-
1
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of Multimodal Biometric Fusion Methods against Spoof Attacks," J. Visual Languages and Computing, vol. 20, no. 3, pp. 169-179, 2009.
-
(2009)
J. Visual Languages and Computing
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
2
-
-
79952506172
-
Multimodal fusion vulnerability to non-zero effort (spoof) imposters
-
P. Johnson, B. Tan, and S. Schuckers, "Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters," Proc. IEEE Int'l Workshop Information Forensics and Security, pp. 1-5, 2010.
-
(2010)
Proc. IEEE Int'l Workshop Information Forensics and Security
, pp. 1-5
-
-
Johnson, P.1
Tan, B.2
Schuckers, S.3
-
3
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee, "Polymorphic Blending Attacks," Proc. 15th Conf. USENIX Security Symp., 2006.
-
(2006)
Proc. 15th Conf. USENIX Security Symp.
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
7
-
-
77954868784
-
Adversarial knowledge discovery
-
Nov. /Dec.
-
D. B. Skillicorn, "Adversarial Knowledge Discovery," IEEE Intelligent Systems, vol. 24, no. 6, Nov. /Dec. 2009.
-
(2009)
IEEE Intelligent Systems
, vol.24
, Issue.6
-
-
Skillicorn, D.B.1
-
8
-
-
57349128585
-
Adversarial information retrieval: the manipulation of web content
-
D. Fetterly, "Adversarial Information Retrieval: The Manipulation of Web Content," ACM Computing Rev., 2007.
-
(2007)
ACM Computing Rev.
-
-
Fetterly, D.1
-
10
-
-
12244295760
-
Adversarial classification
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, "Adversarial Classification," Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 99-108, 2004. (Pubitemid 40114920)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Mausam3
Sanghai, S.4
Verma, D.5
-
11
-
-
33845989821
-
Can machine learning be secure
-
DOI 10.1145/1128817.1128824, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar, "Can Machine Learning be Secure" Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 16-25, 2006. (Pubitemid 46644722)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
13
-
-
78049528115
-
Machine learning in adversarial environments
-
P. Laskov and R. Lippmann, "Machine Learning in Adversarial Environments," Machine Learning, vol. 81, pp. 115-119, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 115-119
-
-
Laskov, P.1
Lippmann, R.2
-
14
-
-
80955143573
-
Adversarial machine learning
-
L. Huang, A. D. Joseph, B. Nelson, B. Rubinstein, and J. D. Tygar, "Adversarial Machine Learning," Proc. Fourth ACM Workshop Artificial Intelligence and Security, pp. 43-57, 2011.
-
(2011)
Proc. Fourth ACM Workshop Artificial Intelligence and Security
, pp. 43-57
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.D.5
-
15
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. Joseph, and J. Tygar, "The Security of Machine Learning," Machine Learning, vol. 81, pp. 121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
22
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting Signature Learning by Training Maliciously," Proc. Ninth Int'l Conf. Recent Advances in Intrusion Detection, pp. 81-105, 2006. (Pubitemid 44617848)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
24
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
-
R. Perdisci, G. Gu, and W. Lee, "Using an Ensemble of One-Class SVM Classifiers to Harden Payload-Based Anomaly Detection Systems," Proc. Int'l Conf. Data Mining, pp. 488-498, 2006. (Pubitemid 47485828)
-
(2007)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 488-498
-
-
Perdisci, R.1
Gu, O.2
Lee, W.3
-
26
-
-
46249103547
-
A multiple instance learning strategy for combating good word attacks on spam filters
-
Z. Jorgensen, Y. Zhou, and M. Inge, "A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters," J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008.
-
(2008)
J. Machine Learning Research
, vol.9
, pp. 1115-1146
-
-
Jorgensen, Z.1
Zhou, Y.2
Inge, M.3
-
27
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo, and A. D. Keromytis, "Casting out Demons: Sanitizing Training Data for Anomaly Sensors," Proc. IEEE Symp. Security and Privacy, pp. 81-95, 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
28
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia, "Exploiting Machine Learning to Subvert Your Spam Filter," Proc. First Workshop Large-Scale Exploits and Emergent Threats, pp. 1-9, 2008.
