Pavel Laskov
Cited by
Cited by
Poisoning attacks against support vector machines
B Biggio, B Nelson, P Laskov
arXiv preprint arXiv:1206.6389, 2012
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Joint European conference on machine learning and knowledge discovery in …, 2013
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
Detection of Intrusions and Malware, and Vulnerability Assessment, 108-125, 2008
Incremental support vector learning: Analysis, implementation and applications.
P Laskov, C Gehl, S Krüger, KR Müller, KP Bennett, ...
Journal of machine learning research 7 (9), 2006
Efficient and accurate lp-norm multiple kernel learning
M Kloft, U Brefeld, S Sonnenburg, P Laskov, KR Müller, A Zien
Advances in neural information processing systems 22 (22), 997-1005, 2009
A fast algorithm for joint diagonalization with non-orthogonal transformations and its application to blind source separation
A Ziehe, P Laskov, G Nolte, KR MÞller
Journal of Machine Learning Research 5 (Jul), 777-800, 2004
Practical Evasion of a Learning-Based Classifier: A Case Study
N Šrndic, P Laskov
Learning intrusion detection: supervised or unsupervised?
P Laskov, P Düssel, C Schäfer, K Rieck
International Conference on Image Analysis and Processing, 50-57, 2005
Support vector machines under adversarial label noise
B Biggio, B Nelson, P Laskov
Asian conference on machine learning, 97-112, 2011
Detection of malicious pdf files based on hierarchical document structure
N Šrndic, P Laskov
Proceedings of the 20th Annual Network & Distributed System Security …, 2013
Detection of Malicious PDF Files Based on Hierarchical Document Structure
N Šrndić, P Laskov
Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013
Static detection of malicious JavaScript-bearing PDF documents
P Laskov, N Šrndić
Proceedings of the 27th annual computer security applications conference …, 2011
Online SVM learning: from classification to data description and back
DMJ Tax, P Laskov
2003 IEEE XIII Workshop on Neural Networks for Signal Processing (IEEE Cat …, 2003
Online anomaly detection under adversarial impact
M Kloft, P Laskov
Proceedings of the thirteenth international conference on artificial …, 2010
Linear-Time Computation of Similarity Measures for Sequential Data.
K Rieck, P Laskov
Journal of Machine Learning Research 9 (1), 2008
Intrusion detection in unlabeled data with quarter-sphere support vector machines
I Kotenko, P Laskov, C Schäfer
Proc. of the International GI Workshop on Detection of Intrusions and …, 2004
Non-sparse multiple kernel learning
M Kloft, U Brefeld, P Laskov, S Sonnenburg
NIPS Workshop on Kernel Learning: Automatic Selection of Optimal Kernels 4, 5, 2008
Language models for detection of unknown attacks in network traffic
K Rieck, P Laskov
Journal in Computer Virology 2 (4), 243-256, 2007
Machine learning in adversarial environments
P Laskov, R Lippmann
Machine learning 81 (2), 115-119, 2010
Botzilla: detecting the" phoning home" of malicious software
K Rieck, G Schwenk, T Limmer, T Holz, P Laskov
Proceedings of the 2010 ACM symposium on applied computing, 1978-1984, 2010
The system can't perform the operation now. Try again later.
Articles 1–20