Picture for Mehmed Kantardzic

Mehmed Kantardzic

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Add code
Mar 24, 2018
Figure 1 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 2 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 3 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 4 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Viaarxiv icon

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Add code
Mar 24, 2018
Figure 1 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 2 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 3 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 4 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Viaarxiv icon

Handling Adversarial Concept Drift in Streaming Data

Add code
Mar 24, 2018
Figure 1 for Handling Adversarial Concept Drift in Streaming Data
Figure 2 for Handling Adversarial Concept Drift in Streaming Data
Figure 3 for Handling Adversarial Concept Drift in Streaming Data
Figure 4 for Handling Adversarial Concept Drift in Streaming Data
Viaarxiv icon

On the Reliable Detection of Concept Drift from Streaming Unlabeled Data

Add code
Mar 31, 2017
Figure 1 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 2 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 3 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 4 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Viaarxiv icon

Evaluating Complex Task through Crowdsourcing: Multiple Views Approach

Add code
Mar 30, 2017
Figure 1 for Evaluating Complex Task through Crowdsourcing: Multiple Views Approach
Figure 2 for Evaluating Complex Task through Crowdsourcing: Multiple Views Approach
Figure 3 for Evaluating Complex Task through Crowdsourcing: Multiple Views Approach
Figure 4 for Evaluating Complex Task through Crowdsourcing: Multiple Views Approach
Viaarxiv icon

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

Add code
Mar 23, 2017
Figure 1 for Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains
Viaarxiv icon

Submodular Optimization for Efficient Semi-supervised Support Vector Machines

Add code
Aug 23, 2011
Figure 1 for Submodular Optimization for Efficient Semi-supervised Support Vector Machines
Figure 2 for Submodular Optimization for Efficient Semi-supervised Support Vector Machines
Figure 3 for Submodular Optimization for Efficient Semi-supervised Support Vector Machines
Figure 4 for Submodular Optimization for Efficient Semi-supervised Support Vector Machines
Viaarxiv icon