Sciweavers

3556 search results - page 7 / 712
» Can machine learning be secure
Sort
View
ICML
2006
IEEE
14 years 8 months ago
How boosting the margin can also boost classifier complexity
Boosting methods are known not to usually overfit training data even as the size of the generated classifiers becomes large. Schapire et al. attempted to explain this phenomenon i...
Lev Reyzin, Robert E. Schapire
IUI
2012
ACM
12 years 3 months ago
Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images?
Recent computer vision approaches are aimed at richer image interpretations that extend the standard recognition of objects in images (e.g., cars) to also recognize object attribu...
William Curran, Travis Moore, Todd Kulesza, Weng-K...
SOUPS
2009
ACM
14 years 2 months ago
Machine learning attacks against the Asirra CAPTCHA
The ASIRRA CAPTCHA [6], recently proposed at ACM CCS 2007, relies on the problem of distinguishing images of cats and dogs (a task that humans are very good at). The security of AS...
Philippe Golle
CCS
2005
ACM
14 years 1 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
NAACL
2007
13 years 9 months ago
Can Semantic Roles Generalize Across Genres?
PropBank has been widely used as training data for Semantic Role Labeling. However, because this training data is taken from the WSJ, the resulting machine learning models tend to...
Szu-ting Yi, Edward Loper, Martha Palmer