Cryptography and Machine Learning
暂无分享,去创建一个
[1] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[2] Philip M. Long,et al. Tracking drifting concepts using random examples , 1991, Annual Conference Computational Learning Theory.
[3] DANA ANGLUIN,et al. On the Complexity of Minimum Inference of Regular Sets , 1978, Inf. Control..
[4] Ronald L. Rivest,et al. Learning complicated concepts reliably and usefully , 1988, Annual Conference Computational Learning Theory.
[5] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[6] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[7] Dana Angluin,et al. When won't membership queries help? , 1991, STOC '91.
[8] Leonard Pitt,et al. The minimum consistent DFA problem cannot be approximated within and polynomial , 1989, STOC '89.
[9] David Haussler,et al. Proceedings of the fifth annual workshop on Computational learning theory , 1992, COLT 1992.
[10] David Haussler,et al. Occam's Razor , 1987, Inf. Process. Lett..
[11] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[12] Solomon Kullback,et al. Statistical Methods in Cryptanalysis , 1976 .
[13] Robert E. Schapire,et al. Design and analysis of efficient learning algorithms , 1992, ACM Doctoral dissertation award ; 1991.
[14] Dana Angluin,et al. A Note on the Number of Queries Needed to Identify Regular Languages , 1981, Inf. Control..
[15] Adi Shamir,et al. A TcS2 = 0 (2n) time/space tradeoff for certain NP-complete problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[16] Leonard Pitt,et al. Prediction-Preserving Reducibility , 1990, J. Comput. Syst. Sci..
[17] Arthur L. Samuel,et al. Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Ryszard S. Michalski,et al. Machine learning: an artificial intelligence approach volume III , 1990 .
[20] Ronald L. Rivest,et al. Cryptography , 1990, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.
[21] Thomas R. Hancock,et al. Learning 2µ DNF Formulas and kµ Decision Trees , 1991, COLT.
[22] Robert E. Schapire,et al. Learning probabilistic read-once formulas on product distributions , 1991, COLT '91.
[23] John R. Anderson,et al. MACHINE LEARNING An Artificial Intelligence Approach , 2009 .
[24] AARON D. WYNER. An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.
[25] David Haussler,et al. Learnability and the Vapnik-Chervonenkis dimension , 1989, JACM.
[26] Yishay Mansour,et al. Learning monotone ku DNF formulas on product distributions , 1991, COLT '91.
[27] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[28] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[29] Aaron D. Wyner. An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time , 1979, IEEE Trans. Inf. Theory.
[30] Michael Kearns,et al. Computational complexity of machine learning , 1990, ACM distinguished dissertations.
[31] Kurt Mehlhorn,et al. Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity , 1990 .
[32] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[33] Marek Karpinski,et al. Learning read-once formulas using membership queries , 1989, COLT '89.
[34] N. J. A. Sloane,et al. Error-Correcting Codes and Cryptography , 1981 .
[35] Noam Nisan,et al. Constant depth circuits, Fourier transform, and learnability , 1993, JACM.
[36] Donald W. Davies,et al. Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.) , 1989, Wiley series in communication and distributed systems.
[37] Gilles Brassard,et al. Modern cryptology , 2006 .
[38] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[39] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[40] Sean W. Smith,et al. Improved learning of AC0 functions , 1991, COLT '91.
[41] Ronald L. Rivest,et al. Learning Time-Varying Concepts , 1990, NIPS.
[42] Leslie G. Valiant,et al. Computational limitations on learning from examples , 1988, JACM.
[43] Leslie G. Valiant,et al. Cryptographic Limitations on Learning Boolean Formulae and Finite Automata , 1993, Machine Learning: From Theory to Applications.
[44] Eyal Kushilevitz,et al. Learning decision trees using the Fourier spectrum , 1991, STOC '91.
[45] Leslie G. Valiant,et al. A theory of the learnable , 1984, CACM.
[46] Marek Karpinski,et al. Learning read-once formulas with queries , 1993, JACM.