One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time
暂无分享,去创建一个
Patrick P. K. Chan | Daniel S. Yeung | Zhi-Min He | Fabio Roli | Giorgio Giacinto | Battista Biggio | Igino Corona | F. Roli | I. Corona | D. Yeung | B. Biggio | G. Giacinto | P. Chan | Zhi-Min He | Igino Corona
[1] Andrew McCallum,et al. Feature Bagging: Preventing Weight Undertraining in Structured Discriminative Learning , 2005 .
[2] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[3] Bhavani M. Thuraisingham,et al. Adversarial support vector machine learning , 2012, KDD.
[4] Blaine Nelson,et al. Exploiting Machine Learning to Subvert Your Spam Filter , 2008, LEET.
[5] Giorgio Giacinto,et al. Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection , 2013, ASIA CCS '13.
[6] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.
[7] Fabio Roli,et al. Multiple classifier systems for robust classifier design in adversarial environments , 2010, Int. J. Mach. Learn. Cybern..
[8] Tobias Scheffer,et al. Static prediction games for adversarial learning problems , 2012, J. Mach. Learn. Res..
[9] David M. J. Tax,et al. One-class classification , 2001 .
[10] Fabio Roli,et al. Multiple Classifier Systems for Adversarial Classification Tasks , 2009, MCS.
[11] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[12] Aleksander Kolcz,et al. Feature Weighting for Improved Classifier Robustness , 2009, CEAS 2009.
[13] Fabio Roli,et al. Design of robust classifiers for adversarial environments , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[14] Amir Globerson,et al. Nightmare at test time: robust learning by feature deletion , 2006, ICML.
[15] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[16] Gordon V. Cormack,et al. TREC 2006 Spam Track Overview , 2006, TREC.
[17] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[18] Yan Zhou,et al. A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters , 2008, J. Mach. Learn. Res..
[19] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[20] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Fabio Roli,et al. Multiple Classifier Systems under Attack , 2010, MCS.
[22] Ling Huang,et al. Query Strategies for Evading Convex-Inducing Classifiers , 2010, J. Mach. Learn. Res..
[23] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[24] Franco Scarselli,et al. Are Multilayer Perceptrons Adequate for Pattern Recognition and Verification? , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[25] Fabio Roli,et al. Pattern Recognition Systems under Attack: Design Issues and Research Challenges , 2014, Int. J. Pattern Recognit. Artif. Intell..
[26] Alexander J. Smola,et al. Convex Learning with Invariances , 2007, NIPS.
[27] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[28] Andrew McCallum,et al. Reducing Weight Undertraining in Structured Discriminative Learning , 2006, NAACL.