2013 12th International Conference on Machine Learning and Applications 2013
DOI: 10.1109/icmla.2013.61
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Spam Detection Using the Randomized Hough Transform-Support Vector Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…(1) KPCA 4 and CSVM 5 are employed by Geng et al (2014), where feature selection is the duty of KPCA and CSVM works as the classi¯cation algorithm, while it achieved a higher detection rate and improved detection e±ciency. (2) RHS 6 and SVM 7 are proposed by Debarr et al (2013) that showed two combined algorithms are su±cient to improve 9.3% versus RONI. (3) Combination of NSA 8 and various evaluations in another article by Idris and Selamat (2014) are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…(1) KPCA 4 and CSVM 5 are employed by Geng et al (2014), where feature selection is the duty of KPCA and CSVM works as the classi¯cation algorithm, while it achieved a higher detection rate and improved detection e±ciency. (2) RHS 6 and SVM 7 are proposed by Debarr et al (2013) that showed two combined algorithms are su±cient to improve 9.3% versus RONI. (3) Combination of NSA 8 and various evaluations in another article by Idris and Selamat (2014) are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…This leverages consensus reasoning (e.g., RANSAC) and helps with both adversarial learning and clonal selection. The motivation behind re-identification comes from the fact that the multitude of antigens share common characteristics and can be traced to some common source(s) using amongst others longest common sequence (LCS) (e.g., positive selection) for similarity using dynamic programming and/or RANSAC/Random Hough Transform for realization [7]. Positive selection further helps with better designs for adversarial attacks as they anticipate weak points in defense susceptible to be overwhelmed by persistent attacks.…”
Section: Immunity and Detectionmentioning
confidence: 99%
“…This suggests that the defense should exercise great caution in its use of training data. Towards that end, labeling errors characteristic of lacking proper annotation can be detected and redressed in many ways including constrained regularization driven optimization and label flipping [6] with label flipping best done in a principled way characteristic of importance sampling [7]. The use of soft rather than hard labeled data is more resistant to (adversarial) label noise [3] with soft labels integral to conformal prediction, the learning framework proposed here, and to incremental transduction, in particular [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations