ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
Latest Publications
TOTAL DOCUMENTS
10
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By ACM Press
9781450338264
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Automated Attacks on Compression-Based Classifiers
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808778
◽
2015
◽
Cited By ~ 2
Author(s):
Igor Burago
◽
Daniel Lowd
Download Full-text
Malicious Behavior Detection using Windows Audit Logs
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808773
◽
2015
◽
Cited By ~ 27
Author(s):
Konstantin Berlin
◽
David Slater
◽
Joshua Saxe
Keyword(s):
Behavior Detection
◽
Malicious Behavior
Download Full-text
Detecting Clusters of Fake Accounts in Online Social Networks
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808779
◽
2015
◽
Cited By ~ 56
Author(s):
Cao Xiao
◽
David Mandell Freeman
◽
Theodore Hwa
Keyword(s):
Social Networks
◽
Online Social Networks
Download Full-text
Remote Operating System Classification over IPv6
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808777
◽
2015
◽
Cited By ~ 4
Author(s):
David Fifield
◽
Alexandru Geana
◽
Luis MartinGarcia
◽
Mathias Morbitzer
◽
J.D. Tygar
Keyword(s):
Operating System
Download Full-text
Differential Privacy for Classifier Evaluation
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808775
◽
2015
◽
Cited By ~ 10
Author(s):
Kendrick Boyd
◽
Eric Lantz
◽
David Page
Keyword(s):
Differential Privacy
◽
Classifier Evaluation
Download Full-text
Better Malware Ground Truth
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808780
◽
2015
◽
Cited By ~ 18
Author(s):
Alex Kantchelian
◽
Michael Carl Tschantz
◽
Sadia Afroz
◽
Brad Miller
◽
Vaishaal Shankar
◽
...
Keyword(s):
Ground Truth
Download Full-text
Subsampled Exponential Mechanism
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808776
◽
2015
◽
Cited By ~ 2
Author(s):
Eric Lantz
◽
Kendrick Boyd
◽
David Page
Download Full-text
Thwarting Fake OSN Accounts by Predicting their Victims
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808772
◽
2015
◽
Cited By ~ 8
Author(s):
Yazan Boshmaf
◽
Matei Ripeanu
◽
Konstantin Beznosov
◽
Elizeu Santos-Neto
Download Full-text
Machine Learning for Enterprise Security
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808782
◽
2015
◽
Cited By ~ 1
Author(s):
Pratyusa K. Manadhata
Keyword(s):
Machine Learning
◽
Enterprise Security
Download Full-text
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15
◽
10.1145/2808769.2808774
◽
2015
◽
Cited By ~ 17
Author(s):
Martine de Cock
◽
Rafael Dowsley
◽
Anderson C.A. Nascimento
◽
Stacey C. Newman
Keyword(s):
Linear Regression
◽
Privacy Preserving
◽
Distributed Data
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close