Abstract is missing.
- On learning and recognition of secure patternsBattista Biggio. 1-2 [doi]
- Adversarial Active LearningBrad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph, J. Doug Tygar. 3-14 [doi]
- Randomized Response Schemes, Privacy and UsefulnessFrancesco Aldà, Hans-Ulrich Simon. 15-26 [doi]
- Poisoning behavioral malware clusteringBattista Biggio, Konrad Rieck, Davide Ariu, Christian Wressnegger, Igino Corona, Giorgio Giacinto, Fabio Roli. 27-36 [doi]
- A Plea for Utilising Synthetic Data when Performing Machine Learning Based Cyber-Security ExperimentsSebastian Abt, Harald Baier. 37-45 [doi]
- Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API ReferencesIgino Corona, Davide Maiorca, Davide Ariu, Giorgio Giacinto. 47-57 [doi]
- Detecting Malicious Domains via Graph InferencePratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne. 59-60 [doi]
- Model Aggregation for Distributed Content Anomaly DetectionSean Whalen, Nathaniel Boggs, Salvatore J. Stolfo. 61-71 [doi]
- Using extreme learning machine for intrusion detection in a big data environmentJunlong Xiang, Magnus Westerlund, Dusan Sovilj, Göran Pulkkis. 73-82 [doi]
- On the Practicality of Integrity Attacks on Document-Level Sentiment AnalysisAndrew Newell, Rahul Potharaju, Luojie Xiang, Cristina Nita-Rotaru. 83-93 [doi]
- Leveraging Machine Learning to Improve Unwanted Resource FilteringSruti Bhagavatula, Christopher W. Dunn, Chris Kanich, Minaxi Gupta, Brian D. Ziebart. 95-102 [doi]
- Automating Reverse Engineering with Machine Learning TechniquesBlake Anderson, Curtis Storlie, Micah Yates, Aaron McPhall. 103-112 [doi]
- Non-Invasive User Tracking via Passive Sensing: Privacy Risks of Time-Series Occupancy MeasurementXiao Wang, Patrick Tague. 113-124 [doi]