The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for adversarial with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1996 (17) 1997-1998 (16) 1999-2000 (19) 2001 (29) 2002 (20) 2003 (37) 2004 (45) 2005 (83) 2006 (85) 2007 (98) 2008 (103) 2009 (112) 2010 (68) 2011 (60) 2012 (75) 2013 (80) 2014 (79) 2015 (87) 2016 (218) 2017 (897) 2018 (2329) 2019 (3683) 2020 (4530) 2021 (4850) 2022 (4809) 2023 (5050) 2024 (1142)
Publication types (Num. hits)
article(16694) book(4) data(8) incollection(61) inproceedings(11718) phdthesis(129) proceedings(7)
Venues (Conferences, Journals, ...)
CoRR(9284) IEEE Access(627) AAAI(425) NeurIPS(398) CVPR(367) ICASSP(346) IJCNN(270) ICML(256) Neurocomputing(249) Sensors(194) ICIP(187) ICCV(185) IJCAI(167) Remote. Sens.(165) ICLR(153) ACM Multimedia(151) More (+10 of total 2628)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 704 occurrences of 484 keywords

Results
Found 28621 publication records. Showing 28621 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
63Andrew L. Cohen, Debra Cash, Michael J. Muller Designing to support adversarial collaboration. Search on Bibsonomy CSCW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF adversarial collaboration, cooperative collaboration, lawyers, privacy, design, documents, collaborative writing, secrecy, collaborative editing
57Michael Langberg Private Codes or Succinct Random Codes That Are (Almost) Perfect. Search on Bibsonomy FOCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar Open problems in the security of learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial learning, secure learning, machine learning, computer security, security metrics
53Carme Àlvarez, Maria J. Blesa, Josep Díaz, Antonio Fernández 0001, Maria J. Serna Adversarial Models for Priority-Based Networks. Search on Bibsonomy MFCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
53David Gamarnik Stability of Adversarial Queues via Fluid Models. Search on Bibsonomy FOCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF scheduling, networks, stability, fluid models
53Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa Online phishing classification using adversarial data mining and signaling games. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering
53Yi Wang 0035, Shyam Kapadia, Bhaskar Krishnamachari Infection spread in wireless networks with random and adversarial node mobilities. Search on Bibsonomy MobilityModels The full citation details ... 2008 DBLP  DOI  BibTeX  RDF infection spread, wireless network, random, adversarial, node mobility
53Michal Pechoucek, Jan Tozicka, Martin Rehák Towards formal model of adversarial action in multi-agent systems. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adversarial action, cooperation, formal model, competitiveness
53Daniel Lowd, Christopher Meek Adversarial learning. Search on Bibsonomy KDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF adversarial classification, spam, linear classifiers
48Baruch Awerbuch, Christian Scheideler Towards a scalable and robust DHT. Search on Bibsonomy SPAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF robustness, overlay networks, peer-to-peer systems
48Christophe Tartary Ensuring Authentication of Digital Information Using Cryptographic Accumulators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel
44Cormac Flanagan, Stephen N. Freund Adversarial memory for detecting destructive races. Search on Bibsonomy PLDI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF concurrency, dynamic analysis, race conditions, relaxed memory models
44Thomas P. Hayes, Jared Saia, Amitabh Trehan The forgiving graph: a distributed data structure for low stretch under adversarial attack. Search on Bibsonomy PODC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF half-full tree, peer-to-peer, network, data structure, distributed, reconfigurable, self-healing, responsive, stretch, degree
44Andrew W. Eckford, Scott E. T. Hadley On Estimating the Topology of an Adversarial Wireless Network. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Ilya Mironov, Moni Naor, Gil Segev 0001 Sketching in adversarial environments. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data stream model., sketch model, massive data sets
44Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschein, Gal A. Kaminka An adversarial environment model for bounded rational agents in zero-sum interactions. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF agents, multiagent systems, modal logic
44Gabriel Istrate, Madhav V. Marathe, S. S. Ravi Adversarial Scheduling Analysis of Game-Theoretic Models of Norm Diffusion. Search on Bibsonomy CiE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial scheduling, Markov chains, evolutionary games
44Kerstin Lemke-Rust, Christof Paar An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tamper-Proof Hardware, Fault Analysis, Physical Security, Adversarial Model, Tampering, Implementation Attack
