Sciweavers

6318 search results - page 137 / 1264
» Data Leakage Detection
Sort
View
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
15 years 5 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee
ICCV
2005
IEEE
16 years 6 months ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani
ACSAC
2007
IEEE
15 years 11 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
DMIN
2006
152views Data Mining» more  DMIN 2006»
15 years 6 months ago
Anomaly Detection Using the Dempster-Shafer Method
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
CLEF
2010
Springer
15 years 5 months ago
Improving the Reliability of the Plagiarism Detection System - Lab Report for PAN at CLEF 2010
In this paper we describe our approach at the PAN 2010 plagiarism detection competition. We refer to the system we have used in PAN'09. We then present the improvements we hav...
Jan Kasprzak, Michal Brandejs