Sciweavers

8381 search results - page 115 / 1677
» The security of machine learning
Sort
View

Publication
152views
15 years 7 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ICML
2001
IEEE
16 years 5 months ago
Learning with the Set Covering Machine
We generalize the classical algorithms of Valiant and Haussler for learning conjunctions and disjunctions of Boolean attributes to the problem of learning these functions over arb...
Mario Marchand, John Shawe-Taylor
ML
2008
ACM
15 years 4 months ago
Structured machine learning: the next ten years
Thomas G. Dietterich, Pedro Domingos, Lise Getoor,...
CSFW
1993
IEEE
15 years 8 months ago
Abstract Machines for Communication Security
Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
ICML
2007
IEEE
16 years 5 months ago
On the relation between multi-instance learning and semi-supervised learning
Multi-instance learning and semi-supervised learning are different branches of machine learning. The former attempts to learn from a training set consists of labeled bags each con...
Zhi-Hua Zhou, Jun-Ming Xu