Sciweavers

3556 search results - page 234 / 712
» Can machine learning be secure
Sort
View
ICML
2010
IEEE
15 years 3 months ago
Multiple Non-Redundant Spectral Clustering Views
Many clustering algorithms only find one clustering solution. However, data can often be grouped and interpreted in many different ways. This is particularly true in the high-dim...
Donglin Niu, Jennifer G. Dy, Michael I. Jordan
ICMLC
2010
Springer
15 years 3 months ago
CMAC-based fault accommodation control for tank system
- This paper presents a learning approach using cerebellar model articulation controller (CMAC) to accommodate faults for a class of multivariable nonlinear systems. A CMAC is prop...
Chih-Min Lin, Chang-Chih Chung, Yu-Ju Liu, Daniel ...
EUROCRYPT
2001
Springer
15 years 9 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
ICMLA
2010
15 years 3 months ago
Ensembles of Neural Networks for Robust Reinforcement Learning
Reinforcement learning algorithms that employ neural networks as function approximators have proven to be powerful tools for solving optimal control problems. However, their traini...
Alexander Hans, Steffen Udluft
ICML
2003
IEEE
16 years 5 months ago
Identifying Predictive Structures in Relational Data Using Multiple Instance Learning
This paper introduces an approach for identifying predictive structures in relational data using the multiple-instance framework. By a predictive structure, we mean a structure th...
Amy McGovern, David Jensen