Sciweavers

8381 search results - page 134 / 1677
» The security of machine learning
Sort
View
CCS
2010
ACM
14 years 11 months ago
Lexical feature based phishing URL detection using online learning
Aaron Blum, Brad Wardman, Thamar Solorio, Gary War...
124
Voted
ICML
2000
IEEE
16 years 5 months ago
Bounds on the Generalization Performance of Kernel Machine Ensembles
We study the problem of learning using combinations of machines. In particular we present new theoretical bounds on the generalization performance of voting ensembles of kernel ma...
Luis Pérez-Breva, Massimiliano Pontil, Theo...
146
Voted
CSDA
2008
147views more  CSDA 2008»
15 years 4 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
AAAI
2008
15 years 6 months ago
A Case Study on the Critical Role of Geometric Regularity in Machine Learning
An important feature of many problem domains in machine learning is their geometry. For example, adjacency relationships, symmetries, and Cartesian coordinates are essential to an...
Jason Gauci, Kenneth O. Stanley
ESANN
2008
15 years 6 months ago
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM
This paper proposes a methodology named OP-ELM, based on a recent development
Yoan Miche, Patrick Bas, Christian Jutten, Olli Si...