Sciweavers

3556 search results - page 248 / 712
» Can machine learning be secure
Sort
View
FSMNLP
2008
Springer
15 years 6 months ago
Learning with Weighted Transducers
Weighted finite-state transducers have been used successfully in a variety of natural language processing applications, including speech recognition, speech synthesis, and machine ...
Corinna Cortes, Mehryar Mohri
TNN
2008
178views more  TNN 2008»
15 years 5 months ago
IMORL: Incremental Multiple-Object Recognition and Localization
This paper proposes an incremental multiple-object recognition and localization (IMORL) method. The objective of IMORL is to adaptively learn multiple interesting objects in an ima...
Haibo He, Sheng Chen
146
Voted
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 9 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 12 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
ICML
2009
IEEE
16 years 5 months ago
Learning instance specific distances using metric propagation
In many real-world applications, such as image retrieval, it would be natural to measure the distances from one instance to others using instance specific distance which captures ...
De-Chuan Zhan, Ming Li, Yu-Feng Li, Zhi-Hua Zhou