Sciweavers

3556 search results - page 82 / 712
» Can machine learning be secure
Sort
View
ISBRA
2011
Springer
14 years 6 months ago
Query-Adaptive Ranking with Support Vector Machines for Protein Homology Prediction
Abstract. Protein homology prediction is a crucial step in templatebased protein structure prediction. The functions that rank the proteins in a database according to their homolog...
Yan Fu, Rong Pan, Qiang Yang, Wen Gao
ICCV
2007
IEEE
15 years 9 months ago
Support Kernel Machines for Object Recognition
Kernel classifiers based on Support Vector Machines (SVM) have recently achieved state-of-the art results on several popular datasets like Caltech or Pascal. This was possible by...
Ankita Kumar, Cristian Sminchisescu
137
Voted
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
15 years 7 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
AAAI
2012
13 years 5 months ago
Relative Attributes for Enhanced Human-Machine Communication
We propose to model relative attributes1 that capture the relationships between images and objects in terms of human-nameable visual properties. For example, the models can captur...
Devi Parikh, Adriana Kovashka, Amar Parkash, Krist...
WCRE
2009
IEEE
15 years 9 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...