Sciweavers

3556 search results - page 22 / 712
» Can machine learning be secure
Sort
View
116
Voted
SACMAT
2009
ACM
15 years 7 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
102
Voted
ICML
2010
IEEE
14 years 10 months ago
Online Prediction with Privacy
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss at each time while the loss cannot be disclosed to others fo...
Jun Sakuma, Hiromi Arai
84
Voted
CSFW
2010
IEEE
15 years 4 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
EMISA
2004
Springer
15 years 6 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
ICANN
2005
Springer
15 years 6 months ago
Reducing the Effect of Out-Voting Problem in Ensemble Based Incremental Support Vector Machines
Although Support Vector Machines (SVMs) have been successfully applied to solve a large number of classification and regression problems, they suffer from the catastrophic forgetti...
Zeki Erdem, Robi Polikar, Fikret S. Gürgen, N...