Sciweavers

3556 search results - page 256 / 712
» Can machine learning be secure
Sort
View
167
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ICML
2004
IEEE
16 years 6 months ago
Semi-supervised learning using randomized mincuts
In many application domains there is a large amount of unlabeled data but only a very limited amount of labeled training data. One general approach that has been explored for util...
Avrim Blum, John D. Lafferty, Mugizi Robert Rweban...
165
Voted
PERCOM
2005
ACM
16 years 5 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 11 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
HRI
2009
ACM
16 years 4 days ago
Learning about objects with human teachers
A general learning task for a robot in a new environment is to learn about objects and what actions/effects they afford. To approach this, we look at ways that a human partner c...
Andrea Lockerd Thomaz, Maya Cakmak