Sciweavers

2884 search results - page 349 / 577
» Evaluating learning algorithms and classifiers
Sort
View
103
Voted
ISI
2007
Springer
15 years 12 days ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CVPR
2012
IEEE
13 years 2 months ago
Top-down visual saliency via joint CRF and dictionary learning
Top-down visual saliency facilities object localization by providing a discriminative representation of target objects and a probability map for reducing the search space. In this...
Jimei Yang, Ming-Hsuan Yang
96
Voted
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
15 years 7 months ago
A Game Theoretical Model for Adversarial Learning
Abstract—It is now widely accepted that in many situations where classifiers are deployed, adversaries deliberately manipulate data in order to reduce the classifier’s accura...
Wei Liu, Sanjay Chawla
96
Voted
ICAC
2008
IEEE
15 years 7 months ago
Guided Problem Diagnosis through Active Learning
There is widespread interest today in developing tools that can diagnose the cause of a system failure accurately and efficiently based on monitoring data collected from the syst...
Songyun Duan, Shivnath Babu
82
Voted
EMMCVPR
2005
Springer
15 years 6 months ago
Learning Hierarchical Shape Models from Examples
Abstract. We present an algorithm for automatically constructing a decompositional shape model from examples. Unlike current approaches to structural model acquisition, in which on...
Alex Levinshtein, Cristian Sminchisescu, Sven J. D...