Sciweavers

3556 search results - page 118 / 712
» Can machine learning be secure
Sort
View
CIKM
2005
Springer
14 years 3 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
IWIA
2005
IEEE
14 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
ICALT
2006
IEEE
14 years 4 months ago
AWELS: Adaptive Web-Based Education and Learning Styles
Can learning styles (LS) be applied in current webbased systems? What are the main issues when applying LS in web-based systems? Can LS be authored in current web-based systems? W...
Alexandra I. Cristea, Natalia Stash
ICML
2009
IEEE
14 years 11 months ago
Factored conditional restricted Boltzmann Machines for modeling motion style
The Conditional Restricted Boltzmann Machine (CRBM) is a recently proposed model for time series that has a rich, distributed hidden state and permits simple, exact inference. We ...
Graham W. Taylor, Geoffrey E. Hinton
ICML
2007
IEEE
14 years 11 months ago
Simpler core vector machines with enclosing balls
The core vector machine (CVM) is a recent approach for scaling up kernel methods based on the notion of minimum enclosing ball (MEB). Though conceptually simple, an efficient impl...
András Kocsor, Ivor W. Tsang, James T. Kwok