{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":2786832,"items":[{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T14:06:04Z","timestamp":1767276364879},"reference-count":0,"publisher":"Oxford University Press","isbn-type":[{"value":"9780198828044","type":"print"},{"value":"9780191883873","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2019,11,28]]},"abstract":"<p>This chapter\u2019s goal is to show how to apply machine learning algorithms in a general setting using some classic methods. In particular, it demonstrates how to apply three important machine learning algorithms, a support vector classifier (SVC), a random forest classifier (RFC), and a multilayer perceptron (MLP). While many of the methods studied later go beyond these now classic methods, this does not mean that these methods are obsolete. Also, the algorithms discussed here provide some form of baseline to discuss advanced methods like probabilistic reasoning and deep learning. The aim here is to demonstrate that applying machine learning methods based on machine learning libraries is not very difficult. It offers an opportunity to discuss evaluation techniques that are very important in practice.<\/p>","DOI":"10.1093\/oso\/9780198828044.003.0003","type":"book-chapter","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T10:54:18Z","timestamp":1579776858000},"page":"38-65","source":"Crossref","is-referenced-by-count":19,"title":["Machine learning with sklearn"],"prefix":"10.1093","author":[{"given":"Thomas P.","family":"Trappenberg","sequence":"first","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2020,1,23]]},"container-title":["Fundamentals of Machine Learning"],"original-title":["Machine learning with sklearn"],"language":"en","deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:21:55Z","timestamp":1659471715000},"score":17.100344,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/book\/36775\/chapter\/321905277"}},"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9780198828044","9780191883873"],"references-count":0,"URL":"https:\/\/doi.org\/10.1093\/oso\/9780198828044.003.0003","published":{"date-parts":[[2019,11,28]]}},{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:03:56Z","timestamp":1761930236135},"edition-number":"1","reference-count":0,"publisher":"Wiley","isbn-type":[{"value":"9781789450712","type":"print"},{"value":"9781119902881","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2022,3,21]]},"DOI":"10.1002\/9781119902881","type":"monograph","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T22:49:03Z","timestamp":1645829343000},"source":"Crossref","is-referenced-by-count":1,"title":["Optimization and Machine Learning"],"prefix":"10.1002","member":"311","published-online":{"date-parts":[[2022,3,31]]},"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T12:03:35Z","timestamp":1693051415000},"score":16.661,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/book\/10.1002\/9781119902881"}},"subtitle":["Optimization for Machine Learning and Machine Learning for Optimization"],"issued":{"date-parts":[[2022,3,21]]},"ISBN":["9781789450712","9781119902881"],"references-count":0,"alternative-id":["10.1002\/9781119902881"],"URL":"https:\/\/doi.org\/10.1002\/9781119902881","published":{"date-parts":[[2022,3,21]]}},{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:07:30Z","timestamp":1763748450627,"version":"build-2065373602"},"reference-count":0,"publisher":"Oxford University Press","isbn-type":[{"type":"print","value":"9780190941659"},{"type":"electronic","value":"9780197601495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2021,7,29]]},"abstract":"<p>Machine learning is involved in search, translation, detecting depression, likelihood of college dropout, finding lost children, and to sell all kinds of products. While barely beyond its inception, the current machine learning revolution will affect people and organizations no less than the Industrial Revolution\u2019s effect on weavers and many other skilled laborers. Machine learning will automate hundreds of millions of jobs that were considered too complex for machines ever to take over even a decade ago, including driving, flying, painting, programming, and customer service, as well as many of the jobs previously reserved for humans in the fields of finance, marketing, operations, accounting, and human resources. This section explains how automated machine learning addresses exploratory data analysis, feature engineering, algorithm selection, hyperparameter tuning, and model diagnostics. The section covers the eight criteria considered essential for AutoML to have significant impact: <italic>accuracy, productivity, ease of use, understanding and learning, resource availability, process transparency, generalization<\/italic>, and <italic>recommended actions.<\/italic>\n               <\/p>","DOI":"10.1093\/oso\/9780190941659.003.0001","type":"book-chapter","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T12:49:28Z","timestamp":1626871768000},"page":"1-22","source":"Crossref","is-referenced-by-count":9,"title":["Why Use Automated Machine Learning?"],"prefix":"10.1093","author":[{"given":"Kai R.","family":"Larsen","sequence":"first","affiliation":[]},{"given":"Daniel S.","family":"Becker","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2021,7,22]]},"container-title":["Automated Machine Learning for Business"],"original-title":["Why Use Automated Machine Learning?"],"language":"en","deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:59:58Z","timestamp":1659473998000},"score":16.531082,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/book\/40037\/chapter\/340418906"}},"issued":{"date-parts":[[2021,7,22]]},"ISBN":["9780190941659","9780197601495"],"references-count":0,"URL":"https:\/\/doi.org\/10.1093\/oso\/9780190941659.003.0001","published":{"date-parts":[[2021,7,22]]}},{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:35:59Z","timestamp":1706790959709},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2012,8,5]],"date-time":"2012-08-05T00:00:00Z","timestamp":1344124800000},"content-version":"unspecified","delay-in-days":416,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2011,6,16]]},"DOI":"10.1017\/cbo9780511975509.007","type":"book-chapter","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T15:35:08Z","timestamp":1344440108000},"page":"92-123","source":"Crossref","is-referenced-by-count":2,"title":["Machine learning"],"prefix":"10.1017","member":"56","container-title":["Phase Transitions in Machine Learning"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/05C394CE4126A5C0ACCF582BC37377A3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T06:44:00Z","timestamp":1654929840000},"score":16.441345,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/CBO9780511975509A033\/type\/book_part"}},"issued":{"date-parts":[[2011,6,16]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/cbo9780511975509.007","published":{"date-parts":[[2011,6,16]]}},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403021,"version":"3.41.2"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1994,3,1]],"date-time":"1994-03-01T00:00:00Z","timestamp":762480000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1994,3,1]],"date-time":"1994-03-01T00:00:00Z","timestamp":762480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1994,3]]},"DOI":"10.1023\/a:1022661713654","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:55:36Z","timestamp":1049475336000},"page":"305-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning and Qualitative Reasoning"],"prefix":"10.1007","volume":"14","author":[{"given":"Ivan","family":"Bratko","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422445_CR1","volume-title":"Proc. 4th Int. Conf. on Machine Learning","author":"C.W. Anderson","year":"1987","unstructured":"Anderson, C.W. (1987). Strategy learning with multilayer connectionist representations. Proc. 4th Int. Conf. on Machine Learning. San Francisco, CA: Morgan Kaufmann."},{"key":"422445_CR2","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TSMC.1983.6313077","volume":"SMC-13","author":"A. G. Barto","year":"1983","unstructured":"Barto, A. G., Sutton, R. S., & Anderson, C. W. (1983). Neuronlike adaptive elements that can solve difficult learning control problems. IEEE Trans. Syst., Man and Cybernetics, SMC-13, 834\u2013846.","journal-title":"IEEE Trans. Syst., Man and Cybernetics"},{"key":"422445_CR3","unstructured":"Bratko, I. (1989). Pole balancing: a study in qualitative reasoning about control. ISSEK Workshop 89. Udine, Italy."},{"key":"422445_CR4","unstructured":"Bratko, I. (1991). Qualitative modeling: learning and control. Proc. AI-91, Prague."},{"key":"422445_CR5","doi-asserted-by":"crossref","unstructured":"Bratko, I. (1993). Qualitative reasoning about control. Proc. IEEE ETFA '93, Cairns, Australia.","DOI":"10.1109\/ETFA.1993.396424"},{"key":"422445_CR6","volume-title":"KARDIO: a Study in Deep and Qualitative Knowledge for Expert Systems","author":"I. Bratko","year":"1989","unstructured":"Bratko, I., Mozeti\u010d;, I., & Lavra\u010d;, N. (1989). KARDIO: a Study in Deep and Qualitative Knowledge for Expert Systems. Reading, MA: The MIT Press."},{"key":"422445_CR7","doi-asserted-by":"crossref","unstructured":"Bratko, I., Muggleton, S., & Var\u0161ek, A. (1991). Learning qualitative models of dynamic systems. Inductive Logic Programming Workshop 91, Viana do Castelo, Portugal. Reprinted in (Muggleton 1992); short version in Proc. Machine Learning Conf. 91, Evanston, IL. San Francisco: Morgan Kaufmann.","DOI":"10.1016\/B978-1-55860-200-7.50079-9"},{"key":"422445_CR8","series-title":"DCS Report","volume-title":"Generating qualitative models from example behaviours","author":"E. Coiera","year":"1989","unstructured":"Coiera, E. (1989). Generating qualitative models from example behaviours. DCS Report No. 8901. Sydney, Australia: School of Electr. Eng. and Computer Sc., Univ. of New South Wales. Also in Working Papers of Qualitative Reasoning 89 Workshop, Palo Alto, 1989."},{"key":"422445_CR9","volume-title":"Proc. 6th National Conf. Artificial Intelligence","author":"M. E. Connel","year":"1987","unstructured":"Connel, M. E., & Utgoff, P. E. (1987). Learning to control a dynamic physical system. Proc. 6th National Conf. Artificial Intelligence. San Francisco: Morgan Kaufmann."},{"key":"422445_CR10","volume-title":"Determining the geometric model of finite element meshes using AI methods","author":"B. Dol\u0161ak","year":"1991","unstructured":"Dol\u0161ak, B. (1991). Determining the geometric model of finite element meshes using AI methods. (M.Sc. Thesis) Maribor, Slovenia: CAD Center, University of Maribor."},{"key":"422445_CR11","doi-asserted-by":"crossref","unstructured":"Dol\u0161ak, B., & Muggleton, S. H. (1991). The application of inductive logic programming to finite element mesh design. First Inductive Logic Programming Workshop, Viana do Castelo, Portugal. Also in S. H. Muggleton, (Ed.), Inductive Logic Programming. New York: Academic Press.","DOI":"10.1007\/BF03037089"},{"key":"422445_CR12","unstructured":"D\u017eeroski, S., & Bratko, I. (1992). Handling noise in inductive logic programming. Inductive Logic Programming Workshop. Tokyo."},{"key":"422445_CR13","first-page":"203","volume":"115","author":"E. Eastwood","year":"1968","unstructured":"Eastwood, E. (1968). Control theory and the engineer. Proc. IEE, 115, 203\u2013211.","journal-title":"Proc. IEE"},{"key":"422445_CR14","unstructured":"Krann, I., Richards, B., & Kuipers, B. J. (1991). Automatic abduction of qualitative models, Qualitative Reasoning Workshop 91, Austin, Texas."},{"key":"422445_CR15","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/0004-3702(86)90073-1","volume":"29","author":"B. J. Kuipers","year":"1986","unstructured":"Kuipers, B. J. (1986). Qualitative simulation. Artificial Intelligence, 29, 289\u2013338.","journal-title":"Artificial Intelligence"},{"key":"422445_CR16","volume-title":"Linear optimal control systems","author":"H. Kwakernaak","year":"1972","unstructured":"Kwakernaak, H. (1972). Linear optimal control systems. New York: John Wiley & Sons."},{"key":"422445_CR17","volume-title":"Cognitive and Linguistic Analyses of Test Performance","author":"J.A. Langer","year":"1987","unstructured":"Langer, J.A. (1987) The construction of meaning and the assessment of comprehension: An analysis of reader performance on standardized test items. In R. Freedle, (Ed.), Cognitive and Linguistic Analyses of Test Performance. Norwood, NJ: Ablex Publishing Company."},{"key":"422445_CR18","volume-title":"Proc. EWSL 91","author":"N. Lavra\u010d","year":"1991","unstructured":"Lavra\u010d;, N., D\u017eeroski, S., & Grobelnik, M. (1991). Learning nonrecursive definitions of relations with LINUS. Proc. EWSL 91, Porto, Portugal. Berlin: Springer-Verlag."},{"key":"422445_CR19","volume-title":"Machine Intelligence","author":"A. Makarovi\u010d","year":"1991","unstructured":"Makarovi\u010d;, A. (1991). A qualitative way of solving the pole-balancing problem. In J. E. Hayes, D. Michie & E. Tyugu, (Eds.) Machine Intelligence 12. Oxford: Oxford University Press."},{"key":"422445_CR20","unstructured":"Michie, D. (1988). Machine learning in the next five years. Proc. EWSL-88, Glasgow."},{"key":"422445_CR21","volume-title":"Applications of Expert Systems","author":"D. Michie","year":"1989","unstructured":"Michie, D. (1989) Problems of computer-aided concept formation. In J. R. Quinlan (Ed.) Applications of Expert Systems, 2. Glasgow: Turing Institute Press (In association with Addison-Wesley)."},{"key":"422445_CR22","volume-title":"Machine Intelligence","author":"D. Michie","year":"1968","unstructured":"Michie, D., & Chambers, R.A. (1968). Boxes: and experiment in adaptive control. In E. Dale & D. Michie, (Eds.), Machine Intelligence 2. Edinburgh: Edinburgh University Press."},{"key":"422445_CR23","volume-title":"First-order induction of patterns in chess","author":"E. Morales","year":"1992","unstructured":"Morales, E. (1992). First-order induction of patterns in chess. Ph.D. Thesis. Glasgow, Scotland: University of Strathclyde, Department of Computer Science."},{"key":"422445_CR24","volume-title":"Progress in Machine Learning","author":"I. Mozeti\u010d","year":"1987","unstructured":"Mozeti\u010d;, I. (1987a). Learning of qualitative models. In I. Bratko & N. Lavra\u010d;, (Eds.) Progress in Machine Learning. Wilmslow, England: Sigma Press."},{"key":"422445_CR25","volume-title":"Proc. Fourth Int. Workshop on Machine Learning","author":"I. Mozeti\u010d","year":"1987","unstructured":"Mozeti\u010d;, I. (1987b). The role of abstractions in learning qualitative models. Proc. Fourth Int. Workshop on Machine Learning. San Francisco, CA: Morgan Kaufmann."},{"key":"422445_CR26","volume-title":"Proc. First Conf. on Algorithmic Learning Theory","author":"S. H. Muggleton","year":"1990","unstructured":"Muggleton, S. H. (1990). Inductive logic programming. Proc. First Conf. on Algorithmic Learning Theory. Tokyo: Omsha."},{"key":"422445_CR27","unstructured":"Muggleton, S. H. (Ed.) (1992). Inductive Logic Programming, Academic Press."},{"key":"422445_CR28","volume-title":"Proc. First Conf. on Algorithmic Learning Theory","author":"S. H. Muggleton","year":"1990","unstructured":"Muggleton, S. H., & Feng, C. (1990). Efficient induction of logic programs. Proc. First Conf. on Algorithmic Learning Theory. Tokyo: Omsha."},{"key":"422445_CR29","volume-title":"Proc. 3rd Int. Conf. Genetic Algorithms","author":"M. O. Odetayo","year":"1989","unstructured":"Odetayo, M. O., & McGregor, D. R. (1989). Genetic algorithm for inducing control rules for a dynamic system. Proc. 3rd Int. Conf. Genetic Algorithms. San Francisco, CA: Morgan Kaufmann."},{"key":"422445_CR30","first-page":"239","volume":"5","author":"J. R. Quinlan","year":"1990","unstructured":"Quinlan, J. R. (1990). Learning logical definitions from relations. Machine Learning, 5, 239\u2013266.","journal-title":"Machine Learning"},{"key":"422445_CR31","volume-title":"An Operator-based Approach to First-order Theory Revision","author":"B. L. Richards","year":"1992","unstructured":"Richards, B. L. (1992) An Operator-based Approach to First-order Theory Revision. Doctoral Dissertation. Austin, Texas: Univ. of Texas Artificial Intelligence Laboratory (No. AI92-181)."},{"key":"422445_CR32","volume-title":"Proc. 5th Int. Machine Learning Conf.","author":"C. Sammut","year":"1988","unstructured":"Sammut, C. (1988). Experimental results from an evaluation of algorithms that learn to control dynamic systems. Proc. 5th Int. Machine Learning Conf.. San Francisco, CA: Morgan Kaufmann."},{"key":"422445_CR33","volume-title":"Proc. 9th Int. Joint Conf. on Artificial Intelligence","author":"O. G. Selfridge","year":"1985","unstructured":"Selfridge, O. G., Sutton, R. S., & Barto, A. G. (1985). Training and tracking in robotics. Proc. 9th Int. Joint Conf. on Artificial Intelligence. San Francisco, CA: Morgan Kaufmann."},{"key":"422445_CR34","unstructured":"Urban\u010d;i\u010d;, T. (1991). Automatic model-based synthesis of control rules for inverted pendulum. First European Workshop on Qualitative Reasoning about Physical Systems."},{"key":"422445_CR35","volume-title":"Dynamic, Genetic and Chaotic Programming: the Sixth Generation","author":"T. Urban\u010d;i\u010d","year":"1992","unstructured":"Urban\u010d;i\u010d;, T., & Bratko, I. (1992). Knowledge acquisition for dynamic system control. In B. Sou\u010d;ek, (Ed.), Dynamic, Genetic and Chaotic Programming: the Sixth Generation. New York: John Wiley & Sons."},{"key":"422445_CR36","doi-asserted-by":"crossref","unstructured":"Urban\u010d;i\u010d;, T., Juri\u010d;i\u010d;, Dj., Filipi\u010d;, B., & Bratko, I. (1992). Automated synthesis of control for nonlinear dynamic systems. 1992 IFAC\/IFIP\/IMACS Int. Symp. on Artificial Intelligence and Real Time Control.","DOI":"10.1016\/B978-0-08-041898-8.50060-8"},{"key":"422445_CR37","volume-title":"Proc. IJCAI-91","author":"A. Var\u0161ek","year":"1991","unstructured":"Var\u0161ek, A. (1991). Qualitative model evolution. Proc. IJCAI-91, San Francisco, CA: Morgan Kaufmann."},{"issue":"6","key":"422445_CR38","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/21.260663","volume":"SMC-23","author":"A. Var\u0161ek","year":"1993","unstructured":"Var\u0161ek, A., Urban\u010d;i\u010d;, T., & Filipi\u010d;, B. (1993). Genetic algorithms in controller design and tuning. IEEE Transactions on Systems, Man and Cybernetics. SMC-23 (6): 1330\u20131339.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"422445_CR39","series-title":"Technical Report","volume-title":"Machine learning of qualitative models","author":"K. \u017ditnik","year":"1991","unstructured":"\u017ditnik, K. (1991). Machine learning of qualitative models. Ljubljana, Slovenia: J. Stefan Institute, Technical Report IJS-DP-6239."}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022661713654.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022661713654\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022661713654.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:36:20Z","timestamp":1752147380000},"score":16.439081,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022661713654"}},"issued":{"date-parts":[[1994,3]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1994,3]]}},"alternative-id":["422445"],"URL":"https:\/\/doi.org\/10.1023\/a:1022661713654","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1994,3]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403232,"version":"3.41.2"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1986,9,1]],"date-time":"1986-09-01T00:00:00Z","timestamp":525916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1986,9,1]],"date-time":"1986-09-01T00:00:00Z","timestamp":525916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1986,9]]},"DOI":"10.1023\/a:1022854429410","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:57:10Z","timestamp":1049475430000},"page":"243-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Editorial: Human and Machine Learning"],"prefix":"10.1007","volume":"1","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422660_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1037\/0033-295X.86.2.124","volume":"86","author":"Y. Anzai","year":"1979","unstructured":"Anzai, Y., & Simon, H. A. (1979). The theory of learning by doing. Psychological Review, 86, 124-140.","journal-title":"Psychological Review"},{"key":"422660_CR2","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1037\/0033-295X.89.4.369","volume":"89","author":"J. R. Anderson","year":"1982","unstructured":"Anderson, J. R. (1982). Acquisition of cognitive skill. Psychological Review, 89, 369-406.","journal-title":"Psychological Review"},{"key":"422660_CR3","volume-title":"Computers and thought","author":"E. A. Feigenbaum","year":"1963","unstructured":"Feigenbaum, E. A. (1963). The simulation of verbal learning behavior. In. E. A. Feigenbaum & J. Feldman (Eds. ), Computers and thought. New York: McGraw-Hill."},{"key":"422660_CR4","volume-title":"A computational model of language acquisition in the two-year-old","author":"J. A. C. Hill","year":"1983","unstructured":"Hill, J. A. C. (1983). A computational model of language acquisition in the two-year-old. Doctoral dissertation, Department of Computer Science, University of Massachusetts, Amherst."},{"key":"422660_CR5","volume-title":"Experiments in induction","author":"E. B. Hunt","year":"1966","unstructured":"Hunt, E. B., Marin, J., & Stone, P. (1966). Experiments in induction. New York: Academic Press."},{"key":"422660_CR6","first-page":"243","volume":"7","author":"J. L. Kolodner","year":"1983","unstructured":"Kolodner, J. L. (1983). Maintaining organization in a dynamic long-term memory. Cognitive Science, 7, 243-280.","journal-title":"Cognitive Science"},{"key":"422660_CR7","first-page":"11","volume":"1","author":"J. E. Laird","year":"1986","unstructured":"Laird, J. E., Rosenbloom, P. S., & Newell, A. (1986). SOAR:The anatomy of a general learning mechanism. Machine Learning, 1, 11-46.","journal-title":"Machine Learning"},{"key":"422660_CR8","unstructured":"Langley, P. (1982). Language acquisition through error recovery. Cognition and Brain Theory, 5, 211-255."},{"key":"422660_CR9","first-page":"217","volume":"9","author":"P. Langley","year":"1985","unstructured":"Langley, P. (1985). Learning to search:From weak methods to domain-specific heuristics. Cognitive Science, 9, 217-260.","journal-title":"Cognitive Science"},{"key":"422660_CR10","unstructured":"Lebowitz, M. (1982). Correcting erroneous generalizations. Cognition and Brain Theory, 5, 367-381."},{"key":"422660_CR11","volume-title":"Machine learning:An artificial intelligence approach","author":"T. M. Mitchell","year":"1983","unstructured":"Mitchell, T. M., Utgoff, P., & Banerji, R. B. (1983). Learning problem solving heuristics by experimentation. In R. S. Michalski, J. G. Carbonell, & T. M. Mitchell (Eds. ), Machine learning:An artificial intelligence approach. Palo Alto, CA: Tioga."},{"key":"422660_CR12","volume-title":"Studies in problem solving:Subject 3 on the crypt-arithmetic task Donald +Gerald = Robert","author":"A. Newell","year":"1967","unstructured":"Newell, A. (1967). Studies in problem solving:Subject 3 on the crypt-arithmetic task Donald +Gerald = Robert (Technical Report). Center for the Study of Information Processing, Carnegie Institute of Technology, Pittsburgh, PA."},{"key":"422660_CR13","first-page":"426","volume-title":"Proceedings of the Eighth International Joint Conference on Artificial Intelligence","author":"S. Ohlsson","year":"1983","unstructured":"Ohlsson, S. (1983). A constrained mechanism for procedural learning. Proceedings of the Eighth International Joint Conference on Artificial Intelligence (pp. 426-428). Karlsruhe, FRG: Morgan-Kaufmann."},{"key":"422660_CR14","doi-asserted-by":"crossref","unstructured":"Porter, B. W., & Kibler, D. F. (1986). Experimental goal regression:A method for learning problem solving heuristics. Machine Learning, 1, 249-286.","DOI":"10.1007\/BF00116893"},{"key":"422660_CR15","first-page":"81","volume":"1","author":"J. R. Quinlan","year":"1986","unstructured":"Quinlan, J. R. (1986). Induction of decision trees. Machine Learning, 1, 81-106.","journal-title":"Machine Learning"},{"key":"422660_CR16","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/0010-0285(75)90024-9","volume":"7","author":"E. Rosch","year":"1975","unstructured":"Rosch, E., & Mervis, C. B. (1975). Family resemblance studies in the internal structure of categories. Cognitive Psychology, 7, 573-605.","journal-title":"Cognitive Psychology"},{"key":"422660_CR17","volume-title":"Proceedings of the Seventh. International Joint Conference on Artificial Intelligence","author":"M. Selfridge","year":"1981","unstructured":"Selfridge, M. (1981). A computer model of child language acquisition. Proceedings of the Seventh. International Joint Conference on Artificial Intelligence (pp. 92-96). Vancouver, BC, Canada: Morgan-Kaufmann."},{"key":"422660_CR18","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/0004-3702(70)90004-4","volume":"1","author":"D. A. Waterman","year":"1970","unstructured":"Waterman, D. A. (1970). Generalization learning techniques for automating the learning of heuristics. Artificial Intelligence, 1, 121-170.","journal-title":"Artificial Intelligence"}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022854429410.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022854429410\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022854429410.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:36:08Z","timestamp":1752147368000},"score":16.422592,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022854429410"}},"issued":{"date-parts":[[1986,9]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1986,9]]}},"alternative-id":["422660"],"URL":"https:\/\/doi.org\/10.1023\/a:1022854429410","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1986,9]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:09:49Z","timestamp":1707847789738},"edition-number":"1","reference-count":0,"publisher":"Cambridge University Press","license":[{"start":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T00:00:00Z","timestamp":1338854400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2012,6,5]]},"DOI":"10.1017\/cbo9780511804779.017","type":"book-chapter","created":{"date-parts":[[2012,6,19]],"date-time":"2012-06-19T17:06:44Z","timestamp":1340125604000},"page":"303-304","source":"Crossref","is-referenced-by-count":1,"title":["Machine learning"],"prefix":"10.1017","member":"56","container-title":["Bayesian Reasoning and Machine Learning"],"link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/DE69032737ABE83A631835141D577DCB","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T11:14:15Z","timestamp":1655118855000},"score":16.39075,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/CBO9780511804779A124\/type\/book_part"}},"issued":{"date-parts":[[2012,6,5]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1017\/cbo9780511804779.017","published":{"date-parts":[[2012,6,5]]}},{"indexed":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T11:24:35Z","timestamp":1715599475844},"edition-number":"1","reference-count":0,"publisher":"Wiley","isbn-type":[{"value":"9781789450712","type":"print"},{"value":"9781119902881","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"},{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2022,3,21]]},"DOI":"10.1002\/9781119902881.fmatter","type":"other","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T22:49:03Z","timestamp":1645829343000},"source":"Crossref","is-referenced-by-count":0,"title":["Front Matter"],"prefix":"10.1002","member":"311","published-online":{"date-parts":[[2022,2,25]]},"container-title":["Optimization and Machine Learning"],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881.fmatter","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881.fmatter","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T12:04:27Z","timestamp":1693051467000},"score":16.383314,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9781119902881.fmatter"}},"issued":{"date-parts":[[2022,2,25]]},"ISBN":["9781789450712","9781119902881"],"references-count":0,"alternative-id":["10.1002\/9781119902881.fmatter","10.1002\/9781119902881"],"URL":"https:\/\/doi.org\/10.1002\/9781119902881.fmatter","archive":["Portico"],"published":{"date-parts":[[2022,2,25]]}},{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:24:30Z","timestamp":1766467470501,"version":"3.41.2"},"reference-count":0,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1992,6]]},"DOI":"10.1023\/a:1022665512030","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:55:36Z","timestamp":1049475336000},"page":"5-7","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Machine Learning: A Maturing Field"],"prefix":"10.1007","volume":"9","author":[{"given":"Jaime","family":"Carbonell","sequence":"first","affiliation":[]}],"member":"297","container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022665512030.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022665512030\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022665512030.