Efficient agnostic PAC-learning with simple hypothesis
COLT '94 Proceedings of the seventh annual conference on Computational learning theory
Learning from a consistently ignorant teacher
COLT '94 Proceedings of the seventh annual conference on Computational learning theory
Efficient learning of continuous neural networks
COLT '94 Proceedings of the seventh annual conference on Computational learning theory
On the learnability of discrete distributions
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Learning with unreliable boundary queries
COLT '95 Proceedings of the eighth annual conference on Computational learning theory
Noise-tolerant learning near the information-theoretic bound
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Learning from examples with unspecified attribute values (extended abstract)
COLT '97 Proceedings of the tenth annual conference on Computational learning theory
A new composition theorem for learning algorithms
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Improved lower bounds for learning from noisy examples: an information-theoretic approach
COLT' 98 Proceedings of the eleventh annual conference on Computational learning theory
On Restricted-Focus-of-Attention Learnability of Boolean Functions
Machine Learning - Special issue on the ninth annual conference on computational theory (COLT '96)
Efficient noise-tolerant learning from statistical queries
Journal of the ACM (JACM)
Uniform-distribution attribute noise learnability
COLT '99 Proceedings of the twelfth annual conference on Computational learning theory
Sample-efficient strategies for learning in the presence of noise
Journal of the ACM (JACM)
A neuroidal architecture for cognitive computation
Journal of the ACM (JACM)
On-line learning with malicious noise and the closure algorithm
Annals of Mathematics and Artificial Intelligence
Theoretical Computer Science
Learning to recognize three-dimensional objects
Neural Computation
ALT '99 Proceedings of the 10th International Conference on Algorithmic Learning Theory
Maximizing Agreements and CoAgnostic Learning
ALT '02 Proceedings of the 13th International Conference on Algorithmic Learning Theory
Smooth Boosting and Learning with Malicious Noise
COLT '01/EuroCOLT '01 Proceedings of the 14th Annual Conference on Computational Learning Theory and and 5th European Conference on Computational Learning Theory
Discrete Prediction Games with Arbitrary Feedback and Loss
COLT '01/EuroCOLT '01 Proceedings of the 14th Annual Conference on Computational Learning Theory and and 5th European Conference on Computational Learning Theory
Bounds for the Minimum Disagreement Problem with Applications to Learning Theory
COLT '02 Proceedings of the 15th Annual Conference on Computational Learning Theory
On the difficulty of approximately maximizing agreements
Journal of Computer and System Sciences
Smooth boosting and learning with malicious noise
The Journal of Machine Learning Research
On domain-partitioning induction criteria: worst-case bounds for the worst-case based
Theoretical Computer Science
Agnostically Learning Halfspaces
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Maximizing agreements and coagnostic learning
Theoretical Computer Science - Algorithmic learning theory(ALT 2002)
An experimental evaluation of simplicity in rule learning
Artificial Intelligence
Incentive compatible regression learning
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
Exploiting machine learning to subvert your spam filter
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Learning Balls of Strings with Correction Queries
ECML '07 Proceedings of the 18th European conference on Machine Learning
Learning Kernel Perceptrons on Noisy Data Using Random Projections
ALT '07 Proceedings of the 18th international conference on Algorithmic Learning Theory
Learning Balls of Strings from Edit Corrections
The Journal of Machine Learning Research
Open problems in the security of learning
Proceedings of the 1st ACM workshop on Workshop on AISec
Robust PCA and clustering in noisy mixtures
SODA '09 Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms
Learning Halfspaces with Malicious Noise
ICALP '09 Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I
Strategyproof classification under constant hypotheses: a tale of two functions
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Learning from partial observations
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
A framework for quantitative security analysis of machine learning
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Learning Halfspaces with Malicious Noise
The Journal of Machine Learning Research
A lower bound for agnostically learning disjunctions
COLT'07 Proceedings of the 20th annual conference on Learning theory
A phase transition-based perspective on multiple instance kernels
ILP'07 Proceedings of the 17th international conference on Inductive logic programming
Incentive compatible regression learning
Journal of Computer and System Sciences
Machine learning in adversarial environments
Machine Learning
Purifying data by machine learning with certainty levels
Proceedings of the Third International Workshop on Reliability, Availability, and Security
Understanding the risk factors of learning in adversarial environments
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Learning complex concepts using crowdsourcing: a Bayesian approach
ADT'11 Proceedings of the Second international conference on Algorithmic decision theory
An Improved Branch-and-Bound Method for Maximum Monomial Agreement
INFORMS Journal on Computing
Journal of Data and Information Quality (JDIQ)
An experimental comparison of real and artificial deception using a deception generation model
Decision Support Systems
Adversarial support vector machine learning
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Disclosure Control of Confidential Data by Applying Pac Learning Theory
Journal of Database Management
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Security analysis of online centroid anomaly detection
The Journal of Machine Learning Research
Hi-index | 0.00 |