-
(2008)
Proc. First Workshop Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
29
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, S. Rao, N. Taft, and J. D. Tygar, "Antidote: Understanding and Defending against Poisoning of Anomaly Detectors," Proc. Ninth ACM SIGCOMM Internet Measurement Conf. (IMC '09), pp. 1-14, 2009.
-
(2009)
Proc. Ninth ACM SIGCOMM Internet Measurement Conf. (IMC '09)
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
31
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
O. Dekel, O. Shamir, and L. Xiao, "Learning to Classify with Missing and Corrupted Features," Machine Learning, vol. 81, pp. 149-178, 2010.
-
(2010)
Machine Learning
, vol.81
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
32
-
-
83755178513
-
Design of robust classifiers for adversarial environments
-
B. Biggio, G. Fumera, and F. Roli, "Design of Robust Classifiers for Adversarial Environments," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, pp. 977-982, 2011.
-
(2011)
Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics
, pp. 977-982
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
33
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
B. Biggio, G. Fumera, and F. Roli, "Multiple Classifier Systems for Robust Classifier Design in Adversarial Environments," Int'l J. Machine Learning and Cybernetics, vol. 1, no. 1, pp. 27-41, 2010.
-
(2010)
Int'l J. Machine Learning and Cybernetics
, vol.1
, Issue.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
34
-
-
80053015779
-
Bagging classifiers for fighting poisoning attacks in adversarial environments
-
B. Biggio, I. Corona, G. Fumera, G. Giacinto, and F. Roli, "Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Environments," Proc. 10th Int'l Workshop Multiple Classifier Systems, pp. 350-359, 2011.
-
(2011)
Proc. 10th Int'l Workshop Multiple Classifier Systems
, pp. 350-359
-
-
Biggio, B.1
Corona, I.2
Fumera, G.3
Giacinto, G.4
Roli, F.5
-
35
-
-
84868094889
-
Poisoning adaptive biometric systems
-
B. Biggio, G. Fumera, F. Roli, and and L. Didaci, "Poisoning Adaptive Biometric Systems," Proc. Joint IAPR Int'l Conf. Structural, Syntactic, and Statistical Pattern Recognition, pp. 417-425, 2012.
-
(2012)
Proc. Joint IAPR Int'l Conf. Structural, Syntactic, and Statistical Pattern Recognition
, pp. 417-425
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
Didaci, L.4
-
37
-
-
0027640858
-
Learning in the presence of malicious errors
-
M. Kearns and M. Li, "Learning in the Presence of Malicious Errors," SIAM J. Computing, vol. 22, no. 4, pp. 807-837, 1993. (Pubitemid 23677152)
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 807-837
-
-
Kearns Michael1
Li Ming2
-
38
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
DOI 10.1109/SP.2006.2, 1624001, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
A. A. C-ardenas, J. S. Baras, and K. Seamon, "A Framework for the Evaluation of Intrusion Detection Systems," Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006. (Pubitemid 44753712)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 63-77
-
-
Cardenas, A.A.1
Baras, J.S.2
Seamon, K.3
-
39
-
-
70349319703
-
Multiple classifier systems for adversarial classification tasks
-
B. Biggio, G. Fumera, and F. Roli, "Multiple Classifier Systems for Adversarial Classification Tasks," Proc. Eighth Int'l Workshop Multiple Classifier Systems, pp. 132-141, 2009.
-
(2009)
Proc. Eighth Int'l Workshop Multiple Classifier Systems
, pp. 132-141
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
40
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
M. Br?uckner, C. Kanzow, and T. Scheffer, "Static Prediction Games for Adversarial Learning Problems," J. Machine Learning Research, vol. 13, pp. 2617-2654, 2012.
