Sciweavers

776 search results - page 53 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICML
2009
IEEE
16 years 5 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
FGR
2006
IEEE
297views Biometrics» more  FGR 2006»
15 years 10 months ago
Automatic Skin Segmentation for Gesture Recognition Combining Region and Support Vector Machine Active Learning
Skin segmentation is the cornerstone of many applications such as gesture recognition, face detection, and objectionable image filtering. In this paper, we attempt to address the ...
Junwei Han, George Awad, Alistair Sutherland, Hai ...
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 4 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
169
Voted
JMLR
2008
148views more  JMLR 2008»
15 years 4 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
FLAIRS
2004
15 years 5 months ago
A Method Based on RBF-DDA Neural Networks for Improving Novelty Detection in Time Series
Novelty detection in time series is an important problem with application in different domains such as machine failure detection, fraud detection and auditing. An approach to this...
Adriano L. I. Oliveira, Fernando Buarque de Lima N...