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:40:33Z","timestamp":1752147633000},"score":16.383314,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022665512030"}},"issued":{"date-parts":[[1992,6]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,6]]}},"alternative-id":["422766"],"URL":"https:\/\/doi.org\/10.1023\/a:1022665512030","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1992,6]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403738,"version":"3.41.2"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1987,3,1]],"date-time":"1987-03-01T00:00:00Z","timestamp":541555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,3,1]],"date-time":"1987-03-01T00:00:00Z","timestamp":541555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1987,3]]},"DOI":"10.1023\/a:1022808826027","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:57:10Z","timestamp":1049475430000},"page":"5-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning and Grammar Induction"],"prefix":"10.1007","volume":"2","author":[{"given":"Pat","family":"Langely","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Anderson, J.R.(1977).Induction of augmented transition networks.Cog-nitive Science,1125-157.","key":"422905_CR1"},{"doi-asserted-by":"crossref","unstructured":"Angluin, D.(1982).Inference of reversible languages.Journal of the As-sociation for Computing Machinery,29741-765.","key":"422905_CR2","DOI":"10.1145\/322326.322334"},{"doi-asserted-by":"crossref","unstructured":"Gold, E.M.(1967).Language identification in the limit.Information and Control,10447-474.","key":"422905_CR3","DOI":"10.1016\/S0019-9958(67)91165-5"},{"unstructured":"Klein, S.,& Kuppin, M.A.(1970).An interactive,heuristic program for learning transformational grammar(Technical Report No.97).Madi-son:University of Wisconsin,Department of Computer Science.","key":"422905_CR4"},{"doi-asserted-by":"crossref","unstructured":"Mitchell, T.M.(1982).Generalization as search.Artificial Intelligence, 18203-226","key":"422905_CR5","DOI":"10.1016\/0004-3702(82)90040-6"},{"unstructured":"Sik\u00f3ssy, L.(1972).Natural language learning by computer.In H.A. Simon & L. Siklossy (Eds.),Representation and meaning:Experiments with information processing systems.Englewood Cliffs,NJ: Prentice-Hall.","key":"422905_CR6"},{"unstructured":"Solomonoff, R.(1959).A new method for discovering the grammars of phrase structure languages.Proceedings of the International Confer-ence on Information Processing.","key":"422905_CR7"}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022808826027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022808826027\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022808826027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:42:32Z","timestamp":1752147752000},"score":16.379211,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022808826027"}},"issued":{"date-parts":[[1987,3]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1987,3]]}},"alternative-id":["422905"],"URL":"https:\/\/doi.org\/10.1023\/a:1022808826027","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1987,3]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403900,"version":"3.41.2"},"reference-count":0,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1986,6,1]],"date-time":"1986-06-01T00:00:00Z","timestamp":517968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1986,6,1]],"date-time":"1986-06-01T00:00:00Z","timestamp":517968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1986,6]]},"DOI":"10.1023\/a:1022840627593","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:57:10Z","timestamp":1049475430000},"page":"141-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Editorial: The Terminology of Machine Learning"],"prefix":"10.1007","volume":"1","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022840627593.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022840627593\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022840627593.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:36:24Z","timestamp":1752147384000},"score":16.348766,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022840627593"}},"issued":{"date-parts":[[1986,6]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1986,6]]}},"alternative-id":["422656"],"URL":"https:\/\/doi.org\/10.1023\/a:1022840627593","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1986,6]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:18:33Z","timestamp":1760707113438,"version":"3.41.2"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1988,8,1]],"date-time":"1988-08-01T00:00:00Z","timestamp":586396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1988,8,1]],"date-time":"1988-08-01T00:00:00Z","timestamp":586396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1988,8]]},"DOI":"10.1023\/a:1022623814640","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:55:36Z","timestamp":1049475336000},"page":"5-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Machine Learning as an Experimental Science"],"prefix":"10.1007","volume":"3","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422916_CR1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1023\/A:1022852608280","volume":"2","author":"D.H. Fisher","year":"1987","unstructured":"Fisher, D.H.(1987).Knowledge acquisition via incremental conceptual clustering.Machine Learning,2,139\u2013172.","journal-title":"Machine Learning"},{"key":"422916_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1022800624210","volume":"2","author":"M. Lebowitz","year":"1987","unstructured":"Lebowitz, M.(1987).Experiments with incremental concept formation:UNI-MEM.Machine Learning,2,103\u2013138.","journal-title":"Machine Learning"},{"key":"422916_CR3","first-page":"596","volume-title":"Proceedings of the Ninth International Joint Conference on Artificial Intelligence","author":"S.N. Minton","year":"1985","unstructured":"Minton, S.N.(1985).Selectively generalizing plans for problem solving.Proceedings of the Ninth International Joint Conference on Artificial Intelligence(pp.596\u2013599).Los Angeles,CA: Morgan Kaufmann."},{"key":"422916_CR4","volume-title":"Proceedings of the Fourth International Workshop on Machine Learning","author":"J.C. Schlimmer","year":"1987","unstructured":"Schlimmer, J.C.(1987).Incremental adjustment of representations for learning.Proceedings of the Fourth International Workshop on Machine Learning(pp.79\u201390).Irvine,CA: Morgan Kaufmann"},{"key":"422916_CR5","first-page":"496","volume-title":"Proceedings of the Fifth National Conference on Artificial Intelligence","author":"J.C. Schlimmer","year":"1986","unstructured":"Schlimmer, J.C., & Fisher, D.H.(1986).A case study of incremental concept induction.Proceedings of the Fifth National Conference on Artificial Intelligence(pp.496\u2013501).Philadelphia,PA: Morgan Kaufmann."},{"key":"422916_CR6","volume-title":"The sciences of the artificial.","author":"H.A. Simon","year":"1969","unstructured":"Simon, H.A.(1969).The sciences of the artificial.Cambridge,MA: MIT Press."},{"key":"422916_CR7","volume-title":"Conjunctive conceptual clustering:A methodology and experimentation.","author":"R.E. Stepp","year":"1984","unstructured":"Stepp, R.E.(1984),Conjunctive conceptual clustering:A methodology and experimentation.Doctoral dissertation,Department of Computer Science, University of Illinois, Urbana."},{"key":"422916_CR8","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/A:1022643204877","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R.(1986).Induction of decision trees.Machine Learning,1,81\u2013106.","journal-title":"Machine Learning"}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022623814640.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022623814640\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022623814640.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:40:15Z","timestamp":1752147615000},"score":16.332535,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022623814640"}},"issued":{"date-parts":[[1988,8]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1988,8]]}},"alternative-id":["422916"],"URL":"https:\/\/doi.org\/10.1023\/a:1022623814640","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1988,8]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:05:51Z","timestamp":1752192351854,"version":"3.41.2"},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1987,11,1]],"date-time":"1987-11-01T00:00:00Z","timestamp":562723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,11,1]],"date-time":"1987-11-01T00:00:00Z","timestamp":562723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1987,11]]},"DOI":"10.1023\/a:1022603230145","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:55:36Z","timestamp":1049475336000},"page":"195-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research Papers in Machine Learning"],"prefix":"10.1007","volume":"2","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422878_CR1","first-page":"139","volume":"2","author":"D.H. Fisher","year":"1987","unstructured":"Fisher, D.H.(1987). Knowledge acquisition via incremental conceptual clustering. Machine Learning, 2, 139-172.","journal-title":"Machine Learning"},{"key":"422878_CR2","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/B978-0-934613-41-5.50019-2","volume-title":"Proceedings of the Fourth International Workshop on Machine Learning","author":"P. O'Rorke","year":"1987","unstructured":"O'Rorke, P. (1987). LT revisited:Experimental results of applying explanation-based learning to the logic of Principia Mathematica. In Proceedings of the Fourth International Workshop on Machine Learning (pp.148-159). Irvine, CA: Morgan Kaufmann."},{"key":"422878_CR3","first-page":"81","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R. (1986). Induction of decision trees. Machine Learning, 1, 81-106.","journal-title":"Machine Learning"},{"key":"422878_CR4","first-page":"229","volume":"2","author":"R.L. Rivest","year":"1987","unstructured":"Rivest, R.L. (1987). Learning decision lists. Machine Learning,2, 229-246.","journal-title":"Machine Learning"},{"key":"422878_CR5","first-page":"496","volume-title":"Proceedings of the Fifth National Conference on Artificial Intelligence","author":"J.C. Schlimmer","year":"1986","unstructured":"Schlimmer, J.C., & Fisher, D.H. (1986). A case study of incremental concept induction.Proceedings of the Fifth National Conference on Artificial Intelligence (pp.496-501). Philadelphia, PA: Morgan Kaufmann."}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022603230145.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022603230145\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022603230145.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:34:15Z","timestamp":1752147255000},"score":16.327368,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022603230145"}},"issued":{"date-parts":[[1987,11]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1987,11]]}},"alternative-id":["422878"],"URL":"https:\/\/doi.org\/10.1023\/a:1022603230145","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1987,11]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403479,"version":"3.41.2"},"reference-count":0,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1990,8,1]],"date-time":"1990-08-01T00:00:00Z","timestamp":649468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1990,8,1]],"date-time":"1990-08-01T00:00:00Z","timestamp":649468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1990,8]]},"DOI":"10.1023\/a:1022647305786","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:55:36Z","timestamp":1049475336000},"page":"233-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Editorial: Advice to Machine Learning Authors"],"prefix":"10.1007","volume":"5","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022647305786.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022647305786\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022647305786.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:39:28Z","timestamp":1752147568000},"score":16.302221,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022647305786"}},"issued":{"date-parts":[[1990,8]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1990,8]]}},"alternative-id":["422608"],"URL":"https:\/\/doi.org\/10.1023\/a:1022647305786","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1990,8]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:05Z","timestamp":1752149405226,"version":"3.41.2"},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1987,9,1]],"date-time":"1987-09-01T00:00:00Z","timestamp":557452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,9,1]],"date-time":"1987-09-01T00:00:00Z","timestamp":557452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1987,9]]},"DOI":"10.1023\/a:1022896407371","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:57:10Z","timestamp":1049475430000},"page":"99-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Machine Learning and Concept Formation"],"prefix":"10.1007","volume":"2","author":[{"given":"Pat","family":"Langley","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422900_CR1","volume-title":"Computers and thought.","author":"E. A. Feigenbaum","year":"1963","unstructured":"Feigenbaum, E. A.(1963).The simulation of verbal learning behavior.In E. A. Feigenbaum & J. Feldman (Eds.),Computers and thought.New York: McGraw-Hill."},{"key":"422900_CR2","unstructured":"Hanson, S. J., & Bauer, M.(1986).Conceptual clustering,semantic orga-nization and polymorphy.Proceedings of the International Meeting on Advances in Learning(pp.53-77).Les Arc,France."},{"key":"422900_CR3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/0004-3702(82)90040-6","volume":"18","author":"T. M. Mitchell","year":"1982","unstructured":"Mitchell, T. M.(1982).Generalization as search.Artificial Intelligence, 18,203-226.","journal-title":"Artificial Intelligence"},{"key":"422900_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-12405-5","volume-title":"Machine learning:An artificial intelligence approach.","author":"R. S. Michalski","year":"1983","unstructured":"Michalski, R. S.(1983).A theory and methodology of learning from examples.In R. S. Michalski, J. G. Carbonell, & T. M. Mitchell (Eds.), Machine learning:An artificial intelligence approach.Los Altos,CA: Morgan Kaufmann."},{"key":"422900_CR5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/B978-0-934613-41-5.50009-X","volume-title":"Pro-ceedings of the Fourth International Workshop on Machine Learning","author":"R. S. Michalski","year":"1987","unstructured":"Michalski, R. S.(1987).How to learn imprecise concepts:A method for employing a two-tiered knowledge representation in learning.In Pro-ceedings of the Fourth International Workshop on Machine Learning(pp.50-58).Irvine,CA: Morgan Kaufmann."},{"key":"422900_CR6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/B978-0-934613-41-5.50007-6","volume-title":"Pro-ceedings of the Fourth International Workshop on Machine Learning","author":"J. R. Quinlan","year":"1987","unstructured":"Quinlan, J. R.(1987).Decision trees as probabilistic classifiers.In Pro-ceedings of the Fourth International Workshop on Machine Learning(pp.31-37).Irvine,CA: Morgan Kaufmann."}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022896407371.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022896407371\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022896407371.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:39:25Z","timestamp":1752147565000},"score":16.2985,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022896407371"}},"issued":{"date-parts":[[1987,9]]},"references-count":6,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1987,9]]}},"alternative-id":["422900"],"URL":"https:\/\/doi.org\/10.1023\/a:1022896407371","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1987,9]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T11:24:14Z","timestamp":1715599454829},"edition-number":"1","reference-count":0,"publisher":"Wiley","isbn-type":[{"value":"9781789450712","type":"print"},{"value":"9781119902881","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"},{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2022,3,21]]},"DOI":"10.1002\/9781119902881.index","type":"other","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T22:49:03Z","timestamp":1645829343000},"page":"235-236","source":"Crossref","is-referenced-by-count":0,"title":["Index"],"prefix":"10.1002","member":"311","published-online":{"date-parts":[[2022,2,25]]},"container-title":["Optimization and Machine Learning"],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881.index","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119902881.index","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T12:05:00Z","timestamp":1693051500000},"score":16.263935,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9781119902881.index"}},"issued":{"date-parts":[[2022,2,25]]},"ISBN":["9781789450712","9781119902881"],"references-count":0,"alternative-id":["10.1002\/9781119902881.index","10.1002\/9781119902881"],"URL":"https:\/\/doi.org\/10.1002\/9781119902881.index","archive":["Portico"],"published":{"date-parts":[[2022,2,25]]}},{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T02:53:07Z","timestamp":1648608787284},"description":"Rescognito : Machine learning and medical education","reference-count":0,"publisher":"Rescognito, Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.37473\/\/10.1038\/s41746-018-0061-1","type":"component","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T10:24:42Z","timestamp":1582885482000},"source":"Crossref","is-referenced-by-count":0,"title":["Machine learning and medical education"],"prefix":"10.37473","member":"23793","deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T10:28:27Z","timestamp":1582885707000},"score":16.246151,"resource":{"primary":{"URL":"https:\/\/rescognito.com\/\/10.1038\/s41746-018-0061-1"}},"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.37473\/\/10.1038\/s41746-018-0061-1"},{"indexed":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T20:42:17Z","timestamp":1721076137453},"edition-number":"1","reference-count":264,"publisher":"Cambridge University Press","isbn-type":[{"value":"9781107043466","type":"print"},{"value":"9781107338548","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"unspecified","delay-in-days":21,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2019,2,21]]},"DOI":"10.1017\/9781107338548.009","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T03:14:16Z","timestamp":1552533256000},"page":"241-252","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Machine Learning Challenges"],"prefix":"10.1017","member":"56","reference":[{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib262","unstructured":"Zhang, Z. , Rubinstein, B. I. P. , & Dimitrakakis, C. (2016), On the differential privacy of Bayesian inference, in \u201cProceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'2016),\u201d pp. 51\u201360."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib261","doi-asserted-by":"crossref","unstructured":"Zhang, Y. , Ge, Z. , Greenberg, A. , & Roughan, M. (2005), Network anomography, in \u201cProceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC),\u201d USENIX Association, Berkeley, CA, USA, pp. 317\u2013330.","DOI":"10.1145\/1330107.1330146"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib260","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib257","first-page":"1485\u20131510","volume":"10","author":"Xu","year":"2009"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib255","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1965.tb04170.x"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib253","doi-asserted-by":"crossref","unstructured":"Warrender, C. , Forrest, S. , & Pearlmutter, B. (1999), Detecting intrusions using system calls: Alternative data models, in \u201cProceedings of the IEEE Symposium on Security and Privacy (SP),\u201d IEEE Computer Society, pp. 133\u2013145.","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib252","unstructured":"Wang, Z. , Josephson, W. K., Lv, Q. , Charikar, M. ,& Li, K. (2007), Filtering image spam with nearduplicate detection, in \u201cProceedings of the 4th Conference on Email and Anti-Spam (CEAS)\u201d available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.94.9550&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib250","first-page":"1\u201340","article-title":"Learning with differential privacy: Stability, learnability and the sufficiency and necessity of ERM principle,","volume":"17","author":"Wang","year":"2016","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib249","unstructured":"Wang, Y. X. , Fienberg, S. E. , & Smola, A. J. (2015), Privacy for free: Posterior sampling and stochastic gradient Monte Carlo, in \u201cICML,\u201d pp. 2493\u20132502."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib248","first-page":"203\u2013222","volume-title":"Lecture Notes in Computer Science","author":"Wang","year":"2004"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib246","doi-asserted-by":"crossref","unstructured":"Wagner, D. & Soto, P. (2002), Mimicry attacks on host-based intrusion detection systems, in \u201cProceedings of the 9th ACM Conference on Computer and Communications Security (CCS),\u201d pp. 255\u2013264.","DOI":"10.1145\/586110.586145"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib245","doi-asserted-by":"crossref","unstructured":"Wagner, D. (2004), Resilient aggregation in sensor networks, in \u201cProceedings of the Workshop on Security of Ad Hoc and Sensor Networks (SASN),\u201d pp. 78\u201387.","DOI":"10.1145\/1029102.1029116"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib258","unstructured":"Xu, W. , Bod\u00edk, P. , & Patterson, D. A. (2004), A flexible architecture for statistical learning and data mining from system log streams, in \u201cProceedings of Workshop on Temporal Data Mining: Algorithms, Theory and Applications at the 4th IEEE International Conference on Data Mining (ICDM)\u201d available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.135.7897&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib243","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib242","unstructured":"Valiant, L. G. (1985), Learning disjunctions of conjunctions, in \u201cProceedings of the International Joint Conference on Artificial Intelligence (IJCAI),\u201d pp. 560\u2013566."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib241","first-page":"433\u2013460","article-title":"A theory of the learnable,","volume":"59","author":"Turing","year":"1950","journal-title":"Communications of the ACM"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib239","unstructured":"Tram\u00e8r, F. , Zhang, F. , Juels, A. , Reiter, M. K. , & Ristenpart, T. (2016), Stealing machine learning models via prediction apis, in \u201cProceedings of the 25th USENIX Security Symposium,\u201d pp. 601\u2013618."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib238","unstructured":"Torkamani, M. A. & Lowd, D. (2014), On robustness and regularization of structural support vector machines, in \u201cProceedings of the 31st International Conference on Machine Learning (ICML-14),\u201d pp. 577\u2013585."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib237","unstructured":"Torkamani, M. & Lowd, D. (2013), Convex adversarial collective classification, in \u201cProceedings of the 30th International Conference on Machine Learning ICML,\u201d pp. 642\u2013650."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib247","first-page":"226\u2013248","volume-title":"Lecture Notes in Computer Science","author":"Wang","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib233","doi-asserted-by":"crossref","unstructured":"Stolfo, S. J. , Li, W. , Hershkop, S. , Wang, K. , Hu, C. , & Nimeskern, O. (2006), Behavior-based modeling and its application to Email analysis, in \u201cACM Transactions on Internet Technology (TOIT),\u201d pp. 187\u2013211.","DOI":"10.1145\/1149121.1149125"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib244","unstructured":"Venkataraman, S. , Blum, A. , & Song, D. (2008), Limits of learning-based signature generation with adversaries, in \u201cProceedings of the Network and Distributed System Security Symposium (NDSS),\u201d The Internet Society available at http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/ 08\/papers\/18_limits_learning-based.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib232","first-page":"57\u201381","volume-title":"in Mathematical Methods, Models and Architectures for Computer Networks Security","author":"Stolfo","year":"2003"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib231","doi-asserted-by":"crossref","unstructured":"Stevens, D. & Lowd, D. (2013), On the hardness of evading combinations of linear classifiers, in \u201cProceedings of the 2013 ACM Workshop on Artificial Intelligence and Security (AISec'13),\u201d pp. 77\u201386.","DOI":"10.1145\/2517312.2517318"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib230","doi-asserted-by":"crossref","unstructured":"Srndic, N. & Laskov, P. (2014), Practical evasion of a learning-based classifier: A case study, in \u201c2014 IEEE Symposium on Security and Privacy, SP 2014,\u201d pp. 197\u2013211.","DOI":"10.1109\/SP.2014.20"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib229","doi-asserted-by":"crossref","unstructured":"Soule, A. , Salamatian, K. , & Taft, N. (2005), Combining filtering and statistical methods for anomaly detection, in \u201cProceedings of the 5th Conference on Internet Measurement (IMC),\u201d USENIX Association, pp. 331\u2013344.","DOI":"10.1145\/1330107.1330147"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib227","unstructured":"Somayaji, A. & Forrest, S. (2000), Automated response using system-call delays, in \u201cProceedings of the Conference on USENIX Security Symposium (SSYM),\u201d pp. 185\u2013197."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib226","doi-asserted-by":"crossref","unstructured":"Smith, R. L. (1996), The hit-and-run sampler: A globally reachingMarkov chain sampler for generating arbitrary multivariate distributions, in \u201cProceedings of the 28th Conference on Winter Simulation (WSC),\u201d pp. 260\u2013264.","DOI":"10.1145\/256562.256619"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib223","unstructured":"Shaoul, C. &Westbury, C. (2007), \u201cA USENET corpus (2005\u20132007).\u201d Accessed October 2007 at http:\/\/www.psych.ualberta.ca\/&westburylab\/downloads\/usenetcorpus.download.html. A more expansive version is available at TheWestbury Lab USENET Corpus, https:\/\/aws.amazon.com\/datasets\/the-westburylab-usenet-corpus\/."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib221","first-page":"928\u2013935","article-title":"Communication theory of secrecy systems,","volume":"28","author":"Shalev-Shwartz","year":"2008","journal-title":"Bell System Technical Journal"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib220","unstructured":"Settles, B. (2009), Active Learning Literature Survey, Computer Sciences Technical Report 1648, University of Wisconsin\u2013Madison."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib219","unstructured":"Segal, R. , Crawford, J. , Kephart, J. , & Leiba, B. (2004), SpamGuru: An enterprise antispam filtering system, in \u201cConference on Email and Anti-Spam (CEAS)\u201d available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.60.114&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib218","doi-asserted-by":"crossref","unstructured":"Sculley, D. , Wachman, G. M. , & Brodley, C. E. (2006), Spam filtering using inexact string matching in explicit feature space with on-line linear classifiers, in E. M. Voorhees & L. P. Buckland, eds., \u201cProceedings of the 15th Text REtrieval Conference (TREC),\u201d Special Publication 500- 272, National Institute of Standards and Technology (NIST).","DOI":"10.6028\/NIST.SP.500-272.spam-tufts.sculley"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib216","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","volume-title":"Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond","author":"Sch\u00f6lkopf","year":"2001"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib214","unstructured":"Saini, U. (2008), Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter, Master's thesis, University of California at Berkeley."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib213","unstructured":"Sahami, M. , Dumais, S. , Heckerman, D. , & Horvitz, E. (1998), A Bayesian approach to filtering junk E-mail, in \u201cLearning for Text Categorization: Papers from the 1998 Workshop,\u201d AAAI Technical Report WS-98-05, Madison, Wisconsin."