Search
Search Results
-
A New Theoretical Framework for K-Means-Type Clustering
One of the fundamental clustering problems is to assign n points into k clusters based on the minimal sum-of-squares(MSSC), which is known to be... -
The Mathematics of Learning: Dealing with Data *
Learning is key to develo** systems tailored to a broad range of data analysis and information extraction tasks. We outline the mathematical... -
Web Page Classification*
This chapter describes systems that automatically classify web pages into meaningful categories. It first defines two types of web page... -
Clustering Via Decision Tree Construction
Clustering is an exploratory data analysis task. It aims to find the intrinsic structure of data by organizing data objects into similarity groups or... -
Sequential Pattern Mining by Pattern-Growth: Principles and Extensions*
Sequential pattern mining is an important data mining problem with broad applications. However, it is also a challenging problem since the mining may... -
Incremental Mining on Association Rules
The discovery of association rules has been known to be useful in selective marketing, decision analysis, and business management. An important... -
A Feature/Attribute Theory for Association Mining and Constructing the Complete Feature Set
A correct selection of features (attributes) is vital in data mining. For this aim, the complete set of features is constructed. Here are some... -
Web Mining – Concepts, Applications and Research Directions
From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data... -
Mining Association Rules from Tabular Data Guided by Maximal Frequent Itemsets
We propose the use of maximal frequent itemsets (MFIs) to derive association rules from tabular datasets. We first present an efficient method to... -
Privacy-Preserving Data Mining
The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The... -
Logical Regression Analysis: From Mathematical Formulas to Linguistic Rules
Data mining means the discovery of knowledge from (a large amount of)data, and so data mining should provide not only predictions but also knowledge... -
Smart Appliance Abnormal Electrical Power Consumption Detection
Potential cyber threats now have an immensely larger attack surface due to the widespread use of smart devices and smart environments. Smart home... -
Projective Space Stern Decoding and Application to SDitH
We show that here standard decoding algorithms for generic linear codes over a finite field can speeded up by a factor which is essentially the size... -
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT
Internet of Things (IoT) devices have revolutionized communication, transportation, healthcare, and many other fields. In particular, the adoption of... -
Device Fingerprinting in a Smart Grid CPS
Data integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms... -
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
The improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms... -
Game Theoretic Modeling of Insider Threats in an Organization
Insider threats have emerged as serious threats to organizations due to the rapid advancement and incorporation of communication technologies.... -
One Time Chat – A Toy End-to-End Encrypted Web Messaging Service
In the digital age, instant messaging (IM) is a cornerstone of communication, necessitating secure and efficient platforms. The One Time Chat web... -
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework
Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image... -
Physically Unclonable Fingerprints for Authentication
We have developed an innovative fingerprinting method using the melt-electrospinning printing process for product authentication. This method...