The Crossover Process: Learnability and Data Protection from Inference Attacks Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07 2016.06.13 文献データベース
Curie: A method for protecting SVM Classifier from Poisoning Attack Authors: Ricky Laishram, Vir Virander Phoha | Published: 2016-06-05 | Updated: 2016-06-07 2016.06.05 文献データベース
Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends Authors: Alexy Bhowmick, Shyamanta M. Hazarika | Published: 2016-06-03 2016.06.03 文献データベース
SUIS: An Online Graphical Signature-Based User Identification System Authors: Shahid Alam | Published: 2016-05-29 2016.05.29 文献データベース
Data-driven software security: Models and methods Authors: Úlfar Erlingsson | Published: 2016-05-27 2016.05.27 文献データベース
Deep Structured Energy Based Models for Anomaly Detection Authors: Shuangfei Zhai, Yu Cheng, Weining Lu, Zhongfei Zhang | Published: 2016-05-25 | Updated: 2016-06-16 2016.05.25 文献データベース
A note on privacy preserving iteratively reweighted least squares Authors: Mijung Park, Max Welling | Published: 2016-05-24 2016.05.24 文献データベース
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow | Published: 2016-05-24 2016.05.24 文献データベース
A First Look at Ad-block Detection: A New Arms Race on the Web Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui | Published: 2016-05-19 2016.05.19 文献データベース
On-Average KL-Privacy and its equivalence to Generalization for Max-Entropy Mechanisms Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2016-05-08 2016.05.08 文献データベース