Sciweavers

53 search results - page 6 / 11
» Manipulation Robustness of Collaborative Filtering
Sort
View
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 3 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
CDC
2010
IEEE
13 years 3 months ago
A Switching strategy for robust cooperative exploration
Abstract-- This paper develops a switching strategy for networked mobile sensing agents to automatically decide when to perform individual exploration and when to perform cooperati...
Wencen Wu, Fumin Zhang
ICPR
2000
IEEE
14 years 29 days ago
Gabor Filters for Object Localization and Robot Grasping
We present a system for learning the 3 DOF finepositioning task of a robot manipulator (Puma 260) using a gripper mounted camera. Small lateral gripper-target misalignments are c...
Jörg A. Walter, Bert Arnrich
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 9 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
MCS
2010
Springer
13 years 10 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli