Sciweavers

3556 search results - page 100 / 712
» Can machine learning be secure
Sort
View
120
Voted
ML
2002
ACM
220views Machine Learning» more  ML 2002»
15 years 21 days ago
Bayesian Methods for Support Vector Machines: Evidence and Predictive Class Probabilities
I describe a framework for interpreting Support Vector Machines (SVMs) as maximum a posteriori (MAP) solutions to inference problems with Gaussian Process priors. This probabilisti...
Peter Sollich
103
Voted
NDSS
2007
IEEE
15 years 7 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
ICML
2009
IEEE
16 years 1 months ago
Optimal reverse prediction: a unified perspective on supervised, unsupervised and semi-supervised learning
Training principles for unsupervised learning are often derived from motivations that appear to be independent of supervised learning. In this paper we present a simple unificatio...
Linli Xu, Martha White, Dale Schuurmans
ICML
2006
IEEE
16 years 1 months ago
Autonomous shaping: knowledge transfer in reinforcement learning
We introduce the use of learned shaping rewards in reinforcement learning tasks, where an agent uses prior experience on a sequence of tasks to learn a portable predictor that est...
George Konidaris, Andrew G. Barto
111
Voted
GECCO
2009
Springer
161views Optimization» more  GECCO 2009»
15 years 7 months ago
Are evolutionary rule learning algorithms appropriate for malware detection?
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classiï...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...