|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 515 occurrences of 317 keywords
|
|
|
Results
Found 2502 publication records. Showing 2491 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
150 | Vipul Goyal, Abhishek Jain 0002 |
On the round complexity of covert computation. |
STOC |
2010 |
DBLP DOI BibTeX RDF |
covert computation, cryptography, round complexity |
133 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 |
A Field Guide to Hidden Accounting Information Detection. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
128 | Richard A. Kemmerer, Phillip A. Porras |
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
covert storage channels, covert flow tree, listening process, resource attribute, covert channel operation sequences, trees (mathematics), security of data, attributes, tree structure |
128 | Steven Gianvecchio, Haining Wang |
Detecting covert timing channels: an entropy-based approach. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
detection, covert timing channels |
122 | Yi Wang, Ping Chen 0003, Yi Ge, Bing Mao, Li Xie 0001 |
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
111 | Zhenghong Wang, Ruby B. Lee |
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
106 | Serdar Cabuk, Carla E. Brodley, Clay Shields |
IP Covert Channel Detection. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
Network covert channels, channel detection, information hiding |
106 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Model-Based Covert Timing Channels: Automated Modeling and Evasion. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
traffic modeling, evasion, covert timing channels |
99 | Randy Browne |
An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
95 | Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang |
Automatic identification of covert channels inside Linux kernel based on source codes. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
covert channel identification, information flow tree, semantic information flow, shared resource matrix, syntactic information flow, Linux kernel |
95 | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan |
Managing the risk of covert information flows in virtual machine systems. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
chinese wall policy, information flow secrecy, covert channels |
89 | Sebastian Zander, Grenville J. Armitage, Philip Branch |
Covert channels in multiplayer first person shooter online games. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Alan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin |
A security domain model to assess software for exploitable covert channels. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
automated program verification, security domain model, static analysis, specification language, covert channel, dynamic slicing |
83 | Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin |
Covert Channels in IPv6. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
active warden, IPv6, IPsec, covert channel, stateful, stateless |
83 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
83 | Taeshik Shon, Jung-Taek Seo, Jongsub Moon |
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
TCP/IP protocol security, support vector machine, Intrusion detection, covert channel |
83 | Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin |
Analyzing Network-Aware Active Wardens in IPv6. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
active wardens, traffic normalizers, active mappers, traffic analysis, covert channels, stateful, stateless, network-aware, evasion attacks |
78 | Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li |
Optimization of Covert Channel Identification. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
72 | Keisuke Okamura, Yoshihiro Oyama |
Load-based covert channels between Xen virtual machines. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
covert channels, virtual machine monitors |
72 | Ronald William Smith, George Scott Knight |
Predictable Design of Network-Based Covert Communication Systems. |
SP |
2008 |
DBLP DOI BibTeX RDF |
forward error correcting codes, insertion errors, probability of detection, reliability, Covert channels |
72 | Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen |
Autonomous navigation of wireless robot swarms with covert leaders. |
ROBOCOMM |
2007 |
DBLP DOI BibTeX RDF |
covert leaders, navigation, robot swarms |
71 | Yonglak Sohn, Songchun Moon |
Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems. |
DEXA |
2000 |
DBLP DOI BibTeX RDF |
Database, Concurrency Control, Covert Channel, Multilevel security |
67 | Yunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li 0027, Li Guo 0001 |
Simulation Analysis of Probabilistic Timing Covert Channels. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz 0001, Stefan Katzenbeisser 0001 |
Hide and Seek in Time - Robust Covert Timing Channels. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Ge Cheng, Hai Jin 0001, Deqing Zou, Alex K. Ohoussou, Feng Zhao 0003 |
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Baishakhi Ray, Shivakant Mishra |
A Protocol for Building Secure and Reliable Covert Channel. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, Amit Sahai |
Covert Multi-Party Computation. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Zhenghong Wang, Ruby B. Lee |
Covert and Side Channels Due to Processor Architecture. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Changda Wang 0001, Shiguang Ju |
The Dilemma of Covert Channels Searching. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Serdar Cabuk, Carla E. Brodley, Clay Shields |
IP covert timing channels: design and detection. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
network covert channels, TCP/IP, detection, covert timing channels |
67 | Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran |
On the Identification of Covert Storage Channels in Secure Systems. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
covert storage channels, Secure Xenix kernel, visible/alterable kernel variables, language code, sharing relationships, nondiscretionary access rules, false flow violations, kernel locations, audit code, time-delay variables, covert-channel handling, software engineering, identification, security of data, source code, operating systems (computers), secure systems, information-flow analysis, implementation languages |
66 | Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu |
The Research on Information Hiding Based on Command Sequence of FTP Protocol. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Gary Cantrell, David A. Dampier |
Experiments in hiding data inside the file structure of common office documents: a stegonography application. |
ISICT |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels |
Covert channels in privacy-preserving identification systems. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
privacy, mobile, identification, covert channels, rfid |
60 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Fairness Strategy for Multilevel Secure Concurrency Control Protocol. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
concurrency control, fairness, covert channel, Multilevel secure database systems |
56 | Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo |
Towards Adaptive Covert Communication System. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Sebastian Zander, Grenville J. Armitage, Philip Branch |
An Empirical Evaluation of IP Time To Live Covert Channels. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Chang-da Wang 0001, Shiguang Ju, Dianchun Guo, Zhen Yang, Wen-yi Zheng |
Research on the Methods of Search and Elimination in Covert Channels. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 |
A Tamper-Evident Voting Machine Resistant to Covert Channels. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
tamper-evident, receipt-free, electronic voting, covert channel |
50 | Geir Olav Dyrkolbotn, Einar Snekkenes |
A Wireless Covert Channel on Smart Cards (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
EMSide-Channel, Wireless Covert Channel, Smart Cards, Subversion |
50 | Ilaria Venturini |
Oracle Attacks and Covert Channels. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
Oracle attacks, Watermarking, Covert channels |
50 | Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller |
Covert channels and anonymizing networks. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
anonymity, information theory, covert channel, MIX |
50 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
50 | John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg |
Building higher resolution synthetic clocks for signaling in covert timing channels. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels |
49 | Mohammad Iftekhar Husain, Shambhu J. Upadhyaya, Madhusudhanan Chandrasekaran |
A Novel Approach for Security and Robustness in Wireless Embedded Systems. |
SEUS |
2008 |
DBLP DOI BibTeX RDF |
RTS/CTS, Security, Embedded systems, Wireless networks, Media Access Control (MAC), Covert channel |
49 | Sihan Qing, Changxiang Shen |
Design of secure operating systems with high security levels. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
secure operating systems with high security levels, covert channel analysis, architecture, security model |
49 | Nikita Borisov, Kazuhiro Minami |
Single-bit re-encryption with applications to distributed proof systems. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
commutative encryption, distributed proof systems, goldwasser-micali, covert channels, re-encryption |
49 | Todd Fine |
Defining Noninterference in the Temporal Logic of Actions. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
noninterference properties, temporal logic of actions, multilevel secure systems, formal specification, formal methods, temporal logic, composition, security of data, covert channels, definitions, specification refinement |
45 | Hui Tian 0002, Ke Zhou 0001, Yongfeng Huang 0001, Dan Feng 0001, Jin Liu 0017 |
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Vipul Goyal, Payman Mohassel, Adam D. Smith |
Efficient Two Party and Multi Party Computation Against Covert Adversaries. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Heiko Mantel, Henning Sudbrock |
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Gu Taek Lee, Seokhee Lee 0002, Elena Tsomko, Sangjin Lee 0002 |
Discovering Methodology and Scenario to Detect Covert Database System. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Zhenghong Wang, Ruby B. Lee |
Capacity Estimation of Non-Synchronous Covert Channels. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan |
Pervasive Random Beacon in the Internet for Covert Coordination. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Eugene Tumoian, Maxim Anikeev |
Network Based Detection of Passive Covert Channels in TCP/IP. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Loïc Hélouët |
Finding Covert Channels in Protocols with Message Sequence Charts: The Case of RMTP2. |
SAM |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Shiguang Ju, Xiaoyu Song |
On the Formal Characterization of Covert Channel. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Taeshik Shon, Taewoo Noh, Jongsub Moon |
Support Vector Machine Based ICMP Covert Channel Attack Detection. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
45 | John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts |
Covert Messaging through TCP Timestamps. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Alexander A. Grusho |
Mathematical Models of the Covert Channels. |
MMM-ACNS |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Shufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan |
The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Sniffer, Covert Channel, Covert communication |
44 | Henrik Svensson, Anthony F. Morse, Tom Ziemke |
Neural Pathways of Embodied Simulation. |
ABiALS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Lei Zheng, Ingemar J. Cox |
JPEG Based Conditional Entropy Coding for Correlated Steganography. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
44 | |
Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ilaria Venturini |
Oracle Channels. |
Trans. Data Hiding Multim. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Oracle attacks, Secure watermarking, Information hiding, Covert channels, Information leakage, Subliminal channels, Covert communications |
39 | Sylvain Chevallier, Philippe Tarroux |
Covert Attention with a Spiking Neural Network. |
ICVS |
2008 |
DBLP DOI BibTeX RDF |
precise spike-timing, covert attention, saliency, spiking neurons |
39 | Dario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli |
SecSyslog: an Approach to Secure Logging Based on Covert Channels. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
Log Correlation, Log Integrity, Covert Channel, Forensic, Spyware, Log analysis |
39 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
39 | Sang Hyuk Son, Ravi Mukkamala, Rasikan David |
Integrating Security and Real-Time Requirements Using Covert Channel Capacity. |
IEEE Trans. Knowl. Data Eng. |
2000 |
DBLP DOI BibTeX RDF |
covert channel analysis, real-time systems, Concurrency control, database systems, multilevel security, locking protocols |
38 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Secure Transaction Management Protocols for MLS/DDBMS. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
concurrency control, covert channel, Multilevel security, distributed database system, commit protocol |
38 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Auditable Privacy: On Tamper-Evident Mix Networks. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
tamper-evident, observer, malware, covert channel, Mix network, subliminal channel |
38 | Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee 0001 |
A Network Pump. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
security, information theory, flow control, router, Covert channel, gateway |
38 | X. C. Dellanoy, C. Del Vigna |
Binary Integrity Constraints Against Confidentiality. |
DEXA |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel |
34 | Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
TCP covert timing channels: Design and detection. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Dan Mossop, Ronald Pose |
Covert Channel Analysis of the Password-Capability System. |
Asia-Pacific Computer Systems Architecture Conference |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Sukhoon Kang, Yong-Rak Choi |
A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li |
Covert Channel Identification Founded on Information Flow Analysis. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Alexei Galatenko, Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina |
Statistical Covert Channels Through PROXY Server. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Steven J. Murdoch, Piotr Zielinski |
Covert Channels for Collusion in Online Computer Games. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Taeshik Shon, Jongsub Moon, Sangjin Lee 0002, Dong Hoon Lee 0001, Jongin Lim 0001 |
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Alexander A. Grusho, Elena E. Timonina |
Construction of the Covert Channels. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Darko Kirovski, Henrique S. Malvar |
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Steve R. White |
Covert Distributed Processing with Computer Viruses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
33 | Parvathinathan Venkitasubramaniam, Ting He 0001, Lang Tong |
Anonymous Networking Amidst Eavesdroppers. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ting He 0001, Ameya Agaskar, Lang Tong |
On security-aware transmission scheduling. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen |
The Security Threat Posed by Steganographic Content on the Internet. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
A Secure Concurrency Control for MLS/DDBSs. |
ICDIM |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Information Flow Analysis for Probabilistic Timed Automata. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos |
Malicious ICMP Tunneling: Defense against the Vulnerability. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil |
Eliminating Steganography in Internet Traffic with Active Wardens. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Yonglak Sohn, Songchun Moon |
Tightly Secure Transaction Scheduler in Multi-Level Secure Database Management Systems |
DEXA |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Gustavus J. Simmons |
A Secure Subliminal Channel (?). |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
33 | Gustavus J. Simmons |
The Subliminal Channel and Digital Signature. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
31 | Ian Covert, Chanwoo Kim 0002, Su-In Lee, James Zou 0001, Tatsunori Hashimoto |
Stochastic Amortization: A Unified Approach to Accelerate Feature and Data Attribution. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Hugh Chen, Ian C. Covert, Scott M. Lundberg, Su-In Lee |
Algorithms to estimate Shapley value feature attributions. |
Nat. Mac. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Soham Gadgil, Ian Covert, Su-In Lee |
Estimating Conditional Mutual Information for Dynamic Feature Selection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Chris Lin, Ian Covert, Su-In Lee |
On the Robustness of Removal-Based Feature Attributions. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ethan Weinberger, Ian Covert, Su-In Lee |
Feature Selection in the Contrastive Analysis Setting. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ian Covert, Wei Qiu, Mingyu Lu, Nayoon Kim, Nathan J. White, Su-In Lee |
Learning to Maximize Mutual Information for Dynamic Feature Selection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2491 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|