Sciweavers

3556 search results - page 160 / 712
» Can machine learning be secure
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 11 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
ICML
2005
IEEE
14 years 11 months ago
Core Vector Regression for very large regression problems
In this paper, we extend the recently proposed Core Vector Machine algorithm to the regression setting by generalizing the underlying minimum enclosing ball problem. The resultant...
Ivor W. Tsang, James T. Kwok, Kimo T. Lai
ECML
2007
Springer
14 years 5 months ago
Probabilistic Explanation Based Learning
Abstract. Explanation based learning produces generalized explanations from examples. These explanations are typically built in a deductive manner and they aim to capture the essen...
Angelika Kimmig, Luc De Raedt, Hannu Toivonen
ECML
2006
Springer
14 years 2 months ago
Active Learning with Irrelevant Examples
Abstract. Active learning algorithms attempt to accelerate the learning process by requesting labels for the most informative items first. In real-world problems, however, there ma...
Dominic Mazzoni, Kiri Wagstaff, Michael C. Burl
ECTEL
2010
Springer
13 years 9 months ago
Learning from Erroneous Examples: When and How Do Students Benefit from Them?
We investigate whether erroneous examples in the domain of fractions can help students learn from common errors of other students presented in a computer-based system. Presenting t...
Dimitra Tsovaltzi, Erica Melis, Bruce M. McLaren, ...