{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:23:52Z","timestamp":1725708232131},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351006"},{"type":"electronic","value":"9783642351013"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35101-3_55","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T16:40:16Z","timestamp":1354207216000},"page":"649-660","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries"],"prefix":"10.1007","author":[{"given":"Wei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Chawla","sequence":"additional","affiliation":[]},{"given":"James","family":"Bailey","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]},{"given":"Kotagiri","family":"Ramamohanarao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial classification. In: Proc. of KDD 2004, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: KDD 2005, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Globerson, A., Roweis, S.: Nightmare at test time: robust learning by feature deletion. In: Proc. of ICML 2006, pp. 353\u2013360 (2006)","DOI":"10.1145\/1143844.1143889"},{"key":"55_CR4","unstructured":"Ko\u0142cz, A., Teo, C.: Feature weighting for improved classifier robustness. In: CEAS 2009: Sixth Conference on Email and Anti-Spam (2009)"},{"issue":"1","key":"55_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10618-010-0197-3","volume":"22","author":"M. Kantarcioglu","year":"2011","unstructured":"Kantarcioglu, M., Xi, B., Clifton, C.: Classifier evaluation and attribute selection against active adversaries. Data Min. Knowl. Discov.\u00a022(1), 291\u2013335 (2011)","journal-title":"Data Min. Knowl. Discov."},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Liu, W., Chawla, S.: A game theoretical model for adversarial learning. In: Proceedings of the 2009 IEEE International Conference on Data Mining Workshops, pp. 25\u201330 (2009)","DOI":"10.1109\/ICDMW.2009.9"},{"issue":"1","key":"55_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10994-010-5199-2","volume":"81","author":"W. Liu","year":"2010","unstructured":"Liu, W., Chawla, S.: Mining Adversarial Patterns via Regularized Loss Minimization. Machine Learning\u00a081(1), 69\u201383 (2010)","journal-title":"Machine Learning"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Br\u00fcckner, M., Scheffer, T.: Stackelberg games for adversarial prediction problems. In: Proc. of KDD 2011, pp. 547\u2013555 (2011)","DOI":"10.1145\/2020408.2020495"},{"key":"55_CR9","unstructured":"Fudenberg, D., Tirole, J.: Game Theory, 1st edn. The MIT Press (1991)"},{"issue":"6","key":"55_CR10","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1016\/j.patcog.2003.11.009","volume":"37","author":"J. Fortuna","year":"2004","unstructured":"Fortuna, J., Capson, D.: Improved support vector classification using PCA and ICA feature space modification. Pattern Recognition\u00a037(6), 1117\u20131129 (2004)","journal-title":"Pattern Recognition"},{"issue":"11","key":"55_CR11","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1109\/TIP.2007.908082","volume":"16","author":"S. Selvan","year":"2007","unstructured":"Selvan, S., Ramakrishnan, S.: SVD-based modeling for image texture classification using wavelet transformation. IEEE Transactions on Image Processing\u00a016(11), 2688\u20132696 (2007)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"55_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/BF01580735","volume":"40","author":"R. Byrd","year":"1988","unstructured":"Byrd, R., Schnabel, R., Shultz, G.: Approximate solution of the trust region problem by minimization over two-dimensional subspaces. Mathematical Programming\u00a040(1), 247\u2013263 (1988)","journal-title":"Mathematical Programming"},{"key":"55_CR13","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1137\/0904038","volume":"4","author":"J. Mor\u00e9","year":"1983","unstructured":"Mor\u00e9, J., Sorensen, D.: Computing a trust region step. SIAM Journal on Scientific and Statistical Computing\u00a04, 553 (1983)","journal-title":"SIAM Journal on Scientific and Statistical Computing"},{"issue":"1","key":"55_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1137\/S1064827595289108","volume":"21","author":"M. Branch","year":"2000","unstructured":"Branch, M., Coleman, T., Li, Y.: A subspace, interior, and conjugate gradient method for large-scale bound-constrained minimization problems. SIAM Journal on Scientific Computing\u00a021(1), 1\u201323 (2000)","journal-title":"SIAM Journal on Scientific Computing"},{"issue":"4-5","key":"55_CR15","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.knosys.2004.10.002","volume":"18","author":"S.J. Delany","year":"2005","unstructured":"Delany, S.J., Cunningham, P., Tsymbal, A., Coyle, L.: Tracking concept drift in spam filtering. Knowledge-Based Systems\u00a018(4-5), 187\u2013195 (2005)","journal-title":"Knowledge-Based Systems"},{"key":"55_CR16","first-page":"1","volume":"7","author":"J. Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. Journal of Machine Learning Research\u00a07, 1\u201330 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The elements of statistical learning (2001)","DOI":"10.1007\/978-0-387-21606-5"}],"container-title":["Lecture Notes in Computer Science","AI 2012: Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35101-3_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T10:14:10Z","timestamp":1557396850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35101-3_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351006","9783642351013"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35101-3_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}