Sciweavers

3556 search results - page 197 / 712
» Can machine learning be secure
Sort
View
108
Voted
CCS
2009
ACM
15 years 7 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
87
Voted
AGENTS
1997
Springer
15 years 5 months ago
Neo: Learning Conceptual Knowledge by Sensorimotor Interaction with an Environment
Recent developments in philosophy, linguistics, developmental psychology and arti cial intelligence make it possible to envision a developmental path for an arti cial agent, groun...
Paul R. Cohen, Marc S. Atkin, Tim Oates, Carole R....
90
Voted
CHI
2010
ACM
15 years 7 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
111
Voted
COMPSEC
2006
143views more  COMPSEC 2006»
15 years 24 days ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 3 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...