Sciweavers

8381 search results - page 164 / 1677
» The security of machine learning
Sort
View
ECAI
2008
Springer
15 years 6 months ago
Fighting Knowledge Acquisition Bottleneck with Argument Based Machine Learning
Knowledge elicitation is known to be a difficult task and thus a major bottleneck in building a knowledge base. Machine learning has long ago been proposed as a way to alleviate th...
Martin Mozina, Matej Guid, Jana Krivec, Aleksander...
IMC
2010
ACM
15 years 2 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
CSFW
2010
IEEE
15 years 8 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
ECML
2006
Springer
15 years 8 months ago
A Selective Sampling Strategy for Label Ranking
Abstract. We propose a novel active learning strategy based on the compression framework of [9] for label ranking functions which, given an input instance, predict a total order ov...
Massih-Reza Amini, Nicolas Usunier, Françoi...