Sciweavers

66 search results - page 6 / 14
» A Game Theoretical Model for Adversarial Learning
Sort
View
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 10 months ago
Doing Good with Spam Is Hard
We study economic means to improve network performance in the well-known game theoretic traffic model due to Wardrop. We introduce two sorts of spam flow - auxiliary and adversari...
Martin Hoefer, Lars Olbrich, Alexander Skopalik
131
Voted
ALT
2001
Springer
16 years 25 days ago
Real-Valued Multiple-Instance Learning with Queries
While there has been a significant amount of theoretical and empirical research on the multiple-instance learning model, most of this research is for concept learning. However, f...
Daniel R. Dooly, Sally A. Goldman, Stephen Kwek
138
Voted
GI
2009
Springer
15 years 1 months ago
Test your Strategy - Intuitive Strategy Definition and Evaluation for Novices and Experts
: ConnectIT uses a graphical representation to express strategies for playing the connect-four game. With this tool we can transfer complex knowledge about the connect-four game it...
Sven Jörges, Marco Bakera, Tiziana Margaria, ...
CCS
2006
ACM
15 years 7 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
ATAL
2010
Springer
15 years 5 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...