Sciweavers

3556 search results - page 80 / 712
» Can machine learning be secure
Sort
View
COLT
2008
Springer
13 years 12 months ago
How Local Should a Learning Method Be?
We consider the question of why modern machine learning methods like support vector machines outperform earlier nonparametric techniques like kNN. Our approach investigates the lo...
Alon Zakai, Yaacov Ritov
ECTEL
2009
Springer
13 years 8 months ago
CAMera for PLE
Successful self-regulated learning in a personalized learning environment (PLE) requires self-monitoring of the learner and reflection of learning behaviour. We introduce a tool ca...
Hans-Christian Schmitz, Maren Scheffel, Martin Fri...
CCS
2010
ACM
13 years 10 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
ACSAC
1999
IEEE
14 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ICML
2002
IEEE
14 years 11 months ago
Learning to Share Distributed Probabilistic Beliefs
In this paper, we present a general machine learning approach to the problem of deciding when to share probabilistic beliefs between agents for distributed monitoring. Our approac...
Christopher Leckie, Kotagiri Ramamohanarao