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib212","doi-asserted-by":"crossref","unstructured":"Russu, P. , Demontis, A. , Biggio, B. , Fumera, G. , & Roli, F. (2016), Secure kernel machines against evasion attacks, in \u201cProceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (AISec),\u201d pp. 59\u201369.","DOI":"10.1145\/2996758.2996771"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib228","doi-asserted-by":"crossref","unstructured":"Sommer, R. & Paxson, V. (2010), Outside the closed world: On using machine learning for network intrusion detection, in \u201cProceedings of the 2010 IEEE Symposium on Security and Privacy,\u201d pp. 305\u2013316.","DOI":"10.1109\/SP.2010.25"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib209","first-page":"73\u201374","article-title":"Stealthy poisoning attacks on PCA-based anomaly detectors,","volume":"37","author":"Rubinstein","journal-title":"SIGMETRICS Performance Evaluation Review"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib254","unstructured":"Wittel, G. L. & Wu, S. F. (2004), On attacking statistical spam filters, in \u201cProceedings of the 1st Conference on Email and Anti-Spam (CEAS)\u201d available at https:\/\/pdfs.semanticscholar.org\/af5f\/4b5f8548e740735b6c2abc1a5ef9c5ebf2df.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib208","doi-asserted-by":"crossref","unstructured":"Rubinstein, B. I. P. , Nelson, B. , Huang, L. , Joseph, A. D. , Lau, S. , Rao, S. , Taft, N. , & Tygar, J. D. (2009a), ANTIDOTE: Understanding and defending against poisoning of anomaly detectors, in A. Feldmann & L. Mathy, eds., \u201cProceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (IMC),\u201d pp. 1\u201314.","DOI":"10.1145\/1644893.1644895"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib203","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib201","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib199","first-page":"74\u201390","volume-title":"Lecture Notes in Computer Science","author":"Rieck","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib096","unstructured":"Gro\u00dfhans, M. , Sawade, C. , Br\u00fcckner, M. , & Scheffer, T. (2013), Bayesian games for adversarial regression problems, in \u201cProceedings of the 30th International Conference on Machine Learning, ICML 2013,\u201d pp. 55\u201363."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib104","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809978"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib094","unstructured":"Gottlieb, L. A. , Kontorovich, A. , & Mossel, E. (2011), VC bounds on the cardinality of nearly orthogonal function classes, Technical Report arXiv:1007.4915v2 [math.CO], arXiv.3"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib134","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v3i1.594"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib093","unstructured":"Goodfellow, I. , Pouget-Abadie, J., Mirza, M. , Xu, B. ,Warde-Farley, D., Ozair, S. , Courville, A. , & Bengio, Y. (2014), Generative adversarial nets, in \u201cAdvances in Neural Information Processing Systems,\u201d pp. 2672\u20132680."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib200","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0030-0"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib088","doi-asserted-by":"crossref","unstructured":"Fogla, P. & Lee, W. (2006), Evading network anomaly detection systems: Formal reasoning and practical techniques, in \u201cProceedings of the 13th ACM Conference on Computer and Communications Security (CCS),\u201d pp. 59\u201368.","DOI":"10.1145\/1180405.1180414"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib222","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1959.tb03905.x"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib072","doi-asserted-by":"crossref","unstructured":"Dinur, I. & Nissim, K. (2003), Revealing information while preserving privacy, in \u201cProceedings of the Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems,\u201d pp. 202\u2013210.","DOI":"10.1145\/773153.773173"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib005","volume-title":"The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality, Technical Report NII-2016-005E, National Institute of Informatics","author":"Amsaleg","year":"2016"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib087","volume-title":"Parameterized Complexity Theory","author":"Flum","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib086","first-page":"30\u201331","article-title":"Question 14: Combining independent tests of significance,","volume":"2","author":"Fisher","year":"1948","journal-title":"American Statistician"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib144","unstructured":"Li, B. & Vorobeychik, Y. (2014), Feature cross-substitution in adversarial classification, in \u201cAdvances in Neural Information Processing Systems,\u201d pp. 2087\u20132095."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib083","first-page":"409\u2013421","article-title":"Routes for breaching and protecting genetic privacy,","volume":"15","author":"Erlich","year":"2014","journal-title":"Nature Reviews Genetics"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib205","unstructured":"Rubinstein, B. I. P. (2010), Secure Learning and Learning for Security: Research in the Intersection, PhD thesis, University of California, Berkeley."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib082","doi-asserted-by":"crossref","unstructured":"Dwork, C. & Yekhanin, S. (2008), New efficient attacks on statistical disclosure control mechanisms, in \u201cCRYPTO'08,\u201d pp. 469\u2013480.","DOI":"10.1007\/978-3-540-85174-5_26"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib089","doi-asserted-by":"crossref","unstructured":"Forrest, S. , Hofmeyr, S. A. , Somayaji, A. , & Longstaff, T. A. (1996), A sense of self for Unix processes, in \u201cProceedings of the IEEE Symposium on Security and Privacy (SP),\u201d pp.120\u2013128.","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib084","volume-title":"in Data Mining for Security Applications","author":"Eskin","year":"2002"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib026","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib162","doi-asserted-by":"publisher","DOI":"10.1002\/0470010940"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib210","unstructured":"Rubinstein, B. I. P. , Nelson, B. , Huang, L. , Joseph, A. D. , Lau, S. , Taft, N. , & Tygar, J. D. (2008), Compromising PCA-based anomaly detectors for network-wide traffic, Technical Report UCB\/EECS-2008-73, EECS Department, University of California, Berkeley."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib080","doi-asserted-by":"crossref","unstructured":"Dwork, C. , Naor, M. , Reingold, O. , Rothblum, G. N. , & Vadhan, S. (2009), On the complexity of differentially private data release: Efficient algorithms and hardness results, in \u201cProceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 381\u2013390.","DOI":"10.1145\/1536414.1536467"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib160","first-page":"220\u2013237","volume-title":"Lecture Notes in Computer Science","author":"Mahoney","year":"2003"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib174","doi-asserted-by":"crossref","unstructured":"Mukkamala, S. , Janoski, G. , & Sung, A. (2002), Intrusion detection using neural networks and support vector machines, in \u201cProceedings of the International Joint Conference on Neural Networks (IJCNN),\u201d Vol. 2, pp. 1702\u20131707.","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib180","unstructured":"Nelson, B. (2005), Designing, Implementing, and Analyzing a System for Virus Detection, Master's thesis, University of California, Berkeley."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib190","unstructured":"Papernot, N. , McDaniel, P. , Goodfellow, I. , Jha, S. , Celik, Z. B. , & Swami, A. (2016), \u201cPractical black-box attacks against deep learning systems using adversarial examples,\u201d arXiv preprint arXiv:1602.02697."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib256","doi-asserted-by":"crossref","unstructured":"Xiao, H. , Biggio, B. , Brown, G. , Fumera, G. , Eckert, C. , & Roli, F. (2015), Is feature selection secure against training data poisoning?, in \u201cProceedings of the 32nd International Conference on Machine Learning, ICML 2015,\u201d pp. 1689\u20131698.","DOI":"10.5244\/C.29"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib079","doi-asserted-by":"crossref","unstructured":"Dwork, C. , McSherry, F. , & Talwar, K. (2007), The price of privacy and the limits of LP decoding, in \u201cProceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 85\u201394.","DOI":"10.1145\/1250790.1250804"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib032","first-page":"235\u2013255","article-title":"Statistical fraud detection: A review,","volume":"17","author":"Bolton","year":"2002","journal-title":"Journal of Statistical Science"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib044","first-page":"130\u2013145","article-title":"The dark cloud: Understanding and defending against botnets and stealthy malware,","volume":"13","author":"Chandrashekar","year":"2009","journal-title":"Intel Technology Journal"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib074","unstructured":"Duchi, J. C. , Jordan, M. I. , & Wainwright, M. J. (2013), Local privacy and statistical minimax rates, in \u201c2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS),\u201d pp. 429\u2013438."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib114","doi-asserted-by":"publisher","DOI":"10.1119\/1.1933957"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib073","unstructured":"Dredze, M. , Gevaryahu, R. , & Elias-Bachrach, A. (2007), Learning fast classifiers for image spam, in \u201cProceedings of the 4th Conference on Email and Anti-Spam (CEAS).\u201d http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.102.8417&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib070","volume-title":"Proceedings of the","author":"Dimitrakakis","year":"2015"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib069","volume-title":"Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, AISec 2014","author":"Dimitrakakis","year":"2014"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib043","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib113","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1979.10489779"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib058","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2004.08.002"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib192","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib091","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1003"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib066","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib132","first-page":"3681\u20133724","article-title":"Security analysis of online centroid anomaly detection,","volume":"13","author":"Kloft","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib120","doi-asserted-by":"crossref","unstructured":"Kandula, S. , Chandra, R. , & Katabi, D. (2008), What's going on? Learning communication rules in edge networks, in \u201cProceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM),\u201d pp. 87\u201398.","DOI":"10.1145\/1402958.1402970"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib060","first-page":"281\u2013299","article-title":"Analysis of perceptron-based active learning,","volume":"10","author":"Dasgupta","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib125","doi-asserted-by":"publisher","DOI":"10.1162\/089976699300016304"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib211","volume-title":"Fourier Analysis on Groups","author":"Rudin","year":"1994"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib061","doi-asserted-by":"crossref","unstructured":"De, A. (2012), Lower bounds in differential privacy, in \u201cTheory of Cryptography Conference,\u201d Springer, pp. 321\u2013338.","DOI":"10.1007\/978-3-642-28914-9_18"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib251","unstructured":"Wang, Z. , Fan, K. , Zhang, J. , & Wang, L. (2013), Efficient algorithm for privately releasing smooth queries, in \u201cAdvances in Neural Information Processing Systems,\u201d pp. 782\u2013790."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib207","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib056","volume-title":"An Introduction to Support Vector Machines","author":"Cristianini","year":"2000"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib055","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9965.1991.tb00002.x"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib092","unstructured":"Goodfellow, I. J. , Shlens, J. , & Szegedy, C. (2015), Explaining and harnessing adversarial challenges, in \u201cProceedings of the International Conference on Learning Representations.\u201d"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib064","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0711-5"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib053","unstructured":"Cormen, T. H. , Leiserson, C. E. , Rivest, R. L. , & Stein, C. (2001), Introduction to Algorithms, 2nd edn, McGraw-Hill. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.86.3539&rep=rep1type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib028","doi-asserted-by":"crossref","unstructured":"Blum, A. , Dwork, C. , McSherry, F. , & Nissim, K. (2005), Practical privacy: The SuLQ framework, in \u201cProceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems,\u201d pp. 128\u2013138.","DOI":"10.1145\/1065167.1065184"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib170","doi-asserted-by":"crossref","unstructured":"Miller, B. , Kantchelian, A. , Afroz, S. , Bachwani, R. , Dauber, E. , Huang, L. , Tschantz, M. C. , Joseph, A. D. , & Tygar, J. D. (2014), Adversarial active learning, in \u201cProceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop,\u201d ACM, pp. 3\u201314.","DOI":"10.1145\/2666652.2666656"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib007","unstructured":"Apa (n.d.), Apache SpamAssassin."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib075","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2006), Differential privacy, in \u201cProceedings of the 33rd International Conference on Automata, Languages and Programming,\u201d pp. 1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib048","doi-asserted-by":"crossref","unstructured":"Cheng, Y.-C. , Afanasyev, M. , Verkaik, P. , Benk\u00f6, P., Chiang, J. , Snoeren, A. C. , Savage, S. , & Voelker, G. M. (2007), Automating cross-layer diagnosis of enterprise wireless networks, in \u201cProceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM),\u201d pp. 25\u201336.","DOI":"10.1145\/1282380.1282384"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib020","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008733"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib105","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9965.00058"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib017","unstructured":"Bassily, R. , Smith, A. , & Thakurta, A. (2014), Private empirical risk minimization: Efficient algorithms and tight error bounds, in \u201c2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS),\u201d pp. 464\u2013473."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib059","doi-asserted-by":"crossref","unstructured":"Dalvi, N. , Domingos, P. , Mausam, Sanghai, S. , & Verma, D. (2004), Adversarial classification, in \u201cProceedings of the 10th ACM International Conference on Knowledge Discovery and Data Mining (KDD),\u201d pp. 99\u2013108.","DOI":"10.1145\/1014052.1014066"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib140","doi-asserted-by":"crossref","unstructured":"Laskov, P. & Kloft, M. (2009), A framework for quantitative security analysis of machine learning, in \u201cProceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (AISec),\u201d pp. 1\u20134.","DOI":"10.1145\/1654988.1654990"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib188","doi-asserted-by":"crossref","unstructured":"Newsome, J. , Karp, B. , & Song, D. (2005), Polygraph: Automatically generating signatures for polymorphic worms, in \u201cProceedings of the IEEE Symposium on Security and Privacy (SP),\u201d IEEE Computer Society, pp. 226\u2013241.","DOI":"10.1109\/SP.2005.15"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib102","doi-asserted-by":"crossref","unstructured":"Hardt, M. & Talwar, K. (2010), On the geometry of differential privacy, in \u201cProceedings of the Forty-Second Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 705\u2013714.","DOI":"10.1145\/1806689.1806786"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib063","first-page":"354\u2013362","article-title":"Robust estimation of dispersion matrices and principal components","volume":"76","author":"Devlin","year":"1981"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib041","volume-title":"Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, North Carolina, October, 19, 2012","author":"C\u00e1rdenas","year":"2012"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib183","volume-title":"Proceedings of the","author":"Nelson","year":"2013"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib078","doi-asserted-by":"crossref","unstructured":"Dwork, C. , McSherry, F. , Nissim, K. , & Smith, A. (2006), Calibrating noise to sensitivity in private data analysis, in \u201cTheory of Cryptography Conference,\u201d pp. 265\u2013284.","DOI":"10.1007\/11681878_14"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib194","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1025-2"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib024","doi-asserted-by":"crossref","unstructured":"Biggio, B. , Rieck, K. , Ariu, D. , Wressnegger, C. , Corona, I. , Giacinto, G. , & Roli, F. (2014), Poisoning behavioral malware clustering, in \u201cProceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014,\u201d pp. 27\u201336.","DOI":"10.1145\/2666652.2666666"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib050","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_4"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib010","unstructured":"Balfanz, D. & Staddon, J. , eds (2009), Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib090","first-page":"353\u2013360","volume-title":"Proceedings of the","author":"Freeman","year":"2016"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib139","doi-asserted-by":"crossref","unstructured":"Lakhina, A. , Crovella, M. , & Diot, C. (2005b), Mining anomalies using traffic feature distributions, in \u201cProceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM),\u201d pp. 217\u2013228.","DOI":"10.1145\/1080091.1080118"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib001","doi-asserted-by":"crossref","unstructured":"Ald\u00e0, F. & Rubinstein, B. I. P. (2017), The Bernstein mechanism: Function release under differential privacy, in \u201cProceedings of the 31st AAAI Conference on Artificial Intelligence (AAAI'2017).\u201d","DOI":"10.1609\/aaai.v31i1.10884"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib027","doi-asserted-by":"crossref","unstructured":"Blocki, J. , Christin, N. , Datta, A. , & Sinha, A. (2011), Regret minimizing audits: A learningtheoretic basis for privacy protection, in \u201cProceedings of the 24th IEEE Computer Security Foundations Symposium,\u201d pp. 312\u2013327.","DOI":"10.1109\/CSF.2011.28"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib014","first-page":"121\u2013148","article-title":"The security of machine learning","volume":"81","author":"Barreno","year":"2010"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib006","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116828"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib008","doi-asserted-by":"crossref","unstructured":"Bahl, P. , Chandra, R. , Greenberg, A. , Kandula, S. , Maltz, D. A. , & Zhang, M. (2007), Towards highly reliable enterprise network services via inference of multi-level dependencies, in \u201cProceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM),\u201d pp. 13\u201324.","DOI":"10.1145\/1282380.1282383"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib107","unstructured":"Hohm, T. , Egli, M. , Gaehwiler, S. , Bleuler, S. , Feller, J. , Frick, D. , Huber, R. , Karlsson, M. , Lingenhag, R. , Ruetimann, T. , Sasse, T. , Steiner, T. , Stocker, J. , & Zitzler, E. (2007), An evolutionary algorithm for the block stacking problem, in \u201c8th International Conference Artificial Evolution (EA 2007),\u201d Springer, pp. 112\u2013123."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib112","doi-asserted-by":"publisher","DOI":"10.1002\/0471725250"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib206","unstructured":"Rubinstein, B. I. P. , Bartlett, P. L. , Huang, L. , & Taft, N. (2009), \u201cLearning in a large function space: Privacy-preserving mechanisms for SVM learning,\u201d CoRR abs\/0911.5708."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib136","doi-asserted-by":"crossref","unstructured":"Lakhina, A. , Crovella, M. , & Diot, C. (2004a), Characterization of network-wide anomalies in traffic flows, in A., Lombardo & J. F., Kurose , eds., \u201cProceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC),\u201d pp. 201\u2013206.","DOI":"10.1145\/1028788.1028813"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib119","first-page":"423\u2013440","article-title":"Efficient algorithms for universal portfolios,","volume":"3","author":"Kalai","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib068","volume-title":"Proceedings of the 1st ICML Workshop on Learning, Security and Privacy,","author":"Dimitrakakis","year":"2014"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib021","doi-asserted-by":"crossref","unstructured":"Biggio, B. , Corona, I. , Maiorca, D. , Nelson, B. , Srndic, N. , Laskov, P. , Giacinto, G. , & Roli, F. (2013), Evasion attacks against machine learning at test time, in \u201cMachine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2013,\u201d pp.387\u2013402.","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib181","unstructured":"Nelson, B. , Barreno, M. , Chi, F. J. , Joseph, A. D. , Rubinstein, B. I. P. , Saini, U. , Sutton, C. , Tygar, J. D. , & Xia, K. (2008), Exploiting machine learning to subvert your spam filter, in \u201cProceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET),\u201d USENIX Association, pp. 1\u20139."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib011","doi-asserted-by":"crossref","unstructured":"Barak, B. , Chaudhuri, K. , Dwork, C. , Kale, S. , McSherry, F. , & Talwar, K. (2007), Privacy, accuracy, and consistency too: A holistic solution to contingency table release, in \u201cProceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems,\u201d pp. 273\u2013282.","DOI":"10.1145\/1265530.1265569"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib240","unstructured":"Tukey, J. W. (1960), \u201cA survey of sampling from contaminated distributions,\u201d Contributions to Probability and Statistics pp. 448\u2013485."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib009","unstructured":"Balfanz, D. & Staddon, J. , eds (2008), Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib100","volume-title":"Robust Statistics: The Approach Based on Influence Functions","author":"Hampel","year":"1986"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib013","volume-title":"Evaluating the security of machine learning algorithms. PhD thesis, University of California","author":"Barreno","year":"2008"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib071","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C. , Nelson, B. , Mitrokotsa, A. , & Rubinstein, B. I. P. (2014), Robust and private Bayesian inference, in \u201cProceedings of the 25th International Conference Algorithmic Learning Theory (ALT),\u201d pp. 291\u2013305.","DOI":"10.1007\/978-3-319-11662-4_21"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib157","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A. , Kifer, D. , Abowd, J. , Gehrke, J. , & Vilhuber, L. (2008), Privacy: Theory meets practice on the map, in \u201cProceedings of the 2008 IEEE 24th International Conference on Data Engineering,\u201d IEEE Computer Society, pp. 277\u2013286.","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib234","first-page":"557\u2013570","article-title":"k-anonymity: A model for protecting privacy,","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib038","volume-title":"Numerical Analysis","author":"Burden","year":"2000"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib018","first-page":"437\u2013454","volume-title":"Lecture Notes in Computer Science","author":"Beimel","year":"2010"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib159","doi-asserted-by":"crossref","unstructured":"Mahoney, M. V. & Chan, P. K. (2002), Learning nonstationary models of normal network traffic for detecting novel attacks, in \u201cProceedings of the 8th ACM International Conference on Knowledge Discovery and Data Mining (KDD),\u201d pp. 376\u2013385.","DOI":"10.1145\/775047.775102"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib023","unstructured":"Biggio, B. , Nelson, B. , & Laskov, P. (2012), Poisoning attacks against support vector machines, in \u201cProceedings of the 29th International Conference on Machine Learning (ICML-12),\u201d pp. 1807\u20131814."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib224","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809682"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib161","doi-asserted-by":"publisher","DOI":"10.1198\/004017005000000166"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib263","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib002","unstructured":"Alfeld, S. , Zhu, X. , & Barford, P. (2016), Data poisoning attacks against autoregressive models, in \u201cProceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI'2016),\u201d pp.1452\u20131458."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib019","unstructured":"Bennett, J. , Lanning, S. , et al. (2007), The Netflix prize, in \u201cProceedings of KDD Cup and Workshop,\u201d Vol. 2007, pp. 3\u20136."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib039","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib030","doi-asserted-by":"crossref","unstructured":"Bod\u00edk, P. , Fox, A. , Franklin, M. J. , Jordan, M. I. , & Patterson, D. A. (2010), Characterizing, modeling, and generating workload spikes for stateful services, in \u201cProceedings of the 1st ACM Symposium on Cloud Computing (SoCC),\u201d pp. 241\u2013252.","DOI":"10.1145\/1807128.1807166"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib012","volume-title":"A face is exposed for AOL searcher no. 4417749","author":"Barbaro","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib033","unstructured":"Bousquet, O. & Elisseeff, A. (2002), \u201cStability and generalization,\u201d Journal of Machine Learning Research 2(Mar), 499\u2013526."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib047","doi-asserted-by":"publisher","DOI":"10.1201\/9781420030884"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib185","unstructured":"Nelson, B. , Rubinstein, B. I. P. , Huang, L. , Joseph, A. D. , Lau, S. , Lee, S. , Rao, S. , Tran, A. , & Tygar, J. D. (2010), Near-optimal evasion of convex-inducing classifiers, in \u201cProceedings of the 13th International Conference on Artificial Intelligence and Statistics (AISTATS),\u201d pp.549\u2013556."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib031","unstructured":"Bod\u00edk, P. , Griffith, R. , Sutton, C. , Fox, A. , Jordan, M. I. , & Patterson, D. A. (2009), Statistical machine learning makes automatic control practical for internet datacenters, in \u201cProceedings of the Workshop on Hot Topics in Cloud Computing (HotCloud),\u201d USENIX Association, pp.12\u201317."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib067","volume-title":"Privacy and Security Issues in Data Mining and Machine Learning - International ECML\/PKDD Workshop, PSDML 2010, Barcelona, September 24, 2010. Revised Selected Papers","author":"Dimitrakakis","year":"2011"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib045","unstructured":"Chaudhuri, K. & Monteleoni, C. (2009), Privacy-preserving logistic regression, \u201cAdvances in Neural Information Processing Systems,\u201d 289\u2013296."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib034","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib133","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450242889"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib035","doi-asserted-by":"crossref","unstructured":"Brauckhoff, D. , Salamatian, K. , & May, M. (2009), Applying PCA for traffic anomaly detection: Problems and solutions, in \u201cProceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM),\u201d pp. 2866\u20132870.","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib029","doi-asserted-by":"crossref","unstructured":"Blum, A. , Ligett, K. , & Roth, A. (2008), A learning theory approach to non-interactive database privacy, in \u201cProceedings of the Fortieth Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 609\u2013618.","DOI":"10.1145\/1374376.1374464"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib166","unstructured":"Mei, S. & Zhu, X. (2015a), The security of latent Dirichlet allocation, in \u201cProceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics (AISTATS),\u201d pp.681\u2013689."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib036","volume-title":"Algorithms for Minimization without Derivatives","author":"Brent","year":"1973"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib037","unstructured":"Br\u00fcckner, M. & Scheffer, T. (2009), Nash equilibria of static prediction games, in Y. Bengio, D. Schuurmans, J. Lafferty, C. K. I. Williams & A. Culotta, eds., \u201cAdvances in Neural Information Processing Systems (NIPS),\u201d Vol. 22, MIT Press, pp. 171\u2013179."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib236","doi-asserted-by":"crossref","unstructured":"Tan, K. M. C. , McHugh, J. , & Killourhy, K. S. (2003), Hiding intrusions: From the abnormal to the normal and beyond, in \u201cRevised Papers from the 5th InternationalWorkshop on Information Hiding (IH),\u201d Springer-Verlag, pp. 1\u201317.","DOI":"10.1007\/3-540-36415-3_1"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib217","doi-asserted-by":"crossref","unstructured":"Sculley, D. , Otey, M. E. , Pohl, M. , Spitznagel, B. , Hainsworth, J. , & Zhou, Y. (2011), Detecting adversarial advertisements in the wild, in \u201cProceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD),\u201d pp. 274\u2013282.","DOI":"10.1145\/2020408.2020455"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib215","unstructured":"Schohn, G. & Cohn, D. (2000), Less is more: Active learning with support vector machines, in \u201cProceedings of the 17th International Conference on Machine Learning (ICML),\u201d pp.839\u2013846."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib051","first-page":"236\u2013255","volume-title":"Lecture Notes in Computer Science","author":"Chung","year":"2007"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib040","volume-title":"Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011 Chicago, October 21, 2011","author":"C\u00e1rdenas","year":"2011"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib054","doi-asserted-by":"crossref","unstructured":"Cormode, G. , Procopiuc, C. , Srivastava, D. , Shen, E. , & Yu, T. (2012), Differentially private spatial decompositions, in \u201c2012 IEEE 28th International Conference on Data Engineering (ICDE),\u201d pp. 20\u201331.","DOI":"10.1109\/ICDE.2012.16"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib042","first-page":"409\u2013415","article-title":"Incremental and decremental support vector machine learning","volume":"13","author":"Cauwenberghs","year":"2000"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib179","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/7.4.308"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib138","unstructured":"Lakhina, A. , Crovella, M. , & Diot, C. (2005a), Detecting distributed attacks using networkwide flow traffic, in \u201cProceedings of the FloCon 2005 Analysis Workshop\u201d available at http:\/\/www.cs.bu.edu\/\u223ccrovella\/paper-archive\/flocon05.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib098","doi-asserted-by":"publisher","DOI":"10.1119\/1.2074007"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib004","doi-asserted-by":"crossref","unstructured":"Alpcan, T. , Rubinstein, B. I. P. , & Leckie, C. (2016), Large-scale strategic games and adversarial machine learning, in \u201c2016 IEEE 55th Conference on Decision and Control (CDC),\u201d IEEE, pp. 4420\u20134426.","DOI":"10.1109\/CDC.2016.7798940"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib099","first-page":"703\u2013727","article-title":"Differential privacy for functions and functional data,","volume":"14","author":"Hall","year":"2013","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib046","first-page":"1069\u20131109","article-title":"Differentially private empirical risk minimization,","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib109","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib128","doi-asserted-by":"publisher","DOI":"10.1016\/0022-247X(71)90184-3"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib103","volume-title":"The Elements of Statistical Learning: Data Mining, Inference and Prediction","author":"Hastie","year":"2003"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib202","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib146","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib016","first-page":"482\u2013493","article-title":"A learning-based approach to reactive security","volume":"9","author":"Barth","year":"2012"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib065","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056087"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib106","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-980109"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib235","first-page":"54\u201373","volume-title":"Lecture Notes in Computer Science","author":"Tan","year":"2002"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib108","unstructured":"Holz, T. , Steiner, M. , Dahl, F. , Biersack, E. , & Freiling, F. (2008), Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm, in \u201cProceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats,\u201d LEET'08, pp. 1\u20139."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib147","first-page":"759\u2013766","article-title":"Projection-pursuit approach to robust dispersion matrices and principal components: Primary theory and Monte Carlo,","volume":"80","author":"Li","year":"1985","journal-title":"Journal of the American Statistical Association"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib077","doi-asserted-by":"crossref","unstructured":"Dwork, C. & Lei, J. (2009), Differential privacy and robust statistics, in \u201cProceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 371\u2013380.","DOI":"10.1145\/1536414.1536466"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib111","doi-asserted-by":"crossref","unstructured":"Huang, L. , Nguyen, X. , Garofalakis, M. , Jordan, M. I. , Joseph, A. , & Taft, N. (2007), In-network PCA and anomaly detection, in B. Sch\u00f6lkopf, J. Platt & T. Hoffman, eds., \u201cAdvances in Neural Information Processing Systems 19 (NIPS),\u201d MIT Press, pp. 617\u2013624.","DOI":"10.7551\/mitpress\/7503.003.0082"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib085","first-page":"163\u2013182","article-title":"On the power of membership queries in agnostic learning,","volume":"10","author":"Feldman","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib115","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012771025575"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib025","volume-title":"Probability and Measure","author":"Billingsley","year":"1995"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib116","doi-asserted-by":"publisher","DOI":"10.1007\/BF00941892"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib049","first-page":"1007\u20131034","article-title":"On robustness properties of convex risk minimization methods for pattern recognition,","volume":"5","author":"Christmann","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib117","first-page":"1\u201330","article-title":"Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371),","volume":"3","author":"Joseph","year":"2013","journal-title":"Dagstuhl Manifestos"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib118","volume-title":"Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition","author":"Jurafsky","year":"2008"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib121","unstructured":"Kantarcioglu, M. , Xi, B. , & Clifton, C. (2009), Classifier evaluation and attribute selection against active adversaries, Technical Report 09-01, Purdue University."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib057","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2007.01.004"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib122","doi-asserted-by":"crossref","unstructured":"Kantchelian, A. , Ma, J. , Huang, L. , Afroz, S. , Joseph, A. D. , & Tygar, J. D. (2012), Robust detection of comment spam using entropy rate, in \u201cProceedings of the 5th ACMWorkshop on Security and Artificial Intelligence (AISec 2012),\u201d pp. 59\u201370.","DOI":"10.1145\/2381896.2381907"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib123","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S. P. , Lee, H. K. , Nissim, K. , Raskhodnikova, S. , & Smith, A. (2008),What can we learn privately?, in \u201cProceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS),\u201d pp. 531\u2013540.","DOI":"10.1109\/FOCS.2008.27"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib052","unstructured":"Cormack, G. & Lynam, T. (2005), Spam corpus creation for TREC, in \u201cProceedings of the Conference on Email and Anti-Spam (CEAS).\u201d"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib127","unstructured":"Kim, H.-A. & Karp, B. (2004), Autograph: Toward automated, distributed worm signature detection, in \u201cUSENIX Security Symposium\u201d available at https:\/\/www.usenix.org\/legacy\/ publications\/library\/proceedings\/sec04\/tech\/full_papers\/kim\/kim.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib124","doi-asserted-by":"publisher","DOI":"10.1137\/0222052"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib126","first-page":"5\u201383","article-title":"La cryptographie militaire,","volume":"9","author":"Kerckhoffs","year":"1883","journal-title":"Journal des Sciences Militaires"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib195","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib129","doi-asserted-by":"crossref","unstructured":"Kl\u00edma, R. , Lisy, V. , & Kiekintveld, C. (2015), Combining online learning and equilibrium computation in security games, in \u201cInternational Conference on Decision and Game Theory for Security,\u201d Springer, pp. 130\u2013149.","DOI":"10.1007\/978-3-319-25594-1_8"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib130","unstructured":"Klimt, B. & Yang, Y. (2004), Introducing the Enron corpus, in \u201cProceedings of the Conference on Email and Anti-Spam (CEAS)\u201d available at https:\/\/bklimt.com\/papers\/2004_klimt_ceas.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib131","unstructured":"Kloft, M. & Laskov, P. (2010), Online anomaly detection under adversarial impact, in \u201cProceedings of the 13th International Conference on Artificial Intelligence and Statistics (AISTATS),\u201d pp. 406\u2013412."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib153","unstructured":"Lov\u00e1sz, L. & Vempala, S. (2003), Simulated annealing in convex bodies and an O*(n4) volume algorithm, in \u201cProceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS),\u201d pp. 650\u2013659."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib135","unstructured":"Kutin, S. & Niyogi, P. (2002), Almost-everywhere algorithmic stability and generalization error, Technical report TR-2002-03, Computer Science Dept., University of Chicago."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib137","doi-asserted-by":"crossref","unstructured":"Lakhina, A. , Crovella, M. , & Diot, C. (2004b), Diagnosing network-wide traffic anomalies, in R. Yavatkar, E. W. Zegura & J. Rexford, eds., \u201cProceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM),\u201d pp. 219\u2013230.","DOI":"10.1145\/1015467.1015492"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib189","first-page":"81\u2013105","volume-title":"Lecture Notes in Computer Science","author":"Newsome","year":"2006"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib141","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5207-6"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib142","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib173","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib095","unstructured":"Greenstadt, R. , ed. (2010), Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, October 8, 2010, ACM."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib101","unstructured":"Hardt, M. , Ligett, K. , & McSherry, F. (2012), A simple and practical algorithm for differentially private data release, in F. Pereira, C. J. C. Burges, L. Bottou, & K. Q. Weinberger, eds., \u201cAdvances in Neural Information Processing Systems 25 (NIPS),\u201d pp. 2339\u20132347."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib143","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12127-2_8"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib145","unstructured":"Li, B. , Wang, Y. , Singh, A. , & Vorobeychik, Y. (2016), Data poisoning attacks on factorizationbased collaborative filtering, in \u201cAdvances in Neural Information Processing Systems,\u201d pp. 1885\u20131893."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib163","unstructured":"Martinez, D. R. , Streilein, W.W. , Carter, K.M. , & Sinha, A. , eds (2016), Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, AICS 2016, Phoenix, AZ, February 12, 2016."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib148","unstructured":"Li, N. , Li, T. , & Venkatasubramanian, S. (2007), t-Closeness: Privacy beyond k-anonymity and l-diversity, in \u201cIEEE 23rd International Conference on Data Engineering (ICED),\u201d pp.106\u2013115."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib149","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib150","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib151","doi-asserted-by":"crossref","unstructured":"Liu, C. & Stamm, S. (2007), Fighting unicode-obfuscated spam, in \u201cProceedings of the Anti- Phishing Working Groups 2nd Annual eCrime Researchers Summit,\u201d pp. 45\u201359.","DOI":"10.1145\/1299015.1299020"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib152","unstructured":"Liu, Y. , Chen, X. , Liu, C. , & Song, D. (2017), Delving into transferable adversarial examples and black-box attacks, in \u201cProceedings of the International Conference on Learning Representations\u201d available at https:\/\/people.eecs.berkeley.edu\/~liuchang\/paper\/transferability_iclr_2017.pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib154","doi-asserted-by":"crossref","unstructured":"Lov\u00e1sz, L. & Vempala, S. (2004), Hit-and-run from a corner, in \u201cProceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 310\u2013314.","DOI":"10.1145\/1007352.1007403"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib155","doi-asserted-by":"crossref","unstructured":"Lowd, D. & Meek, C. (2005a), Adversarial learning, in \u201cProceedings of the 11th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD),\u201d pp. 641\u2013647.","DOI":"10.1145\/1081870.1081950"},{"key":"#cr-split#-9781107338548.CBO9781107338548A075_CBO9781107338548bib169.1","unstructured":"Microsoft (2009), \u201cH1n1 swine flu response center.\u201d https:\/\/h1n1.cloudapp.net;"},{"key":"#cr-split#-9781107338548.CBO9781107338548A075_CBO9781107338548bib169.2","unstructured":"Date accessed: March 3, 2011."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib156","unstructured":"Lowd, D. & Meek, C. (2005b), Good word attacks on statistical spam filters, in \u201cProceedings of the 2nd Conference on Email and Anti-Spam (CEAS)\u201d available at http:\/\/citeseerx.ist.psuedu\/viewdoc\/download?doi=10.1.1.130.9846&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib076","first-page":"705\u2013714","article-title":"A firm foundation for private data analysis","volume":"53","author":"Dwork","year":"2010"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib097","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib158","article-title":"_-Diversity: Privacy beyond k-anonymity,","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Transactions on KDD"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib164","doi-asserted-by":"crossref","unstructured":"McSherry, F. & Mironov, I. (2009), Differentially private recommender systems: Building privacy into the net, in \u201cProceedings of the 15th ACM International Conference on Knowledge Discovery and Data Mining (KDD),\u201d pp. 627\u2013636.","DOI":"10.1145\/1557019.1557090"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib165","doi-asserted-by":"crossref","unstructured":"McSherry, F. & Talwar, K. (2007), Mechanism design via differential privacy, in \u201cProceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS),\u201d pp.94\u2013103.","DOI":"10.1109\/FOCS.2007.66"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib167","doi-asserted-by":"crossref","unstructured":"Mei, S. & Zhu, X. (2015b), Using machine teaching to identify optimal training-set attacks on machine learners, in \u201cProceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI),\u201d AAAI Press, pp. 2871\u20132877.","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib168","unstructured":"Meyer, T. A. & Whateley, B. (2004), SpamBayes: Effective open-source, Bayesian based, email classification system, in \u201cProceedings of the Conference on Email and Anti-Spam (CEAS)\u201d available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.3.9543&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib003","doi-asserted-by":"crossref","unstructured":"Alfeld, S. , Zhu, X. , & Barford, P. (2017), Explicit defense actions against test-set attacks, in \u201cProceedings of the 31st AAAI Conference on Artificial Intelligence (AAAI'2017).\u201d","DOI":"10.1609\/aaai.v31i1.10767"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib191","doi-asserted-by":"crossref","unstructured":"Papernot, N. , McDaniel, P. , Goodfellow, I. , Jha, S. , Celik, Z. B. , & Swami, A. (2017), Practical black-box attacks against deep learning systems using adversarial examples in \u201cProceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS),\u201d ACM, pp. 506\u2013519.","DOI":"10.1145\/3052973.3053009"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib171","volume-title":"Machine Learning","author":"Mitchell","year":"1997"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib081","first-page":"211\u2013407","volume":"9","author":"Dwork","year":"2014"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib172","unstructured":"Mitchell, T. M. (2006), The discipline of machine learning, Technical Report CMU-ML-06-108, Carnegie Mellon University."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib186","first-page":"1293\u20131332","article-title":"Query strategies for evading convex-inducing classifiers","author":"Nelson","year":"2012"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib175","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib225","doi-asserted-by":"crossref","unstructured":"Smith, A. (2011), Privacy-preserving statistical estimation with optimal convergence rates, in \u201cProceedings of the Forty-Third Annual ACM Symposium on Theory of Computing (STOC),\u201d pp. 813\u2013822.","DOI":"10.1145\/1993636.1993743"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib176","doi-asserted-by":"crossref","unstructured":"Narayanan, A. , Shi, E. , & Rubinstein, B. I. P. (2011), Link prediction by de-anonymization: How we won the kaggle social network challenge, in \u201cProceedings of the 2011 International Joint Conference on Neural Networks (IJCNN),\u201d IEEE, pp. 1825\u20131834.","DOI":"10.1109\/IJCNN.2011.6033446"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib259","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2415032"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib177","doi-asserted-by":"crossref","unstructured":"Narayanan, A. & Shmatikov, V. (2008), Robust de-anonymization of large sparse datasets, in \u201cProceedings of the 2008 IEEE Symposium on Security and Privacy,\u201d SP \u201808, IEEE Computer Society, pp. 111\u2013125.","DOI":"10.1109\/SP.2008.33"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib178","doi-asserted-by":"crossref","unstructured":"Narayanan, A. & Shmatikov, V. (2009), De-anonymizing social networks, in \u201c30th IEEE Symposium on Security and Privacy,\u201d pp. 173\u2013187.","DOI":"10.1109\/SP.2009.22"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib015","doi-asserted-by":"crossref","unstructured":"Barreno, M. , Nelson, B. , Sears, R. , Joseph, A. D. , & Tygar, J. D. (2006), Can machine learning be secure?, in \u201cProceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS),\u201d pp. 16\u201325.","DOI":"10.1145\/1128817.1128824"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib182","first-page":"17\u201351","volume-title":"Machine Learning in Cyber Trust: Security, Privacy, Reliability","author":"Nelson","year":"2009"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib204","unstructured":"Robinson, G. (2003), \u201cA statistical approach to the spam problem,\u201d Linux Journal, p. 3."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib062","doi-asserted-by":"publisher","DOI":"10.1145\/356778.356782"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib184","unstructured":"Nelson, B. & Joseph, A. D. (2006), Bounding an attack's complexity for a simple learning model, in \u201cProceedings of the 1st Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML)\u201d http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.71.9869&rep=rep1&type=pdf."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib187","unstructured":"Nelson, B. , Rubinstein, B. I. P. , Huang, L. , Joseph, A. D. , & Tygar, J. D. (2010), Classifier evasion: Models and open problems (position paper), in \u201cProceedings of ECML\/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning (PSDML),\u201d pp. 92\u201398."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib110","doi-asserted-by":"publisher","DOI":"10.1080\/10485259508832620"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib193","first-page":"559\u2013572","article-title":"On lines and planes of closest fit to systems of points in space,","volume":"2","author":"Pearson","year":"1901","journal-title":"Philosophical Magazine"},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib196","unstructured":"Rademacher, L. & Goyal, N. (2009), Learning convex bodies is hard, in \u201cProceedings of the 22nd Annual Conference on Learning Theory (COLT),\u201d pp. 303\u2013308."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib197","unstructured":"Rahimi, A. & Recht, B. (2008), Random features for large-scale kernel machines, in \u201cAdvances in Neural Information Processing Systems 20 (NIPS),\u201d pp. 1177\u20131184."},{"key":"9781107338548.CBO9781107338548A075_CBO9781107338548bib198","doi-asserted-by":"crossref","unstructured":"Ramachandran, A. , Feamster, N. , & Vempala, S. (2007), Filtering spam with behavioral blacklisting, in \u201cProceedings of the 14th ACM Conference on Computer and Communications Security (CCS),\u201d pp. 342\u2013351.","DOI":"10.1145\/1315245.1315288"}],"container-title":["Adversarial Machine Learning"],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T19:49:08Z","timestamp":1721072948000},"score":16.242819,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/CBO9781107338548A065\/type\/book_part"}},"issued":{"date-parts":[[2019,2,21]]},"ISBN":["9781107043466","9781107338548"],"references-count":264,"URL":"https:\/\/doi.org\/10.1017\/9781107338548.009","published":{"date-parts":[[2019,2,21]]}},{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T12:10:03Z","timestamp":1752149403709,"version":"3.41.2"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1988,4,1]],"date-time":"1988-04-01T00:00:00Z","timestamp":575856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1988,4,1]],"date-time":"1988-04-01T00:00:00Z","timestamp":575856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Learning"],"published-print":{"date-parts":[[1988,4]]},"DOI":"10.1023\/a:1022817027844","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T16:57:10Z","timestamp":1049475430000},"page":"281-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New Theoretical Directions In Machine Learning"],"prefix":"10.1007","volume":"2","author":[{"given":"David","family":"Haussler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"422909_CR1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/356914.356918","volume":"15","author":"D. Angluin","year":"1983","unstructured":"Angluin, D., & Smith C. (1983). Inductive inference: Theory and methods. Com-puting Surveys, 15, 237\u2013269.","journal-title":"Com-puting Surveys"},{"key":"422909_CR2","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E. M. Gold","year":"1967","unstructured":"Gold, E. M. (1967). Language identification in the limit. Information and Control, 10, 447\u2013474.","journal-title":"Information and Control"},{"key":"422909_CR3","doi-asserted-by":"crossref","unstructured":"Haussler, D. (1987). Bias, version spaces and Valiant's learning framework. Pro-ceedings of the Fourth International Workshop on Machine Learning (pp. 324\u2013336). Irvine, CA: Morgan Kaufmann.","DOI":"10.1016\/B978-0-934613-41-5.50036-2"},{"key":"422909_CR4","volume-title":"Tech-nical Report TR-03\u201387","author":"M. Kearns","year":"1987","unstructured":"Kearns, M., & Li, M. (1987). Learning in the presence of malicious errors (Tech-nical Report TR-03\u201387). Cambridge, MA: Harvard University, Aiken Com-putation Laboratory."},{"key":"422909_CR5","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/B978-0-934613-41-5.50037-4","volume-title":"Proceedings of the Fourth International Workshop on Ma-chine Learning","author":"M. Kearns","year":"1987","unstructured":"Kearns, M., Li, M., Pitt, L., & Valiant, L. G. (1987). Recent results on Boolean concept learning. Proceedings of the Fourth International Workshop on Ma-chine Learning (pp. 337\u2013352). Irvine, CA: Morgan Kaufmann."},{"key":"422909_CR6","first-page":"229","volume":"2","author":"R. L. Rivest","year":"1987","unstructured":"Rivest, R. L. (1987). Learning decision lists. Machine Learning, 2, 229\u2013246.","journal-title":"Machine Learning"},{"key":"422909_CR7","volume-title":"Machine learning: An artificial intelligence approach","author":"C. Sammut","year":"1986","unstructured":"Sammut, C., & Banerji, R. (1986). Learning concepts by asking questions. In R. S. Michalski, J. G. Carbonell, & T. M. Mitchell (Eds.), Machine learning: An artificial intelligence approach (Vol. 2). Los Altos, CA: Morgan Kaufmann."},{"key":"422909_CR8","first-page":"518","volume-title":"Proceedings of the Fifth National Conference on Artificial Intelligence","author":"D. Subramanian","year":"1986","unstructured":"Subramanian, D., & Feigenbaum, J. (1986). Factorization in experiment genera tion. Proceedings of the Fifth National Conference on Artificial Intelligence (pp. 518\u2013522). Philadelphia, PA: Morgan Kaufmann."},{"key":"422909_CR9","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"L. G. Valiant","year":"1984","unstructured":"Valiant, L. G. (1984). A theory of the learnable. Communications of the ACM, 27, 1134\u20131142.","journal-title":"Communications of the ACM"},{"key":"422909_CR10","first-page":"560","volume-title":"Proceedings of the Ninth International Joint Conference on Artificial Intelligence","author":"L. G. Valiant","year":"1985","unstructured":"Valiant, L. G. (1985). Learning disjunctions of conjunctions. Proceedings of the Ninth International Joint Conference on Artificial Intelligence (pp. 560\u2013566). Los Angeles, CA: Morgan Kaufmann."}],"container-title":["Machine Learning"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022817027844.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1022817027844\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1022817027844.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T11:36:35Z","timestamp":1752147395000},"score":16.202288,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1022817027844"}},"issued":{"date-parts":[[1988,4]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1988,4]]}},"alternative-id":["422909"],"URL":"https:\/\/doi.org\/10.1023\/a:1022817027844","ISSN":["0885-6125","1573-0565"],"issn-type":[{"type":"print","value":"0885-6125"},{"type":"electronic","value":"1573-0565"}],"published":{"date-parts":[[1988,4]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]},{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:14:36Z","timestamp":1743048876302,"version":"3.40.3"},"publisher-location":"Boca Raton","edition-number":"1","reference-count":0,"publisher":"CRC Press","isbn-type":[{"value":"9781003606055","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2025,3,26]]},"DOI":"10.1201\/9781003606055-5","type":"book-chapter","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:20:24Z","timestamp":1742998824000},"page":"102-135","source":"Crossref","is-referenced-by-count":0,"title":["Machine learning vs. neutrosophic machine learning"],"prefix":"10.1201","author":[{"given":"Shabbir","family":"Hassan","sequence":"first","affiliation":[]}],"member":"301","container-title":["Soft Computing and Machine Learning"],"language":"en","deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:20:31Z","timestamp":1742998831000},"score":16.198158,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781003606055\/chapters\/10.1201\/9781003606055-5"}},"issued":{"date-parts":[[2025,3,26]]},"ISBN":["9781003606055"],"references-count":0,"URL":"https:\/\/doi.org\/10.1201\/9781003606055-5","published":{"date-parts":[[2025,3,26]]}}],"items-per-page":20,"query":{"start-index":0,"search-terms":"machine learning"}}}