Author:
Laskov Pavel,Lippmann Richard
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference27 articles.
1. Abernethy, J., Chapelle, O., & Castillo, C. (2010). Graph regularization methods for Web spam detection. Machine Learning, 81(2). doi: 10.1007/s10994-010-5171-1 .
2. Auer, P., & Cesa-Bianchi, N. (1998). On-line learning with malicious noise and the closure algorithm. Annals of Mathematics and Artificial Intelligence, 23(1–2), 83–99.
3. Barreno, M., Nelson, B., Joseph, A., & Tygar, D. (2010). The security of machine learning. Machine Learning, 81(2). doi: 10.1007/s10994-010-5188-5 .
4. Brückner, M., & Scheffer, T. (2009). Nash equilibria of static prediction games. In Y. Bengio, D. Schuurmans, J. Lafferty, C. K. I. Williams, & A. Culotta (Eds.), Advances in neural information processing systems (Vol. 22, pp. 171–179). Red Hook: Curran Associates, Inc.
5. Brumley, D., Newsome, J., Song, D., Wang, H., & Jha, S. (2006). Towards automatic generation of vulnerability-based signatures. In IEEE symposium on security and privacy (pp. 2–16).
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献