Sciweavers

3556 search results - page 119 / 712
» Can machine learning be secure
Sort
View
85
Voted
ICML
2008
IEEE
16 years 1 months ago
Stopping conditions for exact computation of leave-one-out error in support vector machines
We propose a new stopping condition for a Support Vector Machine (SVM) solver which precisely reflects the objective of the Leave-OneOut error computation. The stopping condition ...
Klaus-Robert Müller, Pavel Laskov, Vojtech Fr...
ICML
2004
IEEE
16 years 1 months ago
Robust feature induction for support vector machines
The goal of feature induction is to automatically create nonlinear combinations of existing features as additional input features to improve classification accuracy. Typically, no...
Rong Jin, Huan Liu
121
Voted
ICML
2006
IEEE
15 years 6 months ago
Multiclass reduced-set support vector machines
There are well-established methods for reducing the number of support vectors in a trained binary support vector machine, often with minimal impact on accuracy. We show how reduce...
Benyang Tang, Dominic Mazzoni
121
Voted
DIMVA
2010
15 years 1 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
156
Voted
ICMCS
2000
IEEE
170views Multimedia» more  ICMCS 2000»
15 years 5 months ago
Update Relevant Image Weights for Content-Based Image Retrieval using Support Vector Machines
Relevance feedback [1] has been a powerful tool for interactive Content-Based Image Retrieval (CBIR). During the retrieval process, the user selects the most relevant images and p...
Qi Tian, Pengyu Hong, Thomas S. Huang