.4
Hon Lau, S.5
Lee, S.6
Rao, S.7
Tran, A.8
Tygar, J.D.9
-
59
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Springer
-
J. Newsome, B. Karp and D. Song, Paragraph: Thwarting signature learning by training maliciously, in RAID, LNCS (Springer, 2006), pp. 81-105.
-
(2006)
RAID, LNCS
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
60
-
-
84899065894
-
Randomized anagram revisited
-
S. Pastrana, A. Orfila, J. E. Tapiador and P. Peris-Lopez, Randomized anagram revisited, J. Netw. Comput. Appl. 41 (2014) 182-196.
-
(2014)
J. Netw. Comput. Appl.
, vol.41
, pp. 182-196
-
-
Pastrana, S.1
Orfila, A.2
Tapiador, J.E.3
Peris-Lopez, P.4
-
61
-
-
84875216992
-
Scalable fine-grained behavioral clustering of httpbased malware
-
R. Perdisci, D. Ariu and G. Giacinto, Scalable fine-grained behavioral clustering of httpbased malware, Comput. Netw. 57 (2) (2013) 487-500.
-
(2013)
Comput. Netw.
, vol.57
, Issue.2
, pp. 487-500
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, G.3
-
62
-
-
82055208335
-
An analysis of minutiae matching strength
-
J. Bigün and F. Smeraldi, LNCS, Springer
-
N. K. Ratha, J. H. Connell and R. M. Bolle, An analysis of minutiae matching strength, in Int. Conf. Audio- and Video-Based Biometric Person Authentication, eds. J. Bigün and F. Smeraldi, LNCS, Vol. 2091(Springer, 2001), pp. 223-228.
-
(2001)
Int. Conf. Audio- and Video-based Biometric Person Authentication
, vol.2091
, pp. 223-228
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
63
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems and T. Holz, Automatic analysis of malware behavior using machine learning, J. Comput. Secur. 19 (4) (2011) 639-668.
-
(2011)
J. Comput. Secur.
, vol.19
, Issue.4
, pp. 639-668
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
64
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
R. N. Rodrigues, L. L. Ling and V. Govindaraju, Robustness of multimodal biometric fusion methods against spoof attacks, J. Vis. Lang. Comput. 20 (3) (2009) 169-179.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
65
-
-
84893186903
-
Pattern recognition systems under attack
-
J. Ruiz-Shulcloper and G. S. di Baja, LNCS, Springer
-
F. Roli, B. Biggio and G. Fumera, Pattern recognition systems under attack, in Progress in Pattern Recognition Image Analysis, Computer Vision, and Applications, eds. J. Ruiz-Shulcloper and G. S. di Baja, LNCS, Vol. 8258(Springer, 2013), pp. 1-8.
-
(2013)
Progress in Pattern Recognition Image Analysis, Computer Vision, and Applications
, vol.8258
, pp. 1-8
-
-
Roli, F.1
Biggio, B.2
Fumera, G.3
-
66
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
ACM
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-H. Lau, S. Rao, N. Taft and J. D. Tygar, Antidote: Understanding and defending against poisoning of anomaly detectors, Proc. 9th Int. Measurement Conf., IMC'09(ACM, 2009), pp. 1-14.
-
(2009)
Proc. 9th Int. Measurement Conf., IMC'09
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
67
-
-
84877781092
-
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
-
B. I. P. Rubinstein, P. L. Bartlett, L. Huang and N. Taft, Learning in a large function space: Privacy-preserving mechanisms for SVM learning, J. Privacy Confidentiality 4 (1) (2012) 65-100.
-
(2012)
J. Privacy Confidentiality
, vol.4
, Issue.1
, pp. 65-100
-
-
Rubinstein, B.I.P.1
Bartlett, P.L.2
Huang, L.3
Taft, N.4
-
68
-
-
85162055491
-
Convex learning with invariances
-
J. Platt, D. Koller, Y. Singer and S. Roweis, MIT Press, Cambridge, MA
-
C. H. Teo, A. Globerson, S. Roweis and A. Smola, Convex learning with invariances, in Advances in Neural Information Processing Systems 20, eds. J. Platt, D. Koller, Y. Singer and S. Roweis (MIT Press, Cambridge, MA, 2008), pp. 1489-1496.
-
(2008)
Advances in Neural Information Processing Systems 20
, pp. 1489-1496
-
-
Teo, C.H.1
Globerson, A.2
Roweis, S.3
Smola, A.4
-
69
-
-
84897511735
-
Convex adversarial collective classification
-
M. Torkamani and D. Lowd, Convex adversarial collective classification, Proc. 30th Int. Conf. Mach. Learning, JMLR, Vol. 28(2013), pp. 642-650.
-
(2013)
Proc. 30th Int. Conf. Mach. Learning, JMLR
, vol.28
, pp. 642-650
-
-
Torkamani, M.1
Lowd, D.2
-
70
-
-
53849091083
-
On attacking statistical spam filters
-
Mountain View, CA, USA
-
G. L. Wittel and S. F. Wu, On attacking statistical spam filters, First Conf. Email and Anti-Spam (Mountain View, CA, USA, 2004), pp. 1-7.
-
(2004)
First Conf. Email and Anti-Spam
, pp. 1-7
-
-
Wittel, G.L.1
Wu, S.F.2
-
72
-
-
68949157380
-
Robustness and regularization of support vector machines
-
H. Xu, C. Caramanis and S. Mannor, Robustness and regularization of support vector machines, J. Mach. Learn. Res. 10 (2009) 1485-1510.
-
(2009)
J. Mach. Learn. Res.
, vol.10
, pp. 1485-1510
-
-
Xu, H.1
Caramanis, C.2
Mannor, S.3
-
74
-
-
84866042395
-
Adversarial support vector machine learning
-
ACM
-
Y. Zhou, M. Kantarcioglu, B. Thuraisingham and B. Xi, Adversarial support vector machine learning, Proc. 18th Int. Conf. Knowl. Disc. and Data Mining, KDD'12(ACM, 2012), pp. 1059-1067.
-
(2012)
Proc. 18th Int. Conf. Knowl. Disc. and Data Mining, KDD'12
, pp. 1059-1067
-
-
Zhou, Y.1
Kantarcioglu, M.2
Thuraisingham, B.3
Xi, B.4
|