PATTERN RECOGNITION SYSTEMS UNDER ATTACK: DESIGN ISSUES AND RESEARCH CHALLENGES
Published 2014 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
PATTERN RECOGNITION SYSTEMS UNDER ATTACK: DESIGN ISSUES AND RESEARCH CHALLENGES
Authors
Keywords
-
Journal
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE
Volume 28, Issue 07, Pages 1460002
Publisher
World Scientific Pub Co Pte Lt
Online
2014-07-29
DOI
10.1142/s0218001414600027
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Randomized Anagram revisited
- (2014) Sergio Pastrana et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Security Evaluation of Pattern Classifiers under Attack
- (2013) Battista Biggio et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Scalable fine-grained behavioral clustering of HTTP-based malware
- (2012) Roberto Perdisci et al. Computer Networks
- Does Game Theory Work?
- (2012) Michael Wooldridge IEEE INTELLIGENT SYSTEMS
- Security Analytics and Measurements
- (2012) George Cybenko et al. IEEE SECURITY & PRIVACY
- Security evaluation of biometric authentication systems under real spoofing attacks
- (2012) B. Biggio et al. IET Biometrics
- A survey of image spamming and filtering techniques
- (2011) Abdolrahman Attar et al. ARTIFICIAL INTELLIGENCE REVIEW
- A Learning-Based Approach to Reactive Security
- (2011) Adam Barth et al. IEEE Transactions on Dependable and Secure Computing
- A survey and experimental evaluation of image spam filtering techniques
- (2011) Battista Biggio et al. PATTERN RECOGNITION LETTERS
- An evaluation of indirect attacks and countermeasures in fingerprint verification systems
- (2011) Marcos Martinez-Diaz et al. PATTERN RECOGNITION LETTERS
- Mining adversarial patterns via regularized loss minimization
- (2010) Wei Liu et al. MACHINE LEARNING
- Multiple classifier systems for robust classifier design in adversarial environments
- (2010) Battista Biggio et al. International Journal of Machine Learning and Cybernetics
- Robustness of multimodal biometric fusion methods against spoof attacks
- (2009) Ricardo N. Rodrigues et al. JOURNAL OF VISUAL LANGUAGES AND COMPUTING
- Learning to classify with missing and corrupted features
- (2009) Ofer Dekel et al. MACHINE LEARNING
- On the vulnerability of face verification systems to hill-climbing attacks
- (2009) Javier Galbally et al. PATTERN RECOGNITION
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now