Blaine Nelson

According to our database1, Blaine Nelson authored at least 30 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Extracting Memorized Training Data via Decomposition.
CoRR, 2024

2023
Tree of Attacks: Jailbreaking Black-Box LLMs Automatically.
CoRR, 2023

2017
Differential Privacy for Bayesian Inference through Posterior Sampling.
J. Mach. Learn. Res., 2017

2015
Support vector machines under adversarial label contamination.
Neurocomputing, 2015

2014
Security Evaluation of Support Vector Machines in Adversarial Environments.
CoRR, 2014

Robust and Private Bayesian Inference.
Proceedings of the Algorithmic Learning Theory - 25th International Conference, 2014

2013
Robust, Secure and Private Bayesian Inference.
CoRR, 2013

Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Summary/overview for artificial intelligence and security (AISec'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Query Strategies for Evading Convex-Inducing Classifiers.
J. Mach. Learn. Res., 2012

Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371).
Dagstuhl Reports, 2012

Poisoning Attacks against Support Vector Machines.
Proceedings of the 29th International Conference on Machine Learning, 2012

Fifth ACM workshop on artificial intelligence and security (AISec 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Microbagging Estimators: An Ensemble Approach to Distance-weighted Classifiers.
Proceedings of the 3rd Asian Conference on Machine Learning, 2011

Support Vector Machines Under Adversarial Label Noise.
Proceedings of the 3rd Asian Conference on Machine Learning, 2011

Understanding the risk factors of learning in adversarial environments.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Adversarial machine learning.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Behavior of Machine Learning Algorithms in Adversarial Environments.
PhD thesis, 2010

The security of machine learning.
Mach. Learn., 2010

Near-Optimal Evasion of Convex-Inducing Classifiers.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

Classifier Evasion: Models and Open Problems.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Perform. Evaluation Rev., 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

2008
Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Exploiting Machine Learning to Subvert Your Spam Filter.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Open problems in the security of learning.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

CircuitTSAT: A Solver for Large Instances of the Disjunctive Temporal Problem.
Proceedings of the Eighteenth International Conference on Automated Planning and Scheduling, 2008

2007
Revisiting probabilistic models for clustering with pair-wise constraints.
Proceedings of the Machine Learning, 2007

2006
Can machine learning be secure?
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Analyzing Behavioral Features for Email Classification.
Proceedings of the CEAS 2005, 2005


  Loading...