Sciweavers

16 search results - page 1 / 4
» Adversarial classification
Sort
View
CIKM
2009
Springer
13 years 10 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
DARS
2000
Springer
173views Robotics» more  DARS 2000»
13 years 10 months ago
On Behavior Classification in Adversarial Environments
In order for robotic systems to be successful in domains with other agents possibly interfering with the accomplishing of goals, the agents must be able to adapt to the opponents&#...
Patrick Riley, Manuela M. Veloso
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 7 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 7 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
ML
2010
ACM
138views Machine Learning» more  ML 2010»
13 years 1 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla