Pavel Laskov
Cited by
Cited by
Poisoning attacks against support vector machines
B Biggio, B Nelson, P Laskov
arXiv preprint arXiv:1206.6389, 2012
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
Learning and classification of malware behavior
K Rieck, T Holz, C Willems, P Düssel, P Laskov
Detection of Intrusions and Malware, and Vulnerability Assessment, 108-125, 2008
Support vector machines under adversarial label noise
B Biggio, B Nelson, P Laskov
Asian conference on machine learning, 97-112, 2011
Incremental support vector learning: Analysis, implementation and applications.
P Laskov, C Gehl, S Krüger, KR Müller, KP Bennett, ...
Journal of machine learning research 7 (9), 2006
Practical Evasion of a Learning-Based Classifier: A Case Study
N Šrndic, P Laskov
Learning intrusion detection: supervised or unsupervised?
P Laskov, P Düssel, C Schäfer, K Rieck
Image Analysis and Processing–ICIAP 2005: 13th International Conference …, 2005
Efficient and accurate lp-norm multiple kernel learning
M Kloft, U Brefeld, S Sonnenburg, P Laskov, KR Müller, A Zien
Advances in neural information processing systems 22 (22), 997-1005, 2009
A fast algorithm for joint diagonalization with non-orthogonal transformations and its application to blind source separation
A Ziehe, P Laskov, G Nolte, KR MÞller
Journal of Machine Learning Research 5 (Jul), 777-800, 2004
Static detection of malicious JavaScript-bearing PDF documents
P Laskov, N Šrndić
Proceedings of the 27th annual computer security applications conference …, 2011
Detection of Malicious PDF Files Based on Hierarchical Document Structure
N Šrndić, P Laskov
Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013
Online anomaly detection under adversarial impact
M Kloft, P Laskov
Proceedings of the thirteenth international conference on artificial …, 2010
Online SVM learning: from classification to data description and back
DMJ Tax, P Laskov
2003 IEEE XIII Workshop on Neural Networks for Signal Processing (IEEE Cat …, 2003
Machine learning in adversarial environments
P Laskov, R Lippmann
Machine learning 81, 115-119, 2010
Linear-Time Computation of Similarity Measures for Sequential Data.
K Rieck, P Laskov
Journal of Machine Learning Research 9 (1), 2008
Intrusion detection in unlabeled data with quarter-sphere support vector machines
I Kotenko, P Laskov, C Schäfer
Proc. of the International GI Workshop on Detection of Intrusions and …, 2004
Language models for detection of unknown attacks in network traffic
K Rieck, P Laskov
Journal in Computer Virology 2, 243-256, 2007
Botzilla: detecting the" phoning home" of malicious software
K Rieck, G Schwenk, T Limmer, T Holz, P Laskov
Proceedings of the 2010 ACM symposium on applied computing, 1978-1984, 2010
Hidost: a static machine-learning-based detector of malicious files
N Šrndić, P Laskov
EURASIP Journal on Information Security 2016, 1-20, 2016
Detecting unknown network attacks using language models
K Rieck, P Laskov
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20