Sciweavers

3556 search results - page 82 / 712
» Can machine learning be secure
Sort
View
ISBRA
2011
Springer
13 years 1 months ago
Query-Adaptive Ranking with Support Vector Machines for Protein Homology Prediction
Abstract. Protein homology prediction is a crucial step in templatebased protein structure prediction. The functions that rank the proteins in a database according to their homolog...
Yan Fu, Rong Pan, Qiang Yang, Wen Gao
ICCV
2007
IEEE
14 years 4 months ago
Support Kernel Machines for Object Recognition
Kernel classifiers based on Support Vector Machines (SVM) have recently achieved state-of-the art results on several popular datasets like Caltech or Pascal. This was possible by...
Ankita Kumar, Cristian Sminchisescu
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
14 years 2 months ago
On the appropriateness of evolutionary rule learning algorithms for malware detection
In this paper, we evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classi...
M. Zubair Shafiq, S. Momina Tabish, Muddassar Faro...
AAAI
2012
12 years 19 days ago
Relative Attributes for Enhanced Human-Machine Communication
We propose to model relative attributes1 that capture the relationships between images and objects in terms of human-nameable visual properties. For example, the models can captur...
Devi Parikh, Adriana Kovashka, Amar Parkash, Krist...
WCRE
2009
IEEE
14 years 5 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...