Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Pillai, Ignazio"'
Autor:
Biggio, Battista, Pillai, Ignazio, Bulò, Samuel Rota, Ariu, Davide, Pelillo, Marcello, Roli, Fabio
Publikováno v:
Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, AISec '13, pages 87-98, New York, NY, USA, 2013. ACM
Clustering algorithms have been increasingly adopted in security applications to spot dangerous or illicit activities. However, they have not been originally devised to deal with deliberate attack attempts that may aim to subvert the clustering proce
Externí odkaz:
http://arxiv.org/abs/1811.09982
Publikováno v:
IEEE Transactions on Neural Networks and Learning Systems, 2016
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time; e.g., malware code is typically obfuscated using random strings or byte sequences to hide known e
Externí odkaz:
http://arxiv.org/abs/1609.00804
Publikováno v:
In Pattern Recognition January 2017 61:394-404
Publikováno v:
In Pattern Recognition August 2013 46(8):2256-2266
Publikováno v:
In Pattern Recognition July 2013 46(7):2055-2065
Publikováno v:
In Pattern Recognition Letters 2011 32(10):1436-1446
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Biggio, Battista, Bulò, Samuel Rota, Pillai, Ignazio, Mura, Michele, Mequanint, Eyasu Zemene, Pelillo, Marcello, Roli, Fabio
Publikováno v:
Structural, Syntactic & Statistical Pattern Recognition: Joint IAPR International Workshop, S+SSPR 2014, Joensuu, Finland, August 20-22, 2014. Proceedings; 2014, p42-52, 11p
Publikováno v:
2014 22nd International Conference on Pattern Recognition; 2014, p3452-3456, 5p
Publikováno v:
Intelligent Data Engineering & Automated Learning - IDEAL 2014; 2014, p45-52, 8p