Sciweavers

3556 search results - page 19 / 712
» Can machine learning be secure
Sort
View
DSN
2003
IEEE
14 years 29 days ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
LFCS
1992
Springer
13 years 11 months ago
Machine Learning of Higher Order Programs
A generator program for a computable function (by definition) generates an infinite sequence of programs all but finitely many of which compute that function. Machine learning of ...
Ganesh Baliga, John Case, Sanjay Jain, Mandayam Su...
SMC
2010
IEEE
121views Control Systems» more  SMC 2010»
13 years 6 months ago
Learning of personalized security settings
—While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer...
Mehrbod Sharifi, Eugene Fink, Jaime G. Carbonell
ICML
2010
IEEE
13 years 8 months ago
Modeling Transfer Learning in Human Categorization with the Hierarchical Dirichlet Process
Transfer learning can be described as the tion of abstract knowledge from one learning domain or task and the reuse of that knowledge in a related domain or task. In categorizatio...
Kevin R. Canini, Mikhail M. Shashkov, Thomas L. Gr...
CCS
2010
ACM
13 years 7 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...