Sciweavers

6318 search results - page 30 / 1264
» Data Leakage Detection
Sort
View
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
15 years 10 months ago
Outlier detection by active learning
Naoki Abe, Bianca Zadrozny, John Langford
ICIP
2004
IEEE
15 years 11 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
GIS
2008
ACM
15 years 10 months ago
Data mining for visual exploration and detection of ecosystem disturbances
This paper presents a case study on the application of data mining to the problem of detecting ecosystem disturbances from vegetation cover data obtained from satellite observatio...
Haibin Cheng, Pang-Ning Tan, Christopher Potter, S...
FLAIRS
2009
14 years 7 months ago
Discovering Anomalies to Multiple Normative Patterns in Structural and Numeric Data
One of the primary issues with traditional anomaly detection approaches is their inability to handle complex, structural data. One approach to this issue involves the detection of...
William Eberle, Lawrence B. Holder