Sciweavers

295 search results - page 3 / 59
» A framework for quantitative security analysis of machine le...
Sort
View
SIGIR
2010
ACM
13 years 9 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
MCS
2001
Springer
13 years 9 months ago
Dependence among Codeword Bits Errors in ECOC Learning Machines: An Experimental Analysis
One of the main factors affecting the effectiveness of ECOC methods for classification is the dependence among the errors of the computed codeword bits. We present an extensive ...
Francesco Masulli, Giorgio Valentini
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 3 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
BIOID
2008
110views Biometrics» more  BIOID 2008»
13 years 7 months ago
An Empirical Comparison of Individual Machine Learning Techniques in Signature and Fingerprint Classification
This paper describes an empirical study to investigate the performance of a wide range of classifiers deployed in applications to classify biometric data. The study specifically re...
Marjory C. C. Abreu, Michael C. Fairhurst

Publication
152views
13 years 8 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...