Sciweavers

3556 search results - page 239 / 712
» Can machine learning be secure
Sort
View
CSDA
2008
147views more  CSDA 2008»
15 years 5 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
163
Voted
ISMVL
1997
IEEE
134views Hardware» more  ISMVL 1997»
15 years 9 months ago
Functional Decomposition of MVL Functions Using Multi-Valued Decision Diagrams
In this paper, the minimization of incompletely specified multi-valued functions using functional decomposition is discussed. From the aspect of machine learning, learning sample...
Craig M. Files, Rolf Drechsler, Marek A. Perkowski
ACCV
2009
Springer
15 years 9 months ago
Efficient Classification of Images with Taxonomies
We study the problem of classifying images into a given, pre-determined taxonomy. The task can be elegantly translated into the structured learning framework. Structured learning, ...
Alexander Binder, Motoaki Kawanabe, Ulf Brefeld
ALT
2006
Springer
16 years 2 months ago
Learning Linearly Separable Languages
This paper presents a novel paradigm for learning languages that consists of mapping strings to an appropriate high-dimensional feature space and learning a separating hyperplane i...
Leonid Kontorovich, Corinna Cortes, Mehryar Mohri
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 10 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton