Sciweavers

3556 search results - page 15 / 712
» Can machine learning be secure
Sort
View
CCS
2005
ACM
14 years 1 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
IJOE
2008
98views more  IJOE 2008»
13 years 7 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
EMNLP
2004
13 years 9 months ago
Learning Hebrew Roots: Machine Learning with Linguistic Constraints
The morphology of Semitic languages is unique in the sense that the major word-formation mechanism is an inherently non-concatenative process of interdigitation, whereby two morph...
Ezra Daya, Dan Roth, Shuly Wintner
ALT
2010
Springer
13 years 9 months ago
A Lower Bound for Learning Distributions Generated by Probabilistic Automata
Known algorithms for learning PDFA can only be shown to run in time polynomial in the so-called distinguishability
Borja Balle, Jorge Castro, Ricard Gavaldà
ITS
2010
Springer
115views Multimedia» more  ITS 2010»
14 years 13 days ago
In the Zone: Towards Detecting Student Zoning Out Using Supervised Machine Learning
This paper explores automatically detecting student zoning out while performing a spoken learning task. Standard supervised machine learning techniques were used to create classiï¬...
Joanna Drummond, Diane J. Litman