Sciweavers

8381 search results - page 71 / 1677
» The security of machine learning
Sort
View
111
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 29 days ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
84
Voted
ICML
1997
IEEE
16 years 1 months ago
Machine Learning by Function Decomposition
Blaz Zupan, Marko Bohanec, Ivan Bratko, Janez Dems...
63
Voted
ICML
1989
IEEE
15 years 4 months ago
An Experimental Comparison of Human and Machine Learning Formalisms
Stephen Muggleton, Michael Bain, Jean Hayes Michie...
84
Voted
ICML
2008
IEEE
16 years 1 months ago
Fast support vector machine training and classification on graphics processors
Bryan C. Catanzaro, Narayanan Sundaram, Kurt Keutz...