메뉴 건너뛰기




Volumn , Issue , 2016, Pages 1452-1458

Data poisoning attacks against autoregressive models

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMMERCE; DIGITAL STORAGE; TIME SERIES;

EID: 84995490350     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (266)

References (25)
  • 1
    • 77956724793 scopus 로고    scopus 로고
    • An empirical comparison of machine learning models for time series forecasting
    • Ahmed, N. K.; Atiya, A. F.; Gayar, N. E.; and El-Shishiny, H. 2010. An empirical comparison of machine learning models for time series forecasting. Econometric Reviews 29(5-6):594-621.
    • (2010) Econometric Reviews , vol.29 , Issue.5-6 , pp. 594-621
    • Ahmed, N.K.1    Atiya, A.F.2    Gayar, N.E.3    El-Shishiny, H.4
  • 7
    • 84872723371 scopus 로고    scopus 로고
    • Machine learning strategies for time series forecasting
    • Springer
    • Bontempi, G.; Taieb, S. B.; and Le Borgne, Y.-A. 2013. Machine learning strategies for time series forecasting. In Business Intelligence. Springer. 62-77.
    • (2013) Business Intelligence , pp. 62-77
    • Bontempi, G.1    Taieb, S.B.2    Le Borgne, Y.-A.3
  • 14
    • 34247493236 scopus 로고    scopus 로고
    • Matplotlib: A 2d graphics environment
    • Hunter, J. D. 2007. Matplotlib: A 2d graphics environment. Computing In Science & Engineering 9(3):90-95.
    • (2007) Computing in Science & Engineering , vol.9 , Issue.3 , pp. 90-95
    • Hunter, J.D.1
  • 17
    • 65449142381 scopus 로고    scopus 로고
    • Good word attacks on statistical spam filters
    • Lowd, D., and Meek, C. 2005. Good word attacks on statistical spam filters. In CEAS.
    • (2005) CEAS.
    • Lowd, D.1    Meek, C.2
  • 19
  • 22
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Springer
    • Tan, K. M.; Killourhy, K. S.; and Maxion, R. A. 2002. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Advances in Intrusion Detection, 54-73. Springer.
    • (2002) Recent Advances in Intrusion Detection , pp. 54-73
    • Tan, K.M.1    Killourhy, K.S.2    Maxion, R.A.3
  • 24
    • 84878781560 scopus 로고    scopus 로고
    • Adversarial label flips attack on support vector machines
    • Xiao, H.; Xiao, H.; and Eckert, C. 2012. Adversarial label flips attack on support vector machines. In ECAI, 870-875.
    • (2012) ECAI , pp. 870-875
    • Xiao, H.1    Xiao, H.2    Eckert, C.3
  • 25
    • 84961203416 scopus 로고    scopus 로고
    • Machine teaching: An inverse problem to machine learning and an approach toward optimal education
    • Senior Member Track
    • Zhu, X. 2015. Machine teaching: An inverse problem to machine learning and an approach toward optimal education. In AAAI Conference on Artificial Intelligence (Senior Member Track).
    • (2015) AAAI Conference on Artificial Intelligence
    • Zhu, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.