Sciweavers

3556 search results - page 119 / 712
» Can machine learning be secure
Sort
View
ICML
2008
IEEE
14 years 11 months ago
Stopping conditions for exact computation of leave-one-out error in support vector machines
We propose a new stopping condition for a Support Vector Machine (SVM) solver which precisely reflects the objective of the Leave-OneOut error computation. The stopping condition ...
Klaus-Robert Müller, Pavel Laskov, Vojtech Fr...
ICML
2004
IEEE
14 years 11 months ago
Robust feature induction for support vector machines
The goal of feature induction is to automatically create nonlinear combinations of existing features as additional input features to improve classification accuracy. Typically, no...
Rong Jin, Huan Liu
ICML
2006
IEEE
14 years 4 months ago
Multiclass reduced-set support vector machines
There are well-established methods for reducing the number of support vectors in a trained binary support vector machine, often with minimal impact on accuracy. We show how reduce...
Benyang Tang, Dominic Mazzoni
DIMVA
2010
13 years 10 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
ICMCS
2000
IEEE
170views Multimedia» more  ICMCS 2000»
14 years 2 months ago
Update Relevant Image Weights for Content-Based Image Retrieval using Support Vector Machines
Relevance feedback [1] has been a powerful tool for interactive Content-Based Image Retrieval (CBIR). During the retrieval process, the user selects the most relevant images and p...
Qi Tian, Pengyu Hong, Thomas S. Huang