Sciweavers

8381 search results - page 147 / 1677
» The security of machine learning
Sort
View
124
Voted
ECML
1994
Springer
15 years 8 months ago
Industrial Applications of ML: Illustrations for the KAML Dilemma and the CBR Dream
This paperpresents several industrial applications of MLin the context of their effort to solve the "KAMLproblem", i.e., the problem of merging knowledge acquisition and...
Yves Kodratoff
MLQ
2010
107views more  MLQ 2010»
14 years 11 months ago
Confined modified realizability
Gilda Ferreira, Paulo Oliva
ISW
2010
Springer
15 years 2 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
CCS
2010
ACM
15 years 4 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...