Sciweavers

658 search results - page 36 / 132
» Open problems in the security of learning
Sort
View
FOCS
2004
IEEE
14 years 20 days ago
Learning with Errors in Answers to Membership Queries
We study the learning models defined in [AKST97]: Learning with equivalence and limited membership queries and learning with equivalence and malicious membership queries. We show ...
Laurence Bisht, Nader H. Bshouty, Lawrance Khoury
CVPR
2009
IEEE
13 years 6 months ago
Learning IMED via shift-invariant transformation
The IMage Euclidean Distance (IMED) is a class of image metrics, in which the spatial relationship between pixels is taken into consideration. It was shown that calculating the IM...
Bing Sun, Jufu Feng, Liwei Wang
IEEEARES
2010
IEEE
14 years 3 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
13 years 11 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
ECOOP
2009
Springer
14 years 9 months ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...