Sciweavers

3556 search results - page 74 / 712
» Can machine learning be secure
Sort
View
ICML
2005
IEEE
14 years 11 months ago
Hedged learning: regret-minimization with learning experts
In non-cooperative multi-agent situations, there cannot exist a globally optimal, yet opponent-independent learning algorithm. Regret-minimization over a set of strategies optimiz...
Yu-Han Chang, Leslie Pack Kaelbling
ESSOS
2010
Springer
14 years 7 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
ICML
2009
IEEE
14 years 11 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
14 years 10 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
ICML
2007
IEEE
14 years 11 months ago
Robust multi-task learning with t-processes
Most current multi-task learning frameworks ignore the robustness issue, which means that the presence of "outlier" tasks may greatly reduce overall system performance. ...
Shipeng Yu, Volker Tresp, Kai Yu