Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sandamal Weerasinghe"'
Autor:
Sandamal Weerasinghe, Tamas Abraham, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein
Publikováno v:
2022 IEEE 61st Conference on Decision and Control (CDC).
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:2566-2578
Support Vector Machines (SVMs) are vulnerable to targeted training data manipulations such as poisoning attacks and label flips. By carefully manipulating a subset of training samples, the attacker forces the learner to compute an incorrect decision
Autor:
Benjamin I. P. Rubinstein, Sarah M. Erfani, Tamas Abraham, Christopher Leckie, Tansu Alpcan, Sandamal Weerasinghe
Publikováno v:
IJCAI
Nonlinear regression, although widely used in engineering, financial and security applications for automated decision making, is known to be vulnerable to training data poisoning. Targeted poisoning attacks may cause learning algorithms to fit decisi
Publikováno v:
LCN
Software-defined radios (SDRs) with substantial cognitive (computing) and networking capabilities provide an opportunity for observing radio communications in an area and potentially identifying malicious rogue agents. Assuming a prevalence of encryp
Publikováno v:
Pattern Recognition. 96:106985
Support Vector Machines (SVMs) are vulnerable to integrity attacks, where malicious attackers distort the training data in order to compromise the decision boundary of the learned model. With increasing real-world applications of SVMs, malicious data
Autor:
Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Peyam Pourbeik, Jack Riddle, Christopher Leckie
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030015534
GameSec
GameSec
Software-defined radios (SDRs) with substantial cognitive (computing) and networking capabilities provide an opportunity for malicious individuals to jam the communications of other legitimate users. Channel hopping is a well known anti-jamming tacti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::965d610b553e6543a07bf780d6225637
https://doi.org/10.1007/978-3-030-01554-1_22
https://doi.org/10.1007/978-3-030-01554-1_22
Publikováno v:
2013 IEEE 8th International Conference on Industrial and Information Systems.
Tables are frequently used in web sources to present relational data in a human friendly manner. Because they are intended for humans, using machines to extract such information is difficult. There are approaches such as wrappers that attempt to solv