Sciweavers

8381 search results - page 68 / 1677
» The security of machine learning
Sort
View
128
Voted
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 20 days ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
111
Voted
CCS
2010
ACM
15 years 23 days ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
AGENTS
1999
Springer
15 years 4 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
ICML
2008
IEEE
16 years 1 months ago
Hierarchical sampling for active learning
We present an active learning scheme that exploits cluster structure in data.
Sanjoy Dasgupta, Daniel Hsu
112
Voted
ISMIS
2005
Springer
15 years 6 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...