Works matching IS 08856125 AND DT 2010 AND VI 81 AND IP 2
Results: 5
The security of machine learning.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 121, doi. 10.1007/s10994-010-5188-5
- By:
- Publication type:
- Article
Graph regularization methods for Web spam detection.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 207, doi. 10.1007/s10994-010-5171-1
- By:
- Publication type:
- Article
Learning to classify with missing and corrupted features.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 149, doi. 10.1007/s10994-009-5124-8
- By:
- Publication type:
- Article
Machine learning in adversarial environments.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
On the infeasibility of modeling polymorphic shellcode.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 179, doi. 10.1007/s10994-009-5143-5
- By:
- Publication type:
- Article