Sciweavers

8381 search results - page 175 / 1677
» The security of machine learning
Sort
View
147
Voted
AI50
2006
15 years 8 months ago
Intrinsically Motivated Machines
Abstract. Children seem intrinsically motivated to manipulate, to explore, to test, to learn and they look for activities and situations that provide such learning opportunities. I...
Frédéric Kaplan, Pierre-Yves Oudeyer
166
Voted
ICAC
2006
IEEE
15 years 11 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
162
Voted
NIPS
2004
15 years 6 months ago
Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)
Machine learning is often used to automatically solve human tasks. In this paper, we look for tasks where machine learning algorithms are not as good as humans with the hope of ga...
Kumar Chellapilla, Patrice Y. Simard
AAAI
2000
15 years 6 months ago
ADVISOR: A Machine Learning Architecture for Intelligent Tutor Construction
We have constructed ADVISOR, a two-agent machine learning architecture for intelligent tutoring systems (ITS). The purpose of this architecture is to centralize the reasoning of a...
Joseph Beck, Beverly Park Woolf, Carole R. Beal
ALT
2001
Springer
16 years 1 months ago
Learning of Boolean Functions Using Support Vector Machines
This paper concerns the design of a Support Vector Machine (SVM) appropriate for the learning of Boolean functions. This is motivated by the need of a more sophisticated algorithm ...
Ken Sadohara