Sciweavers

3556 search results - page 84 / 712
» Can machine learning be secure
Sort
View
TREC
2004
13 years 11 months ago
Experience of Using SVM for the Triage Task in TREC 2004 Genomics Track
This paper reports our knowledge-ignorant machine learning approach to the triage task in TREC2004 genomics track, which is actually a text categorization problem. We applied Supp...
Dell Zhang, Wee Sun Lee
FC
2010
Springer
132views Cryptology» more  FC 2010»
14 years 2 months ago
A Learning-Based Approach to Reactive Security
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
ICML
2000
IEEE
14 years 11 months ago
Meta-Learning by Landmarking Various Learning Algorithms
Landmarking is a novel approach to describing tasks in meta-learning. Previous approaches to meta-learning mostly considered only statistics-inspired measures of the data as a sou...
Bernhard Pfahringer, Hilan Bensusan, Christophe G....
ACSAC
2005
IEEE
14 years 3 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
ECTEL
2010
Springer
13 years 8 months ago
A Framework for the Domain-Independent Collection of Attention Metadata
Abstract. We present a simple and extendible framework to collect attention metadata and store them for further analysis. Currently, several metadata collectors have been implement...
Maren Scheffel, Martin Friedrich, Katja Niemann, U...