44Jay Sethuraman, Chung-Piaw Teo Effective Routing and Scheduling in Adversarial Queueing Networks. Search on Bibsonomy Algorithmica The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Adversarial networks, Scheduling, Congestion, Multicommodity flow, Fluid model
41Muhammad Aurangzeb Ahmad, Brian Keegan, Sophia D. Sullivan, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor Towards Analyzing Adversarial Behavior in Clandestine Networks. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
41Boris A. Galitsky, Josep Lluís de la Rosa Learning Adversarial Reasoning Patterns in Customer Complaints. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
38Fredrik Manne, Morten Mjelde, Laurence Pilard, Sébastien Tixeuil A New Self-stabilizing Maximal Matching Algorithm. Search on Bibsonomy SIROCCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38David Gamarnik On deciding stability of constrained random walks and queueing systems. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Fabien Mathieu Upper Bounds for Stabilization in Acyclic Preference-Based Systems. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Preference-based systems, adversarial and round robin daemons, round robin, acyclicity, b-matching
38Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi Physical Security Bounds Against Tampering. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack
38Nathaniel Gemelli, Robert Wright, James Lawton, Andrew Boes Asynchronous chess competition. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adversarial environments, real-time reasoning, intelligent agents
36Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36George Cybenko, Michael P. Wellman, Peng Liu 0005, Minghui Zhu Overview of Control and Game Theory in Adaptive Cyber Defenses. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen Adaptive Cyber Defenses for Botnet Detection and Mitigation. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Benjamin W. Priest, George Cybenko, Satinder Singh 0001, Massimiliano Albanese, Peng Liu 0005 Online and Scalable Adaptive Cyber Defense. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Michael P. Wellman, Thanh Hong Nguyen, Mason Wright Empirical Game-Theoretic Methods for Adaptive Cyber-Defense. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Zhisheng Hu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Massimiliano Albanese, Warren Connell, Sridhar Venkatesan, George Cybenko Moving Target Defense Quantification. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis Control-Theoretic Approaches to Cyber-Security. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu 0005 MTD Techniques for Memory Protection Against Zero-Day Attacks. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36 Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011 AAAI Workshop, San Francisco, California, USA, August 7, 2011 Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Sam Ganzfried, Tuomas Sandholm, Kevin Waugh Strategy Purification. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Octavio Lerma, Vladik Kreinovich, Christopher Kiekintveld Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Manish Jain, Zhengyu Yin, Milind Tambe, Fernando Ordóñez Addressing Execution and Observation Error in Security Games. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36James Pita, Rong Yang, Milind Tambe, Richard John Toward Addressing Human Behavior with Observational Uncertainty in Security Games. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Oswaldo Aguirre, Nicolas Lopez, Eric Gutierrez, Heidi A. Taboada, Jose Epiritu, Christopher Kiekintveld Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Joshua Letchford, Yevgeniy Vorobeychik Computing Randomized Security Strategies in Networked Domains. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Maciej M. Latek, Seyed M. Mussavi Rizi Robust Decision Making under Strategic Uncertainty in Multiagent Environments. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Thomas J. Walsh 0001, Javad Taheri, Jeremy B. Wright, Paul R. Cohen Leadership Games and their Application in Super-Peer Networks. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
36Daniel Keep, Rachel Bunder, Ian Piper, Anthony Green Application of Microsimulation Towards Modelling of Behaviours in Complex Environments. Search on Bibsonomy Applied Adversarial Reasoning and Risk Modeling The full citation details ... 2011 DBLP  BibTeX  RDF
34Marcos A. Kiwi Adversarial Queueing Theory Revisited. Search on Bibsonomy IFIP TCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Jay Sethuraman, Chung-Piaw Teo Effective Routing and Scheduling in Adversarial Queueing Networks. Search on Bibsonomy RANDOM-APPROX The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Maria J. Blesa, Daniel Calzada, Antonio Fernández 0001, Luis López, Andrés L. Martínez, Agustín Santos, Maria J. Serna, Christopher Thraves Adversarial Queueing Model for Continuous Network Dynamics. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversarial queueing theory, Stability of networks, Stability of queueing policies, Packet-switched networks
34Justin King, Kiran Lakkaraju, Adam J. Slagell A taxonomy and adversarial model for attacks against network log anonymization. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network logs, anonymization, taxonomy, adversarial model
34Noa Agmon, Sarit Kraus, Gal A. Kaminka Uncertainties in adversarial patrol. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF adversarial/game domains, formal models of multi-robot plans, multi-robotics
34Carlos Castillo 0001, Kumar Chellapilla, Dennis Fetterly Fourth international workshop on adversarial information retrieval on the web (AIRWeb 2008). Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial information retrieval, search engine spam, spamdexing, web spam
34Jane Holt, Simon Lock MARPLE investigates: an 'adversarial' approach to evaluating user experience. Search on Bibsonomy BCS HCI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF evaluation, interactive, user experience, subjective, adversarial
34Adi Rosén, Michael S. Tsirkin On delivery times in packet networks under adversarial traffic. Search on Bibsonomy SPAA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF adversarial queuing theory, delivery time, protocols, stability, packet networks
34Baruch Awerbuch, André Brinkmann, Christian Scheideler Anycasting in Adversarial Systems: Routing and Admission Control. Search on Bibsonomy ICALP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Adversarial routing, load balancing, online algorithms, dynamic networks, anycasting
34Zvi Lotker, Boaz Patt-Shamir, Adi Rosén New stability results for adversarial queuing. Search on Bibsonomy SPAA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversarial queuing theory
34Carme Àlvarez, Maria J. Blesa, Maria J. Serna Universal stability of undirected graphs in the adversarial queueing model. Search on Bibsonomy SPAA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversarial queueing, greedy protocols, packet switched networks, network stability
29Baruch Awerbuch, Christian Scheideler Towards a Scalable and Robust DHT. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Martin Hoefer 0001, Lars Olbrich, Alexander Skopalik Doing Good with Spam Is Hard. Search on Bibsonomy SAGT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Stefan Zickler, Manuela M. Veloso Efficient physics-based planning: sampling search via non-deterministic tactics and skills. Search on Bibsonomy AAMAS (1) The full citation details ... 2009 DBLP  BibTeX  RDF kinodynamic, physics-based, robot, planning, control, behavioral, rigid body, tactics
29Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF min-max robust detection, protocol misbehavior, Wireless networks, MAC layer
29Payman Mohassel, Enav Weinreb Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yinian Mao, Min Wu 0001 Tracing Malicious Relays in Cooperative Wireless Communications. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Matthew Andrews, Kyomin Jung, Alexander L. Stolyar Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scheduling, routing, stability
29Vitaly Feldman, Parikshit Gopalan, Subhash Khot, Ashok Kumar Ponnuswami New Results for Learning Noisy Parities and Halfspaces. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Farzad Parvaresh, Alexander Vardy Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time. Search on Bibsonomy FOCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Dimitrios Koukopoulos The Impact of Dynamic Link Slowdowns on Network Stability. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Avrim Blum, Prasad Chalasani Learning Switching Concepts. Search on Bibsonomy COLT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
29Pavel Laskov, Marius Kloft A framework for quantitative security analysis of machine learning. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security
29Dimitrios Koukopoulos, Stavros D. Nikolopoulos, Leonidas Palios, Paul G. Spirakis Optimal Algorithms for Detecting Network Stability. Search on Bibsonomy WALCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Packet-switched communication networks, adversarial queueing theory, intrusion detection, graph theory, network stability, linear algorithms
29Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki Stability of the Multiple-Access Channel Under Maximum Broadcast Loads. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deterministic broadcast, adversarial queuing, stability, fairness, latency, multiple-access channel
29Sudipto Guha, Andrew McGregor 0001 Approximate quantiles and the order of the stream. Search on Bibsonomy PODS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adversarial order, random order, data streams, quantiles
29Venkatesan Guruswami, Piotr Indyk Linear time encodable and list decodable codes. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adversarial noise model, linear time computation, expander graphs, list decoding, spectral partitioning
29Matthew Andrews, Baruch Awerbuch, Antonio Fernández 0001, Frank Thomson Leighton, Zhiyong Liu, Jon M. Kleinberg Universal-stability results and performance bounds for greedy contention-resolution protocols. Search on Bibsonomy J. ACM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF adversarial queuing theory, packet scheduling, end-to-end delay, network stability
