The Crossover Process: Learnability and Data Protection from Inference Attacks Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07 Model EvaluationConvergence Property因果推論 2016.06.13 2026.05.01 Literature Database
Curie: A method for protecting SVM Classifier from Poisoning Attack Authors: Ricky Laishram, Vir Virander Phoha | Published: 2016-06-05 | Updated: 2016-06-07 Model EvaluationAdversarial Attack DetectionDetection of Poisonous Data 2016.06.05 2026.05.01 Literature Database
Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends Authors: Alexy Bhowmick, Shyamanta M. Hazarika | Published: 2016-06-03 スパム進化Feature ExtractionFeature Extraction Method 2016.06.03 2026.05.01 Literature Database
SUIS: An Online Graphical Signature-Based User Identification System Authors: Shahid Alam | Published: 2016-05-29 Integration of Digital Signatures and Machine LearningModel Performance EvaluationUser Identification System 2016.05.29 2026.05.01 Literature Database
Data-driven software security: Models and methods Authors: Úlfar Erlingsson | Published: 2016-05-27 Security AssurancePrivacy Protection MechanismVulnerability Management 2016.05.27 2026.05.01 Literature Database
Deep Structured Energy Based Models for Anomaly Detection Authors: Shuangfei Zhai, Yu Cheng, Weining Lu, Zhongfei Zhang | Published: 2016-05-25 | Updated: 2016-06-16 Identification of AI OutputModel Performance EvaluationModel Design 2016.05.25 2026.05.01 Literature Database
A note on privacy preserving iteratively reweighted least squares Authors: Mijung Park, Max Welling | Published: 2016-05-24 Privacy Protection MechanismPrivacy-Preserving Machine LearningDifferential Privacy 2016.05.24 2026.05.01 Literature Database
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow | Published: 2016-05-24 Certified RobustnessAdversarial ExampleAdversarial Attack Analysis 2016.05.24 2026.05.01 Literature Database
A First Look at Ad-block Detection: A New Arms Race on the Web Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui | Published: 2016-05-19 URL-based DetectionData CollectionFeature Importance Analysis 2016.05.19 2026.05.01 Literature Database
On-Average KL-Privacy and its equivalence to Generalization for Max-Entropy Mechanisms Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2016-05-08 Privacy Protection MechanismDifferential Privacy情報理論 2016.05.08 2026.05.01 Literature Database