暂无分享,去创建一个
[1] Huosheng Hu,et al. Toward a fully decentralized architecture for multi-sensor data fusion , 1990, Proceedings., IEEE International Conference on Robotics and Automation.
[2] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[3] R. Poovendran,et al. Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[4] Dan Shen,et al. Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] Jonathan Eckstein. Augmented Lagrangian and Alternating Direction Methods for Convex Optimization: A Tutorial and Some Illustrative Computational Results , 2012 .
[6] Sanjay Chawla,et al. A Game Theoretical Model for Adversarial Learning , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[7] Lorenzo Bruzzone,et al. Fusion of Hyperspectral and LIDAR Remote Sensing Data for Classification of Complex Forest Areas , 2008, IEEE Transactions on Geoscience and Remote Sensing.
[8] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[9] Ivor W. Tsang,et al. Core Vector Machines: Fast SVM Training on Very Large Data Sets , 2005, J. Mach. Learn. Res..
[10] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[11] Jérôme Hert,et al. New Methods for Ligand-Based Virtual Screening: Use of Data Fusion and Machine Learning to Enhance the Effectiveness of Similarity Searching , 2006, J. Chem. Inf. Model..
[12] Gang Wang,et al. On-line least squares support vector machine algorithm in gas prediction , 2009 .
[13] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[14] Shie Mannor,et al. Robustness and Regularization of Support Vector Machines , 2008, J. Mach. Learn. Res..
[15] Rui Zhang,et al. Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).
[16] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[17] Rui Zhang,et al. A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[18] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[19] Quanyan Zhu,et al. Student research highlight: Secure and resilient distributed machine learning under adversarial environments , 2016, IEEE Aerospace and Electronic Systems Magazine.
[20] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[21] Edward Y. Chang,et al. Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance , 2003, MULTIMEDIA '03.
[22] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Jian-xiong Dong,et al. Fast SVM training algorithm with decomposition on very large data sets , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] H. Vincent Poor,et al. Distributed learning in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[25] Jon Atli Benediktsson,et al. Fusion of Support Vector Machines for Classification of Multisensor Data , 2007, IEEE Transactions on Geoscience and Remote Sensing.
[26] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[27] Swagatam Das,et al. Multi-sensor data fusion using support vector machine for motor fault detection , 2012, Inf. Sci..
[28] Kavi Kumar Khedo,et al. A Wireless Sensor Network Air Pollution Monitoring System , 2010, ArXiv.
[29] Bingsheng He,et al. On non-ergodic convergence rate of Douglas–Rachford alternating direction method of multipliers , 2014, Numerische Mathematik.
[30] Wei Jiang,et al. A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[31] Yan Zhou,et al. Distributed support vector machines: An overview , 2012, 2012 24th Chinese Control and Decision Conference (CCDC).
[32] Chris Clifton,et al. A game theoretic framework for adversarial learning , 2008 .
[33] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[34] Emilio Parrado-Hernández,et al. Distributed support vector machines , 2006, IEEE Trans. Neural Networks.
[35] Georgios B. Giannakis,et al. Consensus-Based Distributed Support Vector Machines , 2010, J. Mach. Learn. Res..
[36] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.