暂无分享,去创建一个
Tudor Dumitras | Andrew Ruef | Sanghyun Hong | Michael W. Hicks | Octavian Suciu | Rock Stevens | T. Dumitras | M. Hicks | Octavian Suciu | Sanghyun Hong | Andrew Ruef | Rock Stevens
[1] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[2] Blaine Nelson,et al. Support Vector Machines Under Adversarial Label Noise , 2011, ACML.
[3] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[4] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[6] Alexey Tsymbal,et al. The problem of concept drift: definitions and related work , 2004 .
[7] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[8] Peter Oehlert,et al. Violating Assumptions with Fuzzing , 2005, IEEE Secur. Priv..
[9] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[10] Fabio Roli,et al. Is data clustering in adversarial settings secure? , 2013, AISec.
[11] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[12] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[13] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[14] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[15] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[17] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[18] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[21] Ling Huang,et al. Adversarial Active Learning , 2014, AISec '14.
[22] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[23] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[24] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.