Benjamin I. P. Rubinstein
Benjamin I. P. Rubinstein
Associate Professor, School of Computing and Information Systems, The University of Melbourne
Verifierad e-postadress på - Startsida
Citeras av
Citeras av
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
A Bayesian approach to discovering truth from conflicting sources for data integration
B Zhao, BIP Rubinstein, J Gemmell, J Han
Proceedings of the VLDB Endowment 5 (6), 550-561, 2012
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement …, 2009
Exploiting Machine Learning to Subvert Your Spam Filter.
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
First USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET'08 …, 2008
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
Journal of Privacy and Confidentiality 4 (1), 65-100, 2012
Link prediction by de-anonymization: How we won the kaggle social network challenge
A Narayanan, E Shi, BIP Rubinstein
The 2011 International Joint Conference on Neural Networks (IJCNN), 1825-1834, 2011
Identifying At-Risk Students in Massive Open Online Courses
J He, J Bailey, BIP Rubinstein, R Zhang
Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI …, 2015
Query strategies for evading convex-inducing classifiers
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
The Journal of Machine Learning Research 13 (1), 1293-1332, 2012
Adaptive bidding for display advertising
A Ghosh, BIP Rubinstein, S Vassilvitskii, M Zinkevich
Proceedings of the 18th International Conference on World Wide Web, 251-260, 2009
Misleading learners: Co-opting your spam filter
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
Machine Learning in Cyber Trust, 17-51, 2009
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
International Conference on Algorithmic Learning Theory, 291-305, 2014
Evolving quantum circuits using genetic programming
BIP Rubinstein
Proceedings of the 2001 Congress on Evolutionary Computation, 144-151, 2001
PPFA: Privacy preserving fog-enabled aggregation in smart grid
L Lyu, K Nandakumar, B Rubinstein, J Jin, J Bedo, M Palaniswami
IEEE Transactions on Industrial Informatics 14 (8), 3733-3744, 2018
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support Vector Machines Applications, 105-153, 2014
On the differential privacy of Bayesian inference
Z Zhang, B Rubinstein, C Dimitrakakis
Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI …, 2016
A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning
Y Han, T Alpcan, J Chan, C Leckie, BIP Rubinstein
IEEE Transactions on information Forensics and Security 11 (3), 556-570, 2015
Near-Optimal Evasion of Convex-Inducing Classifiers.
B Nelson, BIP Rubinstein, L Huang, AD Joseph, S Lau, SJ Lee, S Rao, ...
Proceedings of the Thirteenth International Conference on Artificial …, 2010
Open problems in the security of learning
M Barreno, PL Bartlett, FJ Chi, AD Joseph, B Nelson, BIP Rubinstein, ...
Proceedings of the 1st ACM Workshop on Artificial Intelligence & Security …, 2008
A learning-based approach to reactive security
A Barth, BIP Rubinstein, M Sundararajan, JC Mitchell, D Song, PL Bartlett
International Conference on Financial Cryptography and Data Security, 192-206, 2010
Presenting actions and providers associated with entities
B Rubinstein, AK Chandra, OJ Dabrowski, DJ Gemmell
US Patent 9,189,549, 2015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20