Poisoning attacks against support vector machines B Biggio, B Nelson, P Laskov arXiv preprint arXiv:1206.6389, 2012 | 1810 | 2012 |
Evasion attacks against machine learning at test time B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ... Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013 | 1715 | 2013 |
Learning and classification of malware behavior K Rieck, T Holz, C Willems, P Düssel, P Laskov Detection of Intrusions and Malware, and Vulnerability Assessment, 108-125, 2008 | 894 | 2008 |
Support vector machines under adversarial label noise B Biggio, B Nelson, P Laskov Asian conference on machine learning, 97-112, 2011 | 503 | 2011 |
Incremental support vector learning: Analysis, implementation and applications. P Laskov, C Gehl, S Krüger, KR Müller, KP Bennett, ... Journal of machine learning research 7 (9), 2006 | 494 | 2006 |
Practical Evasion of a Learning-Based Classifier: A Case Study N Šrndic, P Laskov | 469* | |
Learning intrusion detection: supervised or unsupervised? P Laskov, P Düssel, C Schäfer, K Rieck Image Analysis and Processing–ICIAP 2005: 13th International Conference …, 2005 | 376 | 2005 |
Efficient and accurate lp-norm multiple kernel learning M Kloft, U Brefeld, S Sonnenburg, P Laskov, KR Müller, A Zien Advances in neural information processing systems 22 (22), 997-1005, 2009 | 358 | 2009 |
A fast algorithm for joint diagonalization with non-orthogonal transformations and its application to blind source separation A Ziehe, P Laskov, G Nolte, KR MÞller Journal of Machine Learning Research 5 (Jul), 777-800, 2004 | 349 | 2004 |
Static detection of malicious JavaScript-bearing PDF documents P Laskov, N Šrndić Proceedings of the 27th annual computer security applications conference …, 2011 | 257 | 2011 |
Detection of Malicious PDF Files Based on Hierarchical Document Structure N Šrndić, P Laskov Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013 | 251 | 2013 |
Online anomaly detection under adversarial impact M Kloft, P Laskov Proceedings of the thirteenth international conference on artificial …, 2010 | 201 | 2010 |
Online SVM learning: from classification to data description and back DMJ Tax, P Laskov 2003 IEEE XIII Workshop on Neural Networks for Signal Processing (IEEE Cat …, 2003 | 162 | 2003 |
Machine learning in adversarial environments P Laskov, R Lippmann Machine learning 81, 115-119, 2010 | 145 | 2010 |
Linear-Time Computation of Similarity Measures for Sequential Data. K Rieck, P Laskov Journal of Machine Learning Research 9 (1), 2008 | 145 | 2008 |
Intrusion detection in unlabeled data with quarter-sphere support vector machines I Kotenko, P Laskov, C Schäfer Proc. of the International GI Workshop on Detection of Intrusions and …, 2004 | 142* | 2004 |
Language models for detection of unknown attacks in network traffic K Rieck, P Laskov Journal in Computer Virology 2, 243-256, 2007 | 133 | 2007 |
Botzilla: detecting the" phoning home" of malicious software K Rieck, G Schwenk, T Limmer, T Holz, P Laskov Proceedings of the 2010 ACM symposium on applied computing, 1978-1984, 2010 | 127 | 2010 |
Hidost: a static machine-learning-based detector of malicious files N Šrndić, P Laskov EURASIP Journal on Information Security 2016, 1-20, 2016 | 115 | 2016 |
Detecting unknown network attacks using language models K Rieck, P Laskov Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006 | 97 | 2006 |