Sciweavers

8381 search results - page 196 / 1677
» The security of machine learning
Sort
View
ICONIP
2008
15 years 6 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
COLT
2008
Springer
15 years 7 months ago
Learning Random Monotone DNF Under the Uniform Distribution
We show that randomly generated monotone c log(n)-DNF formula can be learned exactly in probabilistic polynomial time. Our notion of randomly generated is with respect to a unifor...
Linda Sellie
ICDM
2002
IEEE
133views Data Mining» more  ICDM 2002»
15 years 10 months ago
Learning with Progressive Transductive Support Vector Machine
Support vector machine (SVM) is a new learning method developed in recent years based on the foundations of statistical learning theory. By taking a transductive approach instead ...
Yisong Chen, Guoping Wang, Shihai Dong
EVOW
2007
Springer
15 years 9 months ago
Classification of Cell Fates with Support Vector Machine Learning
In human mesenchymal stem cells the envelope surrounding the nucleus, as visualized by the nuclear lamina, has a round and flat shape. The lamina structure is considerably deformed...
Ofer M. Shir, Vered Raz, Roeland W. Dirks, Thomas ...
UIST
2010
ACM
15 years 3 months ago
Gestalt: integrated support for implementation and analysis in machine learning
We present Gestalt, a development environment designed to support the process of applying machine learning. While traditional programming environments focus on source code, we exp...
Kayur Patel, Naomi Bancroft, Steven M. Drucker, Ja...