Sciweavers

6318 search results - page 53 / 1264
» Data Leakage Detection
Sort
View
PAKDD
2009
ACM
149views Data Mining» more  PAKDD 2009»
15 years 4 months ago
A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data
Detecting outliers which are grossly different from or inconsistent with the remaining dataset is a major challenge in real-world KDD applications. Existing outlier detection met...
Ke Zhang, Marcus Hutter, Huidong Jin
ICDM
2005
IEEE
199views Data Mining» more  ICDM 2005»
15 years 5 months ago
CoLe: A Cooperative Data Mining Approach and Its Application to Early Diabetes Detection
We present CoLe, a cooperative data mining approach for discovering hybrid knowledge. It employs multiple different data mining algorithms, and combines results from them to enhan...
Jie Gao, Jörg Denzinger, Robert C. James
PRDC
2006
IEEE
15 years 5 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
WWW
2008
ACM
16 years 17 days ago
Using subspace analysis for event detection from web click-through data
Although most of existing research usually detects events by analyzing the content or structural information of Web documents, a recent direction is to study the usage data. In th...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
KDD
2007
ACM
112views Data Mining» more  KDD 2007»
16 years 9 days ago
Statistical change detection for multi-dimensional data
This paper deals with detecting change of distribution in multi-dimensional data sets. For a given baseline data set and a set of newly observed data points, we define a statistic...
Xiuyao Song, Mingxi Wu, Christopher M. Jermaine, S...