Feature Cross-Substitution in Adversarial Classification
暂无分享,去创建一个
[1] Tom Fawcett,et al. "In vivo" spam filtering: a challenge problem for KDD , 2003, SKDD.
[2] Peter L. Bartlett,et al. Open problems in the security of learning , 2008, AISec '08.
[3] Yiming Yang,et al. The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .
[4] Georgios Paliouras,et al. Learning to Filter Unsolicited Commercial E-Mail , 2006 .
[5] Garth P. McCormick,et al. Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..
[6] Tobias Scheffer,et al. Stackelberg games for adversarial prediction problems , 2011, KDD.
[7] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[8] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[9] L. Ghaoui,et al. Robust Classification with Interval Data , 2003 .
[10] Ling Huang,et al. Query Strategies for Evading Convex-Inducing Classifiers , 2010, J. Mach. Learn. Res..
[11] Ling Huang,et al. Classifier Evasion: Models and Open Problems , 2010, PSDML.
[12] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[13] Jurandy Almeida,et al. Evaluation of Approaches for Dimensionality Reduction Applied with Naive Bayes Anti-Spam Filters , 2009, 2009 International Conference on Machine Learning and Applications.
[14] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[15] Pedro M. Domingos,et al. Adversarial classification , 2004, KDD.
[16] Fabio Roli,et al. Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.
[17] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[18] Sanjay Chawla,et al. A Game Theoretical Model for Adversarial Learning , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[19] Richard Lippmann,et al. Machine learning in adversarial environments , 2010, Machine Learning.
[20] Christopher Krügel,et al. Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters , 2007, WOOT.
[21] Ion Androutsopoulos,et al. A Game Theoretic Model of Spam E-Mailing , 2005, CEAS.
[22] Georgios Paliouras,et al. An evaluation of Naive Bayesian anti-spam filtering , 2000, ArXiv.
[23] Vangelis Metsis,et al. Spam Filtering with Naive Bayes - Which Naive Bayes? , 2006, CEAS.