Vulnerability of Covariate Shift Adaptation Against Malicious Poisoning Attacks
暂无分享,去创建一个
Robi Polikar | Christopher Frederickson | Muhammad Umer | R. Polikar | Muhammad Umer | Christopher Frederickson
[1] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[2] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[3] Fabio Roli,et al. Is data clustering in adversarial settings secure? , 2013, AISec.
[4] H. Shimodaira,et al. Improving predictive inference under covariate shift by weighting the log-likelihood function , 2000 .
[5] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[6] Neil D. Lawrence,et al. Dataset Shift in Machine Learning , 2009 .
[7] Bernhard Schölkopf,et al. Correcting Sample Selection Bias by Unlabeled Data , 2006, NIPS.
[8] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Motoaki Kawanabe,et al. Direct Importance Estimation with Model Selection and Its Application to Covariate Shift Adaptation , 2007, NIPS.
[10] Robi Polikar,et al. Learning under extreme verification latency quickly: FAST COMPOSE , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
[11] Masashi Sugiyama,et al. Importance-weighted least-squares probabilistic classifier for covariate shift adaptation with application to human activity recognition , 2012, Neurocomputing.
[12] Klaus-Robert Müller,et al. Covariate Shift Adaptation by Importance Weighted Cross Validation , 2007, J. Mach. Learn. Res..
[13] Claudia Eckert,et al. Is Feature Selection Secure against Training Data Poisoning? , 2015, ICML.
[14] Masashi Sugiyama,et al. Adaptive Importance Sampling with Automatic Model Selection in Value Function Approximation , 2007, AAAI.
[15] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[16] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[17] Takafumi Kanamori,et al. A Least-squares Approach to Direct Importance Estimation , 2009, J. Mach. Learn. Res..
[18] João Gama,et al. Data Stream Classification Guided by Clustering on Nonstationary Environments and Extreme Verification Latency , 2015, SDM.
[19] Trevor Darrell,et al. Continuous Manifold Based Adaptation for Evolving Visual Domains , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[20] Robi Polikar,et al. Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).
[21] Steffen Bickel,et al. Discriminative Learning Under Covariate Shift , 2009, J. Mach. Learn. Res..
[22] Robi Polikar,et al. LEVELIW: Learning extreme verification latency with importance weighting , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[23] Robi Polikar,et al. Adversarial Poisoning of Importance Weighting in Domain Adaptation , 2018, 2018 IEEE Symposium Series on Computational Intelligence (SSCI).
[24] Steffen Bickel,et al. Dirichlet-Enhanced Spam Filtering based on Biased Samples , 2006, NIPS.
[25] J. Heckman. Sample selection bias as a specification error , 1979 .
[26] Hans-Peter Kriegel,et al. Integrating structured biological data by Kernel Maximum Mean Discrepancy , 2006, ISMB.