Sciweavers

528 search results - page 23 / 106
» What Can We Learn Privately
Sort
View
CCS
2008
ACM
13 years 9 months ago
Open problems in the security of learning
Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decisi...
Marco Barreno, Peter L. Bartlett, Fuching Jack Chi...
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
ICALP
2001
Springer
14 years 4 days ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
ALT
2008
Springer
14 years 4 months ago
Active Learning of Group-Structured Environments
The question investigated in this paper is to what extent an input representation influences the success of learning, in particular from the point of view of analyzing agents that...
Gábor Bartók, Csaba Szepesvár...
IICAI
2003
13 years 9 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri