Sciweavers

3556 search results - page 195 / 712
» Can machine learning be secure
Sort
View
ICML
2008
IEEE
16 years 1 months ago
Large scale manifold transduction
We show how the regularizer of Transductive Support Vector Machines (TSVM) can be trained by stochastic gradient descent for linear models and multi-layer architectures. The resul...
Michael Karlen, Jason Weston, Ayse Erkan, Ronan Co...
124
Voted
MLDM
2005
Springer
15 years 6 months ago
An Automatic Face Recognition System in the Near Infrared Spectrum
Face recognition is a challenging visual classification task, especially when the lighting conditions can not be controlled. In this paper, we present an automatic face recognitio...
Shuyan Zhao, Rolf-Rainer Grigat
DATAMINE
2008
112views more  DATAMINE 2008»
15 years 25 days ago
PRIE: a system for generating rulelists to maximize ROC performance
Rules are commonly used for classification because they are modular, intelligible and easy to learn. Existing work in classification rule learning assumes the goal is to produce ca...
Tom Fawcett
119
Voted
LICS
1999
IEEE
15 years 5 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
97
Voted
ICML
2008
IEEE
16 years 1 months ago
Training SVM with indefinite kernels
Similarity matrices generated from many applications may not be positive semidefinite, and hence can't fit into the kernel machine framework. In this paper, we study the prob...
Jianhui Chen, Jieping Ye