Secure and resilient distributed machine learning under adversarial environments
暂无分享,去创建一个
[1] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[2] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[3] Georgios B. Giannakis,et al. Consensus-Based Distributed Support Vector Machines , 2010, J. Mach. Learn. Res..
[4] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.
[5] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Jonathan Eckstein. Augmented Lagrangian and Alternating Direction Methods for Convex Optimization: A Tutorial and Some Illustrative Computational Results , 2012 .
[7] Shie Mannor,et al. Robustness and Regularization of Support Vector Machines , 2008, J. Mach. Learn. Res..
[8] Sanjay Chawla,et al. A Game Theoretical Model for Adversarial Learning , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[9] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[10] Tony A. Meyer,et al. SpamBayes: Effective open-source, Bayesian based, email classification system , 2004, CEAS.
[11] Chris Clifton,et al. Classifier evaluation and attribute selection against active adversaries , 2010, Data Mining and Knowledge Discovery.
[12] Sencun Zhu,et al. Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[13] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[14] Paul Geladi,et al. Principal Component Analysis , 1987, Comprehensive Chemometrics.
[15] Richard A. Brown,et al. Introduction to random signals and applied kalman filtering (3rd ed , 2012 .