Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference20 articles.
1. Branch, M., Coleman, T., & Li, Y. (2000). A subspace, interior, and conjugate gradient method for large-scale bound-constrained minimization problems. SIAM Journal on Scientific Computing, 21(1), 1–23.
2. Byrd, R., Schnabel, R., & Shultz, G. (1988). Approximate solution of the trust region problem by minimization over two-dimensional subspaces. Mathematical Programming, 40(1), 247–263.
3. Collins, M., Schapire, R., & Singer, Y. (2002). Logistic regression, AdaBoost and Bregman distances. Machine Learning, 48(1), 253–285.
4. Dalvi, N., Domingos, P. Mausam, Sanghai, S., & Verma, D. (2004). Adversarial classification. In KDD’04: proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 99–108). New York: ACM.
5. Delany, S. J., Cunningham, P., Tsymbal, A., & Coyle, L. (2005). A case-based technique for tracking concept drift in spam filtering. Knowledge-Based Systems, 18(4–5), 187–195.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors;2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML);2024-04-09
2. Case Studies and Different Applications;SpringerBriefs in Computer Science;2024
3. An Approach to Effective Processing of Information from Smart Home Sensors using Machine Learning Methods;2023 V International Conference on Control in Technical Systems (CTS);2023-09-21
4. Adversarial Machine Learning;2023
5. Attacks Against Machine Learning Systems: Analysis and GAN-based Approach to Protection;Proceedings of the Seventh International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’23);2023