29Osman Abul, Faruk Polat, Reda Alhajj Function approximation based multi-agent reinforcement learning. Search on Bibsonomy ICTAI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multi-agent based domain independent coordination mechanisms, coordination information, reward distribution, region-wide joint rewards, Adversarial Food-Collecting World, multi-agent environments, multi-agent systems, learning (artificial intelligence), function approximation, function approximation, state transitions, multi-agent reinforcement learning
25Timothy Jones 0001, Ramesh S. Sankaranarayana, David Hawking, Nick Craswell Nullification test collections for web spam and SEO. Search on Bibsonomy AIRWeb The full citation details ... 2009 DBLP  DOI  BibTeX  RDF evaluation, test collections, web spam
25Maurice Herlihy, Flavio Paiva Junqueira, Keith Marzullo, Lucia Draque Penso Optimizing Threshold Protocols in Adversarial Structures. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Anand D. Sarwate, Michael Gastpar Adversarial interference models for multiantenna cooperative systems. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Battista Biggio, Giorgio Fumera, Fabio Roli Adversarial Pattern Classification Using Multiple Classifiers and Randomisation. Search on Bibsonomy SSPR/SPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Adam D. Smith Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes. Search on Bibsonomy SODA The full citation details ... 2007 DBLP  BibTeX  RDF
25Adi Rosén, Michael S. Tsirkin On Delivery Times in Packet Networks under Adversarial Traffic. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Charu C. Aggarwal, Jian Pei, Bo Zhang 0002 On privacy preservation against adversarial data mining. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, association rules, privacy preservation
25Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Allan Borodin, Jon M. Kleinberg, Prabhakar Raghavan, Madhu Sudan 0001, David P. Williamson Adversarial queuing theory. Search on Bibsonomy J. ACM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF stability, packet routing, scheduling protocols
25J. D. Tygar Adversarial Machine Learning. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF adversarial machine learning, spam email, machine learning, intrusion detection, computer security
25Deepak Chinavle, Pranam Kolari, Tim Oates 0001, Tim Finin Ensembles in adversarial classification for spam. Search on Bibsonomy CIKM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial classification, retraining, spam, ensembles, weblogs, nonstationarity
25Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki Adversarial queuing on the multiple-access channel. Search on Bibsonomy PODC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adversarial queuing, continuous packet injection, stability, broadcast, multiple-access channel
19Mark Sandler 0002, S. Muthukrishnan 0001 Monitoring algorithms for negative feedback systems. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF negative feedback systems, user reputation, probabilistic analysis
19Moshe Babaioff, Liad Blumrosen, Aaron Roth 0001 Auctions with online supply. Search on Bibsonomy EC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online supply, truthful auction, approximation, mechanism design
19Wen Ming Liu, Lingyu Wang 0001, Lei Zhang 0004 k-jump strategy for preserving privacy in micro-data disclosure. Search on Bibsonomy ICDT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Di Ma, Claudio Soriente, Gene Tsudik New adversary and new threats: security in unattended sensor networks. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19David Stynes, Kenneth N. Brown Value ordering for quantified CSPs. Search on Bibsonomy Constraints An Int. J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Value ordering, Quantified CSPs, Backtracking search
19Ji Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong Hoon Lee 0001 Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Sudipto Guha, Zhiyi Huang 0002 Revisiting the Direct Sum Theorem and Space Lower Bounds in Random Order Streams. Search on Bibsonomy ICALP (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-Recoverability, Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks
19Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu Relationship privacy: output perturbation for queries with joins. Search on Bibsonomy PODS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis
19Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Tracey Ho, Ben Leong, Ralf Koetter, Muriel Médard, Michelle Effros, David R. Karger Byzantine Modification Detection in Multicast Networks With Random Network Coding. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yu Zhang, Zang Li, Wade Trappe Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 28621 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license