Sciweavers

3556 search results - page 13 / 712
» Can machine learning be secure
Sort
View
123
Voted
AAAI
2011
14 years 22 days ago
Effective End-User Interaction with Machine Learning
End-user interactive machine learning is a promising tool for enhancing human productivity and capabilities with large unstructured data sets. Recent work has shown that we can cr...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
92
Voted
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 7 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
138
Voted
ATAL
2007
Springer
15 years 7 months ago
A framework for agent-based distributed machine learning and data mining
This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes ...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek
95
Voted
IWPC
2006
IEEE
15 years 6 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
95
Voted
ICML
2000
IEEE
16 years 1 months ago
Bounds on the Generalization Performance of Kernel Machine Ensembles
We study the problem of learning using combinations of machines. In particular we present new theoretical bounds on the generalization performance of voting ensembles of kernel ma...
Luis Pérez-Breva, Massimiliano Pontil, Theo...