-
(2012)
J. Machine Learning Research
, vol.13
, pp. 2617-2654
-
-
Bruckner, M.1
Kanzow, C.2
Scheffer, T.3
-
41
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
A. Adler, "Vulnerabilities in Biometric Encryption Systems," Proc. Fifth Int'l Conf. Audio-and Video-Based Biometric Person Authentication, pp. 1100-1109, 2005. (Pubitemid 41423129)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 1100-1109
-
-
Adler, A.1
-
43
-
-
0032594950
-
Support vector machines for spam categorization
-
Sept.
-
H. Drucker, D. Wu, and V. N. Vapnik, "Support Vector Machines for Spam Categorization," IEEE Trans. Neural Networks, vol. 10, no. 5, pp. 1048-1054, Sept. 1999.
-
(1999)
IEEE Trans. Neural Networks
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Wu, D.2
Vapnik, V.N.3
-
44
-
-
0002442796
-
Machine learning in automated text categorization
-
F. Sebastiani, "Machine Learning in Automated Text Categorization," ACM Computing Surveys, vol. 34, pp. 1-47, 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, pp. 1-47
-
-
Sebastiani, F.1
-
46
-
-
37549016464
-
Likelihood ratio-based biometric score fusion
-
Feb.
-
K. Nandakumar, Y. Chen, S. C. Dass, and A. Jain, "Likelihood Ratio-Based Biometric Score Fusion," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 30, no. 2, pp. 342-347, Feb. 2008.
-
(2008)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.30
, Issue.2
, pp. 342-347
-
-
Nandakumar, K.1
Chen, Y.2
Dass, S.C.3
Jain, A.4
-
47
-
-
84856094425
-
Robustness of multi-modal biometric verification systems under realistic spoofing attacks
-
B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli, "Robustness of Multi-Modal Biometric Verification Systems under Realistic Spoofing Attacks," Proc. Int'l Joint Conf. Biometrics, pp. 1-6, 2011.
-
(2011)
Proc. Int'l Joint Conf. Biometrics
, pp. 1-6
-
-
Biggio, B.1
Akhtar, Z.2
Fumera, G.3
Marcialis, G.4
Roli, F.5
-
48
-
-
84866671111
-
Security evaluation of biometric authentication systems under real spoofing attacks
-
B. Biggio, Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, "Security Evaluation of Biometric Authentication Systems under Real Spoofing Attacks," IET Biometrics, vol. 1, no. 1, pp. 11-24, 2012.
-
(2012)
IET Biometrics
, vol.1
, Issue.1
, pp. 11-24
-
-
Biggio, B.1
Akhtar, Z.2
Fumera, G.3
Marcialis, G.L.4
Roli, F.5
-
50
-
-
17444438778
-
New support vector algorithms
-
B. Sch?olkopf, A. J. Smola, R. C. Williamson, and P. L. Bartlett, "New Support Vector Algorithms," Neural Computation, vol. 12, no. 5, pp. 1207-1245, 2000.
-
(2000)
Neural Computation
, vol.12
, Issue.5
, pp. 1207-1245
-
-
Scholkopf, B.1
Smola, A.J.2
Williamson, R.C.3
Bartlett, P.L.4
-
52
-
-
84856463585
-
Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers
-
D. Sculley, G. Wachman, and C. E. Brodley, "Spam Filtering Using Inexact String Matching in Explicit Feature Space with on-Line Linear Classifiers," Proc. 15th Text Retrieval Conf., 2006.
-
(2006)
Proc. 15th Text Retrieval Conf.
-
-
Sculley, D.1
Wachman, G.2
Brodley, C.E.3
-
54
-
-
58349121261
-
Adversarial pattern classification using multiple classifiers and randomisation
-
B. Biggio, G. Fumera, and F. Roli, "Adversarial Pattern Classification Using Multiple Classifiers and Randomisation," Proc. Joint IAPR Int'l Workshop Structural, Syntactic, and Statistical Pattern Recognition, pp. 500-509, 2008.
-
(2008)
Proc. Joint IAPR Int'l Workshop Structural, Syntactic, and Statistical Pattern Recognition
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
|