-
1
-
-
77956724793
-
An empirical comparison of machine learning models for time series forecasting
-
Ahmed, N. K.; Atiya, A. F.; Gayar, N. E.; and El-Shishiny, H. 2010. An empirical comparison of machine learning models for time series forecasting. Econometric Reviews 29(5-6):594-621.
-
(2010)
Econometric Reviews
, vol.29
, Issue.5-6
, pp. 594-621
-
-
Ahmed, N.K.1
Atiya, A.F.2
Gayar, N.E.3
El-Shishiny, H.4
-
2
-
-
33845989821
-
Can machine learning be secure?
-
ACM
-
Barreno, M.; Nelson, B.; Sears, R.; Joseph, A. D.; and Tygar, J. D. 2006. Can machine learning be secure? In Proceedings of the 2006 ACM Symposium on Information, computer and communications security, 16-25. ACM.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
3
-
-
78049530550
-
The security of machine learning
-
Barreno, M.; Nelson, B.; Joseph, A. D.; and Tygar, J. 2010. The security of machine learning. Machine Learning 81(2):121-148.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.4
-
5
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Springer
-
Biggio, B.; Corona, I.; Maiorca, D.; Nelson, B.; Srndíc, N.; Laskov, P.; Giacinto, G.; and Roli, F. 2013. Evasion attacks against machine learning at test time. In Machine Learning and Knowledge Discovery in Databases. Springer. 387-402.
-
(2013)
Machine Learning and Knowledge Discovery in Databases
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Srndíc, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
6
-
-
84927956444
-
Security evaluation of support vector machines in adversarial environments
-
Springer
-
Biggio, B.; Corona, I.; Nelson, B.; Rubinstein, B. I.; Maiorca, D.; Fumera, G.; Giacinto, G.; and Roli, F. 2014. Security evaluation of support vector machines in adversarial environments. In Support Vector Machines Applications. Springer. 105-153.
-
(2014)
Support Vector Machines Applications
, pp. 105-153
-
-
Biggio, B.1
Corona, I.2
Nelson, B.3
Rubinstein, B.I.4
Maiorca, D.5
Fumera, G.6
Giacinto, G.7
Roli, F.8
-
7
-
-
84872723371
-
Machine learning strategies for time series forecasting
-
Springer
-
Bontempi, G.; Taieb, S. B.; and Le Borgne, Y.-A. 2013. Machine learning strategies for time series forecasting. In Business Intelligence. Springer. 62-77.
-
(2013)
Business Intelligence
, pp. 62-77
-
-
Bontempi, G.1
Taieb, S.B.2
Le Borgne, Y.-A.3
-
13
-
-
12244295760
-
Adversarial classification
-
ACM
-
Dalvi, N.; Domingos, P.; Sanghai, S.; Verma, D.; et al. 2004. Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, 99-108. ACM.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sanghai, S.3
Verma, D.4
-
14
-
-
34247493236
-
Matplotlib: A 2d graphics environment
-
Hunter, J. D. 2007. Matplotlib: A 2d graphics environment. Computing In Science & Engineering 9(3):90-95.
-
(2007)
Computing in Science & Engineering
, vol.9
, Issue.3
, pp. 90-95
-
-
Hunter, J.D.1
-
17
-
-
65449142381
-
Good word attacks on statistical spam filters
-
Lowd, D., and Meek, C. 2005. Good word attacks on statistical spam filters. In CEAS.
-
(2005)
CEAS.
-
-
Lowd, D.1
Meek, C.2
-
21
-
-
78549280763
-
Misleading learners: Co-opting your spam filter
-
Springer
-
Nelson, B.; Barreno, M.; Chi, F. J.; Joseph, A. D.; Rubinstein, B. I.; Saini, U.; Sutton, C.; Tygar, J.; and Xia, K. 2009. Misleading learners: Co-opting your spam filter. In Machine learning in cyber trust. Springer. 17-51.
-
(2009)
Machine Learning in Cyber Trust
, pp. 17-51
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.5
Saini, U.6
Sutton, C.7
Tygar, J.8
Xia, K.9
-
22
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Springer
-
Tan, K. M.; Killourhy, K. S.; and Maxion, R. A. 2002. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Advances in Intrusion Detection, 54-73. Springer.
-
(2002)
Recent Advances in Intrusion Detection
, pp. 54-73
-
-
Tan, K.M.1
Killourhy, K.S.2
Maxion, R.A.3
-
23
-
-
85007180863
-
Support vector machines under adversarial label contamination
-
Xiao, H.; Biggiob, B.; Nelson, B.; Xiao, H.; Eckerta, C.; and Rolib, F. 2014. Support vector machines under adversarial label contamination. Neurocomputing Preprint.
-
(2014)
Neurocomputing Preprint
-
-
Xiao, H.1
Biggiob, B.2
Nelson, B.3
Xiao, H.4
Eckerta, C.5
Rolib, F.6
-
24
-
-
84878781560
-
Adversarial label flips attack on support vector machines
-
Xiao, H.; Xiao, H.; and Eckert, C. 2012. Adversarial label flips attack on support vector machines. In ECAI, 870-875.
-
(2012)
ECAI
, pp. 870-875
-
-
Xiao, H.1
Xiao, H.2
Eckert, C.3
-
25
-
-
84961203416
-
Machine teaching: An inverse problem to machine learning and an approach toward optimal education
-
Senior Member Track
-
Zhu, X. 2015. Machine teaching: An inverse problem to machine learning and an approach toward optimal education. In AAAI Conference on Artificial Intelligence (Senior Member Track).
-
(2015)
AAAI Conference on Artificial Intelligence
-
-
Zhu, X.1
|