On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis
暂无分享,去创建一个
Cristina Nita-Rotaru | Rahul Potharaju | Andrew Newell | Luojie Xiang | C. Nita-Rotaru | Rahul Potharaju | Luojie Xiang | Andrew Newell
[1] Navneet Kaur,et al. Opinion mining and sentiment analysis , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[2] Ling Huang,et al. Query Strategies for Evading Convex-Inducing Classifiers , 2010, J. Mach. Learn. Res..
[3] Christopher Meek,et al. Good Word Attacks on Statistical Spam Filters , 2005, CEAS.
[4] Claudia Eckert,et al. Adversarial Label Flips Attack on Support Vector Machines , 2012, ECAI.
[5] Ronen Feldman,et al. Techniques and applications for sentiment analysis , 2013, CACM.
[6] Shyhtsun Felix Wu,et al. On Attacking Statistical Spam Filters , 2004, CEAS.
[7] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[8] N. Littlestone. Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[9] Steven Bird,et al. NLTK: The Natural Language Toolkit , 2002, ACL 2006.
[10] Ming Li,et al. Learning in the presence of malicious errors , 1993, STOC '88.
[11] Masoud Nikravesh,et al. Feature Extraction - Foundations and Applications , 2006, Feature Extraction.
[12] Yehuda Koren,et al. Matrix Factorization Techniques for Recommender Systems , 2009, Computer.
[13] Jacob Ratkiewicz,et al. Predicting the Political Alignment of Twitter Users , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[14] Tobias Scheffer,et al. Bayesian Games for Adversarial Regression Problems , 2013, ICML.
[15] David G. Stork,et al. Evaluating Classifiers by Means of Test Data with Noisy Labels , 2003, IJCAI.
[16] Bhavani M. Thuraisingham,et al. Adversarial support vector machine learning , 2012, KDD.
[17] N. Aronszajn. Theory of Reproducing Kernels. , 1950 .
[18] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[19] Shady Shehata,et al. Enhancing Search Engine Quality Using Concept-based Text Retrieval , 2007, IEEE/WIC/ACM International Conference on Web Intelligence (WI'07).
[20] Giovanni Felici,et al. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.
[21] Steven Bird,et al. NLTK: The Natural Language Toolkit , 2002, ACL.
[22] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[23] Pavel Laskov,et al. Detection of Malicious PDF Files Based on Hierarchical Document Structure , 2013, NDSS.
[24] Patrick Paroubek,et al. Twitter as a Corpus for Sentiment Analysis and Opinion Mining , 2010, LREC.
[25] Gideon S. Mann,et al. Putting Semantic Information Extraction on the Map : Noisy Label Models for Fact Extraction , 2007 .
[26] David P. Williamson,et al. The Design of Approximation Algorithms , 2011 .
[27] Leslie G. Valiant,et al. Learning Disjunction of Conjunctions , 1985, IJCAI.
[28] Johan Bollen,et al. Modeling Public Mood and Emotion: Twitter Sentiment and Socio-Economic Phenomena , 2009, ICWSM.
[29] Isabell M. Welpe,et al. Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment , 2010, ICWSM.
[30] Jacob Ratkiewicz,et al. Political Polarization on Twitter , 2011, ICWSM.
[31] Blaine Nelson,et al. Support Vector Machines Under Adversarial Label Noise , 2011, ACML.
[32] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[33] Hsin-Hsi Chen,et al. Emotion Classification Using Web Blog Corpora , 2007, IEEE/WIC/ACM International Conference on Web Intelligence (WI'07).
[34] Isabell M. Welpe,et al. Election Forecasts With Twitter , 2011 .
[35] Shie Mannor,et al. Robust Sparse Regression under Adversarial Corruption , 2013, ICML.
[36] Masoud Nikravesh,et al. Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing) , 2006 .
[37] Rocco A. Servedio,et al. Learning Halfspaces with Malicious Noise , 2009, ICALP.
[38] Jonathon Read,et al. Using Emoticons to Reduce Dependency in Machine Learning Techniques for Sentiment Classification , 2005, ACL.
[39] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[40] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.