Adversarial vulnerability bounds for Gaussian process classification
Related publications (35)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Support Vector Machine (SVM) is an acknowledged powerful tool for building classifiers, but it lacks flexibility, in the sense that the kernel is chosen prior to learning. Multiple Kernel Learning (MKL) enables to learn the kernel, from an ensemble of ...
Technological advances in sensing and portable computing devices and wireless communication has lead to an increase in the number and variety of sensing enabled devices (e.g. smartphones or sensing garments). Pervasive computing and activity recognition sy ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2011
The Support Vector Machine (SVM) is an acknowledged powerful tool for building classifiers, but it lacks flexibility, in the sense that the kernel is chosen prior to learning. Multiple Kernel Learning (MKL) enables to learn the kernel, from an ensemble of ...
The objective of this paper is to present the operating and hedging analysis of a hydroelectric system in a non-hydro dominated market using a specifically-developed tool for operating and contracting decisions. Hydropower companies are likely to face stoc ...
The impact of capital mobility restrictions on the diversification benefit for risk at the group level of a financial conglomerate is an important aspect in risk management. In this paper we propose a new bottom-up approach for realizing diversification be ...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhole attacks on Intrusion Detection Systems. More specifically, we propose a mathematical framework for obtaining performance bounds of Byzantine attackers and ...
Systemic risks and hazards have become increasingly significant features of modern industrial society of which the network industries form a vital element. The idea of systemic risk, however, is much less prominent in the network industries compared to ban ...
In the standard real options approach to investment under uncertainty, agents formulate optimal policies under the assumptions of risk neutrality or perfect capital markets. However, in most situations, corporate executives face incomplete markets either b ...
Breadth First Search (BFS) is a widely used approach for sampling large graphs. However, it has been empirically observed that BFS sampling is biased toward high-degree nodes, which may strongly affect the measurement results. In this paper, we quantify an ...
Institute of Electrical and Electronics Engineers2011
The aims of the preliminary study reported in this document were twofold. Firstly, within the context of the application of UHPFRC for the rehabilitation of reinforced concrete structures, to identify the phenomena that require further study with respect t ...