Evasion and hardening of tree ensemble classifiers
A Kantchelian, JD Tygar… - … conference on machine …, 2016 - proceedings.mlr.press
Classifier evasion consists in finding for a given instance x the “nearest” instance x'such that
the classifier predictions of x and x'are different. We present two novel algorithms for …
the classifier predictions of x and x'are different. We present two novel algorithms for …
A system-driven taxonomy of attacks and defenses in adversarial machine learning
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in
modern real-world applications, which utilize Computational Intelligence (CI) as their core …
modern real-world applications, which utilize Computational Intelligence (CI) as their core …
HYDRA: Revealing heterogeneity of imaging and genetic patterns through a multiple max-margin discriminative analysis framework
Multivariate pattern analysis techniques have been increasingly used over the past decade
to derive highly sensitive and specific biomarkers of diseases on an individual basis. The …
to derive highly sensitive and specific biomarkers of diseases on an individual basis. The …
PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration
Miscreants register thousands of new domains every day to launch Internet-scale attacks,
such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …
such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …
Embedded image coding using zeroblocks of subband/wavelet coefficients and context modeling
ST Hsiang - Proceedings DCC 2001. Data Compression …, 2001 - ieeexplore.ieee.org
In this paper, we present a new embedded wavelet image coding system using quadtree
splitting and context modeling. It features low computational complexity and high …
splitting and context modeling. It features low computational complexity and high …
Recasting self-attention with holographic reduced representations
In recent years, self-attention has become the dominant paradigm for sequence modeling in
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
A solver-free framework for scalable learning in neural ilp architectures
There is a recent focus on designing architectures that have an Integer Linear Programming
(ILP) layer within a neural model (referred to as\emph {Neural ILP} in this paper). Neural ILP …
(ILP) layer within a neural model (referred to as\emph {Neural ILP} in this paper). Neural ILP …
Learning SMT (LRA) constraints using SMT solvers
We introduce the problem of learning SMT (LRA) constraints from data. SMT (LRA) extends
propositional logic with (in) equalities between numerical variables. Many relevant formal …
propositional logic with (in) equalities between numerical variables. Many relevant formal …
The curious case of convex neural networks
This paper investigates a constrained formulation of neural networks where the output is a
convex function of the input. We show that the convexity constraints can be enforced on both …
convex function of the input. We show that the convexity constraints can be enforced on both …
Polyhedral conic classifiers for visual object detection and classification
We propose a family of quasi-linear discriminants that outperform current large-margin
methods in sliding window visual object detection and open set recognition tasks. In these …
methods in sliding window visual object detection and open set recognition tasks. In these …