Sciweavers

2208 search results - page 46 / 442
» Privacy-Preserving Classifier Learning
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 6 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ISCI
2007
130views more  ISCI 2007»
15 years 2 months ago
Learning to classify e-mail
In this paper we study supervised and semi-supervised classification of e-mails. We consider two tasks: filing e-mails into folders and spam e-mail filtering. Firstly, in a sup...
Irena Koprinska, Josiah Poon, James Clark, Jason C...
225
Voted
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
16 years 3 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
ICTAI
2009
IEEE
15 years 9 months ago
Learning Link-Based Classifiers from Ontology-Extended Textual Data
Cornelia Caragea, Doina Caragea, Vasant Honavar