Solving the multiple instance problem with axis-parallel rectangles
Artificial Intelligence
Machine Learning - Special issue on the ninth annual conference on computational theory (COLT '96)
A Note on Learning from Multiple-Instance Examples
Machine Learning - Special issue on the ninth annual conference on computational theory (COLT '96)
A framework for multiple-instance learning
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
ICML '02 Proceedings of the Nineteenth International Conference on Machine Learning
On Learning From Multi-Instance Examples: Empirical Evaluation of a Theoretical Approach
ICML '97 Proceedings of the Fourteenth International Conference on Machine Learning
Solving the Multiple-Instance Problem: A Lazy Learning Approach
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Image Categorization by Learning and Reasoning with Regions
The Journal of Machine Learning Research
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Using additive expert ensembles to cope with concept drift
ICML '05 Proceedings of the 22nd international conference on Machine learning
Supervised versus multiple instance learning: an empirical comparison
ICML '05 Proceedings of the 22nd international conference on Machine learning
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An introduction to ROC analysis
Pattern Recognition Letters - Special issue: ROC analysis in pattern recognition
Multi-label learning by instance differentiation
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Multinomial naive bayes for text categorization revisited
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Paragraph: thwarting signature learning by training maliciously
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Malware detection using adaptive data compression
Proceedings of the 1st ACM workshop on Workshop on AISec
Ensemble Based Data Fusion for Gene Function Prediction
MCS '09 Proceedings of the 8th International Workshop on Multiple Classifier Systems
Compression for anti-adversarial learning
PAKDD'11 Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part II
Multi-instance multi-label learning
Artificial Intelligence
Multiple-instance learning as a classifier combining problem
Pattern Recognition
An agent-based model to simulate and analyse behaviour under noisy and deceptive information
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
On the hardness of evading combinations of linear classifiers
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Hi-index | 0.00 |
Statistical spam filters are known to be vulnerable to adversarial attacks. One of the more common adversarial attacks, known as the good word attack, thwarts spam filters by appending to spam messages sets of "good" words, which are words that are common in legitimate email but rare in spam. We present a counterattack strategy that attempts to differentiate spam from legitimate email in the input space by transforming each email into a bag of multiple segments, and subsequently applying multiple instance logistic regression on the bags. We treat each segment in the bag as an instance. An email is classified as spam if at least one instance in the corresponding bag is spam, and as legitimate if all the instances in it are legitimate. We show that a classifier using our multiple instance counterattack strategy is more robust to good word attacks than its single instance counterpart and other single instance learners commonly used in the spam filtering domain.