Benjamin I. P. Rubinstein
Benjamin I. P. Rubinstein
Associate Professor, School of Computing and Information Systems, University of Melbourne
Verified email at - Homepage
TitleCited byYear
Adversarial machine learning
L Huang, AD Joseph, B Nelson, BIP Rubinstein, JD Tygar
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
A Bayesian approach to discovering truth from conflicting sources for data integration
B Zhao, BIP Rubinstein, J Gemmell, J Han
Proceedings of the VLDB Endowment 5 (6), 550-561, 2012
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement …, 2009
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
BIP Rubinstein, PL Bartlett, L Huang, N Taft
Journal of Privacy and Confidentiality 4 (1), 65-100, 2012
Exploiting Machine Learning to Subvert Your Spam Filter.
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
First USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET'08 …, 2008
Link prediction by de-anonymization: How we won the kaggle social network challenge
A Narayanan, E Shi, BIP Rubinstein
The 2011 International Joint Conference on Neural Networks (IJCNN), 1825-1834, 2011
Identifying At-Risk Students in Massive Open Online Courses
J He, J Bailey, BIP Rubinstein, R Zhang
Proceedings of the 29th AAAI Conference on Artificial Intelligence (AAAI …, 2015
Adaptive bidding for display advertising
A Ghosh, BIP Rubinstein, S Vassilvitskii, M Zinkevich
Proceedings of the 18th International Conference on World Wide Web, 251-260, 2009
Query strategies for evading convex-inducing classifiers
B Nelson, BIP Rubinstein, L Huang, AD Joseph, SJ Lee, S Rao, JD Tygar
Journal of Machine Learning Research 13 (May), 1293-1332, 2012
Evolving quantum circuits using genetic programming
BIP Rubinstein
Proceedings of the 2001 Congress on Evolutionary Computation, 144-151, 2001
A learning-based approach to reactive security
A Barth, BIP Rubinstein, M Sundararajan, JC Mitchell, D Song, PL Bartlett
IEEE Transactions on Dependable and Secure Computing 9 (4), 482-493, 2011
Misleading learners: Co-opting your spam filter
B Nelson, M Barreno, FJ Chi, AD Joseph, BIP Rubinstein, U Saini, ...
Machine Learning in Cyber Trust, 17-51, 2009
Robust and private Bayesian inference
C Dimitrakakis, B Nelson, A Mitrokotsa, BIP Rubinstein
International Conference on Algorithmic Learning Theory, 291-305, 2014
Open problems in the security of learning
M Barreno, PL Bartlett, FJ Chi, AD Joseph, B Nelson, BIP Rubinstein, ...
Proceedings of the 1st ACM Workshop on Artificial Intelligence & Security …, 2008
Security evaluation of support vector machines in adversarial environments
B Biggio, I Corona, B Nelson, BIP Rubinstein, D Maiorca, G Fumera, ...
Support Vector Machines Applications, 105-153, 2014
Stealthy poisoning attacks on PCA-based anomaly detectors
BIP Rubinstein, B Nelson, L Huang, AD Joseph, S Lau, S Rao, N Taft, ...
ACM SIGMETRICS Performance Evaluation Review 37 (2), 73-74, 2009
Presenting actions and providers associated with entities
B Rubinstein, AK Chandra, OJ Dabrowski, DJ Gemmell
US Patent 9,189,549, 2015
Near-Optimal Evasion of Convex-Inducing Classifiers.
B Nelson, BIP Rubinstein, L Huang, AD Joseph, S Lau, SJ Lee, S Rao, ...
Proceedings of the Thirteenth International Conference on Artificial …, 2010
Shifting: One-inclusion mistake bounds and sample compression
BIP Rubinstein, PL Bartlett, JH Rubinstein
Journal of Computer and System Sciences 75 (1), 37-59, 2009
A geometric approach to sample compression
BIP Rubinstein, JH Rubinstein
Journal of Machine Learning Research 13 (Apr), 1221-1261, 2012
The system can't perform the operation now. Try again later.
Articles 1–20